Sciweavers

787 search results - page 125 / 158
» The Application of Hidden Markov Models in Speech Recognitio...
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
SIGIR
2005
ACM
14 years 1 months ago
On the collective classification of email "speech acts"
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...
Vitor Rocha de Carvalho, William W. Cohen
JCDL
2003
ACM
101views Education» more  JCDL 2003»
14 years 1 months ago
Bibliographic Attribute Extraction from Erroneous References Based on a Statistical Model
In this paper, we propose a method for extracting bibliographic attributes from reference strings captured using Optical Character Recognition (OCR) and an extended hidden Markov ...
Atsuhiro Takasu
TIP
2008
165views more  TIP 2008»
13 years 7 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
ICIP
2006
IEEE
14 years 2 months ago
Modelization of Limb Coordination for Human Action Analysis
This paper analyzes the movements of the human body limbs (hands, feet and head) and center of gravity in order to detect simple actions such as walking, jumping and displacing an...
Kosta Gaitanis, Pedro Correa, Benoit M. Macq