Sciweavers

11 search results - page 2 / 3
» Using Hidden Markov Modeling to Decompose Human-Written Summ...
Sort
View
ETRICS
2006
13 years 9 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ICASSP
2008
IEEE
13 years 11 months ago
Impact of automatic sentence segmentation on meeting summarization
This paper investigates the impact of automatic sentence segmentation on speech summarization using the ICSI meeting corpus. We use a hidden Markov model (HMM) for sentence segmen...
Yang Liu, Shasha Xie
ICASSP
2011
IEEE
12 years 9 months ago
Utilizing glottal source pulse library for generating improved excitation signal for HMM-based speech synthesis
This paper describes a source modeling method for hidden Markov model (HMM) based speech synthesis for improved naturalness. A speech corpus is rst decomposed into the glottal sou...
Tuomo Raitio, Antti Suni, Hannu Pulakka, Martti Va...
AAAI
1997
13 years 6 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand
AAAI
2006
13 years 6 months ago
DNNF-based Belief State Estimation
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
Paul Elliott, Brian C. Williams