The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
We report work on the first component of a two stage speech recognition architecture based on phonological features rather than phones. The paper reports experiments on three phon...
The lack of eye contact in video conference degrades the user’s experience. This problem has been known and studied for many years. There are hardware-based solutions to the eye...
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...