Telematics and Information Technology, Enschede.
Cline, M., (2005). Power, Madness, and Immortality: the
future of virtual reality. University Village Press.
Dharmawansa, A., Nakahira, K., and Fukumura, Y.,
(2011). Develop a Monitoring Tool and Extract Facial
Expression towards the Analyzing Student Behavior in
Three Dimensional Virtual Environment. Biometrics
and Kansei Engineering (ICBAKE), 2011
International Conference on (pp. 134 -139).
Takamatsu, Japan: Abrasive Engineering Society.
Drosou, A., Ioannidis, D., Moustakas, K., and Tzovaras,
D., (2012). Spatiotemporal analysis of human
activities for biometric authentication. Computer
Vision and Image Understanding , 411 - 421.
Gavrilova, M. L., and Yampolskiy, R. V., (2010).
Applying Biometric Principles to Avatar Recognition.
Proc. Int Cyberworlds (CW) Conf (pp. 179-186).
Singapore: IEEE Computer Society.
Golle, P., and Ducheneaut, N., (2005). Preventing bots
from playing online games. Computers in
Entertainment (CIE) - Theoretical and Practical
Computer Applications in Entertainment , 3 (3), 1-10.
Gonzalez-Pardo, A., Rodriguez, F. B., Pulido, E., and
Camacho, D., (2010). Using virtual worlds for
behaviour clustering-based analysis. SMVC'10 -
Proceedings of the 2010 ACM Workshop on Surreal
Media and Virtual Cloning, Co-located with ACM
Multimedia 2010, (pp. 9-14). Firenze, Italy.
Harris, B., and Novobilski, A., (2008). Real currency
economies: Using real money in virtual worlds. 2008
International Conference on Frontiers in Education:
Computer Science and Computer Engineering, FECS
2008 (pp. 241 - 246). Las Vegas: CSREA Press.
Horng, S.-J., Chen, Y.-H., Run, R.-S., Chen, R.-J., Lai, J.-
L., and Sentosal, K., (2009). An Improved Score Level
Fusion in Multimodal Biometric Systems. Parallel
and Distributed Computing, Applications and
Technologies, 2009 International Conference on (pp.
239 -246). Higashi Hiroshima : IEEE.
Hube, J. (2010). Methods for estimating biometric score
level fusion. Biometrics: Theory Applications and
Systems (BTAS), 2010 Fourth IEEE International
Conference on (pp. 1 - 6). Washington, DC, USA:
IEEE.
Ishikawa, N., Watanabe, Y., Nishimura, R., Umemoto, K.,
Okada, Y. and Murata, M., (2010). Detection of users
suspected of using multiple user accounts and
manipulating evaluations in a community site. 2010
International Conference on Natural Language
Processing and Knowledge Engineering (NLP-KE
2010), (pp. 1-8). Beijing.
Kim, B., Barua, A., and Whinston, A., (2002). Virtual
field experiments for a digital economy: a new
research methodology for exploring an information
economy. Decision Support Systems , 215 - 231.
Noor, A., (2010). Potential of virtual worlds for remote
space exploration. Advances in Engineering Software ,
666 - 673.
Peng, H., and Xu, X., (2008). The Analysis of Arbitrage
Capital Flows between Online Virtual Game and Real
Economy Based on Risk Premium. Computational
Intelligence for Modelling Control Automation, 2008
International Conference on (pp. 1141 -1146). Vienna,
Austria: IEEE.
Ratha, N. K., Connell, J. H., and Bolle, R. M., (2001).
Enhancing security and privacy in biometrics-based
authentication systems. IBM Systems Journal , 40 (3),
614-34.
Romann, J., (2007). Projective virtual reality today and in
the future: Application of virtual worlds in space,
industry, and at the construction site with robotic
know-how to improved virtual worlds. VDI Berichte ,
55-67.
Ross, A., and Nandakumar, K., (2009). Score-Level
Fusion. In S. Z. Li, and A. K. Jain, Encyclopeida of
Biometrics (pp. 611 - 621). Springer Science+Business
Media, LLC.
Schuckers, S. A., (2002). Spoofing and anti-spoofing
measures. Information security technical report , 7 (4),
56-62.
Standing document 2. (2007, 08 22). Standing document 2,
harmonized biometric vocabulary, version 8 . ISO/IEC
JTC 1/SC 37 N 2263.
Thawonmas, R., Kashifuji, Y., and Chen, K.-T., (2008).
Detection of MMORPG bots based on behavior
analysis. Proceedings of the 2008 International
Conference on Advances in Computer Entertainment
Technology, ACE 2008, (pp. 91-94). Yokohama,
Japan.
Toth, B., (2005). Biometric liveness detection.
Information Security Bulletin, (pp. 291-297).
Tran, Q., Liatsis, P., Zhu, B., and He, C., (2011). An
approach for multimodal biometric fusion under the
missing data scenario. Uncertainty Reasoning and
Knowledge Engineering (URKE), 2011 International
Conference on (pp. 185 -188). Bali, Indonesia: IEEE.
Yampolskiy, R., and Govindaraju, V., (2007). Behavioral
biometrics for recognition and verification of game
bots. 8th International Conference on Intelligent
Games and Simulation. GAME-ON 2007, (pp. 108-
114). Ghent-Zwijnaarde, Belgium.
BiometricIdentificationinVirtualWorldsusingBiometricFusionTechniques
269