Learn More
A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1) over the Internet, 2) in an office environment with desktop PC, and 3) in indoor/outdoor environments with mobile portable(More)
This paper develops and demonstrates an original approach to face-image analysis based on identifying distinctive areas of each individual's face by its comparison to others in the population. The method differs from most others&#8212;that we refer as <i>unary</i>&#8212;where salient regions are defined by analyzing only images of the same individual. We(More)
We define a semantic-driven strategy to automatically associate stochas-tic information with the transitions of a π-calculus process by simply scanning their labels. To perform this step we enhance the labels of classical process algebras by encoding in them the proof of the corresponding transitions. We also discuss how stochastic information can be tuned(More)
Global computing applications coordinate distributed computations across widely-dispersed hosts. Such systems present formidable design and implementation challenges to software developers and syn-chronisation, scheduling and performance problems come to the fore. Complex systems such as these can benefit from the application of high-level performance(More)
A type flaw attack on a security protocol is an attack where an honest principal is cheated on interpreting a field in a message as the one with a type other than the intended one. In this paper, we shall present an extension of the LySa calculus with tags attached to each field, indicating the intended types. We developed a control flow analysis for(More)
Application or business logic, used in the development of services, has to do with the operations that define the application func-tionalities and not with the platform ones. Often security problems can be found at this level, because circumventing or misusing the required operations can lead to unexpected behaviour or to attacks, called application logic(More)
We show how a symbolic approach to the semantics of process algebras can be fruitfully applied to the modeling and analysis of partially unspecified biological systems, i.e., systems whose components are not fully known, cannot be described entirely, or whose functioning is not completely understood. This adds a novel deductive perspective to the use of(More)