Cocktail: A multidimensional optimization for model serving in cloud
With a growing demand for adopting ML models for a variety of application services, it is vital
that the frameworks serving these models are capable of delivering highly accurate …
that the frameworks serving these models are capable of delivering highly accurate …
[图书][B] Iris biometrics: from segmentation to template security
C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …
challenges and solutions on recent iris biometric research topics, including image …
Hamming distance method with subjective and objective weights for personnel selection
Multicriteria decision making (MCDM) is one of the methods that popularly has been used in
solving personnel selection problem. Alternatives, criteria, and weights are some of the …
solving personnel selection problem. Alternatives, criteria, and weights are some of the …
Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology
In recent years, safer and more reliable biometric methods have been developed. Apart from
the need for enhanced security, the media and entertainment sectors have also been …
the need for enhanced security, the media and entertainment sectors have also been …
[HTML][HTML] Enhancing iris recognition system performance using templates fusion
Iris recognition has very high recognition accuracy in comparison with many other biometric
features. This paper proposes an iris recognition algorithm in which a set of iris images of a …
features. This paper proposes an iris recognition algorithm in which a set of iris images of a …
Iris biometric security challenges and possible solutions: For your eyes only? using the iris as a key
Biometrics were originally developed for identification, such as for criminal investigations.
More recently, biometrics have been also utilized for authentication. Most biometric …
More recently, biometrics have been also utilized for authentication. Most biometric …
Shifting score fusion: On exploiting shifting variation in iris recognition
C Rathgeb, A Uhl, P Wild - Proceedings of the 2011 ACM Symposium on …, 2011 - dl.acm.org
Iris recognition applies pattern matching techniques to compare two iris images and retrieve
a comparison score that reflects their degree of (dis-) similarity. While numerous approaches …
a comparison score that reflects their degree of (dis-) similarity. While numerous approaches …
[PDF][PDF] Iris recognition using ridgelets
L Birgale, M Kokare - Journal of Information Processing Systems, 2012 - koreascience.kr
Image feature extraction is one of the basic works for biometric analysis. This paper presents
the novel concept of application of ridgelets for iris recognition systems. Ridgelet transforms …
the novel concept of application of ridgelets for iris recognition systems. Ridgelet transforms …
Fork bomb attack mitigation by process resource quarantine
G Nakagawa, S Oikawa - 2016 Fourth International Symposium …, 2016 - ieeexplore.ieee.org
A fork bomb attack is a denial of service attack. An attacker generates many processes
rapidly, exhausting the resources of the target computer systems. There are several previous …
rapidly, exhausting the resources of the target computer systems. There are several previous …
Enhanced iris recognition method based on multi-unit iris images
KY Shin, YG Kim, KR Park - Optical Engineering, 2013 - spiedigitallibrary.org
For the purpose of biometric person identification, iris recognition uses the unique
characteristics of the patterns of the iris; that is, the eye region between the pupil and the …
characteristics of the patterns of the iris; that is, the eye region between the pupil and the …