Probabilistic model for comparing the effectiveness of counterfeit deterrent features
暂无分享,去创建一个
[1] Charles J. Geyer,et al. Practical Markov Chain Monte Carlo , 1992 .
[2] Sara E. Church,et al. Evaluation of security features in new design of U.S. currency , 1998, Electronic Imaging.
[3] David J. Pizzanelli. Counterfeit holograms and simulations , 1998, Electronic Imaging.
[4] Giuseppe Carenini,et al. Dealing with the Expert Inconsistency in Probability Elicitation , 2000, IEEE Trans. Knowl. Data Eng..
[5] John W. Mercer. Document fraud deterrent strategies: four case studies , 1998, Electronic Imaging.
[6] David Draper,et al. Assessment and Propagation of Model Uncertainty , 2011 .
[7] J. D. Brongers. Search for effective document security by inventioneering , 1998, Electronic Imaging.
[8] Gordon E. Pickett. How do you select the right security features for your company's products , 1998, Electronic Imaging.
[9] R.. Sensitivity & Uncertainty Analysis of Markov-Reward Models , 2004 .
[10] Richard C. Benson,et al. Technology approaches to currency security , 1998, Electronic Imaging.
[11] Linda C. van der Gaag,et al. Supporting Probability Elicitation by Sensitivity Analysis , 1997, EKAW.
[12] Sara E. Church,et al. Evaluation of security features for new U.S. currency , 1996, Electronic Imaging.
[13] Rudolf L. van Renesse,et al. Verifying versus falsifying banknotes , 1998 .