Sciweavers

1215 search results - page 50 / 243
» A theory of Error-Rate Testing
Sort
View
TSMC
2008
172views more  TSMC 2008»
13 years 10 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
TSP
2008
99views more  TSP 2008»
13 years 10 months ago
Low-Complexity Block Turbo Equalization for OFDM Systems in Time-Varying Channels
We propose low-complexity block turbo equalizers for orthogonal frequency-division multiplexing (OFDM) systems in time-varying channels. The presented work is based on a soft minim...
Kun Fang, Luca Rugini, Geert Leus
MVA
2002
13 years 9 months ago
Automatic Feature Extraction from non-uniform Finger Vein Image and its Application to Personal Identification
A new method to extract vein patterns from an unclear finger image is proposed. Finger vein pattern can be used for personal identification technology. The finger vein image that ...
Naoto Miura, Akio Nagasaka, Takafumi Miyatake
TASLP
2002
124views more  TASLP 2002»
13 years 9 months ago
A robust compensation strategy for extraneous acoustic variations in spontaneous speech recognition
In this paper, we propose a robust compensation strategy to deal effectively with extraneous acoustic variations for spontaneous speech recognition. This strategy extends speaker a...
Hui Jiang, Li Deng
PRL
2007
180views more  PRL 2007»
13 years 9 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...