Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
48 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Levaillant, Jean-Marc. author.
      Format: 
      Excerpt: 
      pathologies -- Chapter 12. Curves and biometrics.
      by 
      Contos, Brian T.
      Format: 
      Excerpt: 
      , biometrics, and more. *This topic is picking up momentum every day with every new computer exploit
      by 
      Zeng, Wenjun, 1967-
      Format: 
      Excerpt: 
      .P. Subbalakshmi -- Biometrics in digital rights management / Anil Jain and Umut Uludag -- Format-compliant content
      by 
      Lotze, Michael T.
      Format: 
      Excerpt: 
      cytometry -- Cancer biometrics -- Genomics and microarrays -- Image informatics.
      by 
      Rice, Julie Christine, author.
      Format: 
      Excerpt: 
      behavioral biometrics of consumers. Eye tracking can facilitate a wide range of research, and is commonly
      by 
      Hansley, Earnest Eugene, author.
      Format: 
      Excerpt: 
      biometrics such as fingerprint, face and iris because the ear is relatively stable over time, the ear is non
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      Chapter 4: Advances in Video-Based Biometrics1. Introduction; 2. Video-Based Face Recognition; 3
      by 
      Vacca, John R.
      Format: 
      Excerpt: 
      / Storage area networking devices security / Risk management / Physical security essentials / Biometrics
      by 
      Zhao, Wenyi.
      Format: 
      Excerpt: 
      Biometrics: Augmenting Face with Other Cues.
      by 
      Leeuw, Karl de.
      Format: 
      Excerpt: 
      Development of Biometrics Over the Last 40 Years (J.L. Wayman) -- Part III. Communication Security -- 11. The
      by 
      Gregg, Michael (Michael C.)
      Format: 
      Excerpt: 
      Perimeter security Facility security Device security Identification and authentication Biometrics Attacking