Workload dispatch planning for real-time fingerprint authentication on a sensor-client-server model
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chung, Y. | - |
dc.contributor.author | Moon, D. | - |
dc.contributor.author | Kim, T. | - |
dc.contributor.author | Park, J.-W. | - |
dc.date.accessioned | 2022-03-14T07:41:25Z | - |
dc.date.available | 2022-03-14T07:41:25Z | - |
dc.date.created | 2022-03-14 | - |
dc.date.issued | 2004 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/25855 | - |
dc.description.abstract | In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the sensor-client-server model. We first estimated the performance of primitive operations on the sensor, the client, and the server, respectively. Then, based on these primitive performance results, the workload of each scenario of the task assignment was applied to the M/D/1 queueing model representing the sensor-client-server model, and the collective performance of each scenario was analyzed quantitatively. The modeling results showed that extracting features and matching on the server could provide both fast response time and secure authentication with small numbers of clients. As the number of clients was increased, however, a bottleneck was observed on the server. The bottleneck can be eliminated by either performing the feature extraction on the client or increasing the number of processors in the server. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | Workload dispatch planning for real-time fingerprint authentication on a sensor-client-server model | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, J.-W. | - |
dc.identifier.doi | 10.1007/978-3-540-30501-9_163 | - |
dc.identifier.scopusid | 2-s2.0-13944261230 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science, v.3320, pp.833 - 838 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science | - |
dc.citation.title | Lecture Notes in Computer Science | - |
dc.citation.volume | 3320 | - |
dc.citation.startPage | 833 | - |
dc.citation.endPage | 838 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Authentication Protocol | - |
dc.subject.keywordAuthor | Fingerprint Verification | - |
dc.subject.keywordAuthor | Performance Evaluation | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.