Sciweavers

12 search results - page 2 / 3
» Validating a Biometric Authentication System: Sample Size Re...
Sort
View
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
13 years 11 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
ICPR
2010
IEEE
13 years 9 months ago
Video Based Palmprint Recognition
The ability to carry out biometric authentication using generic cameras can be extremely useful for a variety of applications, especially in mobile devices. Palmprint based authen...
Chhaya Methani, Anoop Namboodiri
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
13 years 10 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
PRL
2007
287views more  PRL 2007»
13 years 5 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
BMCBI
2011
12 years 9 months ago
To aggregate or not to aggregate high-dimensional classifiers
Background: High-throughput functional genomics technologies generate large amount of data with hundreds or thousands of measurements per sample. The number of sample is usually m...
Cheng-Jian Xu, Huub C. J. Hoefsloot, Age K. Smilde