Sciweavers

BIOID
2008
130views Biometrics» more  BIOID 2008»
13 years 8 months ago
Quality-Based Score Normalization and Frame Selection for Video-Based Person Authentication
This paper addresses the incorporation of quality measures to video-based person authentication. A theoretical framework to incorporate quality measures in biometric authentication...
Enrique Argones-Rúa, José Luis Alba-...
BIOID
2008
100views Biometrics» more  BIOID 2008»
13 years 8 months ago
Face Quality Assessment System in Video Sequences
When a person passes by a surveillance camera a sequence of image is obtained. Before performing any analysis on the face of a person, the face first needs to be detected and secon...
Kamal Nasrollahi, Thomas B. Moeslund
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
13 years 8 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
HICSS
2010
IEEE
200views Biometrics» more  HICSS 2010»
13 years 8 months ago
Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web Search
1 The latent semantic indexing (LSI) methodology for information retrieval applies the singular value decomposition to identify an eigensystem for a large matrix, in which cells re...
Houssain Kettani, Gregory B. Newby
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 8 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
HICSS
2010
IEEE
176views Biometrics» more  HICSS 2010»
13 years 8 months ago
Development of the Smart Grid: Missing Elements in the Policy Process
This paper seeks to frame one aspect of the Smart Grid discussion which has been under-recognized in regulatory and policy debates. Significant discussion has focused Smart Grid a...
Richard D. Tabors, Geoffrey Parker, Michael C. Car...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
13 years 8 months ago
On Mapping Business Document Models to Core Components
Today, there exists a huge variety of business document models for electronic data exchange among business partners used in business-to-business, business-to-government, as well a...
Michael Strommer, Christian Pichler, Philipp Liegl
ACMSE
2008
ACM
13 years 8 months ago
Biometrics education with hands-on labs
Biometrics is an emerging field via the automated use of unique and measurable physiological or behavioral characteristics to determine or verify identity. Biometrics has a variet...
Li Yang, Kathy Winters, Joseph M. Kizza
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
13 years 10 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek