-
2
-
-
27144535913
-
Evolving hidden markov models for protein secondary structure prediction
-
September
-
K.-J. Won, T. Hamelryck, A. Prugel-Bennett, and A. Krogh, "Evolving hidden markov models for protein secondary structure prediction," Evolutionary Computation, IEEE, vol. 1, pp. 1-18, September 2005.
-
(2005)
Evolutionary Computation, IEEE
, vol.1
, pp. 1-18
-
-
Won, K.-J.1
Hamelryck, T.2
Prugel-Bennett, A.3
Krogh, A.4
-
3
-
-
77953035086
-
Optimizing hidden markov models using genetic algorithms and artificial immune systems
-
M. Korayem, A. Badr, and I. Farag, "Optimizing hidden markov models using genetic algorithms and artificial immune systems," Computing and Information Systems, vol. 11, no. 2, 2007.
-
(2007)
Computing and Information Systems
, vol.11
, Issue.2
-
-
Korayem, M.1
Badr, A.2
Farag, I.3
-
4
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
February
-
L. R. Rabiner, "A tutorial on hidden markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, February 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
-
-
Rabiner, L.R.1
-
6
-
-
77953039682
-
Markovian models for sequential markovian models for sequencial data
-
Y. Bengio, "Markovian models for sequential markovian models for sequencial data," Statistical Science, 1997.
-
(1997)
Statistical Science
-
-
Bengio, Y.1
-
7
-
-
67650376269
-
A statistical multiresolution approach for face recognition using structural hidden markov models
-
P. Nicholl, A. Amira, D. Bouchaffra, and R. H. Perrot, "A statistical multiresolution approach for face recognition using structural hidden markov models," EURASIP Journal on Advances in Signal Processing, ACM, vol. 2008, p. 13, 2008.
-
(2008)
EURASIP Journal on Advances in Signal Processing, ACM
, vol.2008
, pp. 13
-
-
Nicholl, P.1
Amira, A.2
Bouchaffra, D.3
Perrot, R.H.4
-
8
-
-
57749201416
-
A genetic algorithm-aided hidden markov model topology estimation for phoneme recognition of thai continuous speech
-
IEEE
-
P. Bhuriyakorn, P. Punyabukkana, and A. Suchato, "A genetic algorithm-aided hidden markov model topology estimation for phoneme recognition of thai continuous speech," in Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. IEEE, 2008, pp. 475-480.
-
(2008)
Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
, pp. 475-480
-
-
Bhuriyakorn, P.1
Punyabukkana, P.2
Suchato, A.3
-
9
-
-
77958047679
-
A hybrid speech recognition training method for hmm based on genetic algorithm and baum welch algorithm
-
X. Zhang, Y. Wang, and Z. Zhao, "A hybrid speech recognition training method for hmm based on genetic algorithm and baum welch algorithm," IEEE, pp. 572-572, 2007.
-
(2007)
IEEE
, pp. 572-572
-
-
Zhang, X.1
Wang, Y.2
Zhao, Z.3
-
10
-
-
84964461159
-
Mobile security agents for network traffic analysis
-
D. Dasgupta and H. Brian, "Mobile security agents for network traffic analysis," IEEE Transactions on Power Systems, vol. 2, no. 332-340, 2001.
-
(2001)
IEEE Transactions on Power Systems
, vol.2
, Issue.332-340
-
-
Dasgupta, D.1
Brian, H.2
-
11
-
-
34748870795
-
A framework for an adaptive intrusion detection system using bayesian network
-
F. Jemili, M. Zaghdoud, and M. Ben Ahmed, "A framework for an adaptive intrusion detection system using bayesian network," Intelligence and Security Informatics, IEEE, 2007.
-
(2007)
Intelligence and Security Informatics, IEEE
-
-
Jemili, F.1
Zaghdoud, M.2
Ben Ahmed, M.3
-
12
-
-
34548722675
-
Anomaly detection via feature-aided tracking and hidden markov model
-
March
-
S. Singh, W. Donat, K. Pattipati, and P. Willet, "Anomaly detection via feature-aided tracking and hidden markov model," Aerospace Conference, IEEE, pp. 1-18, March 2007.
-
(2007)
Aerospace Conference, IEEE
, pp. 1-18
-
-
Singh, S.1
Donat, W.2
Pattipati, K.3
Willet, P.4
-
13
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
IEEE, May
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," in Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on. IEEE, May 1999, pp. 133-145.
-
(1999)
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|