1. Foster, I., Kesselman, C., Tsudik, G., and Tuecke, S., A Security Architecture for Computational Grids CCS “98, Proc. of the 5th ACM Conf. Comput. And Commun. Security, Nov.3–5, 1998, San Francisco, CA, USA, ACM Press, 1998, pp. 83–91.
2. Bryukhomotskii, Ya.A., Kazarin, M.N., The Method for Biometric Identification of a User by Keyboard Writing Based on Haar Decomposition and Hamming Similarity Measure, Izvestiya TRTU, Taganrog: Izd. TRTU, 2003, vol. 33, no 4, in Materialy 5-oi Mezhdun. nauch.-prakt. konf. “Informatsionnaya bezopasnost’” (Proceedings of the 5-th Scientific-Practical Conference “Information Secuirity”, pp. 141–149.
3. Jacobs, C.E., Finkelstein, A., Salesin, D.H., Fast Multiresolution Image Quering, Proc. of SIGGAPH’95, New York, 1995, vol. 286, pp. 277–286.
4. Stolinz, E., Rose, de T., Salezin, D. Veivlety v kompyuternoi grafike (Wavelets in Computer Graphics), Transl. from Engl. Izhevsk: NITs RKhD, 2002, p. 272.
5. Martinez, A.M., Kak, A.C., PCA Versus LDA, IEEE Trans. Pattern Anal. and Mach. Intell., 2001, vol. 23, no. 2, pp. 228–233.