Manolis Sardis

Learn More
The biometric identification of individuals has many safety and security applications in several fields of major interest. This can range from healthcare to commerce and from defense to banking systems. Current bio-metric technologies are hardly suitable for remote online massive use. This paper presents an innovative approach to design advanced biometric(More)
Workflow management systems exactly enact business procedures and processes described in a process description language. This strict adherence to the prescribed workflow makes it impossible for the system to adapt to unforeseen circumstances. Surveillance systems have unpredicted information especially in difficult environments like the industrial ones. In(More)
This paper describes a tool chain for monitoring complex workflows. Statistics obtained from automatic workflow monitoring in a car assembly environment assist in improving industrial safety and process quality. To this end, we propose automatic detection and tracking of humans and their activity in multiple networked cameras. The described tools offer(More)
In this paper, we propose a self configurable cognitive architecture for supervising video data in manufacturing environments. The architecture supports weakly supervised learning algorithms and self-adaptation strategies for analysis of visually observable procedures. The research proposed directly affects ease of deployment and minimises effort of(More)
Scholarly Contributions [Data Provided by ] Editorial on "qoS and service provisioning for integrated wireless networks" Towards a collaborative ranking mechanism for efficient and personalized internet search service provisioning On the feasibility of applying capturerecapture experiments for web evolution estimations Design and implementation of a(More)
Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a(More)