Sciweavers

271 search results - page 49 / 55
» Hidden Markov Model Variants and their Application
Sort
View
ICIP
2008
IEEE
15 years 11 months ago
Estimation and representation of accumulated motion characteristics for semantic event detection
In this paper, a motion-based approach for detecting high-level semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be dire...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...
69
Voted
ICASSP
2008
IEEE
15 years 4 months ago
Text-independent voice conversion based on state mapped codebook
Voice conversion has become more and more important in speech technology, but most of current works have to use parallel utterances of both source and target speaker as the traini...
Meng Zhang, Jianhua Tao, Jilei Tian, Xia Wang
ACSAC
2003
IEEE
15 years 2 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
96
Voted
ICRA
2003
IEEE
222views Robotics» more  ICRA 2003»
15 years 2 months ago
Path planning using learned constraints and preferences
— In this paper we present a novel method for robot path planning based on learning motion patterns. A motion pattern is defined as the path that results from applying a set of ...
Gregory Dudek, Saul Simhon
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
15 years 2 months ago
Studying the Advantages of a Messy Evolutionary Algorithm for Natural Language Tagging
The process of labeling each word in a sentence with one of its lexical categories (noun, verb, etc) is called tagging and is a key step in parsing and many other language processi...
Lourdes Araujo