Sciweavers

40 search results - page 3 / 8
» Evaluation Techniques for Biometrics-Based Authentication Sy...
Sort
View
PAMI
2006
155views more  PAMI 2006»
13 years 5 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
ICIP
2002
IEEE
14 years 6 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson
WSC
2004
13 years 6 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
ICIP
2002
IEEE
14 years 6 months ago
Polynomial features for robust face authentication
In this paper we introduce the DCT-mod2 facial feature extraction technique which utilizes polynomial coefficients derived from 2-D DCT coefficients of spatially neighbouring bloc...
Conrad Sanderson, Kuldip K. Paliwal
ACL
2006
13 years 6 months ago
FAST - An Automatic Generation System for Grammar Tests
This paper introduces a method for the semi-automatic generation of grammar test items by applying Natural Language Processing (NLP) techniques. Based on manually-designed pattern...
Chia-Yin Chen, Hsien-Chin Liou, Jason S. Chang