Sciweavers

13651 search results - page 2698 / 2731
» Spectral analysis of data
Sort
View
PAMI
2006
186views more  PAMI 2006»
13 years 10 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
PAMI
2006
145views more  PAMI 2006»
13 years 10 months ago
Reflectance Sharing: Predicting Appearance from a Sparse Set of Images of a Known Shape
Three-dimensional appearance models consisting of spatially varying reflectance functions defined on a known shape can be used in analysis-by-synthesis approaches to a number of vi...
Todd Zickler, Ravi Ramamoorthi, Sebastian Enrique,...
PAMI
2006
155views more  PAMI 2006»
13 years 10 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
SIAMCO
2008
108views more  SIAMCO 2008»
13 years 10 months ago
A Viability Theorem for Morphological Inclusions
The aim of this paper is to adapt the Viability Theorem from differential inclusions (governing the evolution of vectors in a finite dimensional space) to so-called morphological i...
Thomas Lorenz
QUESTA
2006
94views more  QUESTA 2006»
13 years 10 months ago
Modeling teletraffic arrivals by a Poisson cluster process
In this paper we consider a Poisson cluster process N as a generating process for the arrivals of packets to a server. This process generalizes in a more realistic way the infinite...
Gilles Faÿ, Bárbara González-Ar...
« Prev « First page 2698 / 2731 Last » Next »