Sciweavers

923 search results - page 77 / 185
» Spam Deobfuscation using a Hidden Markov Model
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
Is ontology-based activity recognition really effective?
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
127
Voted
ICIP
2000
IEEE
16 years 6 months ago
Hierarchical Image Probability (HIP) Models
We formulate a model for probability distributions on image spaces. We show that any distribution of images can be factored exactly into conditional distributions of feature vecto...
Clay Spence, Lucas C. Parra, Paul Sajda
ICMCS
2009
IEEE
115views Multimedia» more  ICMCS 2009»
15 years 2 months ago
A framework to detect and classify activity transitions in low-power applications
Minimizing the number of computations a low-power device makes is important to achieve long battery life. In this paper we present a framework for a low-power device to minimize t...
Jeffrey Boyd, Hari Sundaram
DIMVA
2008
15 years 6 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
MSWIM
2004
ACM
15 years 10 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...