Hidden

Results: 5368



#Item
851

46 • THE DARK HORSE • SPRING / SUMMERAmit Majmudar Our Hidden Contemporaries I.

Add to Reading List

Source URL: www.thedarkhorsemagazine.com

Language: English - Date: 2013-05-02 09:17:36
    852Signal processing / Fourier analysis / Integral transforms / Computational linguistics / Digital signal processing / Wavelet / Speech synthesis / Discrete cosine transform / S transform / Continuous wavelet transform / Hidden Markov model

    A MULTI-LEVEL REPRESENTATION OF F0 USING THE CONTINUOUS WAVELET TRANSFORM AND THE DISCRETE COSINE TRANSFORM Manuel Sam Ribeiro, Robert A. J. Clark Centre for Speech Technology Research, University of Edinburgh, UK ABSTRA

    Add to Reading List

    Source URL: www.cstr.ed.ac.uk

    Language: English - Date: 2015-09-29 11:06:25
    853

    ChromHMM Version 1.11 User Manual Jason Ernst and Manolis Kellis Overview ChromHMM is a Java program for the learning and analysis chromatin states using a multivariate Hidden Markov Model that explicitly models the obse

    Add to Reading List

    Source URL: compbio.mit.edu

    Language: English - Date: 2016-02-24 22:56:19
      854

      Numerically Stable Hidden Markov Model Implementation Tobias P. Mann February 21, 2006 Abstract Application of Hidden Markov Models to long observation sequences entails the

      Add to Reading List

      Source URL: bozeman.genome.washington.edu

      Language: English - Date: 2006-02-21 15:12:11
        855

        ARE YOU TAKING ADVANTAGE OF THE HIDDEN SALES CYCLE? Leading businesses track customers’ online movements to predict their buying behaviour. It’s easier than you think... ?

        Add to Reading List

        Source URL: www.ehousestudio.com

        Language: English - Date: 2015-08-20 15:21:13
          856

          Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Albert Kwon† , Mashael AlSabah‡§†∗, David Lazar† , Marc Dacier‡ , and Srinivas Devadas† † Massachusetts Institute of Techno

          Add to Reading List

          Source URL: people.csail.mit.edu

          Language: English - Date: 2015-07-06 18:09:43
            857Bioinformatics / Markov models / BaumWelch algorithm / Hidden Markov model / Sequence analysis

            DNA Sequence Analysis using Hidden Markov Model and Genetic Algorithm Tetsushi Yada 1

            Add to Reading List

            Source URL: www.jsbi.org

            Language: English - Date: 1998-01-09 02:50:02
            858

            Motivation Social Capital Hidden-Action Attacks Discussion & Conclusions Countering Hidden-Action Attacks on

            Add to Reading List

            Source URL: infosecon.net

            Language: English - Date: 2006-03-16 20:15:29
              859

              Personality Disorder Paranoid Suspicious and quick to take offense. Often very few confidants and may read hidden meaning into innocent remarks. Signs & Symptoms:- (several of the following) • Unfound suspicion of othe

              Add to Reading List

              Source URL: www.silverribbonsingapore.com

              Language: English - Date: 2014-05-26 17:32:54
                860

                An efficient quantum algorithm for the hidden subgroup problem in nil-2 groups ∗ G´abor Ivanyos† Luc Sanselme‡

                Add to Reading List

                Source URL: www.liafa.univ-paris-diderot.fr

                Language: English - Date: 2010-12-13 11:02:50
                  UPDATE