Author of the publication

Retinal Angiography Based Authentication.

, , , and . CIARP, volume 2905 of Lecture Notes in Computer Science, page 306-313. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the use of a minimal path approach for target trajectory analysis., , , , and . Pattern Recognition, 46 (7): 2015-2027 (2013)Personal verification based on extraction and characterisation of retinal feature points., , , , and . J. Vis. Lang. Comput., 20 (2): 80-90 (2009)Optimization of Topological Active Models with Multiobjective Evolutionary Algorithms., , , and . ICPR, page 2226-2229. IEEE Computer Society, (2010)Automatic Segmentation of the Mandible in Cone-Beam Computer Tomography Images., , , and . CBMS, page 467-468. IEEE Computer Society, (2014)Automatic Arteriovenous Ratio Computation: Emulating the Experts., , , , , , and . DoCEIS, volume 372 of IFIP Advances in Information and Communication Technology, page 563-570. Springer, (2012)Crest Line and Correlation Filter Based Location of the Macula in Digital Retinal Images., , , and . BIOSIGNALS (2), page 521-527. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)978-989-8111-18-0.Adaptive parameter computation for the automatic measure of the Tear Break-Up Time., , , , , , and . KES, volume 243 of Frontiers in Artificial Intelligence and Applications, page 1370-1379. IOS Press, (2012)Topological Active Volumes., and . EURASIP J. Adv. Sig. Proc., 2005 (13): 1939-1947 (2005)Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information., , and . CIARP, volume 7042 of Lecture Notes in Computer Science, page 173-180. Springer, (2011)Retinal Angiography Based Authentication., , , and . CIARP, volume 2905 of Lecture Notes in Computer Science, page 306-313. Springer, (2003)