default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2013
- Rima Belguechi, Estelle Cherrier, Christophe Rosenberger, Samy Ait-Aoudia:
Operational bio-hash to preserve privacy of fingerprint minutiae templates. IET Biom. 2(2): 76-84 (2013) - David Pereira Coutinho, Hugo Silva, Hugo Gamboa, Ana L. N. Fred, Mário A. T. Figueiredo:
Novel fiducial and non-fiducial approaches to electrocardiogram-based biometric systems. IET Biom. 2(2): 64-75 (2013) - George S. Eskander, Robert Sabourin, Eric Granger:
Hybrid writer-independent-writer-dependent offline signature verification system. IET Biom. 2(4): 169-181 (2013) - Kelly N. Faddis, James R. Matey, Jessica R. Maxey, Jerrell T. Stracener:
Performance assessments of iris recognition in tactical biometric devices. IET Biom. 2(3): 107-116 (2013) - Kelly N. Faddis, James R. Matey, Jerrell T. Stracener:
Improving tactical biometric systems through the application of systems engineering. IET Biom. 2(1): 1-9 (2013) - Patrick Lacharme:
Revisiting the accuracy of the biohashing algorithm on fingerprints. IET Biom. 2(3): 130-133 (2013) - Latha Lakshmanan:
Efficient person authentication based on multi-level fusion of ear scores. IET Biom. 2(3): 97-106 (2013) - Swanirbhar Majumder, Kharibam Jilenkumari Devi, Subir Kumar Sarkar:
Singular value decomposition and wavelet-based iris biometric watermarking. IET Biom. 2(1): 21-27 (2013) - Christopher McCool, Roy Wallace, Mitchell McLaren, Laurent El Shafey, Sébastien Marcel:
Session variability modelling for face authentication. IET Biom. 2(3): 117-129 (2013) - Thi Hanh Nguyen, Yi Wang, Yajun Ha, Renfa Li:
Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biom. 2(2): 48-55 (2013) - Manabu Okawa, Kenichi Yoshida:
Offline writer verification using pen pressure information from infrared image. IET Biom. 2(4): 199-207 (2013) - Srikanta Pal, Umapada Pal, Michael Blumenstein:
Off-line verification technique for Hindi signatures. IET Biom. 2(4): 182-190 (2013) - Marianela Parodi, Juan Carlos Gómez, Marcus Liwicki, Linda Alewijnse:
Orthogonal function representation for online signature verification: which features should be looked at? IET Biom. 2(4): 137-150 (2013) - Giuseppe Pirlo, Donato Impedovo:
Editorial. IET Biom. 2(4): 135-136 (2013) - Giuseppe Pirlo, Donato Impedovo:
Cosine similarity for analysis and verification of static signatures. IET Biom. 2(4): 151-158 (2013) - Utkarsh Porwal, Venu Govindaraju:
Semi-supervised framework for writer identification using structural learning. IET Biom. 2(4): 208-215 (2013) - Ahmad Poursaberi, Jan Vana, Stepán Mrácek, Radim Dvorak, Svetlana N. Yanushkevich, Martin Drahanský, Vlad P. Shmerko, Marina L. Gavrilova:
Facial biometrics for situational awareness systems. IET Biom. 2(2): 35-47 (2013) - Vijayakumari Pushparaj, Ulaganathan Gurunathan, Arumugam Banumathi:
Dental radiographs and photographs in human forensic identification. IET Biom. 2(2): 56-63 (2013) - Arti Shivram, Chetan Ramaiah, Venu Govindaraju:
A hierarchical Bayesian approach to online writer identification. IET Biom. 2(4): 191-198 (2013) - Darryl Stewart, Adrian Pass, Jianguo Zhang:
Gender classification via lips: static and dynamic features. IET Biom. 2(1): 28-34 (2013) - Jacques P. Swanepoel, Johannes Coetzer:
A robust dissimilarity representation for writer-independent signature modelling. IET Biom. 2(4): 159-168 (2013) - Esteban Vázquez-Fernández, Daniel González-Jiménez, Long Long Yu:
Improved average of synthetic exact filters for precise eye localisation under realistic conditions. IET Biom. 2(1): 10-20 (2013) - James L. Wayman, Antonio Possolo, Anthony J. Mansfield:
Modern statistical and philosophical framework for uncertainty assessment in biometric performance testing. IET Biom. 2(3): 85-96 (2013)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-18 16:49 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint