Sciweavers

1437 search results - page 28 / 288
» Content Extraction Signatures
Sort
View
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
13 years 5 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
INTERSPEECH
2010
13 years 2 months ago
On the potential of glottal signatures for speaker recognition
Most of current speaker recognition systems are based on features extracted from the magnitude spectrum of speech. However the excitation signal produced by the glottis is expecte...
Thomas Drugman, Thierry Dutoit
GLOBECOM
2007
IEEE
14 years 1 months ago
A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System
Abstract—Network Intrusion Detection and Prevention Systems (NIDPSs) are vital in the fight against network intrusions. NIDPSs search for certain malicious content in network tr...
N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jo...
FGR
2006
IEEE
132views Biometrics» more  FGR 2006»
14 years 1 months ago
Using a Tensor Framework for the Analysis of Facial Dynamics
Research has shown that the dynamics of facial motion are important in the perception of gender, identity, and emotion. In this paper we show that it is possible to use a multilin...
Lisa Gralewski, Neill W. Campbell, Ian Penton-Voak
CEAS
2007
Springer
14 years 1 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury