Sciweavers

930 search results - page 162 / 186
» Melody Spotting Using Hidden Markov Models
Sort
View
WEBI
2010
Springer
14 years 7 months ago
Impacts of Analysts' Cognitive Styles on the Analytic Process
A user's cognitive style has been found to affect how they search for information, how they analyze the information, and how they make decisions in an analytical process. In ...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Deqing Li,...
DAGM
2009
Springer
14 years 7 months ago
HMM-Based Defect Localization in Wire Ropes - A New Approach to Unusual Subsequence Recognition
Abstract. Automatic visual inspection has become an important application of pattern recognition, as it supports the human in this demanding and often dangerous work. Nevertheless,...
Esther-Sabrina Platzer, Josef Nägele, Karl-He...
92
Voted
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 7 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
JMLR
2010
152views more  JMLR 2010»
14 years 4 months ago
The SHOGUN Machine Learning Toolbox
We have developed a machine learning toolbox, called SHOGUN, which is designed for unified large-scale learning for a broad range of feature types and learning settings. It offers...
Sören Sonnenburg, Gunnar Rätsch, Sebasti...
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto