Sciweavers

193 search results - page 38 / 39
» Sparseness Achievement in Hidden Markov Models
Sort
View
WISEC
2010
ACM
14 years 1 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
ICASSP
2009
IEEE
14 years 1 months ago
Cross-lingual speech recognition under runtime resource constraints
This paper proposes and compares four cross-lingual and bilingual automatic speech recognition techniques under the constraints of limited memory size and CPU speed. The first thr...
Dong Yu, Li Deng, Peng Liu, Jian Wu, Yifan Gong, A...
ASSETS
2006
ACM
14 years 6 days ago
American sign language recognition in game development for deaf children
CopyCat is an American Sign Language (ASL) game, which uses gesture recognition technology to help young deaf children practice ASL skills. We describe a brief history of the game...
Helene Brashear, Valerie L. Henderson, Kwang-Hyun ...
BMCBI
2007
141views more  BMCBI 2007»
13 years 6 months ago
Using structural motif descriptors for sequence-based binding site prediction
Background: Many protein sequences are still poorly annotated. Functional characterization of a protein is often improved by the identification of its interaction partners. Here, ...
Andreas Henschel, Christof Winter, Wan Kyu Kim, Mi...
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 6 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin