Sciweavers

923 search results - page 55 / 185
» Spam Deobfuscation using a Hidden Markov Model
Sort
View
CCS
2007
ACM
15 years 10 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
140
Voted
CHI
1999
ACM
15 years 9 months ago
Inferring Intent in Eye-Based Interfaces: Tracing Eye Movements with Process Models
While current eye-based interfaces offer enormous potential for efficient human-computer interaction, they also manifest the difficulty of inferring intent from user eye movements...
Dario D. Salvucci
CSL
1999
Springer
15 years 4 months ago
A hidden Markov-model-based trainable speech synthesizer
This paper presents a new approach to speech synthesis in which a set of cross-word decision-tree state-clustered context-dependent hidden Markov models are used to define a set o...
R. E. Donovan, Philip C. Woodland
149
Voted
AUTOMATICA
2007
82views more  AUTOMATICA 2007»
15 years 4 months ago
Simulation-based optimal sensor scheduling with application to observer trajectory planning
The sensor scheduling problem can be formulated as a controlled hidden Markov model and this paper solves the problem when the state, observation and action spaces are continuous....
Sumeetpal S. Singh, Nikolaos Kantas, Ba-Ngu Vo, Ar...
PAMI
2008
189views more  PAMI 2008»
15 years 4 months ago
Detecting Objects of Variable Shape Structure With Hidden State Shape Models
This paper proposes a method for detecting object classes that exhibit variable shape structure in heavily cluttered images. The term "variable shape structure" is used t...
Jingbin Wang, Vassilis Athitsos, Stan Sclaroff, Ma...