Sciweavers

466 search results - page 14 / 94
» Biometric Identification System Based on Electrocardiogram D...
Sort
View
ICPR
2006
IEEE
14 years 1 months ago
A fusion methodology based on Dempster-Shafer evidence theory for two biometric applications
Different features carry more or less rich and varied pieces of information to characterize a pattern. The fusion of these different sources of information can provide an opportun...
Muhammad Arif, Thierry Brouard, Nicole Vincent
ACSAC
2005
IEEE
14 years 1 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
14 years 1 months ago
IT-Benefits-Management in the Swiss Financial Sector
Companies engage in IT-projects in order to gain some benefits; however they complain that those benefits are difficult to achieve. On the basis of a survey in the Swiss financial...
Gerhard Schwabe, Pascal Bänninger
FGR
2000
IEEE
141views Biometrics» more  FGR 2000»
13 years 11 months ago
Memory-Based Face Recognition for Visitor Identification
We show that a simple, memory-based technique for appearance-based face recognition, motivated by the realworld task of visitor identification, can outperform more sophisticated a...
Terence Sim, Rahul Sukthankar, Matthew D. Mullin, ...
HICSS
2005
IEEE
190views Biometrics» more  HICSS 2005»
14 years 1 months ago
Blob Analysis of the Head and Hands: A Method for Deception Detection
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands bas...
Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas...