Sciweavers

776 search results - page 153 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
131
Voted
AIIDE
2006
15 years 1 months ago
The NERO Video Game
In most modern video games, character behavior is scripted; no matter how many times the player exploits a weakness, that weakness is never repaired. Yet if game characters could ...
Kenneth O. Stanley, Igor Karpov, Risto Miikkulaine...
BMCBI
2010
129views more  BMCBI 2010»
14 years 11 months ago
LAITOR - Literature Assistant for Identification of Terms co-Occurrences and Relationships
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...
BMCBI
2007
126views more  BMCBI 2007»
14 years 11 months ago
High-throughput identification of interacting protein-protein binding sites
Background: With the advent of increasing sequence and structural data, a number of methods have been proposed to locate putative protein binding sites from protein surfaces. Ther...
Jo-Lan Chung, Wei Wang, Philip E. Bourne
BMCBI
2006
112views more  BMCBI 2006»
14 years 11 months ago
Protein disorder prediction by condensed PSSM considering propensity for order or disorder
Background: More and more disordered regions have been discovered in protein sequences, and many of them are found to be functionally significant. Previous studies reveal that dis...
Chung-Tsai Su, Chien-Yu Chen, Yu-Yen Ou
TITS
2011
165views more  TITS 2011»
14 years 6 months ago
Robust Inference of Principal Road Paths for Intelligent Transportation Systems
Abstract—Over the last few years, electronic vehicle guidance systems have become increasingly more popular. However, despite their ubiquity, performance will always be subject t...
Gabriel Agamennoni, Juan Nieto, Eduardo Mario Nebo...