IEEE Transactions on Pattern Analysis and Machine Intelligence
Line-Based Face Recognition under Varying Pose
IEEE Transactions on Pattern Analysis and Machine Intelligence
Combining multiple matchers for a high security fingerprint verification system
Pattern Recognition Letters - Special issue on pattern recognition in practice VI
Person Identification Using Multiple Cues
IEEE Transactions on Pattern Analysis and Machine Intelligence
Expert Conciliation for Multi Modal Person Authentication Systems by Bayesian Statistics
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Information fusion in biometrics
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
Performance by Design: Computer Capacity Planning By Example
Performance by Design: Computer Capacity Planning By Example
Allocating Applications in Distributed Computing
IEEE Internet Computing
Risk-Resilient Heuristics and Genetic Algorithms for Security-Assured Grid Job Scheduling
IEEE Transactions on Computers
Role-Based Access Control for Grid Database Services Using the Community Authorization Service
IEEE Transactions on Dependable and Secure Computing
Grid-Oriented Storage: A Single-Image, Cross-Domain, High-Bandwidth Architecture
IEEE Transactions on Computers
An overview of the EGEE project
DELOS'04 Proceedings of the 6th Thematic conference on Peer-to-Peer, Grid, and Service-Orientation in Digital Library Architectures
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Fusion of face and speech data for person identity verification
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
The biometrics grid can simplify resource management and access by making biometrics data as easy to access as Web pages via a Web browser. It tests user-designed modules, which are wrapped to Web services and deployed into a Web services container. Risk-resilient strategies are used for job scheduling. A case study of two biometrics recognition processes in voiceprint and face illustrates the process. The biometrics grid could benefit academic collaborations and improve biometric data sharing, as well as enhance biometric systems' efficiency in scientific research and commercial applications.