<--- Back to Details
First PageDocument Content
Bioinformatics / Machine learning / Biometrics / Human–computer interaction / K-nearest neighbor algorithm / Speech recognition / Hidden Markov model / Supervised learning / Electrical grid / Artificial intelligence / Security / Search algorithms
Date: 2015-06-16 09:42:08
Bioinformatics
Machine learning
Biometrics
Human–computer interaction
K-nearest neighbor algorithm
Speech recognition
Hidden Markov model
Supervised learning
Electrical grid
Artificial intelligence
Security
Search algorithms

2014 22nd International Conference on Pattern Recognition Behavioural biometrics using electricity load profiles M. Bicego, F. Recchia, A. Farinelli S. D. Ramchurn

Add to Reading List

Source URL: profs.sci.univr.it

Download Document from Source Website

File Size: 189,79 KB

Share Document on Facebook

Similar Documents

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

DocID: 1xVQY - View Document

CASE STUDY  VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY:	 Tatra Banka

CASE STUDY VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY: Tatra Banka

DocID: 1xUAY - View Document

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti  Marc Roeschlin

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti Marc Roeschlin

DocID: 1xUjz - View Document

PDF Document

DocID: 1xSV6 - View Document

DOC Document

DocID: 1xMH5 - View Document