Sciweavers

712 search results - page 113 / 143
» Effective, Automatic Procedure Extraction
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 4 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
KDD
2003
ACM
144views Data Mining» more  KDD 2003»
15 years 10 months ago
Clinical and financial outcomes analysis with existing hospital patient records
Existing patient records are a valuable resource for automated outcomes analysis and knowledge discovery. However, key clinical data in these records is typically recorded in unst...
R. Bharat Rao, Sathyakama Sandilya, Radu Stefan Ni...
BMCBI
2010
153views more  BMCBI 2010»
14 years 10 months ago
PPLook: an automated data mining tool for protein-protein interaction
Background: Extracting and visualizing of protein-protein interaction (PPI) from text literatures are a meaningful topic in protein science. It assists the identification of inter...
Shao-Wu Zhang, Yao-Jun Li, Li Xia, Quan Pan
BMCBI
2008
144views more  BMCBI 2008»
14 years 10 months ago
Rule-based knowledge aggregation for large-scale protein sequence analysis of influenza A viruses
Background: The explosive growth of biological data provides opportunities for new statistical and comparative analyses of large information sets, such as alignments comprising te...
Olivo Miotto, Tin Wee Tan, Vladimir Brusic
TREC
2000
14 years 11 months ago
TREC-9 Cross Language, Web and Question-Answering Track Experiments using PIRCS
In TREC-9, we participated in the English-Chinese Cross Language, 10GB Web data ad-hoc retrieval as well as the Question-Answering tracks, all using automatic procedures. All thes...
Kui-Lam Kwok, Laszlo Grunfeld, Norbert Dinstl, M. ...