Sciweavers

190 search results - page 30 / 38
» Chromosome Classification Using Continuous Hidden Markov Mod...
Sort
View
ICIAP
2005
ACM
14 years 7 months ago
Facial Expression Recognition Based on the Belief Theory: Comparison with Different Classifiers
This paper presents a system for classifying facial expressions based on a data fusion process relying on the Belief Theory (BeT). Four expressions are considered: joy, surprise, d...
Zakia Hammal, L. Couvreur, Alice Caplier, Mich&egr...
DAGM
2009
Springer
13 years 5 months ago
HMM-Based Defect Localization in Wire Ropes - A New Approach to Unusual Subsequence Recognition
Abstract. Automatic visual inspection has become an important application of pattern recognition, as it supports the human in this demanding and often dangerous work. Nevertheless,...
Esther-Sabrina Platzer, Josef Nägele, Karl-He...
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ISCI
2008
129views more  ISCI 2008»
13 years 7 months ago
Thai spelling analysis for automatic spelling speech recognition
Spelling speech recognition can be applied for several purposes including enhancement of speech recognition systems and implementation of name retrieval systems. This paper presen...
Chutima Pisarn, Thanaruk Theeramunkong
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 7 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....