has been cited by the following article(s):
[1]
|
A review of b biometric modalities most likely to
|
|
Journal of Technology Research,
2013 |
|
|
[2]
|
Perceptions of biometric expert modalities will com
|
|
Research in Business and Economics Journal,
2013 |
|
|
[3]
|
Perceptions of biometric experts on whether or not biometric modalities will combat identity fraud.
|
|
GS Edo, SN Braxton-Lieber - Research in Business & Economics Journal,
2013 |
|
|
[4]
|
An Approach to Model Selection in Spectral Clustering with Application to the Writing Style Determination Problem
|
|
Knowledge Discovery, Knowledge Engineering and Knowledge Management. Springer Berlin Heidelberg,
2013 |
|
|
[5]
|
Human Re-Identification In Surveillance Network
|
|
Int. Journal of Engineering Research and Applications,
2013 |
|
|
[6]
|
A review of biometric experts' evaluations of the biometric modalities most likely to effectively combat identity fraud
|
|
Journal of Technology Research,
2013 |
|
|
[7]
|
Perceptions of biometric experts on whether or not biometric modalities will combat identity fraud
|
|
Research in Business and Economics Journal,
2013 |
|
|
[8]
|
Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques
|
|
Review of Policy Research,
2012 |
|
|
[9]
|
A hierarchical method combining gait and phase of motion with spatiotemporal model for person re-identification
|
|
Pattern Recognition Letters,
2012 |
|
|
[10]
|
Model Selection and Stability in Spectral Clustering.
|
|
KDIR,
2012 |
|
|
[1]
|
Knowledge Discovery, Knowledge Engineering and Knowledge Management
Communications in Computer and Information Science,
2013
DOI:10.1007/978-3-642-54105-6_2
|
|
|
[2]
|
Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques
Review of Policy Research,
2012
DOI:10.1111/j.1541-1338.2011.00538.x
|
|
|