Sciweavers

7053 search results - page 1404 / 1411
» Data Mining of Multi-categorized Data
Sort
View
JMLR
2006
132views more  JMLR 2006»
13 years 7 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
JUCS
2006
225views more  JUCS 2006»
13 years 7 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
BMCBI
2005
117views more  BMCBI 2005»
13 years 7 months ago
Differentiation of regions with atypical oligonucleotide composition in bacterial genomes
Background: Complete sequencing of bacterial genomes has become a common technique of present day microbiology. Thereafter, data mining in the complete sequence is an essential st...
Oleg N. Reva, Burkhard Tümmler
BMCBI
2005
96views more  BMCBI 2005»
13 years 7 months ago
Overview of BioCreAtIvE task 1B: normalized gene lists
Background: Our goal in BioCreAtIve has been to assess the state of the art in text mining, with emphasis on applications that reflect real biological applications, e.g., the cura...
Lynette Hirschman, Marc E. Colosimo, Alexander A. ...
JCB
2007
118views more  JCB 2007»
13 years 7 months ago
Discovering Topological Motifs Using a Compact Notation
Discovering topological motifs or common topologies in one or more graphs is an important as well as an interesting problem. It had been classically viewed as the subgraph isomorp...
Laxmi Parida
« Prev « First page 1404 / 1411 Last » Next »