Sciweavers

2438 search results - page 110 / 488
» Incremental Learning in Biological and Machine Learning Syst...
Sort
View
BMCBI
2008
123views more  BMCBI 2008»
15 years 4 months ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
138
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
122
Voted
ICTAI
2007
IEEE
15 years 10 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
LREC
2010
187views Education» more  LREC 2010»
15 years 5 months ago
Ontology-Based Categorization of Web Services with Machine Learning
We present the problem of categorizing web services according to a shallow ontology for presentation on a specialist portal, using their WSDL and associated textual documents foun...
Adam Funk, Kalina Bontcheva
160
Voted
FORTE
2008
15 years 5 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee