Sciweavers

MEDBIOMETRICS
2010
13 years 5 months ago
A DIAMOND Method for Classifying Biological Data
This study proposes an effective method called DIAMOND to classify biological and medical data. Given a set of objects with some classes, DIAMOND separates the objects into differe...
Han-Lin Li, Yao-Huei Huang, Ming-Hsien Chen
HICSS
2010
IEEE
181views Biometrics» more  HICSS 2010»
13 years 5 months ago
Standards Initiatives for Software Product Line Engineering and Management within the International Organization for Standardiza
Abstract: Software product line engineering is an established methodology for fast and effective development of software-intensive systems and services. To reap maximum benefits fr...
Timo Käkölä
PAMI
2007
208views more  PAMI 2007»
13 years 6 months ago
Biometric Recognition Using 3D Ear Shape
—Previous works have shown that the ear is a promising candidate for biometric identification. However, in prior work, the preprocessing of ear images has had manual steps and al...
Ping Yan, Kevin W. Bowyer
PR
2006
167views more  PR 2006»
13 years 6 months ago
Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system's accuracy. Despite many works in the literature, it is surprising t...
Norman Poh, Samy Bengio
PR
2008
113views more  PR 2008»
13 years 6 months ago
Heart sound as a biometric
In this paper, we investigate the possibility of using heart sound as a biometric for human identification. The most significant contribution of using heart sound as a biometric is...
Koksoon Phua, Jianfeng Chen, Tran Huy Dat, Louis S...
COMPUTER
2010
147views more  COMPUTER 2010»
13 years 6 months ago
Authentication by Biometric Verification
:-Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human b...
Ron Vetter
HICSS
2008
IEEE
142views Biometrics» more  HICSS 2008»
13 years 6 months ago
K-Trunk and Efficient Algorithms for Finding a K-Trunk on a Tree Network
Given an edge-weighted tree T, a k-trunk is a subtree Tk with k leaves in T which minimizes the sum of the distances of all vertices in T from Tk plus the weight of Tk. In this pa...
Yamin Li, Shietung Peng, Wanming Chu
HICSS
2008
IEEE
127views Biometrics» more  HICSS 2008»
13 years 6 months ago
A Dyadic Model of Interorganizational Systems (IOS) Adoption Maturity
Interorganizational Systems (IOS) adoption requires cooperation and collaboration between trading partners and, therefore, is reliant on the nature of their relationships. There h...
Mazen Ali, Sherah Kurnia, Robert B. Johnston
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
13 years 6 months ago
From Adoption to Diffusion of a Telehealth Innovation
Telehealth innovations promise to provide extensive medical benefits by increasing access to healthcare services and lowering costs at the same time. However, while many telehealt...
Sunyoung Cho, Lars Mathiassen, Michael Gallivan