Sciweavers

485 search results - page 32 / 97
» On the Individuality of the Iris Biometric
Sort
View
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
14 years 1 months ago
Applying Multiple Query Optimization in Mobile Databases
We apply multiple query optimization to batches of pull (on-demand) requests in a mobile database system. The resulting view can answer several queries at once, and it is broadcas...
Rajeswari Malladi, Karen C. Davis
IJPRAI
2008
136views more  IJPRAI 2008»
13 years 8 months ago
Comparison of ROC and Likelihood Decision Methods in Automatic Fingerprint Verification
The biometric verification task is to determine whether or not an input and a template belong to the same individual. In the context of automatic fingerprint verification the task...
Sargur N. Srihari, Harish Srinivasan
FGR
2008
IEEE
231views Biometrics» more  FGR 2008»
14 years 3 months ago
Personalized facial attractiveness prediction
We present an approach to learning the personal preferences of individual users directly from example images. The target application is computer assisted search of partners in onl...
Jacob Whitehill, Javier R. Movellan
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
14 years 2 days ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
ICPR
2010
IEEE
13 years 6 months ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...