Sciweavers

31324 search results - page 96 / 6265
» Compare
Sort
View
ICFHR
2010
139views Biometrics» more  ICFHR 2010»
14 years 11 months ago
A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods
Abstract--Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based auth...
Marcos Martinez-Diaz, C. Martin-Diaz, Javier Galba...
INTERSPEECH
2010
14 years 11 months ago
A comparative study of constrained and unconstrained approaches for segmentation of speech signal
In this work, we compare different approaches for speech segmentation, of which some are constrained and the remaining are unconstrained by phone transcript. A high accuracy speec...
Venkatesh Keri, Kishore Prahallad
118
Voted
CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 7 months ago
Comparing webometric with web-independent rankings: a case study with German universities
In this paper we examine if hyperlink-based (webometric) indicators can be used to rank academic websites. Therefore we analyzed the interlinking structure of German university we...
Mark Thamm, Philipp Mayr
ICASSP
2011
IEEE
14 years 7 months ago
A comparative analysis of dynamic network decoding
The use of statically compiled search networks for ASR systems using huge vocabularies and complex language models often becomes challenging in terms of memory requirements. Dynam...
David Rybach, Ralf Schlüter, Hermann Ney
165
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...