Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Hidden Markov models have become the preferred technique for visual recognition of human gestures. However, the recognition rate depends on the set of visual features used, and al...
This paper concentrates on speech duration distributions that are usually invariant to noises and proposes a noise-robust and real-time voice activity detector (VAD) using the hid...
Xianglong Liu, Yuan Liang, Yihua Lou, He Li, Baoso...
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Background: With the explosion in data generated using microarray technology by different investigators working on similar experiments, it is of interest to combine results across...
Hyungwon Choi, Ronglai Shen, Arul M. Chinnaiyan, D...