Sciweavers

239 search results - page 39 / 48
» Biometric Identification of Mice
Sort
View
CSREASAM
2009
14 years 9 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
117
Voted
ICIAP
2009
ACM
14 years 9 months ago
On the Quantitative Estimation of Short-Term Aging in Human Faces
Facial aging has been only partially studied in the past and mostly in a qualitative way. This paper presents a novel approach to the estimation of facial aging aimed to the quanti...
Marcos Ortega, Linda Brodo, Manuele Bicego, Massim...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 6 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICB
2009
Springer
137views Biometrics» more  ICB 2009»
15 years 6 months ago
Direct Pore Matching for Fingerprint Recognition
Abstract. Sweat pores on fingerprints have proven to be useful features for personal identification. Several methods have been proposed for pore matching. The state-of-the-art meth...
Qijun Zhao, Lei Zhang, David Zhang, Nan Luo
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
15 years 6 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon