{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:31:14Z","timestamp":1739338274453,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037665"},{"type":"electronic","value":"9783642037672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03767-2_7","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T15:29:00Z","timestamp":1251473340000},"page":"58-65","source":"Crossref","is-referenced-by-count":7,"title":["Second-Level Partition for Estimating FAR Confidence Intervals in Biometric Systems"],"prefix":"10.1007","author":[{"given":"Rongfeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Darun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wenxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"David","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.628719","volume":"85","author":"W. Shen","year":"1997","unstructured":"Shen, W., Surette, M., Khanna, R.: Evaluation of Automated Biometrics-Based Identification and Verification Systems. Proceedings of the IEEE\u00a085(9), 1464\u20131478 (1997)","journal-title":"Proceedings of the IEEE"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Golfarelli, M., Maio, D., Maltoni, D.: On the Error-Reject Trade-Off in Biometric Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(7) (July 1997)","DOI":"10.1109\/34.598237"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/79.647042","volume":"15","author":"D.N. Politis","year":"1998","unstructured":"Politis, D.N.: Computer-intensive methods in statistical analysis. IEEE Signal Processing Magazine\u00a015(1), 39\u201355 (1998)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/100.755813","volume":"6","author":"J.L. Wayman","year":"1999","unstructured":"Wayman, J.L.: Error rate equations for the general biometric system. IEEE Robotics & Automation Magazine\u00a06(1), 35\u201348 (1999)","journal-title":"IEEE Robotics & Automation Magazine"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/2.820040","volume":"33","author":"P.J. Phillips","year":"2000","unstructured":"Phillips, P.J., Martin, A., Wilson, C.L., Przybocki, M.: An Introduction to Evaluating Biometric Systems. Computer\u00a033(2), 56\u201363 (2000)","journal-title":"Computer"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bolle, R.M., Pankanti, S., Ratha, N.K.: Evaluation techniques for biometrics-based authentication systems (FRR). In: 15th International Conference on Pattern Recognition, Proceedings, September 2000, vol.\u00a02(3-7), pp. 831\u2013837 (2000)","DOI":"10.1109\/ICPR.2000.906204"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Dahel, S.K., Xiao, Q.: Accuracy performance analysis of multimodal biometrics. In: Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, June 18-20, pp. 170\u2013173 (2003)","DOI":"10.1109\/SMCSIA.2003.1232417"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Bolle, R.M., Ratha, N.K., Pankanti, S.: IBM Thomas J. Watson Research Center. In: Proceedings of the 17th International Conference on An Evaluation of Error Confidence Interval Estimation Methods, August 23-26, vol.\u00a03, pp. 103\u2013106 (2004)","DOI":"10.1109\/ICPR.2004.1334479"},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cviu.2003.08.002","volume":"93","author":"R.M. Bolle","year":"2004","unstructured":"Bolle, R.M., Ratha, N.K., Pankanti, S.: Error analysis of pattern recognition systems\u2014the subsets bootstrap. Computer Vision and Image Understanding\u00a093(1), 1\u201333 (2004)","journal-title":"Computer Vision and Image Understanding"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Schmid, N.A., O\u2019Sullivan, J.A.: Performance Prediction Methodology for Biometric Systems Using a Large Deviations Approach. IEEE Transactions on Signal Processing\u00a052(10) (October 20, 2004)","DOI":"10.1109\/TSP.2004.833863"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Quality Assessment of Biometric Systems: A Comprehensive Perspective Based on Accuracy and Performance Measurement. IEEE Transactions on Instrumentation and Measurement\u00a054(4) (August 2005)","DOI":"10.1109\/TIM.2005.851087"},{"issue":"3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TPAMI.2005.57","volume":"27","author":"R. Snelick","year":"2005","unstructured":"Snelick, R., Uludag, U., Mink, A., Indovina, M., Jain, A.: Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a027(3), 450\u2013455 (2005)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Hube, J.P.: Using Biometric Verification to Estimate Identification Performance. In: Biometric Consortium Conference, 2006 Biometrics Symposium: Special Session on Research, pp. 1\u20136 (2006)","DOI":"10.1109\/BCC.2006.4341620"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Poh, N., Bengio, S.: Estimating the Confidence Interval of Expected Performance Curve in Biometric Authentication using Joint Bootstrap. In: IEEE International Conference on Acoustics, Speech and Signal Processing, April 15-20, vol.\u00a02, pp. II-137 \u2013 II-140 (2007)","DOI":"10.1109\/ICASSP.2007.366191"},{"key":"7_CR15","unstructured":"http:\/\/rate.pku.edu.cn"},{"key":"7_CR16","unstructured":"http:\/\/ai.pku.edu.cn"},{"key":"7_CR17","unstructured":"http:\/\/www.comp.polyu.edu.hk"},{"issue":"13","key":"7_CR18","first-page":"879","volume":"5","author":"W. Li","year":"2002","unstructured":"Li, W., Zhang, D., Xu, Z.Q.: Palmprint Recognition by Fourier Transform. Journal of Software\u00a05(13), 879\u2013886 (2002)","journal-title":"Journal of Software"},{"key":"7_CR19","unstructured":"Li, W., You, J., Zhang, D.: A Texture-based Approach to Palmprint Retrieval for Personal Identification. Accepted by IEEE Trans. on Multimedia (2003)"},{"issue":"10","key":"7_CR20","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1016\/S0031-3203(03)00121-3","volume":"36","author":"W.K. Kong","year":"2003","unstructured":"Kong, W.K., Zhang, D., Li, W.: Palmprint Feature Extraction Using 2-D Gabor Filters. Pattern Recognition\u00a036(10), 2339\u20132347 (2003)","journal-title":"Pattern Recognition"}],"container-title":["Lecture Notes in Computer Science","Computer Analysis of Images and Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03767-2_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T22:22:42Z","timestamp":1739312562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03767-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037665","9783642037672"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03767-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}