default search action
Information Sciences, Volume 268
Volume 268, June 2014
- David Zhang, Lei Zhang:
Special issue on "New sensing and processing technologies for hand-based biometrics authentication". 1-2 - Miguel A. Ferrer, Aythami Morales, Alba Díaz:
An approach to SWIR hyperspectral hand biometrics. 3-19 - Wenming Yang, Xiaola Huang, Fei Zhou, Qingmin Liao:
Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion. 20-32 - Jinfeng Yang, Yihua Shi:
Towards finger-vein image restoration and enhancement for finger-vein recognition. 33-52 - Shoichiro Aoyama, Koichi Ito, Takafumi Aoki:
A finger-knuckle-print recognition algorithm using phase-based local block matching. 53-64 - Manhua Liu, Shuxin Liu, Qijun Zhao:
Fingerprint orientation field reconstruction by weighted discrete cosine transform. 65-77 - Feng Yue, Wangmeng Zuo:
Consistency analysis on orientation features for fast and accurate palmprint identification. 78-90 - Xiaofei Jia, Xin Yang, Kai Cao, Yali Zang, Ning Zhang, Ruwei Dai, Xinzhong Zhu, Jie Tian:
Multi-scale local binary pattern with filters for spoof fingerprint detection. 91-102 - Marta Gomez-Barrero, Javier Galbally, Aythami Morales, Miguel A. Ferrer, Julian Fiérrez, Javier Ortega-Garcia:
A novel hand reconstruction approach and its application to vulnerability assessment. 103-121 - Shengzhe Li, Hakil Kim, Changlong Jin, Stephen J. Elliott, Mingjie Ma:
Assessing the level of difficulty of fingerprint datasets based on relative quality measures. 122-132
- Shu Zhao, Ling Zhang, Xiansheng Xu, Yanping Zhang:
Hierarchical description of uncertain information. 133-146 - Xianyong Zhang, Duoqian Miao:
Quantitative information architecture, granular computing and rough set models in the double-quantitative approximation space of precision and grade. 147-168 - Yu-Jie Wang:
A fuzzy multi-criteria decision-making model by associating technique for order preference by similarity to ideal solution with relative preference relation. 169-184 - Dogan Özgen, Bahadir Gülsün:
Combining possibilistic linear programming and fuzzy AHP for solving the multi-objective capacitated multi-facility location problem. 185-201 - Luciana R. Pedro, Ricardo H. C. Takahashi:
INSPM: An interactive evolutionary multi-objective algorithm with preference model. 202-219 - Sheng Chen, Lindu Zhao, Weigong Zhang, Peng Shi:
Consensus on compact Riemannian manifolds. 220-230 - Santiago Muelas, Alexander Mendiburu, Antonio LaTorre, José María Peña Sánchez:
Distributed Estimation of Distribution Algorithms for continuous optimization: How does the exchanged information influence their behavior? 231-254 - Xinhe Miao, Jein-Shan Chen, Chun-Hsu Ko:
A smoothed NR neural network for solving nonlinear convex programs with second-order cone constraints. 255-270 - Qiang Hu, Yuyue Du, ShuXia Yu:
Service net algebra based on logic Petri nets. 271-289 - Jürgen Dassow, Florin Manea, Robert Mercas:
Regular languages of partial words. 290-304 - Antonio López Jaimes, Carlos A. Coello Coello, Hernán E. Aguirre, Kiyoshi Tanaka:
Objective space partitioning using conflict information for solving many-objective problems. 305-327 - Sebastián Maldonado, Julio López:
Alternative second-order cone programming formulations for support vector classification. 328-341 - Mohammad Javad Mahmoodabadi, S. Momennejad, Ahmad Bagheri:
Online optimal decoupled sliding mode control based on moving least squares and particle swarm optimization. 342-356 - Hyerim Bae, Sanghyup Lee, Ilkyeong Moon:
Planning of business process execution in Business Process Management environments. 357-369 - Fangchao He, Hong Chen, Luoqing Li:
Statistical analysis of the moving least-squares method with unbounded sampling. 370-380 - Lucie Urbanova, Vilém Vychodil:
Derivation digraphs for dependencies in ordinal and similarity-based data. 381-396 - Dries Geebelen, Kristof Geebelen, Eddy Truyen, Sam Michiels, Johan A. K. Suykens, Joos Vandewalle, Wouter Joosen:
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset. 397-424 - Nijad Al-Najdawi, M. Noor Al-Najdawi, Sara Tedmori:
Employing a novel cross-diamond search in a modified hierarchical search motion estimation algorithm for video compression. 425-435 - Chen Peng, Minrui Fei, Engang Tian, Yanpeng Guan:
On hold or drop out-of-order packets in networked control systems. 436-446 - Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. 447-457 - Debiao He, Miaomiao Tian, Jianhua Chen:
Insecurity of an efficient certificateless aggregate signature with constant pairing computations. 458-462 - Shiying Wang, Shurong Zhang, Yuxing Yang:
Hamiltonian path embeddings in conditional faulty k-ary n-cubes. 463-488 - Alireza T. Boloorchi, Mansur H. Samadzadeh, T. Chen:
Symmetric Threshold Multipath (STM): An online symmetric key management scheme. 489-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.