Sciweavers

202 search results - page 34 / 41
» Face Authentication for Banking
Sort
View
IICAI
2003
13 years 9 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
ICIAP
2007
ACM
14 years 7 months ago
Video Biometrics
In this paper we propose multimodal fusion of super resolved texture (SRT) features and 3D shape features with acoustic features for 3D audio-video person authentication systems w...
Rama Chellappa, Gaurav Aggarwal
MA
1999
Springer
155views Communications» more  MA 1999»
13 years 12 months ago
JGram: Rapid Development of Multi-Agent Pipelines for Real-World Tasks
Many real-world tasks can be decomposed into pipelines of sequential operations (where subtasks may themselves be composed of one or more pipelines). JGram is a framework enabling...
Rahul Sukthankar, Antoine Brusseau, Ray Pelletier,...
ICIS
1998
13 years 9 months ago
An activity based costing approach to systems development and implementation
Many organizations are in the process of replacing legacy systems with large, integrated systems using new technological platforms. Accurate estimation of project resources requir...
Ginny Ooi, Christina Soh, Pui Mun Lee
BIB
2008
106views more  BIB 2008»
13 years 7 months ago
Biodiversity informatics: the challenge of linking data and the role of shared identifiers
A major challenge facing biodiversity informatics is integrating data stored in widely distributed databases. Initial efforts have relied on taxonomic names as the shared identifi...
Roderic D. M. Page