We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 675 results
  1. General Decidability Results for Asynchronous Shared-Memory Programs: Higher-Order and Beyond

    The model of asynchronous programming arises in many contexts, from low-level systems software to high-level web programming. We take a...
    Rupak Majumdar, Ramanathan S. Thinniyam, Georg Zetzsche in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2021
  2. Towards optimal score level fusion for adaptive multi-biometric authentication system

    Multi-biometric authentication systems have been extensively investigated due to their merit over unimodal systems. Multi-biometric systems not only...

    Kavita, Rajesh Rohilla, Gurjit Singh Walia in Multimedia Tools and Applications
    Article 15 July 2024
  3. Efficient cancelable authentication system based on DRPE and adaptive filter

    Currently, security enhancement of biometric systems is an important issue that deserves consideration. This is attributed to the threats facing...

    Ensherah A. Naeem, Ayat Saied, ... Ghada M. El-Banby in Multimedia Tools and Applications
    Article 21 February 2024
  4. An Effective Multimodal Biometric System Based on Textural Feature Descriptor

    Abstract

    In recent years the upsurge of contemporary technical assets results in the augmented prerequisite of precise and robust security systems....

    Neeru Bala, Rashmi Gupta, Anil Kumar in Pattern Recognition and Image Analysis
    Article 01 September 2022
  5. Random area-perimeter method for generation of unimodal and multimodal cancelable biometric templates

    In recent times, biometric based authentication systems have seen a tremendous growth in various applications. However, if databases in multiple...

    Rajesh Asthana, Gurjit Singh Walia, Anjana Gupta in Applied Intelligence
    Article 04 March 2021
  6. Novel approach for multimodal feature fusion to generate cancelable biometric

    Biometric systems provide various benefits over traditional pin-based authentication systems. However, the issue of data privacy and theft is of...

    Keshav Gupta, Gurjit Singh Walia, Kapil Sharma in The Visual Computer
    Article 13 June 2020
  7. Improved Periocular Recognition Through Blend of Handcrafted and Deep Features

    Periocular region is the area surrounding human eye. It has emerged as an effective biometric trait due to its robust nature, requirement of less...
    Aryan Lala, Kalagara Chaitanya Kumar, ... Manoj Sharma in Computer Vision and Image Processing
    Conference paper 2022
  8. Catalog Object-Aware Nets

    In this chapter, we provide the second main application of the formal framework of U-RASs to the problem of modeling and verification of complex...
    Chapter 2023
  9. The Logical Level

    Epistemological primitives can be given formal meaning via logical formalisms, which provide the foundation for machine understandability. In this...
    Umutcan Serles, Dieter Fensel in An Introduction to Knowledge Graphs
    Chapter 2024
  10. Interpolation and Amalgamation for Arrays with MaxDiff

    In this paper, the theory of McCarthy’s extensional arrays enriched with a maxdiff operation (this operation returns the biggest index where two...
    Silvio Ghilardi, Alessandro Gianola, Deepak Kapur in Foundations of Software Science and Computation Structures
    Conference paper Open access 2021
  11. Authentication System Based on Biometric Data of Smiling Face from Stacked Autoencoder and Concatenated Reed-Solomon Codes

    A new authentication system based on video frames sampled from three main phases of a user smile has been proposed. This biometric system is...
    Boris Assanovich, Katsiaryna Kosarava in Pattern Recognition and Information Processing
    Conference paper 2022
  12. Ocular recognition databases and competitions: a survey

    The use of the iris and periocular region as biometric traits has been extensively investigated, mainly due to the singularity of the iris features...

    Luiz A. Zanlorensi, Rayson Laroca, ... David Menotti in Artificial Intelligence Review
    Article 08 June 2021
  13. Enhanced near-infrared periocular recognition through collaborative rendering of hand crafted and deep features

    Periocular recognition leverage from larger feature region and lesser user cooperation, when compared against the traditional iris recognition....

    Article 18 January 2022
  14. A Formal Approach to Microservice Architecture Deployment

    Following previous work on the automated deployment of component-based applications, we present a formal model specifically tailored for reasoning on...
    Mario Bravetti, Saverio Giallorenzo, ... Gianluigi Zavattaro in Microservices
    Chapter 2020
  15. Cancelable biometric scheme based on dynamic salting of random patches

    The idea of cancelable biometrics was proposed to ensure the privacy and security of user’s original biometric data, which is collected for...

    Ragendhu S P, Tony Thomas in Multimedia Tools and Applications
    Article 15 September 2022
  16. A decidable dichotomy theorem on directed graph homomorphisms with non-negative weights

    The complexity of graph homomorphism problems has been the subject of intense study for some years. In this paper, we prove a decidable complexity...

    **-Yi Cai, ** Chen in computational complexity
    Article 22 April 2019
  17. Finite Sequentiality of Finitely Ambiguous Max-Plus Tree Automata

    We show that the finite sequentiality problem is decidable for finitely ambiguous max-plus tree automata. A max-plus tree automaton is a weighted...

    Article Open access 28 October 2021
  18. Security Requirements Formalization with RQCODE

    Security requirements vary in nature and form. These requirements may come from compliance checklists, implementation guidelines, corporate...
    Andrey Sadovykh, Nan Messe, ... Jean-Michel Bruel in CyberSecurity in a DevOps Environment
    Chapter 2024
  19. Iris Recognition Using Improved Xor-Sum Code

    Iris recognition has been among the most secure and reliable biometric traits, because of its permanent and unique features. Among the various...
    Neeru Bala, Ritesh Vyas, ... Anil Kumar in Security and Privacy
    Conference paper 2021
Did you find what you were looking for? Share feedback.