Sciweavers

321 search results - page 48 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
FAST
2010
14 years 12 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
15 years 3 months ago
HMM-Based Deception Recognition from Visual Cues
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment human...
Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Ad...
FGR
2002
IEEE
229views Biometrics» more  FGR 2002»
15 years 2 months ago
An Approach to Automatic Recognition of Spontaneous Facial Actions
We present ongoing work on a project for automatic recognition of spontaneous facial actions. Spontaneous facial expressions differ substantially from posed expressions, similar t...
Bjorn Braathen, Marian Stewart Bartlett, Gwen Litt...
PRICAI
2004
Springer
15 years 2 months ago
Classifying Human Actions Using an Incomplete Real-Time Pose Skeleton
Currently, most human action recognition systems are trained with feature sets that have no missing data. Unfortunately, the use of human pose estimation models to provide more des...
Patrick Peursum, Hung Hai Bui, Svetha Venkatesh, G...
IJCAI
2003
14 years 11 months ago
Bayesian Information Extraction Network
Dynamic Bayesian networks (DBNs) offer an elegant way to integrate various aspects of language in one model. Many existing algorithms developed for learning and inference in DBNs ...
Leonid Peshkin, Avi Pfeffer