Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breast Cancer Data Analytics With Missing Values: A study on Ethnic, Age and Income Groups, , , , and . (2015)cite arxiv:1503.03680Comment: The paper analyzes a breast cancer data with missing values, where the missing values of ethnicity are imputed based on a Naive Bayes classifier. Further, the data was analysed from domain purpose as well such as the effect of ethnicity, age, and income on the survival of the breast cancer.Multi-privacy biometric protection scheme using ensemble systems., , and . IJCNN, page 1-8. IEEE, (2015)The multiscenario multienvironment biosecure multimodal database (BMDB), , , , , , , , , and 22 other author(s). IEEE Trans Pattern Anal Mach Intell, 32 (6): 1097--1111 (2010)Facilitating free travel in the Schengen area - A position paper by the European Association for Biometrics., , , , , , , , , and 38 other author(s). IET Biom., 12 (2): 112-128 (March 2023)The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks., , , , , , , , , and . ICB, page 513-518. IEEE, (2015)(Multiscale) Local Phase Quantisation histogram discriminant analysis with score normalisation for robust face recognition., , , , and . ICCV Workshops, page 633-640. IEEE Computer Society, (2009)Towards Predicting Optimal Fusion Candidates: A Case Study on Biometric Authentication Tasks., and . MLMI, volume 3361 of Lecture Notes in Computer Science, page 159-172. Springer, (2004)A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification., , and . WIFS, page 37-42. IEEE, (2013)On the effect of time efficiency in DSV under stress., , and . ICCST, page 1-5. IEEE, (2014)Improving Fusion with Margin-Derived Confidence in Biometric Authentication Tasks., and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 474-483. Springer, (2005)