Sciweavers

1219 search results - page 57 / 244
» Verification of Equivalent-Results Methods
Sort
View
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
IJON
2002
72views more  IJON 2002»
13 years 8 months ago
Modeling large cortical networks with growing self-organizing maps
Self-organizing computational models with specific intracortical connections can explain many features of visual cortex. However, due to their computation and memory requirements,...
James A. Bednar, Amol Kelkar, Risto Miikkulainen
CVPR
2005
IEEE
14 years 10 months ago
Learning a Similarity Metric Discriminatively, with Application to Face Verification
We present a method for training a similarity metric from data. The method can be used for recognition or verification applications where the number of categories is very large an...
Sumit Chopra, Raia Hadsell, Yann LeCun
FLAIRS
2004
13 years 10 months ago
Speaker Verification Using Speaker-Specific Prompts
Intra- and inter-speaker information, which include acoustical, speaker style, speech rate and temporal variation, despite their critical importance for the verification of claims...
Yongxin Zhang, Adel Iskander Fahmy, Michael S. Sco...
IDEAL
2010
Springer
13 years 6 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...