Sciweavers

1275 search results - page 129 / 255
» The Infinite Hidden Markov Model
Sort
View
DIMVA
2008
15 years 20 days ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
MSWIM
2004
ACM
15 years 4 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
RAS
2008
142views more  RAS 2008»
14 years 10 months ago
Motion intention recognition in robot assisted applications
Acquiring, representing and modeling human skills is one of the key research areas in teleoperation, programming-by-demonstration and human-machine collaborative settings. The pro...
Daniel Aarno, Danica Kragic
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
14 years 6 months ago
Optimal cross-layer wireless control policies using TD learning
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
Sean P. Meyn, Wei Chen, Daniel O'Neill
ICNC
2005
Springer
15 years 4 months ago
Texture Segmentation Using Neural Networks and Multi-scale Wavelet Features
This paper presents a novel texture segmentation method using Bayesian estimation and neural networks. Multi-scale wavelet coefficients and the context information extracted from n...
Tae-Hyung Kim, Il Kyu Eom, Yoo Shin Kim