Abstract. The implementation of a pseudo text-independent Speaker Verification system is described. This system was designed to use only information extracted directly from the cod...
Antonio Moreno-Daniel, Biing-Hwang Juang, Juan Art...
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
In this paper we describe a robust and efficient procedure to detect skin region with homogeneous color values in monocular indoor images. The mathematical background is a functio...
Physically disabled and mentally challenged people are an important part of our society that has not yet received the same opportunities as others in their inclusion in the Inform...
Javier Varona, Cristina Manresa-Yee, Francisco J. ...