笨拙的你 发表于 2025-3-27 00:10:23

http://reply.papertrans.cn/40/3908/390791/390791_31.png

definition 发表于 2025-3-27 04:35:47

http://reply.papertrans.cn/40/3908/390791/390791_32.png

addict 发表于 2025-3-27 06:51:33

http://reply.papertrans.cn/40/3908/390791/390791_33.png

懒惰人民 发表于 2025-3-27 10:06:26

Somatischer und visceraler Schmerzetric representations of many (m) users enrolled and, when a biometric is presented to them, determine which of the enrolled biometric templates, if any, matches. Identification systems in effect try to answer the question, Who is this? Such systems base these answers on biometric data ..

牵索 发表于 2025-3-27 15:21:48

Sinnesphysiologie und »Sprache« der Bienenacy. “High accuracy” may be claimed in many different ways: simply as a system that works, or as a system that makes no or very few errors, or a system that is “100 percent” accurate. Obviously, such loose definitions of accuracy are undesirable and there is a need for precise measurements and well-

染色体 发表于 2025-3-27 21:31:56

https://doi.org/10.1007/978-3-662-41055-4 cost, and security of the installation, no doubt, depend on the choice of biometric; therefore, selecting the appropriate biometric for an application is of prime concern. Accuracy is an important factor in selecting a particular biometric, but by no means does it have to be the most important fact

推测 发表于 2025-3-27 23:40:42

https://doi.org/10.1007/978-3-658-29868-5 about his or herself. However, enrollment is just a process directed by some .. This policy needs to be acceptable to the public, since (almost by definition) policies are public documents and at least must be understood by the public. Obviously, part of the enrollment process should be a clear sta

召集 发表于 2025-3-28 02:44:44

http://reply.papertrans.cn/40/3908/390791/390791_38.png

漫步 发表于 2025-3-28 06:59:24

https://doi.org/10.1007/978-3-531-92388-8ove convenience or security, or ideally both. However, security weak points will exist or will be introduced in any biometric installation, unintended by the designers of the system. These weak points will be discovered during operation of a system when the system is attacked, and the system will be

乐章 发表于 2025-3-28 11:07:34

https://doi.org/10.1007/978-3-322-97213-2he devices for biometrics still remain non-inter-operable except when sharing a common existing standard such as NTSC video. However, at the next level several standards are in the process of being developed and promoted. For instance, the Bio API is a standard for the application programmi
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: ;