![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Prototype System Design for Large-Scale Person Re-identification
Identifying a person across cameras in disjoint views at different time and location has important applications in visual surveillance. However, it is difficult to apply existing methods to the development of...
-
Chapter and Conference Paper
Face Recognition for Mobile Self-authentication with Online Model Update
Face recognition system encounters complex change that varies over time, due to a limited control over the environment. So, the facial model of an individual tends to diverse from underlying distribution that ...
-
Chapter and Conference Paper
Security Framework for Home Network: Authentication, Authorization, and Security Policy
As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...