{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:22:14Z","timestamp":1725556934730},"publisher-location":"London","reference-count":9,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781848822146"},{"type":"electronic","value":"9781848822153"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-84882-215-3_11","type":"book-chapter","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T10:46:23Z","timestamp":1275907583000},"page":"147-156","source":"Crossref","is-referenced-by-count":0,"title":["Silog: Speech Input Logon"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Grau","sequence":"first","affiliation":[]},{"given":"Tony","family":"Allen","sequence":"additional","affiliation":[]},{"given":"Nasser","family":"Sherkat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Gollman, D. Computer Security. John Wiley & Sons, 1999. ISBN 0-471-97844-2"},{"issue":"1","key":"11_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TPAMI.2006.20","volume":"28","author":"R. Cappelli","year":"2006","unstructured":"Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., and Jain, A.K., Performance evaluation of fingerprint verification systems, IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3\u201318, Jan. 2006","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR3","unstructured":"NIST Iris Challenge Evaluation, (Online)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Reynolds, D.A., Campbell, W., Gleason, T., Quillen, C, Sturim, D., Torres-Carrasquillo, P., and Adami, A., The 2004 MIT Lincoln laboratory speaker recognition system, in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Philadelphia, PA, Mar. 2005","DOI":"10.1109\/ICASSP.2005.1415079"},{"issue":"10","key":"11_CR5","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/34.464560","volume":"17","author":"R. Bruneili","year":"1995","unstructured":"Bruneili, R. and Falavigna, D.: Personal identification using multiple cues, IEEE Trans. On Pattern Analysis and Machine Intelligence, Vol. 17, No. 10, pp. 955\u2013966, 1995.","journal-title":"IEEE Trans. On Pattern Analysis and Machine Intelligence"},{"key":"11_CR6","unstructured":"AOL\/NCSA Online Safety Study. America Online & The National Cyber Security Alliance. 2005."},{"key":"11_CR7","unstructured":"Pjsip: Open source SIP stack and media stack for presence, im\/instant messaging, and multimedia communication http:\/\/www.pjsip.org"},{"key":"11_CR8","unstructured":"Dennis, A., and Haley Wixom, B., (2003), System Analysis & Design, Second Edition John Wiley & Sons Ltd"},{"key":"11_CR9","volume-title":"Usability Engineering","author":"J. Nielsen","year":"1994","unstructured":"Nielsen, J., (1994), Usability Engineering, Academic Press, Boston 1993 ISBN 0-12-518406-9"}],"container-title":["Applications and Innovations in Intelligent Systems XVI"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-84882-215-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T22:00:10Z","timestamp":1619906410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-84882-215-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781848822146","9781848822153"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-84882-215-3_11","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}