Sciweavers

638 search results - page 77 / 128
» Modeling interleaved hidden processes
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 9 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
ICIP
2006
IEEE
15 years 3 months ago
Modelization of Limb Coordination for Human Action Analysis
This paper analyzes the movements of the human body limbs (hands, feet and head) and center of gravity in order to detect simple actions such as walking, jumping and displacing an...
Kosta Gaitanis, Pedro Correa, Benoit M. Macq
68
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Informative dialect recognition using context-dependent pronunciation modeling
We propose an informative dialect recognition system that learns phonetic transformation rules, and uses them to identify dialects. A hidden Markov model is used to align referenc...
Nancy F. Chen, Wade Shen, Joseph P. Campbell, Pedr...
ICIP
2003
IEEE
15 years 11 months ago
Evaluation strategies for automatic linguistic indexing of pictures
With the rapid technological advances in machine learning and data mining, it is now possible to train computers with hundreds of semantic concepts for the purpose of annotating i...
James Ze Wang, Jia Li, Sui Ching Lin
CHIMIT
2009
ACM
15 years 4 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...