{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:47Z","timestamp":1750307807164,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,24]],"date-time":"2008-08-24T00:00:00Z","timestamp":1219536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,24]]},"DOI":"10.1145\/1401890.1401924","type":"proceedings-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T11:56:41Z","timestamp":1219838201000},"page":"247-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SPIRAL"],"prefix":"10.1145","author":[{"given":"Yasuhiro","family":"Fujiwara","sequence":"first","affiliation":[{"name":"NTT Cyber Space Laboratories, Yokosuka-Shi, Japan"}]},{"given":"Yasushi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"NTT Communication Science Laboratories, Seika-Cho, Japan"}]},{"given":"Masashi","family":"Yamamuro","sequence":"additional","affiliation":[{"name":"NTT Cyber Space Laboratories, Yokosuka-Shi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2008,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/archive.ics.uci.edu\/ml\/.  http:\/\/archive.ics.uci.edu\/ml\/."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.ncbi.nlm.nih.gov.  http:\/\/www.ncbi.nlm.nih.gov."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.91.3.1059"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1993.319405"},{"key":"e_1_3_2_1_5_1","volume-title":"Biological sequence analysis: probabilistic models of proteins and nucleic acids","author":"Durbin R.","year":"1999","unstructured":"R. Durbin , S. R. Eddy , A. Krogh , and G. Mitchison . Biological sequence analysis: probabilistic models of proteins and nucleic acids . Cambridge University Press , 1999 . R. Durbin, S. R. Eddy, A. Krogh, and G. Mitchison. Biological sequence analysis: probabilistic models of proteins and nucleic acids. Cambridge University Press, 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1998.711914"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273529"},{"key":"e_1_3_2_1_8_1","volume-title":"Statistical methods for speech recognition","author":"Jelinek F.","year":"1999","unstructured":"F. Jelinek . Statistical methods for speech recognition . The MIT Press , 1999 . F. Jelinek. Statistical methods for speech recognition. The MIT Press, 1999."},{"key":"e_1_3_2_1_9_1","first-page":"456","volume-title":"Electroencephalography and Clinical Neurophysiology","author":"Pfurtscheller D. F. G.","year":"1994","unstructured":"D. F. G. Pfurtscheller and C. Neuper . Differentiation between finger, toe and tongue in man based on 40hz eeg . Electroencephalography and Clinical Neurophysiology , pages 456 -- 460 , 1994 . D. F. G. Pfurtscheller and C. Neuper. Differentiation between finger, toe and tongue in man based on 40hz eeg. Electroencephalography and Clinical Neurophysiology, pages 456--460, 1994."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1993.270611"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.541414"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.843346"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1989.266415"},{"key":"e_1_3_2_1_15_1","first-page":"35","volume-title":"IJCAI-99 Workshop on Learning About Users","author":"Lane T.","year":"1999","unstructured":"T. Lane . Hidden markov models for human\/computer interface modeling . In IJCAI-99 Workshop on Learning About Users , pages 35 -- 44 , 1999 . T. Lane. Hidden markov models for human\/computer interface modeling. In IJCAI-99 Workshop on Learning About Users, pages 35--44, 1999."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1983.tb03114.x"},{"key":"e_1_3_2_1_17_1","volume-title":"Bioinformatics: sequence and genome analysis","author":"Mount D. W.","year":"2001","unstructured":"D. W. Mount . Bioinformatics: sequence and genome analysis . Cold Spring Harbor Laboratory Press , 2001 . D. W. Mount. Bioinformatics: sequence and genome analysis. Cold Spring Harbor Laboratory Press, 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.124938"},{"key":"e_1_3_2_1_19_1","volume-title":"EUROSIM","author":"Novak D.","year":"2004","unstructured":"D. Novak , Y. H. T. Al-Ani , and L. Lhotska . Electroencephalogram processing using hidden markov models . In EUROSIM , 2004 . D. Novak, Y. H. T. Al-Ani, and L. Lhotska. Electroencephalogram processing using hidden markov models. In EUROSIM, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"e_1_3_2_1_21_1","first-page":"213","volume-title":"ICASSP","author":"Sagayama S.","year":"1995","unstructured":"S. Sagayama , K. Knill , and S. Takahashi . On the use of scalar quantization for fast hmm computation . In ICASSP , pages 213 -- 216 , 1995 . S. Sagayama, K. Knill, and S. Takahashi. On the use of scalar quantization for fast hmm computation. In ICASSP, pages 213--216, 1995."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102452"},{"key":"e_1_3_2_1_23_1","first-page":"361","volume-title":"NIPS","author":"Singh S. P.","year":"1994","unstructured":"S. P. Singh , T. Jaakkola , and M. I. Jordan . Reinforcement learning with soft state aggregation . In NIPS , pages 361 -- 368 , 1994 . S. P. Singh, T. Jaakkola, and M. I. Jordan. Reinforcement learning with soft state aggregation. In NIPS, pages 361--368, 1994."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233324"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007657"}],"event":{"name":"KDD08: The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"Las Vegas Nevada USA","acronym":"KDD08"},"container-title":["Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1401890.1401924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:40Z","timestamp":1750255000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401924"}},"subtitle":["efficient and exact model identification for hidden Markov models"],"short-title":[],"issued":{"date-parts":[[2008,8,24]]},"references-count":24,"alternative-id":["10.1145\/1401890.1401924","10.1145\/1401890"],"URL":"https:\/\/doi.org\/10.1145\/1401890.1401924","relation":{},"subject":[],"published":{"date-parts":[[2008,8,24]]},"assertion":[{"value":"2008-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}