Sciweavers

1275 search results - page 184 / 255
» The Infinite Hidden Markov Model
Sort
View
ETRICS
2006
15 years 3 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
FGR
2000
IEEE
167views Biometrics» more  FGR 2000»
15 years 3 months ago
Comparison of Confidence Measures for Face Recognition
This paper compares different confidence measures for the results of statistical face recognition systems. The main applications of a confidence measure are rejection of unknown p...
Stefan Eickeler, Mirco Jabs, Gerhard Rigoll
AMI
2009
Springer
15 years 1 months ago
Sensor-Based Human Activity Recognition in a Multi-user Scenario
Existing work on sensor-based activity recognition focuses mainly on single-user activities. However, in real life, activities are often performed by multiple users involving inter...
Liang Wang, Tao Gu, XianPing Tao, Jian Lu
CVPR
2008
IEEE
15 years 1 months ago
Extracting smooth and transparent layers from a single image
Layer decomposition from a single image is an underconstrained problem, because there are more unknowns than equations. This paper studies a slightly easier but very useful altern...
Sai Kit Yeung, Tai-Pang Wu, Chi-Keung Tang
COLING
2008
15 years 26 days ago
Weakly Supervised Supertagging with Grammar-Informed Initialization
Much previous work has investigated weak supervision with HMMs and tag dictionaries for part-of-speech tagging, but there have been no similar investigations for the harder proble...
Jason Baldridge