Sciweavers

1084 search results - page 128 / 217
» Hidden Markov Models with Multiple Observation Processes
Sort
View
BMVC
1998
15 years 5 months ago
A Comparative Study of Rotation Invariant Classification and Retrieval of Texture Images
This paper presents a detailed comparative study of 4 rotation invariant texture analysis methods. Human subjects are included as a benchmark for the computational methods. Experi...
Stephanie R. Fountain, Tieniu Tan, Keith D. Baker
TITB
2010
95views Education» more  TITB 2010»
14 years 11 months ago
Sleep staging based on signals acquired through bed sensor
We describe a system for the evaluation of the sleep macrostructure on the basis of Emfit sensor foils placed into bed mattress and of advanced signal processing. The signals on wh...
Juha M. Kortelainen, Martin O. Mendez, Anna M. Bia...
161
Voted
ICASSP
2011
IEEE
14 years 7 months ago
An investigation of subspace modeling for phonetic and speaker variability in automatic speech recognition
This paper investigates the impact of subspace based techniques for acoustic modeling in automatic speech recognition (ASR). There are many well known approaches to subspace based...
Richard C. Rose, Shou-Chun Yin, Yun Tang
ICCAD
2000
IEEE
91views Hardware» more  ICCAD 2000»
15 years 8 months ago
A Timing-Constrained Algorithm for Simultaneous Global Routing of Multiple Nets
In this paper, we propose a new approach for VLSI interconnect global routing that can optimize both congestion and delay, which are often competing objectives. Our approach provi...
Jiang Hu, Sachin S. Sapatnekar
146
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 4 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....