- 1 Yoelle S. Maarek and Gail E. Kaiser, "Change Management in Very Large Software Systems", Phoenix Conference on Computer Systems and Communications, IEEE, March 1988, pp. 280-285.Google Scholar
- 2 Richard W. Selby and Victor R. Basili, "Error Localization During Software Maintenance: Generating Hierarchical System Descriptions from the Source Code Alone", Conference on Software Maintenance -- 1988, IEEE, Ott 1988.Google Scholar
- 3 Rolf Adams, Annette Weinert and Walter Tichy, "Software Change Dynamics or Half of all Ada Compilations are Redundant", European Software Engineering Conference, 1989. Google ScholarDigital Library
- 4 Walter F. Tichy, "Smart Recompilation", ACM Trans. Bogramming Lang. and Systems, Vol. 8, No. 3, July 1986, pp. 273-291. Google ScholarDigital Library
- 5 Virginia R. Gibson and James A. Senn, "System Structure and Software Maintenance Performance", Communications 0 f the ACM, Vol. 32, No. 3, March 1989, pp. 347-358. Google ScholarDigital Library
- 6 David L. Parnas, "On the Criteria To Be Used In Decomposing Systems Into Modules", Tech. report, Computer Science Department, Carnegie-Mellon University, August 1971.Google Scholar
- 7 Joel McCormack, Paul Asente, and Ralph R. Swick, "X Toolkit Intrinsics -- C Language X Interface", Tech. report, Massachusetts Institute of Technology, 1988.Google Scholar
- 8 Yoelle S. Maarek, Using Structural Information for Managing Very Large Software Systems, PhD dissertation, Technion -- Israel Institute of Technology, January 1989.Google Scholar
- 9 Douglas Fisher, "Knowledge Acquisition Via Incremental Conceptual Clustering", Machine Learning, Vol. 2, No. 2, 1987, pp. 139-179. Google ScholarDigital Library
- 10 Frances J. Newbery, "EDGE: An Extendible Directed Graph Editor", Tech. report 8/88, Universitaet Karlsruhe, 1988.Google Scholar
- 11 Peter H. Feiler, Fahimeh Jalili, and Johann H. Schlichter, "An Interactive Prototyping Environment for Language Design", Proceedings of the Hawaii Conference on System Sciences, January 1986.Google Scholar
- 12 Ellen M. Voorhees, "The Cluster Hypothesis Revisited", Research and Development in Information Retrieval, ACM SIGIR, June 1985. Google ScholarDigital Library
- 13 Ellis S. Cohen, Edward T. Smith, and Lee A. Iverson, "Constraint-Based Tiled Windows", First International Conference on Computer Workstations, IEEE Computer Society, November 1985.Google Scholar
Index Terms
- Cross references are features
Recommendations
Anti-spoofing study on palm biometric features
Highlights- A dual-wavelength synchronous acquisition system is proposed.
- Static (palmprint, vein) and dynamic (SpO2, pulse) biometrics acquired at same time.
- Most multispectrum systems are upgradeable for liveness info with minimal ...
AbstractSpoofing attacks severely threaten the security of biometric recognition systems. Two concerns are raised regarding palm biometrics. First, the anti-spoofing ability of the palm vein as a subcutaneous feature needs further exploration. In-depth ...
Combining sclera and periocular features for multi-modal identity verification
In this paper, we propose to combine sclera and periocular features for identity verification. The proposal is particularly useful in applications related to face recognition when the face is partially occluded with only periocular region revealed. Due ...
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness of existing palmprint authentication systems using 3D palmprint features. ...
Comments