Sciweavers

1617 search results - page 268 / 324
» On the Performance and Use of Speaker Recognition Systems fo...
Sort
View
KDD
2009
ACM
160views Data Mining» more  KDD 2009»
14 years 3 months ago
Clustering event logs using iterative partitioning
The importance of event logs, as a source of information in systems and network management cannot be overemphasized. With the ever increasing size and complexity of today’s even...
Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangel...
ICFHR
2010
139views Biometrics» more  ICFHR 2010»
13 years 3 months ago
A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods
Abstract--Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based auth...
Marcos Martinez-Diaz, C. Martin-Diaz, Javier Galba...
TSMC
2002
135views more  TSMC 2002»
13 years 8 months ago
Fuzzy decision tree, linguistic rules and fuzzy knowledge-based network: generation and evaluation
A fuzzy knowledge-based network is developed based on the linguistic rules extracted from a fuzzy decision tree. A scheme for automatic linguistic discretization of continuous attr...
Sushmita Mitra, Kishori M. Konwar, Sankar K. Pal
RTAS
2003
IEEE
14 years 2 months ago
Collaborative Operating System and Compiler Power Management for Real-Time Applications
Managing energy consumption has become vitally important to battery operated portable and embedded systems. A dynamic voltage scaling (DVS) technique reduces the processor’s dyn...
Nevine AbouGhazaleh, Daniel Mossé, Bruce R....
ICIP
2009
IEEE
13 years 6 months ago
Finger-knuckle-print: A new biometric identifier
This paper presents a new biometric identifier, namely finger-knuckle-print (FKP), for personal identity authentication. First a specific data acquisition device is constructed to...
Lin Zhang, Lei Zhang 0006, David Zhang