Sciweavers

23 search results - page 4 / 5
» Biometric Recognition - Security and Privacy Concerns
Sort
View
AMFG
2003
IEEE
126views Biometrics» more  AMFG 2003»
13 years 11 months ago
Rank Constrained Recognition under Unknown Illuminations
Recognition under illumination variations is a challenging problem. The key is to successfully separate the illumination source from the observed appearance. Once separated, what ...
Shaohua Kevin Zhou, Rama Chellappa

Book
640views
15 years 5 months ago
Introduction to Pattern Recognition
"Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typical...
Sargur Srihari
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
13 years 11 months ago
Student Model of Historical Text Comprehension
: In this contribution we present a Learner Model (LM) of Historical Text Comprehension (HTC), which infers the cognitive profile of learner’s global comprehension concerning the...
Grammatiki Tsaganou, Maria Grigoriadou, Theodora C...
HICSS
2005
IEEE
100views Biometrics» more  HICSS 2005»
13 years 11 months ago
'Today' Messages: Lightweight Support for Small Group Awareness via Email
‘Today’ messages are short status emails sent daily by members of a project team. We present the results of a field study of the use of ‘today’ messages by six small work ...
A. J. Bernheim Brush, Alan Borning
ICISS
2007
Springer
13 years 10 months ago
Performance Analysis for Multi Sensor Fingerprint Recognition System
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
Shimon K. Modi, Stephen J. Elliott, Hakil Kim