Author of the publication

Effects of text filtering on authentication performance of keystroke biometrics.

, , , and . WIFS, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Hardness of Approximating the Min-Hack Problem., , , , and . J. Comb. Optim., 9 (3): 295-311 (2005)Summarizing Large Query Logs in Ettu., , , , , , and . CoRR, (2016)Data De-duplication and Event Processing for Security Applications on an Embedded Processor., , and . SRDS, page 418-423. IEEE Computer Society, (2012)A generic resource distribution and test scheduling scheme for embedded core-based SoCs., and . IEEE Trans. Instrumentation and Measurement, 53 (2): 318-329 (2004)Kidemonas: The Silent Guardian., and . CoRR, (2017)Similarity Metrics for SQL Query Clustering., , , , , and . IEEE Trans. Knowl. Data Eng., 30 (12): 2408-2420 (2018)Design Considerations for High Performance RF Cores Based on Process Variation Study., , , , , , and . J. Electron. Test., 24 (1-3): 143-155 (2008)A new approach to the design of built-in self-testing PLAs for high fault coverage., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 7 (1): 60-67 (1988)Insecure Programming: How Culpable is a Language's Syntax?, , , and . IAW, page 158-163. IEEE, (2003)Implementation of a Gracefully Degradable Binary Tree in Programmable., and . DFT, page 28-36. IEEE Computer Society, (1994)