Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
Abstract. In state-of-the-art iris recognition systems, the input iris image has to be compared with a large number of templates in database. When the scale of iris database increa...
: In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be u...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
—Classification has been used for modeling many kinds of data sets, including sets of items, text documents, graphs, and networks. However, there is a lack of study on a new kind...