Sciweavers

887 search results - page 44 / 178
» Representing Systems with Hidden State
Sort
View
ETRICS
2006
15 years 8 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
168
Voted
HAPTICS
2008
IEEE
15 years 5 months ago
Haptic Interaction with Soft Tissues Based on State-Space Approximation
The well known property of haptic interaction is the high refresh rate of the haptic loop that is necessary for the stability of the interaction. Therefore, only simple computation...
Igor Peterlík, Ludek Matyska
139
Voted
VRML
2000
ACM
15 years 9 months ago
3D behavioral model design for simulation and software engineering
Modeling is used to build structures that serve as surrogates for other objects. As children, we learn to model at a very young age. An object such as a small toy train teaches us...
Paul A. Fishwick
ICASSP
2011
IEEE
14 years 8 months ago
An investigation of subspace modeling for phonetic and speaker variability in automatic speech recognition
This paper investigates the impact of subspace based techniques for acoustic modeling in automatic speech recognition (ASR). There are many well known approaches to subspace based...
Richard C. Rose, Shou-Chun Yin, Yun Tang
ICPR
2008
IEEE
15 years 11 months ago
Adaptive nonstationary regression analysis
The problem of finding the most appropriate subset of features or regressors is the generic challenge of Machine Learning problems like regression estimation or pattern recognitio...
Olga Krasotkina, Vadim Mottl