Suggested Topics within your search.
Suggested Topics within your search.
Computer science
58
Computer Science
56
Biometric identification
55
Biometry
48
Artificial intelligence
39
Artificial Intelligence (incl. Robotics)
31
Biometrics
30
Engineering
29
Computer security
28
Image Processing and Computer Vision
28
Image processing
28
Pattern Recognition
26
Pattern perception
26
Information Systems Applications (incl. Internet)
25
Technological innovations
25
Prevention
22
Signal, Image and Speech Processing
21
Computer graphics
20
National security
20
Security measures
18
Systems and Data Security
17
Terrorism
17
Identification
16
Government policy
15
Computational intelligence
14
Computers
13
Computational Intelligence
12
Computer Graphics
12
Computer networks
11
Social aspects
11
-
81
-
82
-
83
-
84
-
85
-
86
-
87
-
88Published 2017Table of Contents: “…Selected Context Dependent Prediction for Reversible Watermarking with Optimal Embedding -- Chapter 5. Cancelable Biometrics using Hadamard Transform and Friendly Random Projections -- Chapter 6. …”
Connect to this title online
Electronic eBook -
89Published 2017Table of Contents: “…Efficient Multimodal Biometric Feature Fusion Using Block-sum and Minutiae Techniques -- Chapter 21. …”
Connect to this title online
Electronic eBook -
90by Cohen, Joel E.Subjects: Connect to this title online (unlimited users allowed)
Published 1978
Electronic eBook -
91
-
92
-
93
-
94by Miettinen, Olli S. (Olli Sakari), 1936-Subjects: Connect to this title online
Published 2011
Electronic eBook -
95
-
96by Gerstman, B. BurtSubjects: Connect to this title online (three simultaneous users allowed)
Published 2014
Electronic eBook -
97
-
98
-
99Published 2017Table of Contents: “…Biometric systems -- On the use of time information at long distance in biometric online signature recognition -- Automatic Face Recognition and Identification Tools in the Forensic Science Domain -- Biometric Fusion for Palm-Vein Based Recognition Systems -- Emerging services with NFV -- Availability Modeling and Evaluation of a Network Service Deployed via NFV -- Definition and Evaluation of Cold Migration Policies for the Minimization of the Energy Consumption in NFV Architectures -- A Lightweight Prediction Method for Scalable Analytics of Multi-Seasonal KPIs -- Multimedia forensics -- A copy-move detection algorithm based on geometric local binary pattern -- A Dataset for forensic analysis of videos in the wild -- Illumination Analysis in Physics-based Image Forensics: A Joint Discussion of Illumination Direction and Color -- Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling -- Security protocols -- A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices -- Delay Tolerant Revocation Scheme in Delay Tolerant VANETs -- Impact of Spreading Factor Imperfect Orthogonality in LoRa Communications -- Software Defined Networks -- A Network-Assisted Platform for Multipoint Remote Learning -- A de-verticalizing middleware for IoT systems based on Information Centric Networking design -- Technologies for IoT -- Measuring Spectrum Similarity in Distributed Radio Monitoring Systems -- Green and Heuristics-based Consolidation Scheme for Data Center Cloud Applications -- Implementing a per-flow Token Bucket using Open Packet Processor. .…”
Connect to this title online
Electronic eBook -
100