Sciweavers

130 search results - page 10 / 26
» User Authentication through Typing Biometrics Features
Sort
View
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
14 years 23 days ago
Increase of Potential Intellectual Bandwidth in a Scientific Community through Implementation of an End-User Information System
Qureshi, et al. (2002) [1] presented a case study where they used a framework, the Intellectual Bandwidth Model to measure an organization’s ability to create value. The model c...
Christian Bach, Salvatore Belardo, Jing Zhang
HICSS
2010
IEEE
228views Biometrics» more  HICSS 2010»
14 years 2 months ago
How to Establish an Online Innovation Community? the Role of Users and Their Innovative Content
We studied the evolution of an online innovation community and users’ interaction behavior through social network analysis to explore how to build an innovation community and ge...
Julia Hautz, Katja Hutter, Johann Füller, Kur...
ICB
2007
Springer
136views Biometrics» more  ICB 2007»
14 years 1 months ago
Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation
Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure of simi...
Daniel González-Jiménez, Manuele Bic...
DICTA
2007
13 years 9 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
CISIM
2007
IEEE
14 years 1 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik