isn't architecture a kind of programming of visual results ???




actually all CPU do just that kind of comparison process repeated
trillionths of time .
architecturing activities, inside processors, is also named programming.

biometrcics are just a modern tool to compare with some given standard

( how does the law systems , examined in a set of given countries, compare
what is referred hereunder as " convicted drug-runners, people who have
previously over-stayed or otherwise breached their visas, and terrorists.",
??? )


actually isn't architecture a kind of programming of visual results,
organizinf those first in the mind/vision/perception of the
author/artist/architect, eventually showing them into the mind of the
client, those results beeing later reproduced into magazine reproductions
available for the edification of their peers and eventually as postcards
available for tourists ....

...including repetitive tasks of drawing by archi-autocad, or even repeating
a good idea into various results (like the greek columns, roman arch,
gothic dômes, those beeing in the Parthenon, Caracallae thermae or Chartres
cathedrally erected building,, is , in some way, a repetition of some
previously invented improvment, eventually recapitulated, repeated , adapted
or reenacted....

Modern materials just changed this evolution / repetition concept and
applied them into new plastic forms.

Also some modern buildings (or at least some parts of them) woudn't
sustain an authentication process when compared to the ones they are derived
from.... many should have been blocked agaisnt an eventual good taste
list..

any art copies, reproduces or is inspired by "good ideas" or better
materials, and the trick is in making such pastiche invisible to the
"novatos" ... and effectively supporting the authentication...

Pat.

http://www.anu.edu.au/people/Roger.Clarke/DV/BioArch.html
". . .The category addressed here is authentication against a block-list. An
example of such an application would be at a border-checkpoint, where the
intention is to screen travellers against a database that contains biometric
reference-measures for persons who are not to be permitted to cross the
border. This could include such categories as convicted drug-runners, people
who have previously over-stayed or otherwise breached their visas, and
terrorists.

The architecture is as follows:





A process to apply that architecture could proceed as follows:
a sensor gathers a test-measure;
the sensor provides the test-measure to a Secure Processing Module (SPM);
the SPM enters into a two-way authentication process with a token carried by
the individual (e.g. in a chip-card performing the function of a passport);
the SPM requests from the token the biometric reference-measure, which has
been previously stored in it;
the token provides the biometric reference-measure;
the SPM computes the result. If the test-measure and reference-measure are
not sufficiently similar, then exception-handling procedures need to be
called into play. The remainder of this outline process description deals
with the mainstream case of an affirmation that the person presenting
themselves is the person to whom the token was issued;
the SPM requests from the token relevant data about the individual, which
has been previously stored in it (e.g. passport-number, date of issue, and
name);
the token provides the relevant data;
the SPM checks the relevant data against the block-list;
the SPM provides to the application only the authentication results:
'The person does/does not match the token'; and
'The person's identifier is /is not blocked'. . . ."




--
The Design-L list for art and architecture, since 1992...
To subscribe, send mailto:design-l-subscribe-request@xxxxxxxxxxxxx.
To signoff, send mailto:design-l-unsubscribe-request@xxxxxxxxxxxxx.
Visit archives: http://lists.psu.edu/archives/design-l.html

Partial thread listing: