{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:59:42Z","timestamp":1725512382780},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540730064"},{"type":"electronic","value":"9783540730071"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73007-1_136","type":"book-chapter","created":{"date-parts":[[2007,9,20]],"date-time":"2007-09-20T13:34:35Z","timestamp":1190295275000},"page":"1122-1129","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of Supervised vs. Non Supervised Databases for Hand Geometry Verification"],"prefix":"10.1007","author":[{"given":"Marcos","family":"Faundez-Zanuy","sequence":"first","affiliation":[]},{"given":"Joan","family":"Fabregas","sequence":"additional","affiliation":[]},{"given":"Miguel A.","family":"Ferrer","sequence":"additional","affiliation":[]},{"given":"Carlos M.","family":"Travieso","sequence":"additional","affiliation":[]},{"given":"Jesus B.","family":"Alonso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"136_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MAES.2006.1662038","volume":"21","author":"M. Faundez-Zanuy","year":"2006","unstructured":"Faundez-Zanuy, M.: Biometric security technology. IEEE Aerospace and Electron. Syst. Mag.\u00a021(6), 15\u201326 (2006)","journal-title":"IEEE Aerospace and Electron. Syst. Mag."},{"key":"136_CR2","doi-asserted-by":"crossref","unstructured":"Kukula, E., Elliot, S.: Implementation of Hand Geometry at Purdue University\u2019s Recreational Center: An Analysis of User Perspectives and System Performance. In: IEEE 39th Int. Carnahan Conference on Security Technology, October 2005, pp. 83\u201388 (2005)","DOI":"10.1109\/CCST.2005.1594879"},{"issue":"6","key":"136_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/MAES.2004.1308819","volume":"19","author":"M. Faundez-Zanuy","year":"2004","unstructured":"Faundez-Zanuy, M.: On the vulnerability of biometric security systems. IEEE Aerospace and Electron. Syst. Mag.\u00a019(6), 3\u20138 (2004)","journal-title":"IEEE Aerospace and Electron. Syst. Mag."},{"key":"136_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/11608288_96","volume-title":"Advances in Biometrics","author":"M. Faundez-Zanuy","year":"2005","unstructured":"Faundez-Zanuy, M., Ferrer-Ballester, M.A., Travieso-Gonz\u00e1lez, C.M., Espinosa-Duro, V.: Hand Geometry Based Recognition with a MLP Classifier. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol.\u00a03832, pp. 721\u2013727. Springer, Heidelberg (2005)"},{"key":"136_CR5","volume-title":"Neural nets. A comprehensive foundation","author":"S. Haykin","year":"1999","unstructured":"Haykin, S.: Neural nets. A comprehensive foundation, 2nd edn. Prentice-Hall, Englewood Cliffs (1999)","edition":"2"},{"key":"136_CR6","volume-title":"Error Control Systems for Digital Communication and Storage","author":"S.B. Wicker","year":"1995","unstructured":"Wicker, S.B.: Error Control Systems for Digital Communication and Storage. Prentice Hall, Englewood Cliffs (1995)"},{"key":"136_CR7","volume-title":"Proceedings of the Ninth National Conference on Artificial Intelligence (AAAI-91)","author":"T.G. Dietterich","year":"1991","unstructured":"Dietterich, T.G., Bakiri, G.: Error-correcting output codes: A general method for improving multiclass inductive learning programs. In: Proceedings of the Ninth National Conference on Artificial Intelligence (AAAI-91), Anaheim, CA, AAAI Press, Menlo Park (1991)"},{"key":"136_CR8","unstructured":"Dietterich, T.: Do Hidden Units Implement Error-Correcting Codes? Tech. report (1991)"},{"key":"136_CR9","doi-asserted-by":"crossref","DOI":"10.1002\/0471660264","volume-title":"Combining pattern classifiers","author":"L.I. Kuncheva","year":"2004","unstructured":"Kuncheva, L.I.: Combining pattern classifiers. John Wiley & Sons, Chichester (2004)"},{"key":"136_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4036-3","volume-title":"Guide to Biometrics","author":"R.M. Bolle","year":"2004","unstructured":"Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer, Heidelberg (2004)"},{"key":"136_CR11","unstructured":"Mansfield, A.J., Wayman, J.L.: Best Practices in Testing ans Reporting Performance of Biometric Devices. Version 2.01. C. for Mathematics and Scientific Computing (2002)"}],"container-title":["Lecture Notes in Computer Science","Computational and Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73007-1_136.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:54:28Z","timestamp":1619502868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73007-1_136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540730064","9783540730071"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73007-1_136","relation":{},"subject":[]}}