Моделирование конвейера распознавания людей в системах контроля доступа
https://doi.org/10.15514/ISPRAS-2016-28(2)-14
Аннотация
Об авторах
Ф. ГёссенИрландия
Т. Маргариа
Ирландия
Т. Гёке
Германия
Список литературы
1. G. S. Gagandeep Kaur and V. Kumar, “A review on biometric recognition,” International Journal of Bio-Science and Bio-Technology, vol. 6, no. 4, pp. 69–76, 2014.
2. Z. Zhang, “Microsoft kinect sensor and its effect,” IEEE MultiMedia, vol. 19, no. 2, pp. 4–10, 2012.
3. F. Gossen, “Bayesian recognition of human identities from continuous visual features for safe and secure access in healthcare environments,” in Design Technology of Integrated Systems in Nanoscale Era (DTIS), 2015 10th International Conference on, 2015.
4. I. Marqués and M. Graña, Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10), ch. Face Processing for Security: A Short Review, pp. 89–96. 2010.
5. T. Cover and P. Hart, “Nearest neighbor pattern classification,” Information Theory, IEEE Transactions on, vol. 13, no. 1, pp. 21–27, 1967.
6. “Rapid miner.” https://rapidminer.com/. Accessed: 2016-02-02.
7. “Openni 2 sdk.” http://structure.io/openni. Accessed: 2016-04-01.
8. S. Naujokat, L.-M. Traonouez, M. Isberner, B. Steffen, and A. Legay, Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change: 6th International Symposium, ISoLA 2014, Imperial, Corfu, Greece, October 8-11, 2014, Proceedings, Part I, ch. Domain-Specific Code Generator Modeling: A Case Study for Multi-faceted Concurrent Systems, pp. 481–498. Springer Berlin Heidelberg, 2014.
9. S. Naujokat, M. Lybecait, B. Steffen, D. Kopetzki, and T. Margaria, “Full generation of domain-specific graphical modeling tools: a meta modeling approach.” under submission, 2015.
10. “Cinco scce meta tooling framework.” http://cinco.scce.info/. Accessed: 2016-04-01.
Рецензия
Для цитирования:
Гёссен Ф., Маргариа Т., Гёке Т. Моделирование конвейера распознавания людей в системах контроля доступа. Труды Института системного программирования РАН. 2016;28(2):205-220. https://doi.org/10.15514/ISPRAS-2016-28(2)-14
For citation:
Gossen F., Margaria T., Göke T. Modelling the People Recognition Pipeline in Access Control Systems. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2016;28(2):205-220. https://doi.org/10.15514/ISPRAS-2016-28(2)-14