Fuser block technologies performance based on identity attributes metrics models
暂无分享,去创建一个
[1] Hamzeh Khazaei,et al. Fingerprint Matching Algorithm Based on Voronoi Diagram , 2008, 2008 International Conference on Computational Sciences and Its Applications.
[2] Julian Fierrez. Adapted fusion schemes for multimodal biometric authentication (Esquemas adaptados de fusión para autenticación biométrica multimodal) , 2006 .
[3] Marit Hansen,et al. Identity management throughout one's whole life , 2008, Inf. Secur. Tech. Rep..
[4] Fadi N. Sibai,et al. Iris recognition using artificial neural networks , 2011, Expert Syst. Appl..
[5] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[6] Abdel Nasser H. Zaied,et al. Development of a fuzzy logic traffic system for isolated signalized intersections in the State of Kuwait , 2011, Expert Syst. Appl..
[7] Theodora Varvarigou,et al. Identity management in GRID computing and Service Oriented Architectures: research and practice , 2009 .
[8] Banafshe Arbab-Zavar,et al. On guided model-based analysis for ear biometrics , 2011, Comput. Vis. Image Underst..
[9] Cornelia M. Ruland,et al. Secure solution for mobile access to patient's health care record , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[10] Michael Negnevitsky,et al. Artificial Intelligence: A Guide to Intelligent Systems , 2001 .
[11] Xiao-qiang Zhang,et al. Neural Network Based Algorithm and Simulation of Information Fusion in the Coal Mine , 2007 .
[12] Madasu Hanmandlu,et al. Score level fusion of multimodal biometrics using triangular norms , 2011, Pattern Recognit. Lett..
[13] Yinan Yang,et al. Profile-based digital identity management — a better way to combat fraud , 2010, 2010 IEEE International Symposium on Technology and Society.
[14] Sebastian Möller,et al. Identity theft, computers and behavioral biometrics , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[15] L. Anthony,et al. AntConc: design and development of a freeware corpus analysis toolkit for the technical writing classroom , 2005, IPCC 2005. Proceedings. International Professional Communication Conference, 2005..
[16] Suziah Sulaiman,et al. User requirement model for federated identities threats , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[17] Gang Liu,et al. Antiphishing through Phishing Target Discovery , 2012, IEEE Internet Computing.
[18] Yi Pan,et al. A Reliable Metric for Quantifying Multiple Sequence Alignment , 2007, 2007 IEEE 7th International Symposium on BioInformatics and BioEngineering.
[19] Tiejun Zhao,et al. Identity attributes quantitative analysis and the development of a metrics model using text mining techniques and information theory , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[20] Patrick J. Flynn,et al. Genetically identical irises have texture similarity that is not detected by iris biometrics , 2011, Comput. Vis. Image Underst..
[21] Michael Hamelin. Preparing for a firewall audit , 2011, Netw. Secur..