Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite  |  View/Download:10/0  |  Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite  |  View/Download:6/0  |  Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack  
Scalable process modeling based on net synthesis under cloud computing environment Conference paper
Proceedings - 2011 IEEE International Conference on Granular Computing, GrC 2011
Authors:  Zhou J.;  Liang R.;  Wang Y.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/22
cloud computing  liveness  net synthesis  process modeling  Semantics Constrained Net  
On reachability graphs of Petri nets Journal article
Computers and Electrical Engineering, 2003,Volume: 29,Issue: 2,Page: 263-272
Authors:  Ye X.;  Zhou J.;  Song X.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Boundedness  Conservation  Coverability  Liveness  Petri net  Reachability  Reachability graph  Reachability tree  Safeness  
Formal object-oriented analysis and design of an online ticketing system Conference paper
Proceedings of the Asia-Pacific Software Engineering Conference and International Computer Science Conference, APSEC and ICSC, MACAO, PEOPLES R CHINA, DEC 04-07, 2001
Authors:  Li X.;  Liu Z.;  Guo Z.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/14
E-commerce  Formal Techniques  Liveness  Object-orientation  Safety  Uml