Sciweavers

239 search results - page 38 / 48
» Biometric Identification of Mice
Sort
View
116
Voted
PDCAT
2005
Springer
15 years 7 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
156
Voted
WIS
2004
15 years 3 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
BMCBI
2011
14 years 5 months ago
Determinants of Antigenicity and Specificity in immune response for Protein Sequences
Background: Target specific antibodies are pivotal for the design of vaccines, immunodiagnostic tests, studies on proteomics for cancer biomarker discovery, identification of prot...
Yulong Wang, Wenjun Wu, Nicolas N. Negre, Kevin P....
AVBPA
2003
Springer
100views Biometrics» more  AVBPA 2003»
15 years 7 months ago
Open World Face Recognition with Credibility and Confidence Measures
This paper describes a novel framework for the Open World face recognition problem, where one has to provide for the Reject option. Based upon algorithmic randomness and transducti...
Fayin Li, Harry Wechsler
119
Voted
ICPR
2010
IEEE
14 years 11 months ago
Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions
Abstract-- This work studies the performance of a stateof-the-art fingerprint recognition technology, in several practical scenarios of interest in forensic casework. First, the di...
Maria Puertas, Daniel Ramos, Julian Fiérrez...