Sciweavers

118 search results - page 8 / 24
» Computational approaches for real-time extraction of soft bi...
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ISCAS
2006
IEEE
154views Hardware» more  ISCAS 2006»
15 years 3 months ago
A novel Fisher discriminant for biometrics recognition: 2DPCA plus 2DFLD
— this paper presents a novel image feature extraction and recognition method two dimensional linear discriminant analysis (2DLDA) in a much smaller subspace. Image representatio...
R. M. Mutelo, Li Chin Khor, Wai Lok Woo, Satnam Si...
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 3 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
FGR
2008
IEEE
142views Biometrics» more  FGR 2008»
15 years 4 months ago
Deformable Face Fitting with Soft Correspondence Constraints
Despite significant progress in deformable model fitting over the last decade, the problem of efficient and accurate person-independentface fitting remains a challenging probl...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn
CGF
2007
158views more  CGF 2007»
14 years 9 months ago
Soft Articulated Characters with Fast Contact Handling
Fast contact handling of soft articulated characters is a computationally challenging problem, in part due to complex interplay between skeletal and surface deformation. We presen...
Nico Galoppo, Miguel A. Otaduy, Serhat Tekin, Mark...