Performance of the perceptron algorithm for the classification of computer users
暂无分享,去创建一个
[1] Mohammad S. Obaidat,et al. Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..
[2] Bassam Hussien,et al. An application of fuzzy algorithms in a computer access security system , 1989, Pattern Recognit. Lett..
[3] Yoh-Han Pao,et al. Adaptive pattern recognition and neural networks , 1989 .
[4] Réjean Plamondon,et al. Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..
[5] Julius T. Tou,et al. Pattern Recognition Principles , 1974 .
[6] Mohammad S. Obaidat,et al. An automated system for characterizing ultrasonic transducers using pattern recognition , 1992 .
[7] Hussein Almuallim,et al. A Method of Recognition of Arabic Cursive Handwriting , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..