Biometrics based on electroencephalogram (EEG) signals is an emerging research topic. Several recent results have shown its feasibility and potential for personal identification....
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Recognition algorithms that use data obtained by imaging faces in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often present...
Ognjen Arandjelovic, Riad I. Hammoud, Roberto Cipo...
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
P2P applications have found a lot of interest lately but there are open questions about the viability of the revenue models behind P2P applications/ services. In this paper, we di...