Sciweavers

8 search results - page 2 / 2
» Vulnerability Assessment of Fingerprint Matching Based on Ti...
Sort
View
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 6 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
ICGA
2006
97views Optimization» more  ICGA 2006»
13 years 5 months ago
Computer Analysis of World Chess Champions
Who is the best chess player of all time? Chess players are often interested in this question that has never been answered authoritatively, because it requires comparison between c...
Matej Guid, Ivan Bratko
ICARIS
2003
Springer
13 years 10 months ago
An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems
Supermarkets lose millions of pounds every year through lost trading and stock wastage caused by the failure of refrigerated cabinets. Therefore, a huge commercial market exists fo...
Dan W. Taylor, David Corne