Sciweavers

321 search results - page 12 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
ACMSE
2005
ACM
15 years 5 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
INTERSPEECH
2010
14 years 6 months ago
Hidden Markov models with context-sensitive observations for grapheme-to-phoneme conversion
Hidden Markov models (HMMs) have proven useful in various aspects of speech technology from automatic speech recognition through speech synthesis, speech segmentation and grapheme...
Udochukwu Kalu Ogbureke, Peter Cahill, Julie Carso...
74
Voted
NAACL
1994
15 years 28 days ago
Japanese Word Segmentation by Hidden Markov Model
The processing of Japanese text is complicated by the fact that there are no word delimiters. To segment Japanese text, systems typically use knowledge-based methods and large lex...
Constantine Papageorgiou
ACL
2009
14 years 9 months ago
Hidden Markov Tree Model in Dependency-based Machine Translation
We would like to draw attention to Hidden Markov Tree Models (HMTM), which are to our knowledge still unexploited in the field of Computational Linguistics, in spite of highly suc...
Zdenek Zabokrtský, Martin Popel
JAIR
2002
120views more  JAIR 2002»
14 years 11 months ago
Learning Geometrically-Constrained Hidden Markov Models for Robot Navigation: Bridging the Topological-Geometrical Gap
Hidden Markov models hmms and partially observable Markov decision processes pomdps provide useful tools for modeling dynamical systems. They are particularly useful for represent...
Hagit Shatkay, Leslie Pack Kaelbling