Sciweavers

321 search results - page 57 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
ISCI
2008
129views more  ISCI 2008»
14 years 9 months ago
Thai spelling analysis for automatic spelling speech recognition
Spelling speech recognition can be applied for several purposes including enhancement of speech recognition systems and implementation of name retrieval systems. This paper presen...
Chutima Pisarn, Thanaruk Theeramunkong
69
Voted
CEE
2010
119views more  CEE 2010»
14 years 9 months ago
Block-matching-based motion field generation utilizing directional edge displacement
A motion field generation algorithm using block matching of edge-flag histograms has been developed aiming at its application to motion recognition systems. Use of edge flags inste...
Hitoshi Hayakawa, Tadashi Shibata
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
15 years 3 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
JMLR
2002
133views more  JMLR 2002»
14 years 9 months ago
Learning Precise Timing with LSTM Recurrent Networks
The temporal distance between events conveys information essential for numerous sequential tasks such as motor control and rhythm detection. While Hidden Markov Models tend to ign...
Felix A. Gers, Nicol N. Schraudolph, Jürgen S...
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
15 years 10 months ago
Name-ethnicity classification from open sources
The problem of ethnicity identification from names has a variety of important applications, including biomedical research, demographic studies, and marketing. Here we report on th...
Anurag Ambekar, Charles B. Ward, Jahangir Mohammed...