Author of the publication

Automated dental identification system (ADIS).

, , , and . DG.O, volume 151 of ACM International Conference Proceeding Series, page 369-370. Digital Government Research Center, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Spoof Buster: Use of Minutiae-Centered Patches., , and . IEEE Trans. Inf. Forensics Secur., 13 (9): 2190-2202 (2018)Matching Forensic Sketches and Mug Shots to Apprehend Criminals., and . Computer, 44 (5): 94-96 (2011)Bootstrap Techniques for Error Estimation., , and . IEEE Trans. Pattern Anal. Mach. Intell., 9 (5): 628-633 (1987)Biometric Recognition: How Do I Know Who You Are?. ICEIS (1), page 17-18. (2006)Bayesian framework for semantic classification of outdoor vacation images., , , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3656 of SPIE Proceedings, page 415-426. SPIE, (1999)Fingerprint image synthesis based on statistical feature models., , , and . BTAS, page 23-30. IEEE, (2012)Probabilistic Face Embeddings., , and . CoRR, (2019)Latent Palmprint Matching., and . IEEE Trans. Pattern Anal. Mach. Intell., 31 (6): 1032-1047 (2009)Deformation Modeling for Robust 3D Face Matching., and . IEEE Trans. Pattern Anal. Mach. Intell., 30 (8): 1346-1357 (2008)Face Recognition: Primates in the Wild., , , , , , and . BTAS, page 1-10. IEEE, (2018)