Sciweavers

1792 search results - page 310 / 359
» Discriminative Methods for Transliteration
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 26 days ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
110
Voted
IJCV
2008
139views more  IJCV 2008»
15 years 25 days ago
Multilevel Image Coding with Hyperfeatures
Histograms of local appearance descriptors are a popular representation for visual recognition. They are highly discriminant with good resistance to local occlusions and to geomet...
Ankur Agarwal, Bill Triggs
76
Voted
IJFCS
2008
49views more  IJFCS 2008»
15 years 25 days ago
A Markovian Approach for the Analysis of the gene Structure
Hidden Markov models (HMMs) are effective tools to detect series of statistically homogeneous structures, but they are not well suited to analyse complex structures. Numerous meth...
Christelle Melo de Lima, Laurent Gueguen, Christia...
103
Voted
DSP
2007
15 years 23 days ago
Feasibility of impact-acoustic emissions for detection of damaged wheat kernels
A non-destructive, real time device was developed to detect insect damage, sprout damage, and scab damage in kernels of wheat. Kernels are impacted onto a steel plate and the resu...
Tom C. Pearson, A. Enis Çetin, Ahmed H. Tew...
82
Voted
TASLP
2008
149views more  TASLP 2008»
15 years 22 days ago
Using Articulatory Representations to Detect Segmental Errors in Nonnative Pronunciation
Abstract--Motivated by potential applications in second-language pedagogy, we present a novel approach to using articulatory information to improve automatic detection of typical p...
Joseph Tepperman, Shrikanth Narayanan