Abstract: The search for local RNA secondary structures and the annotation of unusually stable folding regions in genomic sequences are two well motivated bioinformatic problems. I...
Andreas R. Gruber, Stephan H. F. Bernhart, You Zho...
: The current high-throughput sequencing technologies produce gigabytes of data even when prokaryotic genomes are processed. In a subsequent assembly phase, the generated overlappi...
A great need exists in many fields of eye-tracking research for a robust and general method for scanpath comparisons. Current measures either quantize scanpaths in space (string e...
Halszka Jarodzka, Kenneth Holmqvist, Marcus Nystr&...
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
: In this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of...
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It prese...
Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on pr...