This paper addresses the incorporation of quality measures to video-based person authentication. A theoretical framework to incorporate quality measures in biometric authentication...
When a person passes by a surveillance camera a sequence of image is obtained. Before performing any analysis on the face of a person, the face first needs to be detected and secon...
1 The latent semantic indexing (LSI) methodology for information retrieval applies the singular value decomposition to identify an eigensystem for a large matrix, in which cells re...
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
This paper seeks to frame one aspect of the Smart Grid discussion which has been under-recognized in regulatory and policy debates. Significant discussion has focused Smart Grid a...
Richard D. Tabors, Geoffrey Parker, Michael C. Car...
Today, there exists a huge variety of business document models for electronic data exchange among business partners used in business-to-business, business-to-government, as well a...
Michael Strommer, Christian Pichler, Philipp Liegl
Biometrics is an emerging field via the automated use of unique and measurable physiological or behavioral characteristics to determine or verify identity. Biometrics has a variet...
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...