Sciweavers

75 search results - page 8 / 15
» A Novel Scheme for Fingerprint Identification
Sort
View
ICIAP
2003
ACM
14 years 8 months ago
Multimodal biometric authentication using quality signals in mobile communications
The elements of multimodal authentication along with system models are presented. These include the machine experts as well as machine supervisors. In particular fingerprint and s...
Josef Bigün, Julian Fiérrez-Aguilar, J...
ICB
2009
Springer
194views Biometrics» more  ICB 2009»
14 years 3 months ago
FM Model Based Fingerprint Reconstruction from Minutiae Template
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Jianjiang Feng, Anil K. Jain
ICPR
2008
IEEE
14 years 3 months ago
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
BMCBI
2010
125views more  BMCBI 2010»
13 years 8 months ago
A computational screen for site selective A-to-I editing detects novel sites in neuron specific Hu proteins
Background: Several bioinformatic approaches have previously been used to find novel sites of ADAR mediated A-to-I RNA editing in human. These studies have discovered thousands of...
Mats Ensterö, Örjan Åkerborg, Dani...