This article presents a method aiming at quantifying the visual similarity between an image and a class model. This kind of problem is recurrent in many applications such as objec...
Abstract. This paper presents a method to decompose a field of surface normals (needle-map). A diffusion process is used to model the flow of height information induced by a fi...
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
This paper gives an insight into biometrics used for speaker recognition. Three different biometrics are presented, based on: acoustic, geometric lip, and holistic facial features...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...