Sciweavers

233 search results - page 38 / 47
» Mining Trajectory Patterns Using Hidden Markov Models
Sort
View
KDD
2012
ACM
254views Data Mining» more  KDD 2012»
13 years 2 months ago
Playlist prediction via metric embedding
Digital storage of personal music collections and cloud-based music services (e.g. Pandora, Spotify) have fundamentally changed how music is consumed. In particular, automatically...
Shuo Chen, Josh L. Moore, Douglas Turnbull, Thorst...

Publication
363views
13 years 11 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong
115
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 14 days ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
87
Voted
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 1 months ago
Name-ethnicity classification from open sources
The problem of ethnicity identification from names has a variety of important applications, including biomedical research, demographic studies, and marketing. Here we report on th...
Anurag Ambekar, Charles B. Ward, Jahangir Mohammed...
103
Voted
PR
2007
109views more  PR 2007»
14 years 12 months ago
Unsupervised multiscale oil slick segmentation from SAR images using a vector HMC model
This study focuses on the segmentation and characterization of oil slicks on the sea surface from synthetic aperture radar (SAR) observations. In fact, an increase in viscosity du...
Stéphane Derrode, Grégoire Mercier