Sciweavers

1275 search results - page 238 / 255
» The Infinite Hidden Markov Model
Sort
View
ICDAR
2009
IEEE
13 years 7 months ago
Combining Alignment Results for Historical Handwritten Document Analysis
In this paper we propose a new strategy for combining the outputs of several alignment systems. Based on the word boundaries retrieved from a number of individual alignment system...
Emanuel Indermühle, Marcus Liwicki, Horst Bun...
VLSISP
2010
191views more  VLSISP 2010»
13 years 4 months ago
Sign Language Phoneme Transcription with Rule-based Hand Trajectory Segmentation
A common approach to extract phonemes of sign language is to use an unsupervised clustering algorithm to group the sign segments. However, simple clustering algorithms based on dis...
W. W. Kong, Surendra Ranganath
ICASSP
2011
IEEE
13 years 1 months ago
Feature selection based on Multiple Kernel Learning for single-channel sound source localization using the acoustic transfer fun
This paper presents a sound source (talker) localization method using only a single microphone. In our previous work [1], we discussed the single-channel sound source localization...
Ryoichi Takashima, Tetsuya Takiguchi, Yasuo Ariki
BMCBI
2004
114views more  BMCBI 2004»
13 years 9 months ago
HMM Logos for visualization of protein families
Background: Profile Hidden Markov Models (pHMMs) are a widely used tool for protein family research. Up to now, however, there exists no method to visualize all of their central a...
Benjamin Schuster-Böckler, Jörg Schultz,...
ISI
2008
Springer
13 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham