Cocktail: A multidimensional optimization for model serving in cloud

JR Gunasekaran, CS Mishra, P Thinakaran… - … USENIX Symposium on …, 2022 - usenix.org
With a growing demand for adopting ML models for a variety of application services, it is vital
that the frameworks serving these models are capable of delivering highly accurate …

[图书][B] Iris biometrics: from segmentation to template security

C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …

Hamming distance method with subjective and objective weights for personnel selection

R Md Saad, MZ Ahmad, MS Abu… - The Scientific World …, 2014 - Wiley Online Library
Multicriteria decision making (MCDM) is one of the methods that popularly has been used in
solving personnel selection problem. Alternatives, criteria, and weights are some of the …

Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology

JS Paiva, D Dias, JPS Cunha - PloS one, 2017 - journals.plos.org
In recent years, safer and more reliable biometric methods have been developed. Apart from
the need for enhanced security, the media and entertainment sectors have also been …

[HTML][HTML] Enhancing iris recognition system performance using templates fusion

AI Desoky, HA Ali, NB Abdel-Hamid - Ain Shams Engineering Journal, 2012 - Elsevier
Iris recognition has very high recognition accuracy in comparison with many other biometric
features. This paper proposes an iris recognition algorithm in which a set of iris images of a …

Iris biometric security challenges and possible solutions: For your eyes only? using the iris as a key

G Itkis, V Chandar, BW Fuller… - IEEE Signal …, 2015 - ieeexplore.ieee.org
Biometrics were originally developed for identification, such as for criminal investigations.
More recently, biometrics have been also utilized for authentication. Most biometric …

Shifting score fusion: On exploiting shifting variation in iris recognition

C Rathgeb, A Uhl, P Wild - Proceedings of the 2011 ACM Symposium on …, 2011 - dl.acm.org
Iris recognition applies pattern matching techniques to compare two iris images and retrieve
a comparison score that reflects their degree of (dis-) similarity. While numerous approaches …

[PDF][PDF] Iris recognition using ridgelets

L Birgale, M Kokare - Journal of Information Processing Systems, 2012 - koreascience.kr
Image feature extraction is one of the basic works for biometric analysis. This paper presents
the novel concept of application of ridgelets for iris recognition systems. Ridgelet transforms …

Fork bomb attack mitigation by process resource quarantine

G Nakagawa, S Oikawa - 2016 Fourth International Symposium …, 2016 - ieeexplore.ieee.org
A fork bomb attack is a denial of service attack. An attacker generates many processes
rapidly, exhausting the resources of the target computer systems. There are several previous …

Enhanced iris recognition method based on multi-unit iris images

KY Shin, YG Kim, KR Park - Optical Engineering, 2013 - spiedigitallibrary.org
For the purpose of biometric person identification, iris recognition uses the unique
characteristics of the patterns of the iris; that is, the eye region between the pupil and the …