Sciweavers

661 search results - page 64 / 133
» Risk and Information in the Estimation of Hidden Markov Mode...
Sort
View
SIGIR
2002
ACM
13 years 7 months ago
Two-stage language models for information retrieval
The optimal settings of retrieval parameters often depend on both the document collection and the query, and are usually found through empirical tuning. In this paper, we propose ...
ChengXiang Zhai, John D. Lafferty
CIVR
2009
Springer
257views Image Analysis» more  CIVR 2009»
14 years 2 months ago
Trajectory-based handball video understanding
This paper presents a content-based approach for understanding handball videos. Tracked players are characterized by their 2D trajectories in the court plane. The trajectories and...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
IEEEIAS
2007
IEEE
14 years 2 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
PVLDB
2008
146views more  PVLDB 2008»
13 years 7 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
ICDAR
2009
IEEE
13 years 5 months ago
A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs
In this paper, an approach based on the combination of discrete Hidden Markov Models (HMMs) in the ROC space is proposed to improve the performance of off-line signature verificat...
Luana Batista, Eric Granger, Robert Sabourin