


default search action
Information Sciences, Volume 268
Volume 268, June 2014
- David Zhang

, Lei Zhang
:
Special issue on "New sensing and processing technologies for hand-based biometrics authentication". 1-2 - Miguel A. Ferrer

, Aythami Morales
, Alba Díaz:
An approach to SWIR hyperspectral hand biometrics. 3-19 - Wenming Yang, Xiaola Huang, Fei Zhou

, Qingmin Liao:
Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion. 20-32 - Jinfeng Yang, Yihua Shi:

Towards finger-vein image restoration and enhancement for finger-vein recognition. 33-52 - Shoichiro Aoyama, Koichi Ito

, Takafumi Aoki:
A finger-knuckle-print recognition algorithm using phase-based local block matching. 53-64 - Manhua Liu, Shuxin Liu, Qijun Zhao:

Fingerprint orientation field reconstruction by weighted discrete cosine transform. 65-77 - Feng Yue, Wangmeng Zuo:

Consistency analysis on orientation features for fast and accurate palmprint identification. 78-90 - Xiaofei Jia, Xin Yang, Kai Cao, Yali Zang

, Ning Zhang, Ruwei Dai, Xinzhong Zhu, Jie Tian:
Multi-scale local binary pattern with filters for spoof fingerprint detection. 91-102 - Marta Gomez-Barrero

, Javier Galbally
, Aythami Morales
, Miguel A. Ferrer
, Julian Fiérrez, Javier Ortega-Garcia
:
A novel hand reconstruction approach and its application to vulnerability assessment. 103-121 - Shengzhe Li, Hakil Kim, Changlong Jin, Stephen J. Elliott

, Mingjie Ma:
Assessing the level of difficulty of fingerprint datasets based on relative quality measures. 122-132
- Shu Zhao, Ling Zhang, Xiansheng Xu, Yanping Zhang:

Hierarchical description of uncertain information. 133-146 - Xianyong Zhang, Duoqian Miao:

Quantitative information architecture, granular computing and rough set models in the double-quantitative approximation space of precision and grade. 147-168 - Yu-Jie Wang:

A fuzzy multi-criteria decision-making model by associating technique for order preference by similarity to ideal solution with relative preference relation. 169-184 - Dogan Özgen, Bahadir Gülsün:

Combining possibilistic linear programming and fuzzy AHP for solving the multi-objective capacitated multi-facility location problem. 185-201 - Luciana R. Pedro

, Ricardo H. C. Takahashi
:
INSPM: An interactive evolutionary multi-objective algorithm with preference model. 202-219 - Sheng Chen, Lindu Zhao, Weigong Zhang, Peng Shi:

Consensus on compact Riemannian manifolds. 220-230 - Santiago Muelas, Alexander Mendiburu

, Antonio LaTorre
, José María Peña Sánchez:
Distributed Estimation of Distribution Algorithms for continuous optimization: How does the exchanged information influence their behavior? 231-254 - Xinhe Miao, Jein-Shan Chen

, Chun-Hsu Ko:
A smoothed NR neural network for solving nonlinear convex programs with second-order cone constraints. 255-270 - Qiang Hu, Yuyue Du, ShuXia Yu:

Service net algebra based on logic Petri nets. 271-289 - Jürgen Dassow, Florin Manea, Robert Mercas

:
Regular languages of partial words. 290-304 - Antonio López Jaimes, Carlos A. Coello Coello

, Hernán E. Aguirre, Kiyoshi Tanaka:
Objective space partitioning using conflict information for solving many-objective problems. 305-327 - Sebastián Maldonado, Julio López

:
Alternative second-order cone programming formulations for support vector classification. 328-341 - Mohammad Javad Mahmoodabadi, S. Momennejad, Ahmad Bagheri

:
Online optimal decoupled sliding mode control based on moving least squares and particle swarm optimization. 342-356 - Hyerim Bae, Sanghyup Lee, Ilkyeong Moon

:
Planning of business process execution in Business Process Management environments. 357-369 - Fangchao He, Hong Chen, Luoqing Li:

Statistical analysis of the moving least-squares method with unbounded sampling. 370-380 - Lucie Urbanova, Vilém Vychodil:

Derivation digraphs for dependencies in ordinal and similarity-based data. 381-396 - Dries Geebelen, Kristof Geebelen, Eddy Truyen, Sam Michiels

, Johan A. K. Suykens
, Joos Vandewalle, Wouter Joosen:
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset. 397-424 - Nijad Al-Najdawi

, M. Noor Al-Najdawi, Sara Tedmori:
Employing a novel cross-diamond search in a modified hierarchical search motion estimation algorithm for video compression. 425-435 - Chen Peng, Minrui Fei, Engang Tian, Yanpeng Guan:

On hold or drop out-of-order packets in networked control systems. 436-446 - Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:

Certificate-free ad hoc anonymous authentication. 447-457 - Debiao He

, Miaomiao Tian, Jianhua Chen:
Insecurity of an efficient certificateless aggregate signature with constant pairing computations. 458-462 - Shiying Wang, Shurong Zhang, Yuxing Yang

:
Hamiltonian path embeddings in conditional faulty k-ary n-cubes. 463-488 - Alireza T. Boloorchi, Mansur H. Samadzadeh, T. Chen:

Symmetric Threshold Multipath (STM): An online symmetric key management scheme. 489-504

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














