Sciweavers

HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
13 years 10 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
IDEAL
2004
Springer
13 years 10 months ago
Stock Trading by Modelling Price Trend with Dynamic Bayesian Networks
We study a stock trading method based on dynamic bayesian networks to model the dynamics of the trend of stock prices. We design a three level hierarchical hidden Markov model (HHM...
Jangmin O, Jae Won Lee, Sung-Bae Park, Byoung-Tak ...
ECML
2004
Springer
13 years 10 months ago
Fisher Kernels for Logical Sequences
One approach to improve the accuracy of classifications based on generative models is to combine them with successful discriminative algorithms. Fisher kernels were developed to c...
Kristian Kersting, Thomas Gärtner
IUI
2004
ACM
13 years 10 months ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
KDD
2005
ACM
119views Data Mining» more  KDD 2005»
13 years 10 months ago
LIPED: HMM-based life profiles for adaptive event detection
In this paper, the proposed LIPED (LIfe Profile based Event Detection) employs the concept of life profiles to predict the activeness of event for effective event detection. A gro...
Chien Chin Chen, Meng Chang Chen, Ming-Syan Chen
ISSADS
2005
Springer
13 years 10 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ISMIR
2005
Springer
170views Music» more  ISMIR 2005»
13 years 10 months ago
Applications of Binary Classification and Adaptive Boosting to the Query-By-Humming Problem
In the “query-by-humming” problem, we attempt to retrieve a specific song from a target set based on a sung query. Recent evaluations of query-by-humming systems show that th...
Charles L. Parker
ISMIR
2005
Springer
122views Music» more  ISMIR 2005»
13 years 10 months ago
Continuous HMM and Its Enhancement for Singing/Humming Query Retrieval
The use of HMM (Hidden Markov Models) for speech recognition has been successful for various applications in the past decades. However, the use of continuous HMM (CHMM) for melody...
Jyh-Shing Roger Jang, Chao-Ling Hsu, Hong-Ru Lee
IDEAL
2005
Springer
13 years 10 months ago
Predictive Vaccinology: Optimisation of Predictions Using Support Vector Machine Classifiers
Promiscuous human leukocyte antigen (HLA) binding peptides are ideal targets for vaccine development. Existing computational models for prediction of promiscuous peptides used hidd...
Ivana Bozic, Guanglan Zhang, Vladimir Brusic
ECML
2005
Springer
13 years 10 months ago
Inducing Hidden Markov Models to Model Long-Term Dependencies
We propose in this paper a novel approach to the induction of the structure of Hidden Markov Models. The induced model is seen as a lumped process of a Markov chain. It is construc...
Jérôme Callut, Pierre Dupont