Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2011
- Kai Cao, Eryun Liu, Liaojun Pang, Jimin Liang, Jie Tian:
Fingerprint matching by incorporating minutiae discriminability. IJCB 2011: 1-6 - David Ahmedt-Aristizabal, Edilson Delgado-Trejos, Jesús Francisco Vargas-Bonilla, Jorge Alberto Jaramillo-Garzón:
Dynamic signature for a closed-set identification based on nonlinear analysis. IJCB 2011: 1-8 - Naoki Akae, Yasushi Makihara, Yasushi Yagi:
Gait recognition using periodic temporal super resolution for low frame-rate videos. IJCB 2011: 1-7 - André Anjos, Sébastien Marcel:
Counter-measures to photo attacks in face recognition: A public database and a baseline. IJCB 2011: 1-7 - Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
Retina features based on vessel graph substructures. IJCB 2011: 1-6 - Gunawan Ariyanto, Mark S. Nixon:
Model-based 3D gait biometrics. IJCB 2011: 1-7 - Devansh Arpit, Anoop M. Namboodiri:
Fingerprint feature extraction from gray scale images by ridge tracing. IJCB 2011: 1-8 - Himanshu S. Bhatt, Samarth Bharadwaj, Richa Singh, Mayank Vatsa, Afzel Noore, Arun Ross:
On co-training online biometric classifiers. IJCB 2011: 1-7 - Himanshu S. Bhatt, Samarth Bharadwaj, Mayank Vatsa, Richa Singh, Arun Ross, Afzel Noore:
A framework for quality-based biometric classifier selection. IJCB 2011: 1-7 - Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli:
Robustness of multi-modal biometric verification systems under realistic spoofing attacks. IJCB 2011: 1-6 - Emil Bilgazyev, Boris A. Efraty, Shishir K. Shah, Ioannis A. Kakadiaris:
Improved face recognition using super-resolution. IJCB 2011: 1-7 - Soma Biswas, Gaurav Aggarwal, Patrick J. Flynn:
Face recognition in low-resolution videos using learning-based likelihood measurement model. IJCB 2011: 1-7 - Vishnu Naresh Boddeti, Jonathon M. Smereka, B. V. K. Vijaya Kumar:
A comparative evaluation of iris and ocular recognition methods on challenging ocular images. IJCB 2011: 1-8 - Steven Cadavid, Sherin Fathy, Jindan Zhou, Mohamed Abdel-Mottaleb:
An adaptive resolution voxelization framework for 3D ear recognition. IJCB 2011: 1-6 - Shaun J. Canavan, Xing Zhang, Lijun Yin, Yong Zhang:
3D face sketch modeling and assessment for component based face recognition. IJCB 2011: 1-6 - Deng Cao, Cunjian Chen, Marco Piccirilli, Donald A. Adjeroh, Thirimachos Bourlai, Arun Ross:
Can facial metrology predict gender? IJCB 2011: 1-8 - Raffaele Cappelli, Matteo Ferrara, Davide Maltoni, Francesco Turroni:
Fingerprint verification competition at IJCB2011. IJCB 2011: 1-6 - Murali Mohan Chakka, André Anjos, Sébastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan, Dong Yi, Zhen Lei, Zhiwei Zhang, Stan Z. Li, William Robson Schwartz, Anderson Rocha, Hélio Pedrini, Javier Lorenzo-Navarro, Modesto Castrillón Santana, Jukka Määttä, Abdenour Hadid, Matti Pietikäinen:
Competition on counter measures to 2-D facial spoofing attacks. IJCB 2011: 1-6 - Cunjian Chen, Arun Ross:
Evaluation of gender classification methods on thermal and near-infrared face images. IJCB 2011: 1-8 - Xi Cheng, Sergey Tulyakov, Venu Govindaraju:
Combination of multiple samples utilizing identification model in biometric systems. IJCB 2011: 1-5 - Giovani Chiachia, Alexandre X. Falcão, Anderson Rocha:
Person-specific face representation for recognition. IJCB 2011: 1-8 - Heeseung Choi, Abhishek Nagar, Anil K. Jain:
On the evidential value of fingerprints. IJCB 2011: 1-8 - Tejas I. Dhamecha, Anush Sankaran, Richa Singh, Mayank Vatsa:
Is gender classification across ethnicity feasible using discriminant functions? IJCB 2011: 1-7 - Yujie Dong, Damon L. Woodard:
Eyebrow shape-based features for biometric recognition and gender classification: A feasibility study. IJCB 2011: 1-8 - Boris A. Efraty, Chengwei Huang, Shishir K. Shah, Ioannis A. Kakadiaris:
Facial landmark detection in uncontrolled conditions. IJCB 2011: 1-8 - Chengfang Fang, Qiming Li, Ee-Chien Chang:
Identity leakage mitigation on asymmetric secure sketch. IJCB 2011: 1-6 - Haiying Guan, Mary Frances Theofanos, Yee-Yin Choong, Brian C. Stanton:
Real-time feedback for usable fingerprint systems. IJCB 2011: 1-8 - Huimin Guo, William Robson Schwartz, Larry S. Davis:
Face verification using large feature sets and one shot similarity. IJCB 2011: 1-8 - Daniel Hartung, Martin Aastrup Olsen, Haiyun Xu, Christoph Busch:
Spectral minutiae for vein pattern recognition. IJCB 2011: 1-7 - Jingu Heo, Marios Savvides:
Generic 3D face pose estimation using facial shapes. IJCB 2011: 1-8
skipping 77 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-04 18:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint