Sciweavers

1466 search results - page 16 / 294
» Completeness of the Authentication Tests
Sort
View
FGR
2002
IEEE
175views Biometrics» more  FGR 2002»
14 years 19 days ago
On Modeling Variations for Face Authentication
In this paper, we present a scheme for face authentication in the presence of variations. To deal with variations, such as facial expressions and registration errors, with which t...
Xiaoming Liu 0002, Tsuhan Chen, B. V. K. Vijaya Ku...
AVBPA
2005
Springer
347views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Palmprint Authentication Based on Orientation Code Matching
Abstract. This paper presents a novel approach of palmprint authentication by matching the orientation code. In this approach, each point on a palmprint is assigned a orientation. ...
Xiangqian Wu, Kuanquan Wang, David Zhang
CRV
2006
IEEE
242views Robotics» more  CRV 2006»
14 years 1 months ago
User Authentication based on Face Recognition with Support Vector Machines
The present paper proposes an authentication scheme which relies on face biometrics and one-class Support Vector Machines. The proposed recognition procedures are based on both a ...
Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandr...
WWW
2011
ACM
13 years 2 months ago
Query completion without query logs for song search
We describe a new method for query completion for Bollywood song search without using query logs. Since song titles in nonEnglish languages (Hindi in our case) are mostly present ...
Nitin Dua, Kanika Gupta, Monojit Choudhury, Kalika...
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi