Sciweavers

20833 search results - page 125 / 4167
» Hidden process models
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 10 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
ICIP
2006
IEEE
15 years 4 months ago
Modelization of Limb Coordination for Human Action Analysis
This paper analyzes the movements of the human body limbs (hands, feet and head) and center of gravity in order to detect simple actions such as walking, jumping and displacing an...
Kosta Gaitanis, Pedro Correa, Benoit M. Macq
ICASSP
2011
IEEE
14 years 1 months ago
Informative dialect recognition using context-dependent pronunciation modeling
We propose an informative dialect recognition system that learns phonetic transformation rules, and uses them to identify dialects. A hidden Markov model is used to align referenc...
Nancy F. Chen, Wade Shen, Joseph P. Campbell, Pedr...
IJCAI
2003
14 years 11 months ago
A Statistical Model for Flexible String Similarity
This paper proposes a statistical model for defining string similarity. The proposed model is based on hidden Markov model and defines string similarity as the combination of simi...
Atsuhiro Takasu
PLILP
1998
Springer
15 years 2 months ago
A Hidden Herbrand Theorem
: The bene ts of the object, logic or relational, functional, and constraint paradigms can be obtained from our previous combination of the object and functional paradigms in hidde...
Joseph A. Goguen, Grant Malcolm, Tom Kemp