Sciweavers

1622 search results - page 5 / 325
» Learning a Hidden Matching
Sort
View
STAIRS
2008
175views Education» more  STAIRS 2008»
14 years 11 months ago
Learning Process Behavior with EDY: an Experimental Analysis
This paper presents an extensive evaluation, on artificial datasets, of EDY, an unsupervised algorithm for automatically synthesizing a Structured Hidden Markov Model (S-HMM) from ...
Ugo Galassi
CISSE
2008
Springer
14 years 11 months ago
Pair Hidden Markov Model for Named Entity Matching
Peter Nabende, Jörg Tiedemann, John Nerbonne
WPES
2004
ACM
15 years 3 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
NDSS
2007
IEEE
15 years 3 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ICML
2008
IEEE
15 years 10 months ago
Modeling interleaved hidden processes
Hidden Markov models assume that observations in time series data stem from some hidden process that can be compactly represented as a Markov chain. We generalize this model by as...
Niels Landwehr