13.07.2015 Views

Thesis - Instituto de Telecomunicações

Thesis - Instituto de Telecomunicações

Thesis - Instituto de Telecomunicações

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY 187[191] T. Pixley. Document object mo<strong>de</strong>l (DOM) level 2 events specification. Technicalreport, W3C, 2000.[192] R. Plamondon and S. Srihari. Online and off-line handwriting recognition: a comprehensivesurvey. IEEE Transactions on Pattern Analysis and Machine Intelligence,22(1):63–84, 2000.[193] M. Przybocki and A. Martin. NIST speaker recognition evaluation chronicles. Technicalreport, Information Technology Laboratory National Institute of Standards andTechnology, USA, 2004.[194] M. Pusara and C. E. Brodley. User re-authentication via mouse movements. InProceedings of the 2004 ACM workshop on Visualization and data mining for computersecurity (VizSEC/DMSEC ’04), pages 1–8, New York, NY, USA, 2004. ACM Press.[195] Qarbon. Quick start gui<strong>de</strong> to viewletbuil<strong>de</strong>r. Technical report, Qarbon.com Inc., SanJose, CA 95113 USA, 2002.[196] L. R. Rabiner. A tutorial on hid<strong>de</strong>n Markov mo<strong>de</strong>ls and selected applications inspeech recognition. Proceedings of the IEEE, 77(2):257–286, 1989.[197] R. H. Rand. Introduction to Maxima. Dept. of Theoretical and Applied Mechanics,Cornell University, 08 2005.[198] D. Raymond. GB2399204 - System for monitoring and tracking an individual. EuropeanPatent Office, September 2004.[199] K. Revett, S. T. <strong>de</strong> Magalhães, and H. M. D. Santos. Enhancing login security throughthe use of keystroke input dynamics. In Proceedings of International Conference onAdvances in Biometrics (ICB’2006), pages 661–667, Hong Kong, China, January 5-7,2006.[200] T. Richardson, Q. Stafford-Fraser, K. R. Wood, and A. Hopper. Virtual networkcomputing. IEEE Internet Computing, 2(1):33–38, 1998.[201] T. Richardson and K. R. Wood. The RFB protocol. Technical Report 3.3, ORLCambridge, July 1998.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!