Sciweavers

240 search results - page 39 / 48
» From fingerprint to writeprint
Sort
View
NSDI
2010
13 years 11 months ago
EndRE: An End-System Redundancy Elimination Service for Enterprises
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design ...
Bhavish Agarwal, Aditya Akella, Ashok Anand, Athul...
NAR
1998
94views more  NAR 1998»
13 years 9 months ago
HuGeMap: a distributed and integrated Human Genome Map database
The HuGeMap database stores the major genetic and physical maps of the human genome. It is also interconnected with the gene radiation hybrid mapping database RHdb. HuGeMap is acc...
Emmanuel Barillot, Frédéric Guyon, C...
ICIP
2008
IEEE
14 years 11 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
ICPR
2006
IEEE
14 years 11 months ago
Quality-based Score Level Fusion in Multibiometric Systems
The quality of biometric samples has a significant impact on the accuracy of a matcher. Poor quality biometric samples often lead to incorrect matching results because the feature...
Anil K. Jain, Karthik Nandakumar, Sarat C. Dass, Y...
CSE
2009
IEEE
14 years 4 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...