杀虫剂 发表于 2025-3-25 03:43:19

http://reply.papertrans.cn/24/2324/232313/232313_21.png

ELATE 发表于 2025-3-25 08:46:12

Voice Passphrase Variability Evaluation for Speaker Recognitionlation and conclude that using this variability for passphrase creation (e.g. during the enrollment process) helps to significantly increase the performance of speaker verification and speaker identification systems.

Basilar-Artery 发表于 2025-3-25 13:21:34

When Document Security Brings New Challenges to Document Analysisature that would solve this security issue. Our primary finding is that current state of the art document analysis algorithms need to be re-evaluated under the criterion of robustness as we have done for OCR processing.

Buttress 发表于 2025-3-25 18:33:10

http://reply.papertrans.cn/24/2324/232313/232313_24.png

cinder 发表于 2025-3-25 23:26:42

0302-9743 aper were carefully selected from 34 submissions during a thorough review process. The papers are divided into three broad areas namely biometrics; document image inspection; and applications.978-3-319-20124-5978-3-319-20125-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

Grandstand 发表于 2025-3-26 01:43:37

Some mathematical aspects of the GCMsensive experiments for both identification and verification scenarios are performed on three public datasets. The accuracies of state-of-the-art clearly indicate the viability of multidirectional coding methods for multispectral palmprint recognition.

枪支 发表于 2025-3-26 05:54:01

Some mathematical aspects of the GCMsd recognition approach has obtained a . of . on CASIA-4.0 Interval, . on CASIA-4.0 Lamp and . on IITK database. It has also achieved an EER of . on CASIA-4.0 Interval, . on CASIA-4.0 Lamp and . on IITK database.

lobster 发表于 2025-3-26 08:43:55

http://reply.papertrans.cn/24/2324/232313/232313_28.png

不妥协 发表于 2025-3-26 14:51:34

http://reply.papertrans.cn/24/2324/232313/232313_29.png

到婚嫁年龄 发表于 2025-3-26 18:28:04

Stochastic Comparisons of Order Statistics, This paper first introduces Windows 8 event log format and then proceeds with explaining methods for analyzing the logs for digital investigation and incident handling. The main contributions of this paper are introducing Windows8 logging service and forensic examination of it.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Computational Forensics; 5th International Wo Utpal Garain,Faisal Shafait Conference proceedings 2015 Springer International Publishing Swi