Sciweavers

16 search results - page 3 / 4
» An Off-Line Signature Verification System using Hidden Marko...
Sort
View
BMCBI
2008
155views more  BMCBI 2008»
13 years 5 months ago
Prediction of regulatory elements in mammalian genomes using chromatin signatures
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
SSPR
2004
Springer
13 years 10 months ago
Learning People Movement Model from Multiple Cameras for Behaviour Recognition
Abstract. In surveillance systems for monitoring people behaviour, it is imporant to build systems that can adapt to the signatures of the people tasks and movements in the environ...
Nam Thanh Nguyen, Svetha Venkatesh, Geoff A. W. We...
IVC
2000
153views more  IVC 2000»
13 years 5 months ago
The model-based human body motion analysis system
In this paper, we propose a model-based method to analyze the human walking motion. This system consists of three phases: the preprocessing phase, the model construction phase, an...
I-Cheng Chang, Chung-Lin Huang
JMLR
2010
185views more  JMLR 2010»
13 years 7 days ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ACSAC
2003
IEEE
13 years 10 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...