Sciweavers

321 search results - page 52 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
81
Voted
CSE
2009
IEEE
15 years 4 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
96
Voted
MVA
2007
179views Computer Vision» more  MVA 2007»
14 years 9 months ago
Multi-object trajectory tracking
The majority of existing tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework using a Hidden Markov Model, where the distribution ...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
IJCNLP
2005
Springer
15 years 3 months ago
A Chunking Strategy Towards Unknown Word Detection in Chinese Word Segmentation
This paper proposes a chunking strategy to detect unknown words in Chinese word segmentation. First, a raw sentence is pre-segmented into a sequence of word atoms 1 using a maximum...
Guodong Zhou
BMCBI
2005
152views more  BMCBI 2005»
14 years 9 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 10 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar