Sciweavers

4018 search results - page 736 / 804
» Biometrics
Sort
View
ESORICS
2009
Springer
15 years 6 months ago
Towards a Privacy-Preserving National Identity Card
In this paper, we propose to replace the national identity card, currently used in many countries, by a personal device that allows its user to prove some binary statements about h...
Yves Deswarte, Sébastien Gambs
ICASSP
2009
IEEE
15 years 6 months ago
Rate-constrained distributed distance testing and its applications
We investigate a practical approach to solving one instantiation of a distributed hypothesis testing problem under severe rate constraints that shows up in a wide variety of appli...
Chuohao Yeo, Parvez Ahammad, Hao Zhang, Kannan Ram...
WEBI
2009
Springer
15 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CIS
2009
Springer
15 years 6 months ago
On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images
Abstract—The growth in practical applications for iris biometrics has been accompanied by relevant developments in the underlying algorithms and techniques. Along with the resear...
Gil Melfe Mateus Santos, Hugo Pedro Martins Carric...
DCOSS
2009
Springer
15 years 6 months ago
Optimal Allocation of Time-Resources for Multihypothesis Activity-Level Detection
Abstract. The optimal allocation of samples for activity-level detection in a wireless body area network for health-monitoring applications is considered. A wireless body area netw...
Gautam Thatte, Viktor Rozgic, Ming Li, Sabyasachi ...