This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
When attempting to code faces for modeling or recognition, estimates of dimensions are typically obtained from an ensemble. These tend to be significantly sub-optimal. Firstly, en...
Nicholas Costen, Timothy F. Cootes, Christopher J....
Multiprocessor platforms have been widely adopted in both embedded and server systems. In addition to the performance improvement, multiprocessor systems could have the flexibili...
We describe a new approach of the generalized Bezout identity for linear time-varying ordinary differential control systems. We also explain when and how it can be extended to line...
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...