Sciweavers

20833 search results - page 263 / 4167
» Hidden process models
Sort
View
171
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
EMNLP
2007
15 years 6 months ago
What is the Jeopardy Model? A Quasi-Synchronous Grammar for QA
This paper presents a syntax-driven approach to question answering, specifically the answer-sentence selection problem for short-answer questions. Rather than using syntactic fea...
Mengqiu Wang, Noah A. Smith, Teruko Mitamura
WCE
2007
15 years 5 months ago
Speech Recognition Model for Tamil Stops
—In this paper, a novel approach for implementing Tamil isolated speech phoneme recognition is described. While most of the literature on Automatic Speech Recognition (ASR) is ba...
Arumugam Rathinavelu, Anupriya Rajkumar, A. S. Mut...
155
Voted
TITS
2008
250views more  TITS 2008»
15 years 4 months ago
Learning, Modeling, and Classification of Vehicle Track Patterns from Live Video
This paper presents two different types of visual activity analysis modules based on vehicle tracking. The highway monitoring module accurately classifies vehicles into eight diffe...
Brendan Tran Morris, Mohan M. Trivedi
ACL
2010
15 years 2 months ago
Minimized Models and Grammar-Informed Initialization for Supertagging with Highly Ambiguous Lexicons
We combine two complementary ideas for learning supertaggers from highly ambiguous lexicons: grammar-informed tag transitions and models minimized via integer programming. Each st...
Sujith Ravi, Jason Baldridge, Kevin Knight