{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:16Z","timestamp":1750307536179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,28]],"date-time":"2008-03-28T00:00:00Z","timestamp":1206662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,28]]},"DOI":"10.1145\/1593105.1593111","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T13:29:27Z","timestamp":1249997367000},"page":"18-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Biometrics education with hands-on labs"],"prefix":"10.1145","author":[{"given":"Li","family":"Yang","sequence":"first","affiliation":[{"name":"University of Tennessee at Chattanooga, Chattanooga, TN"}]},{"given":"Kathy","family":"Winters","sequence":"additional","affiliation":[{"name":"University of Tennessee at Chattanooga, Chattanooga, TN"}]},{"given":"Joseph M.","family":"Kizza","sequence":"additional","affiliation":[{"name":"University of Tennessee at Chattanooga, Chattanooga, TN"}]}],"member":"320","published-online":{"date-parts":[[2008,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Craig I. Watson Michael D. Garris Elham Tabassi Charles L. Wilson R. Michael McCabe Stanley Janet and Kenneth Ko User's Guide to NIST Biometric Image Software (NBIS) National Institute of Standards and Technology 2006. http:\/\/fingerprint.nist.gov\/NFIS\/  Craig I. Watson Michael D. Garris Elham Tabassi Charles L. Wilson R. Michael McCabe Stanley Janet and Kenneth Ko User's Guide to NIST Biometric Image Software (NBIS) National Institute of Standards and Technology 2006. http:\/\/fingerprint.nist.gov\/NFIS\/","DOI":"10.6028\/NIST.IR.7392"},{"volume-title":"National Institute of Standards and Technology","year":"2006","author":"Watson Craig I.","key":"e_1_3_2_1_2_1"},{"volume-title":"Computer Science Department Colorado State University","year":"2003","author":"Beveridge Ross","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1991.139758"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"W. Zhao R. Chellappa and A. Krishnaswamy. Discriminant analysis of principal components for face recognition. In Wechsler Philips Bruce Fogelman-Soulie and Huang editors Face Recognition: From Theory to Applications pages 73--85 1998.  W. Zhao R. Chellappa and A. Krishnaswamy. Discriminant analysis of principal components for face recognition. In Wechsler Philips Bruce Fogelman-Soulie and Huang editors Face Recognition: From Theory to Applications pages 73--85 1998.","DOI":"10.1007\/978-3-642-72201-1_4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1996.546848"},{"key":"e_1_3_2_1_7_1","unstructured":"The National Biometrics Challenge National Science and Technology Council Subcommittee on Biometrics 2006.  The National Biometrics Challenge National Science and Technology Council Subcommittee on Biometrics 2006."},{"key":"e_1_3_2_1_8_1","unstructured":"Lodge Juliet Trends in Biometrics December 2006 http:\/\/www.libertysecurity.org\/article1191.html  Lodge Juliet Trends in Biometrics December 2006 http:\/\/www.libertysecurity.org\/article1191.html"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.820040"},{"volume-title":"National Institute of Standards and Technology","year":"2003","author":"Garris Michael D.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/348941.348995"},{"key":"e_1_3_2_1_12_1","unstructured":"Carnegie Mellon University (CMU) http:\/\/cmusphinx.sourceforge.net\/html\/cmusphinx.php  Carnegie Mellon University (CMU) http:\/\/cmusphinx.sourceforge.net\/html\/cmusphinx.php"},{"volume-title":"Wiley","year":"2002","author":"Nanavati Amir","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Paul Reid Biometrics for Network Security Prentice Hall 2004   Paul Reid Biometrics for Network Security Prentice Hall 2004","DOI":"10.1016\/S1353-4858(04)00077-7"}],"event":{"name":"ACM SE08: ACM Southeast Regional Conference","acronym":"ACM SE08","location":"Auburn Alabama"},"container-title":["Proceedings of the 46th Annual Southeast Regional Conference on XX"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1593105.1593111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:18Z","timestamp":1750249398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,28]]},"references-count":14,"alternative-id":["10.1145\/1593105.1593111","10.1145\/1593105"],"URL":"https:\/\/doi.org\/10.1145\/1593105.1593111","relation":{},"subject":[],"published":{"date-parts":[[2008,3,28]]},"assertion":[{"value":"2008-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}