Author:
Moutafis Panagiotis,Kakadiaris Ioannis A.
Publisher
Springer International Publishing
Reference44 articles.
1. Akhtar, Z., Fumera, G., Marcialis, G., Roli, F.: Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: Proceedings of 5th International Conference on Biometrics: Theory, Applications and Systems, pp. 283–288, New Delhi, India, March 29–April1 2012
2. Auckenthaler, R., Carey, M., Lloyd-Thomas, H.: Score normalization for text-independent speaker verification systems. Digit. Signal Proc. 10(1), 42–54 (2000)
3. Beveridge, J., Phillips, P., Bolme, D., Draper, B., Givens, G., Lui, Y., Teli, M., Zhang, H., Scruggs, W., Bowyer, K., Flynn, P., Cheng, S.: The challenge of face recognition from digital point-and-shoot cameras. In Proceedings of 6th International Conference on Biometrics: Theory, Applications and Systems, pp. 1–8, Washington DC, 4–7 June 2013
4. Birnbaum, M., Patton, J., Lott, M.: Evidence against rank-dependent utility theories: tests of cumulative independence, interval independence, stochastic dominance, and transitivity. Organ. Behav. Hum. Decis. Process. 77(1), 44–83 (1999)
5. Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In Proceedings of the International Conference on Spoken Language Processing, vol. 4, pp. 1–4, Sydney, Australia, Nov 30–Dec 4 1998