Sciweavers

887 search results - page 83 / 178
» Representing Systems with Hidden State
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
ACL
1998
15 years 5 months ago
Growing Semantic Grammars
A critical path in the development of natural language understanding NLU modules lies in the di culty of de ning a mapping from words to semantics: Usually it takes in the order o...
Marsal Gavaldà, Alex Waibel
CSL
2007
Springer
15 years 4 months ago
Discriminative semi-parametric trajectory model for speech recognition
Hidden Markov Models (HMMs) are the most commonly used acoustic model for speech recognition. In HMMs, the probability of successive observations is assumed independent given the ...
K. C. Sim, M. J. F. Gales
SIGDIAL
2010
15 years 2 months ago
Dialogue Act Modeling in a Complex Task-Oriented Domain
Classifying the dialogue act of a user utterance is a key functionality of a dialogue management system. This paper presents a data-driven dialogue act classifier that is learned ...
Kristy Elizabeth Boyer, Eun Y. Ha, Robert Phillips...
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 10 months ago
Can Government Be a Good eBayer? The Use of Online Auctions in the Sale of Surplus Property
E-commerce, and online auctions in particular, represent important examples of how information and communication technologies have been employed by public organizations to gain be...
Enrico Ferro, Lucy Dadayan