Sciweavers

930 search results - page 170 / 186
» Melody Spotting Using Hidden Markov Models
Sort
View
86
Voted
PROCEDIA
2010
115views more  PROCEDIA 2010»
14 years 7 months ago
Generative topographic mapping by deterministic annealing
Generative Topographic Mapping (GTM) is an important technique for dimension reduction which has been successfully applied to many fields. However the usual Expectation-Maximizat...
Jong Youl Choi, Judy Qiu, Marlon E. Pierce, Geoffr...
ACL
2009
14 years 7 months ago
Do Automatic Annotation Techniques Have Any Impact on Supervised Complex Question Answering?
In this paper, we analyze the impact of different automatic annotation methods on the performance of supervised approaches to the complex question answering problem (defined in th...
Yllias Chali, Sadid A. Hasan, Shafiq R. Joty
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
15 years 10 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
89
Voted
BMCBI
2004
114views more  BMCBI 2004»
14 years 9 months ago
HMM Logos for visualization of protein families
Background: Profile Hidden Markov Models (pHMMs) are a widely used tool for protein family research. Up to now, however, there exists no method to visualize all of their central a...
Benjamin Schuster-Böckler, Jörg Schultz,...
ISI
2008
Springer
14 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham