A probabilistic risk analysis for multimodal entry control
暂无分享,去创建一个
[1] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[2] Jon T. S. Quah,et al. Real Time Credit Card Fraud Detection using Computational Intelligence , 2007, 2007 International Joint Conference on Neural Networks.
[3] D.L. Wilson. Intelligent video systems for perimeter and secured entry access control , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
[4] S. K. Satpathy,et al. An Adaptive Modular Approach to the Mining of Sensor Network Data , 2011 .
[5] P. J. Williams,et al. Data fusion on a distributed heterogeneous sensor network , 2006, SPIE Defense + Commercial Sensing.
[6] Lykourgos Petropoulakis,et al. An ambient software monitoring system for unsupervised user modelling , 2005, Expert Syst. Appl..
[7] S. Kovacic,et al. Motion Based Human Identification Using Histograms of Optical Flow , 2007 .
[8] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[9] Te-Hsiu Sun,et al. Using backpropagation neural network for face recognition with 2D + 3D hybrid information , 2008, Expert Syst. Appl..
[10] H. Lan,et al. SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .
[11] Huaiqing Wang,et al. Intelligent agent-assisted decision support systems: Integration of knowledge discovery, knowledge analysis, and group decision support , 1997 .
[12] Mitsuo Gen,et al. Unusual human behavior recognition using evolutionary technique , 2009, Comput. Ind. Eng..
[13] Ricardo Vilalta,et al. Metalearning - Applications to Data Mining , 2008, Cognitive Technologies.
[14] Ian H. Witten,et al. Data mining - practical machine learning tools and techniques, Second Edition , 2005, The Morgan Kaufmann series in data management systems.
[15] Ricardo Vilalta,et al. A Perspective View and Survey of Meta-Learning , 2002, Artificial Intelligence Review.
[16] Thomas J. Alexandre,et al. Biometrics on smart cards: An approach to keyboard behavioral signature , 1997, Future Gener. Comput. Syst..
[17] Markus M. Breunig. Quality Driven Database Mining (Zusammenfassung) , 2001, Datenbank Rundbr..
[18] Siu-Yeung Cho,et al. A local experts organization model with application to face emotion recognition , 2009, Expert Syst. Appl..
[19] Ye Zhang,et al. Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes , 2007, KSEM.
[20] Wahyudi,et al. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS) for Building Security , 2007 .
[21] John J. McCarthy,et al. The Rule Engine for the Java Platform , 2008 .
[22] Ian Horrocks,et al. From SHIQ and RDF to OWL: the making of a Web Ontology Language , 2003, J. Web Semant..
[23] Julian Fiérrez,et al. Adapted user-dependent multimodal biometric authentication exploiting general information , 2005, Pattern Recognit. Lett..
[24] Markus M. Breunig. Quality driven database mining , 2001 .