Sciweavers

988 search results - page 186 / 198
» Intrusion Detection with Neural Networks
Sort
View
MICAI
2000
Springer
13 years 11 months ago
Verification of Correct Pronunciation of Mexican Spanish Using Speech Technology
This paper presents a new method for the verification of the correct pronunciation of spoken words. This process is based on speech recognition technology. It can be particularly ...
Ingrid Kirschning, Nancy Aguas
ICASSP
2011
IEEE
12 years 11 months ago
Localization of non-linguistic events in spontaneous speech by Non-Negative Matrix Factorization and Long Short-Term Memory
Features generated by Non-Negative Matrix Factorization (NMF) have successfully been introduced into robust speech processing, including noise-robust speech recognition and detect...
Felix Weninger, Björn Schuller, Martin Wö...
ICPR
2002
IEEE
14 years 9 months ago
Relational Graph Labelling Using Learning Techniques and Markov Random Fields
This paper introduces an approach for handling complex labelling problems driven by local constraints. The purpose is illustrated by two applications: detection of the road networ...
Denis Rivière, Jean-Francois Mangin, Jean-M...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
IJON
2007
91views more  IJON 2007»
13 years 7 months ago
Dynamics of parameters of neurophysiological models from phenomenological EEG modeling
We investigate a recently proposed method for the analysis of oscillatory patterns in EEG data, with respect to its capacity of further quantifying processes on slower (< 1 Hz)...
E. Olbrich, Thomas Wennekers