Sciweavers

355 search results - page 52 / 71
» Security Test Generation Using Threat Trees
Sort
View
CSL
1999
Springer
13 years 9 months ago
A hidden Markov-model-based trainable speech synthesizer
This paper presents a new approach to speech synthesis in which a set of cross-word decision-tree state-clustered context-dependent hidden Markov models are used to define a set o...
R. E. Donovan, Philip C. Woodland
ADC
2008
Springer
135views Database» more  ADC 2008»
14 years 4 months ago
Faster Path Indexes for Search in XML Data
This article describes how to implement efficient memory resident path indexes for semi-structured data. Two techniques are introduced, and they are shown to be significantly fas...
Nils Grimsmo
CIG
2005
IEEE
14 years 3 months ago
Board Evaluation For The Virus Game
Abstract- The Virus Game (or simply Virus) is a turnbased two player perfect information game which is based on the growth and spread of competing viruses. This paper describes a C...
Peter I. Cowling
ICPR
2002
IEEE
14 years 2 months ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 10 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...