-
1
-
-
84936893490
-
Vital signs of identity biometrics
-
Feb.
-
B. Miller, "Vital signs of identity biometrics," IEEE Spectrum, vol. 31, no. 2, pp. 22-30, Feb. 1994.
-
(1994)
IEEE Spectrum
, vol.31
, Issue.2
, pp. 22-30
-
-
Miller, B.1
-
2
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Feb.
-
R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Communications of the ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
3
-
-
0343700185
-
Authentication by keystroke timing
-
Rand Corporation
-
S. Press, R. Gaines, W. Lisowski, and N. Shapiro, "Authentication by keystroke timing," Rand Report, no. R-256-NSF, Rand Corporation, 1980.
-
(1980)
Rand Report, No. R-256-NSF
, vol.R-256-NSF
-
-
Press, S.1
Gaines, R.2
Lisowski, W.3
Shapiro, N.4
-
5
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
M. S. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans, on System, Man, and Cybernetics, vol. 27, no. 2, pp. 261-269, 1997.
-
(1997)
IEEE Trans, on System, Man, and Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
7
-
-
0030721345
-
Computer-access authentication with neural network based keystroke identity verification
-
Jun.
-
D.-T. Lin, "Computer-access authentication with neural network based keystroke identity verification," in Proceedings of IEEE Int. Conf. on Neural Networks, vol. 1, pp. 174-178, Jun. 1997.
-
(1997)
Proceedings of IEEE Int. Conf. on Neural Networks
, vol.1
, pp. 174-178
-
-
Lin, D.-T.1
-
8
-
-
0033316258
-
A comparison of artificial neural networks and cluster analysis for typing biometrics authentication
-
Jul.
-
L. K. Maisuria, C. S. Ong, and W. K. Lai, "A comparison of artificial neural networks and cluster analysis for typing biometrics authentication," in Proceedings of IEEE Int. Joint Conf. on Neural Networks, vol. 5., pp. 3295-3299, Jul. 1999.
-
(1999)
Proceedings of IEEE Int. Joint Conf. on Neural Networks
, vol.5
, pp. 3295-3299
-
-
Maisuria, L.K.1
Ong, C.S.2
Lai, W.K.3
-
9
-
-
0141522840
-
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
-
Jul.
-
E. Yu and S. Cho, "GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification," in Proceedings of IEEE Int. Joint Conf. on Neural Networks, vol. 3, pp. 2253-2257, Jul. 2003.
-
(2003)
Proceedings of IEEE Int. Joint Conf. on Neural Networks
, vol.3
, pp. 2253-2257
-
-
Yu, E.1
Cho, S.2
-
10
-
-
0022594196
-
An introduction to hidden Markov models
-
L. R. Rabiner and B. H. Juang, "An introduction to hidden Markov models," IEEE ASSP Magazine, vol. 3, no. 1, pp. 4-16, 1986.
-
(1986)
IEEE ASSP Magazine
, vol.3
, Issue.1
, pp. 4-16
-
-
Rabiner, L.R.1
Juang, B.H.2
-
11
-
-
0022099671
-
Some properties of continous hidden Markov model representations
-
Jul.-Aug.
-
L. R. Rabiner, B. H. Juang, S. E. Levinson, and M. M. Sondhi, "Some properties of continous hidden Markov model representations," AT&T Technical Journal., vol. 64, no. 6, pp. 1251-1270, Jul.-Aug. 1985.
-
(1985)
AT&T Technical Journal
, vol.64
, Issue.6
, pp. 1251-1270
-
-
Rabiner, L.R.1
Juang, B.H.2
Levinson, S.E.3
Sondhi, M.M.4
-
12
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb.
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, Feb. 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
-
-
Rabiner, L.R.1
-
13
-
-
0020734214
-
An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition
-
Apr.
-
S. E. Levinson, L. R. Rabiner, M. M. Sondhi, "An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition," Bell Systems Technical Journal, vol. 62, no. 4, pp. 1035-1074, Apr. 1983.
-
(1983)
Bell Systems Technical Journal
, vol.62
, Issue.4
, pp. 1035-1074
-
-
Levinson, S.E.1
Rabiner, L.R.2
Sondhi, M.M.3
-
14
-
-
0022685753
-
Continuously variable duration hidden Markov models for automatic speech recognition
-
Mar.
-
S. E. Levinson, "Continuously variable duration hidden Markov models for automatic speech recognition," Computer, Speech and Language, vol. 1, no. 1, pp. 29-45, Mar. 1986.
-
(1986)
Computer, Speech and Language
, vol.1
, Issue.1
, pp. 29-45
-
-
Levinson, S.E.1
-
15
-
-
0023850553
-
Large-vocabulary speaker-independent continuous speech recognition
-
Apr.
-
K. F. Lee and H. W. Hon, "Large-vocabulary speaker-independent continuous speech recognition," in Proceedings of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 123-126, Apr. 1988.
-
(1988)
Proceedings of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing
, pp. 123-126
-
-
Lee, K.F.1
Hon, H.W.2
-
16
-
-
0015600423
-
The Viterbi algorithm
-
Mar.
-
G. D. Forney, "The Viterbi algorithm," Proceedings of the IEEE, vol. 61, pp. 268-278, Mar. 1973.
-
(1973)
Proceedings of the IEEE
, vol.61
, pp. 268-278
-
-
Forney, G.D.1
-
17
-
-
0003970650
-
-
Irwin, Homewood, IL
-
A. J. Duncan, Quality Control and Industrial Statistics, 5th ed., Irwin, Homewood, IL., 1986.
-
(1986)
Quality Control and Industrial Statistics, 5th Ed.
-
-
Duncan, A.J.1
|