Sciweavers

466 search results - page 10 / 94
» Biometric Identification System Based on Electrocardiogram D...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICB
2007
Springer
238views Biometrics» more  ICB 2007»
13 years 11 months ago
Keypoint Identification and Feature-Based 3D Face Recognition
We present a feature-based 3D face recognition algorithm and propose a keypoint identification technique which is repeatable and identifies keypoints where shape variation is high ...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
CCECE
2006
IEEE
14 years 1 months ago
Human Vs. Automatic Measurement of Biometric Sample Quality
Biometric systems are designed to identify a person based on physiological or behavioral characteristics. In order to predict the utility of a particular image for identification,...
Andy Adler, Tatyana Dembinsky
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 11 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
MLMI
2005
Springer
14 years 29 days ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio