{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:57:35Z","timestamp":1725512255325},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540723592"},{"type":"electronic","value":"9783540723608"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72360-8_38","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T23:07:03Z","timestamp":1182380823000},"page":"447-458","source":"Crossref","is-referenced-by-count":1,"title":["An Algorithm Testbed for the Biometrics Grid"],"prefix":"10.1007","author":[{"given":"Anlong","family":"Ming","sequence":"first","affiliation":[]},{"given":"Huadong","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"38_CR1","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/2.820038","volume":"33","author":"R. Bolle","year":"2000","unstructured":"Bolle, R., Pankanti, S., Jain, A.K.: Guest editorial. IEEE Computer (Special Issue on Biometrics)\u00a033(2), 46\u201349 (2000)","journal-title":"IEEE Computer"},{"key":"38_CR2","unstructured":"Waterman, S.: Biometric borders coming. Times, Washington (2003)"},{"key":"38_CR3","unstructured":"General Accounting Office (GAO).: Technology assessment: Using biometrics for border security. GAO-03-174, Washington (2002)"},{"key":"38_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/b117227","volume-title":"Biometrics: Personal Identification in Networked Society","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Bolle, R., et al.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"38_CR5","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Phillips, P.J., Grother, P., et al.: Face recognition vendor test 2002: Evaluation report. In: Audio- and Video-Based Person Authentication (AVBPA) (2003)","DOI":"10.6028\/NIST.IR.6965"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Meng, K., et al.: A High Performence Face Recognition System Based on A Huge Face Database. In: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou (2005)","DOI":"10.1109\/ICMLC.2005.1527853"},{"issue":"3","key":"38_CR8","first-page":"522","volume":"93","author":"S. Matsuoka","year":"2005","unstructured":"Matsuoka, S., et al.: Japanese computational grid research project: NAREGI. Digital Object Identifier\u00a093(3), 522\u2013533 (2005)","journal-title":"Digital Object Identifier"},{"issue":"3","key":"38_CR9","first-page":"485","volume":"93","author":"D. Bernholdt","year":"2005","unstructured":"Bernholdt, D., et al.: The Earth System Grid: Supporting the Next Generation of Climate Modeling Research. Digital Object Identifier\u00a093(3), 485\u2013495 (2005)","journal-title":"Digital Object Identifier"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Gamassi, M., et al.: Quality Assessment of Biometric Systems: A Comprehensive Perspective Based on Accuracy and Performance Measurement. IEEE Transactions on Instrumentation Measurement\u00a054(4) (2005)","DOI":"10.1109\/TIM.2005.851087"},{"issue":"2","key":"38_CR11","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/2.820038","volume":"33","author":"R. Bolle","year":"2000","unstructured":"Bolle, R., Pankanti, S., Jain, A.K.: Guest editorial. IEEE Computer (Special Issue on Biometrics)\u00a033(2), 46\u201349 (2000)","journal-title":"IEEE Computer"},{"key":"38_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0747-7","volume-title":"Biometrics: Advanced Identify Verification \u2013 The Complete Guide","author":"J.D.M. Ashbourn","year":"2000","unstructured":"Ashbourn, J.D.M.: Biometrics: Advanced Identify Verification \u2013 The Complete Guide. Springer, Berlin (2000)"},{"issue":"9","key":"38_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0969-4765(02)00917-7","volume":"10","author":"R. Norton","year":"2002","unstructured":"Norton, R.: The evolving biometric marketplace to 2006. Biometric Technology Today\u00a010(9), 7\u20138 (2002)","journal-title":"Biometric Technology Today"},{"issue":"2","key":"38_CR14","first-page":"68","volume":"5","author":"G. Fox","year":"2003","unstructured":"Fox, G.: Grid computing environments. Digital Object Identifier\u00a05(2), 68\u201372 (2003)","journal-title":"Digital Object Identifier"},{"key":"38_CR15","unstructured":"Mansfield, A.J., Wayman, J.L.: Best practices in testing and reporting performance of biometric devices. National Physical Lab., Center for Mathematics and Scientific Computing (2002)"},{"key":"38_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"A.K. Jain","year":"2001","unstructured":"Jain, A.K., Qian, J.-Z., Ross, A.: Information Fusion in Biometrics. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol.\u00a02091, Springer, Heidelberg (2001)"},{"key":"38_CR17","unstructured":"Zuev, Y., Ivanon, S.: The voting as a way to increase the decision reliability. In: Foundations of Information\/Decision Fusion with Applications to Engineering Problems, Washington, pp. 206\u2013210 (1996)"},{"key":"38_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_34","volume-title":"Multiple Classifier Systems","author":"R. Cappelli","year":"2000","unstructured":"Cappelli, R., Maio, D., Maltoni, D.: Combining Fingerprint Classifiers. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol.\u00a01857, Springer, Heidelberg (2000)"},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1016\/S0167-8655(99)00108-7","volume":"20","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Prabhakar, S., Chen, S.: Combining multiple matchers for a high security fingerprint verification system. Pattern Recognition Letters\u00a020, 1371\u20131379 (1999)","journal-title":"Pattern Recognition Letters"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Kittler, J., et al.: On combining classifiers. IEEE Transactions on PAMI, 226-239 (1998)","DOI":"10.1109\/34.667881"},{"key":"38_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BFb0016008","volume-title":"Audio- and Video-based Biometric Person Authentication","author":"E. Bigun","year":"1997","unstructured":"Bigun, E., et al.: Expert conciliation for multi-modal person authentication systems using bayesian statistics. In: Big\u00fcn, J., Borgefors, G., Chollet, G. (eds.) AVBPA 1997. LNCS, vol.\u00a01206, pp. 291\u2013300. Springer, Heidelberg (1997)"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Ben-Yacoub, S., Abdeljaoued, Y., Mayoraz, E.: Fusion of face and speech data for person identity verification. Research Paper IDIAP-RR 99-03, Switzerland (1999)","DOI":"10.1109\/72.788647"},{"key":"38_CR23","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/34.464560","volume":"12","author":"R. Brunelli","year":"1995","unstructured":"Brunelli, R., Falavigna, D.: Person identification using multiple cues. IEEE Transactions on PAMI\u00a012, 955\u2013966 (1995)","journal-title":"IEEE Transactions on PAMI"},{"key":"38_CR24","unstructured":"Liu, Y.: Research on identity verification system based Institute of Automation. Chinese Academy of Sciences on voiceprint and semanteme[Mnater dissertation], Beijing, China (2002)"},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/34.799912","volume":"21","author":"O. Vel de","year":"1999","unstructured":"de Vel, O., Aeberhard, S.: Line-based face recognition under varying pose. IEEE Trans. Pattern Analysis and Machine Intelligence\u00a021, 1081\u20131088 (1999)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Ming, A., Ma, H.: An improved Approach to the line-based face recognition.pdf. In: Proceedings of the 2006 IEEE International Conference on Multimedia and Exposition (ICME), Toronto (2006)","DOI":"10.1109\/ICME.2006.262840"},{"key":"38_CR27","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W.Y. Zhao","year":"2003","unstructured":"Zhao, W.Y., et al.: Face recognition: A literature survey. ACM Computing Surveys\u00a035, 399\u2013458 (2003)","journal-title":"ACM Computing Surveys"}],"container-title":["Lecture Notes in Computer Science","Advances in Grid and Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72360-8_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:54Z","timestamp":1605763854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72360-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540723592","9783540723608"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72360-8_38","relation":{},"subject":[]}}