[1] 蔡芳升,「以隱藏馬可夫模型模擬衛星通訊通道傳播特性」,國立臺北科技大學,碩士論文,1999。[2] 李彥緯,「隱藏馬可夫模型之參數估計與模型選擇」,國立中央大學,碩士論文,1998。[3] 許毅嘉,「關連法則應用於代理伺服器上之快取置換機制」,國立中興大學,碩士論文,2001。[4] Christopher, D. M. and H. Schutze, Foundations of Statistical Natural Language Processing, Massachusetts London: The MIT Press Cambridge, 1999.
[5] Baum, L. E. and T. Petrie, “Statistical inference for probabilistic functions of finite state Markov chains”, Annals of the Institute of Statistical Mathematics, 37, pp.1554-1563, 1966.
[6] Berry, J. A. and Gordon, Linoff, Data Mining Techniques for Marketing , Sales and Customer Support, New York: John Wiley and Sons, 1997.
[7] Churchill, G. A., “Stochastic models for heterogeneous DNA sequences”, Bull. Math. Biol., 51, pp.79-94, 1989.
[8] Elliott, R. J., L. Aggoun and J. B. Moore, Hidden Markov Models: Estimation and control, New York: Springer, 1995.
[9] Korgh, A., M. Brown, I. S. Mian, k. Sjolander and D. Haussler, “Hidden Markov models in computational biology: applications to protein modeling”, J. Mol. Biol., 235, pp.1501-1513, 1994.
[10] Rabiner, L. R., “A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition”, Proceedings of the IEEE, Vol.77, No.22, pp.257-286, 1989.
[11] Rabiner, L. R. and B. H. Juang, “An Introduction to Hidden Markov Model,” IEEE ASSP Magazine, vol.3, no.1, pp.4-16, 1986.
[12] Aas, K., L. Eikvil and R. B. Huseby, “Applications of hidden Markov chains in image analysis”, The Journal of Pattern Recognition Society, 32, pp.703-713, 1999.
[13] Rizzo, L. and L. Vicisano, “Replacement Policies for a Proxy Cache,” IEEE/ACM Transactions on Networking, Vol.8, No.2, pp.158-170, 2000.
[14] Cooley, R., et al. “Web Mining: Information and Pattern Discovery on the World Wide Web”, Proceedings of the IEEE International Conference on Tools with Artificial Intelligence, November 1997.
[15] Agrawal, R., et al. “Mining Association Rules between Sets of Items in Large Database.” Proc. ACM SIGMOD, pp. 207-216, May 1993.
[16] Squid Proxy Server, http://squid.nlanr.net/