Sciweavers

5398 search results - page 703 / 1080
» Markov Face Models
Sort
View
ETRICS
2006
15 years 7 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
15 years 7 months ago
String transformation-based Bayesian classification or proteins
We describe a Markov chain Bayesian classification tool, SCS, that can perform data-driven classification of proteins and protein segments. Training data for interesting classific...
Timothy Meekhof, Gary W. Daughdrill, Robert B. Hec...
SIGIR
1998
ACM
15 years 7 months ago
Automatic Acquisition of Phrasal Knowledge for English-Chinese Bilingual Information Retrieval
Extraction of phrasal knowledge, such as proper names, domain-specific keyphrases and lexical templates from a domain-specific text collection are significant for developing effec...
Ming-Jer Lee, Lee-Feng Chien
DAC
1994
ACM
15 years 7 months ago
Probabilistic Analysis of Large Finite State Machines
Regarding nite state machines as Markov chains facilitates the application of probabilistic methods to very large logic synthesis and formal veri cation problems. Recently, we ha...
Gary D. Hachtel, Enrico Macii, Abelardo Pardo, Fab...
AMI
2009
Springer
15 years 6 months ago
Sensor-Based Human Activity Recognition in a Multi-user Scenario
Existing work on sensor-based activity recognition focuses mainly on single-user activities. However, in real life, activities are often performed by multiple users involving inter...
Liang Wang, Tao Gu, XianPing Tao, Jian Lu