default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2015
- Dong Cao, Ran He, Man Zhang, Zhenan Sun, Tieniu Tan:
Real-world gender recognition using multi-order LBP and localized multi-boost learning. ISBA 2015: 1-6 - Jianxu Chen, Feng Shen, Danny Ziyi Chen, Patrick J. Flynn:
Iris recognition based on human-interpretable features. ISBA 2015: 1-6 - Stephen J. Elliott, Kevin O'Connor, Eric Bartlow, Joshua J. Robertson, Richard M. Guest:
Expanding the human-biometric sensor interaction model to identity claim scenarios. ISBA 2015: 1-6 - Jeffry Bonar Fernando, Koji Morikawa:
Improvement of human identification accuracy by wavelet of peak-aligned ECG. ISBA 2015: 1-6 - Xun Gong, Zehua Fu, Xinxin Li, Lin Feng:
A two-stage estimation method for depth estimation of facial landmarks. ISBA 2015: 1-6 - Qiong Gui, Zhanpeng Jin, Maria V. Ruiz-Blondet, Sarah Laszlo, Wenyao Xu:
Towards EEG biometrics: pattern matching approaches for user identification. ISBA 2015: 1-6 - Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, Nasir D. Memon:
Investigating users' readiness to trade-off biometric fingerprint data. ISBA 2015: 1-8 - Jiaju Huang, Daqing Hou, Stephanie Schuckers, Zhenhao Hou:
Effect of data size on performance of free-text keystroke authentication. ISBA 2015: 1-7 - Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours:
Keystroke dynamics performance enhancement with soft biometrics. ISBA 2015: 1-7 - Aishwarya Jain, Paritosh Mittal, Gaurav Goswami, Mayank Vatsa, Richa Singh:
Person identification at a distance via ocular biometrics. ISBA 2015: 1-6 - Piyush Joshi, Surya Prakash:
An efficient technique for image contrast enhancement using artificial bee colony. ISBA 2015: 1-6 - Xiang Li, Ancong Wu, Mei Cao, Jinjie You, Wei-Shi Zheng:
Towards more reliable matching for person re-identification. ISBA 2015: 1-6 - Guoqiang Li, Bian Yang, Christoph Busch:
A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction. ISBA 2015: 1-6 - Bin Li, Zifei Yan, Wangmeng Zuo, Feng Yue:
Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy. ISBA 2015: 1-6 - Soumik Mondal, Patrick Bours:
Context independent continuous authentication using behavioural biometrics. ISBA 2015: 1-8 - Mei Ngan, Patrick Grother:
Tattoo recognition technology - challenge (Tatt-C): an open tattoo database for developing tattoo recognition research. ISBA 2015: 1-6 - Ramachandra Raghavendra, Jayachander Surbiryala, Christoph Busch:
An efficient finger vein indexing scheme based on unsupervised clustering. ISBA 2015: 1-8 - Dan Rissacher, Dan Galy:
Cardiac radar for biometric identification using nearest neighbour of continuous wavelet transform peaks. ISBA 2015: 1-6 - Maria V. Ruiz-Blondet, Sarah Laszlo, Zhanpeng Jin:
Assessment of permanence of non-volitional EEG brainwaves as a biometric. ISBA 2015: 1-6 - Napa Sae-Bae, Nasir D. Memon:
Quality of online signature templates. ISBA 2015: 1-8 - M. Saad Shakeel, Wenxiong Kang:
Efficient blind image deblurring method for palm print images. ISBA 2015: 1-7 - Chao Shen, Shichao Pei, Tianwen Yu, Xiaohong Guan:
On motion sensors as source for user input inference in smartphones. ISBA 2015: 1-6 - Gitam Shikkenawis, Suman K. Mitra:
Locality Preserving Discriminant Projection. ISBA 2015: 1-6 - Daniel F. Smith, Arnold Wiliem, Brian C. Lovell:
Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices. ISBA 2015: 1-6 - Ravichandran Subramanian, Sudeep Sarkar, Miguel A. Labrador, Kristina Contino, Christopher Eggert, Omar Javed, Jiejie Zhu, Hui Cheng:
Orientation invariant gait matching algorithm based on the Kabsch alignment. ISBA 2015: 1-8 - Hossein Talebi, Marina L. Gavrilova:
Prior resemblance probability of users for multimodal biometrics rank fusion. ISBA 2015: 1-7 - Zhigang Yao, Benoît Vibert, Christophe Charrier, Christophe Rosenberger:
Blind minutiae selection for standard minutiae templates. ISBA 2015: 1-6 - Kun Zhao, Arnold Wiliem, Brian C. Lovell:
Kernelised orthonormal random projection on grassmann manifolds with applications to action and gait-based gender recognition. ISBA 2015: 1-6 - IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2015, Hong Kong, China, March 23-25, 2015. IEEE 2015, ISBN 978-1-4799-1974-1 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 10:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint