Sciweavers

233 search results - page 38 / 47
» Mining Trajectory Patterns Using Hidden Markov Models
Sort
View
KDD
2012
ACM
254views Data Mining» more  KDD 2012»
13 years 9 days ago
Playlist prediction via metric embedding
Digital storage of personal music collections and cloud-based music services (e.g. Pandora, Spotify) have fundamentally changed how music is consumed. In particular, automatically...
Shuo Chen, Josh L. Moore, Douglas Turnbull, Thorst...

Publication
363views
13 years 8 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 10 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
15 years 10 months ago
Name-ethnicity classification from open sources
The problem of ethnicity identification from names has a variety of important applications, including biomedical research, demographic studies, and marketing. Here we report on th...
Anurag Ambekar, Charles B. Ward, Jahangir Mohammed...
PR
2007
109views more  PR 2007»
14 years 9 months ago
Unsupervised multiscale oil slick segmentation from SAR images using a vector HMC model
This study focuses on the segmentation and characterization of oil slicks on the sea surface from synthetic aperture radar (SAR) observations. In fact, an increase in viscosity du...
Stéphane Derrode, Grégoire Mercier