—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an of...
Letter-to-phoneme conversion generally requires aligned training data of letters and phonemes. Typically, the alignments are limited to one-to-one alignments. We present a novel t...
Sittichai Jiampojamarn, Grzegorz Kondrak, Tarek Sh...
Affect plays a vital role in learning. During tutoring, particular affective states may benefit or detract from student learning. A key cognitiveaffective state is confusion, which...
Joseph F. Grafsgaard, Kristy Elizabeth Boyer, Jame...
Background: The Generalized Hidden Markov Model (GHMM) has proven a useful framework for the task of computational gene prediction in eukaryotic genomes, due to its flexibility an...
William H. Majoros, Mihaela Pertea, Arthur L. Delc...