Marcos A Rodrigues

Learn More
one copy of any article(s) in SHURA to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. Abstract 1 In this paper we discuss our approach to real-time 3D face recognition. We argue the need for real time operation in a(More)
In this paper, we discuss methods for incorporating data acquired as 3D surface scans of human faces into applications such as 3D animation and biometric 3D facial recognition. In both applications the challenge is to accurately and consistently find predefined features such as the corners of the eyes and the tip of the nose. In the field of biometry, if 3D(More)
The present study evaluated the role of N-methyl-D-aspartate receptors (NMDARs) expressed in the dorsal root ganglia (DRG) in the inflammatory sensitization of peripheral nociceptor terminals to mechanical stimulation. Injection of NMDA into the fifth lumbar (L5)-DRG induced hyperalgesia in the rat hind paw with a profile similar to that of intraplantar(More)
(2011). Fast 3D recognition for forensics and counter-terrorism applications. In: AKHGAR, Babak and YATES, Simeon, (eds.) Intelligence management : knowledge driven frameworks for combating terrorism and organized crime. Advanced information and knowledge processing. London, Springer-Verlag, 95-109. one copy of any article(s) in SHURA to facilitate their(More)
We are investigating the design of machine vision algorithms for real time inspection of filter components for quality assurance. Filter components are rigid 3D objects with predefined geometry so that a good deal of knowledge can be incorporated into the system design. However, while the objective is to reason about 3D structure, current machine vision(More)
one copy of any article(s) in SHURA to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. Abstract—This paper addresses the issue of real time gender classification through texture analysis. The purpose is to perform(More)
The European Council has concluded in October 2013 that " It is important to foster the trust of citizens and businesses in the digital economy. The timely adoption of a strong EU General Data Protection framework and the Cyber-Security Directive is essential for the completion of the Digital Single Market by 2015. " This paper discusses the collection and(More)
Every software has an architecture, but in most cases it is poorly documented. That's especially true in virtual community for software development, where creating and updating documents is not a high priority activity and architectural knowledge remain hidden in informal and semi-structured artifacts, such as e-mails, meeting notes and Wikis. We propose a(More)
Given that cloud computing is a remotely accessed service, the connection between provider and customer needs to be adequately protected against all known security risks. In order to ensure this, an open and clear specification of all standards, algorithms and security protocols adopted by the cloud provider is required. In this paper, we review current(More)
The European Council has concluded in October 2013 that " It is important to foster the trust of citizens and businesses in the digital economy. The timely adoption of a strong EU General Data Protection framework and the Cyber-security Directive is essential for the completion of the Digital Single Market by 2015. " This paper discusses the collection and(More)