Sciweavers

269 search results - page 13 / 54
» A machine learning based approach for table detection on the...
Sort
View
ICASSP
2009
IEEE
13 years 11 months ago
Singing voice detection in music tracks using direct voice vibrato detection
In this paper we investigate the problem of locating singing voice in music tracks. As opposed to most existing methods for this task, we rely on the extraction of the characteris...
Lise Regnier, Geoffroy Peeters
JNCA
2007
179views more  JNCA 2007»
13 years 7 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ICML
2001
IEEE
14 years 8 months ago
Bayesian approaches to failure prediction for disk drives
Hard disk drive failures are rare but are often costly. The ability to predict failures is important to consumers, drive manufacturers, and computer system manufacturers alike. In...
Greg Hamerly, Charles Elkan
ICMLA
2009
13 years 5 months ago
Learning Probabilistic Structure Graphs for Classification and Detection of Object Structures
Abstract--This paper presents a novel and domainindependent approach for graph-based structure learning. The approach is based on solving the Maximum Common SubgraphIsomorphism pro...
Johannes Hartz