Sciweavers

1960 search results - page 149 / 392
» A Hidden Markov Model Information Retrieval System
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
15 years 3 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
ICPR
2008
IEEE
15 years 11 months ago
Optimal feature weighting for the continuous HMM
We propose new Continuous Hidden Markov Model (CHMM) structure that integrates feature weighting component. We assume that each feature vector could include different subsets of f...
Oualid Missaoui, Hichem Frigui
ICMCS
2010
IEEE
164views Multimedia» more  ICMCS 2010»
15 years 4 months ago
Exploiting multimodal data fusion in robust speech recognition
This article introduces automatic speech recognition based on Electro-Magnetic Articulography (EMA). Movements of the tongue, lips, and jaw are tracked by an EMA device, which are...
Panikos Heracleous, Pierre Badin, Gérard Ba...
VISUAL
1999
Springer
15 years 9 months ago
General Image Database Model
In this paper we propose a new General Image DataBase (GIDB) model. The model establishes taxonomy based on the systematisation of existing approaches. The GIDB model is based on t...
Peter L. Stanchev
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 4 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....