Sciweavers

791 search results - page 36 / 159
» The Hierarchical Hidden Markov Model: Analysis and Applicati...
Sort
View
BMCBI
2010
123views more  BMCBI 2010»
15 years 1 months ago
Decoding HMMs using the k best paths: algorithms and applications
Background: Traditional algorithms for hidden Markov model decoding seek to maximize either the probability of a state path or the number of positions of a sequence assigned to th...
Daniel G. Brown 0001, Daniil Golod
ISMIR
2005
Springer
170views Music» more  ISMIR 2005»
15 years 7 months ago
Applications of Binary Classification and Adaptive Boosting to the Query-By-Humming Problem
In the “query-by-humming” problem, we attempt to retrieve a specific song from a target set based on a sung query. Recent evaluations of query-by-humming systems show that th...
Charles L. Parker
DMSN
2008
ACM
15 years 3 months ago
Probabilistic processing of interval-valued sensor data
When dealing with sensors with different time resolutions, it is desirable to model a sensor reading as pertaining to a time interval rather than a unit of time. We introduce two ...
Sander Evers, Maarten M. Fokkinga, Peter M. G. Ape...
IJCAI
2003
15 years 2 months ago
Toward Conditional Models of Identity Uncertainty with Application to Proper Noun Coreference
Coreference analysis, also known as record linkage or identity uncertainty, is a difficult and important problem in natural language processing, databases, citation matching and ...
Andrew McCallum, Ben Wellner
JMLR
2010
185views more  JMLR 2010»
14 years 8 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto