Search Results for Biometrics. - Narrowed by: Engineering. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dBiometrics.$0026qf$003dSUBJECT$002509Subject$002509Engineering.$002509Engineering.$0026ps$003d300?dt=list 2026-04-30T21:58:50Z Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Human Subject Research for Engineers A Practical Guide ent://SD_ILS/0/SD_ILS:481316 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;de Winter, Joost C.F. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56964-2">http://dx.doi.org/10.1007/978-3-319-56964-2</a><br/>Format:&#160;Electronic Resources<br/> Real-Time Recursive Hyperspectral Sample and Band Processing Algorithm Architecture and Implementation ent://SD_ILS/0/SD_ILS:480582 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Chang, Chein-I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45171-8">http://dx.doi.org/10.1007/978-3-319-45171-8</a><br/>Format:&#160;Electronic Resources<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:480719 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Conference on Computer Vision and Image Processing CVIP 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481614 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Raman, Balasubramanian. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2107-7">http://dx.doi.org/10.1007/978-981-10-2107-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Conference on Computer Vision and Image Processing CVIP 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481613 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Raman, Balasubramanian. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2104-6">http://dx.doi.org/10.1007/978-981-10-2104-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:481731 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-04-30T21:58:50Z 2026-04-30T21:58:50Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/>