We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
We show that for several classes of idempotent semirings the least fixed-point of a polynomial system of equations X = f(X) is equal to the least fixed-point of a linear system obt...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
Existing approaches on reliability assessment of the system have limitations such as performance entirely depends on expertise, knowledge of system analysts and computation of usa...
Computational Convex Analysis algorithms have been rediscovered several times in the past by researchers from different fields. To further communications between practitioners, we ...
Abstract. In this paper, the use of biometric systems in forensic applications is reviewed. Main differences between the aim of commercial biometric systems and forensic reporting...
Daniel Ramos-Castro, Joaquin Gonzalez-Rodriguez, C...