Author of the publication

Computing the observed information in the hidden Markov model using the EM algorithm

. Statistics & Probability Letters, 32 (1): 107--114 (Feb 14, 1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ron was wrong, Whit is right., , , , , and . IACR Cryptol. ePrint Arch., (2012)Performance of Checksums and CRCs over Real Data., , and . SIGCOMM, page 68-76. ACM, (1995)HYPERchannel Network Computing: Network Elements and Performance Monitoring., and . INDC, page 177-188. North-Holland, (1988)A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem.. ACISP, volume 2384 of Lecture Notes in Computer Science, page 176-189. Springer, (2002)The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing., , , , and . Cryptologia, 36 (1): 70-79 (2012)Extended High Speed Networks Employing Hippi Switches, High Speed WANs, and FDDI Rings., and . J. High Speed Networks, 1 (2): 167-192 (1992)The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems., and . ACM Queue, 20 (3): 18-40 (2022)swCRTdesign: An RPackage for Stepped Wedge Trial Design and Analysis., , , , and . Comput. Methods Programs Biomed., (2020)Handheld computers for self-administered sensitive data collection: A comparative study in Peru., , , , , , , , , and . BMC Medical Informatics Decis. Mak., (2008)HIPPI high performance parallel interface.. LCN, page 346-354. IEEE Computer Society, (1992)