|
|
|
|
LEADER |
02327nmm a2200445 u 4500 |
001 |
EB001846140 |
003 |
EBX01000000000000001010645 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
180901 ||| eng |
020 |
|
|
|a 9783319979090
|
100 |
1 |
|
|a Zhou, Jie
|e [editor]
|
245 |
0 |
0 |
|a Biometric Recognition
|h Elektronische Ressource
|b 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings
|c edited by Jie Zhou, Yunhong Wang, Zhenan Sun, Zhenhong Jia, Jianjiang Feng, Shiguang Shan, Kurban Ubul, Zhenhua Guo
|
250 |
|
|
|a 1st ed. 2018
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2018, 2018
|
300 |
|
|
|a XVII, 748 p. 364 illus
|b online resource
|
505 |
0 |
|
|a Hand-based Biometrics -- Gesture -- Gait -- Action -- Feature Extraction and Classication Theory -- Face -- Eye-based Biometrics -- Emerging Biometrics -- Behavioral Biometrics
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computer vision
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Data Structures and Information Theory
|
653 |
|
|
|a Computer Vision
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Biometrics
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Data structures (Computer science)
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Biometric identification
|
700 |
1 |
|
|a Wang, Yunhong
|e [editor]
|
700 |
1 |
|
|a Sun, Zhenan
|e [editor]
|
700 |
1 |
|
|a Jia, Zhenhong
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Image Processing, Computer Vision, Pattern Recognition, and Graphics
|
028 |
5 |
0 |
|a 10.1007/978-3-319-97909-0
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-97909-0?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 006.248
|
520 |
|
|
|a The LNCS volume 10996 constitutes the proceedings of the 13th Chinese Conference on Biometric Recognition, held in Urumchi, China, in August 2018. The 79 regular papers presented in this book were carefully reviewed and selected from 112 submissions. The papers cover a wide range of topics such as Biometrics, Speech recognition, Activity recognition and understanding, Online handwriting recognition, System forensics, Multi-factor authentication, Graphical and visual passwords
|