<--- Back to Details
First PageDocument Content
Security / Iris / Surveillance / Computer file / National security / Biometrics / Iris recognition / University of Cambridge Computer Laboratory
Date: 2009-08-31 02:27:39
Security
Iris
Surveillance
Computer file
National security
Biometrics
Iris recognition
University of Cambridge Computer Laboratory

Microsoft Word - ServiceNoteOnCasiaIrisImageDatabases1

Add to Reading List

Source URL: www.cbsr.ia.ac.cn

Download Document from Source Website

File Size: 12,28 KB

Share Document on Facebook

Similar Documents

Software engineering / Computer programming / Computing / Proof assistants / Logic in computer science / Functional languages / Automated theorem proving / Theoretical computer science / HOL / Logic for Computable Functions / Automated reasoning / ML

Steps Towards Verified Implementations of HOL Light Magnus O. Myreen1 , Scott Owens2 , and Ramana Kumar1 1 Computer Laboratory, University of Cambridge, UK

DocID: 1xTfW - View Document

ICN and IoT Andrés Arcia-Moret N4D Lab, Computer Laboratory University of Cambridge Agenda

DocID: 1uTfI - View Document

On the role of contextual information for privacy attacks and classification Daniel Cvrˇcek University of Cambridge Computer Laboratory William Gates Building 15 JJ Thomson Avenue

DocID: 1uFdo - View Document

Reducing Dimensions of Tensors in Type-Driven Distributional Semantics Tamara Polajnar Luana Fˇagˇarˇas¸an Stephen Clark Computer Laboratory University of Cambridge Cambridge, UK

DocID: 1uwQl - View Document

A 2-Round Anonymous Veto Protocol Feng Hao and Piotr Zieli´ nski Computer Laboratory, University of Cambridge, UK {feng.hao,piotr.zielinski}@cl.cam.ac.uk

DocID: 1uj2A - View Document