Sciweavers

84 search results - page 12 / 17
» Gathering Experience Knowledge from Iterative Software Devel...
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 9 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
BMCBI
2008
184views more  BMCBI 2008»
14 years 9 months ago
"TOF2H": A precision toolbox for rapid, high density/high coverage hydrogen-deuterium exchange mass spectrometry via an LC-MALDI
Background: Protein-amide proton hydrogen-deuterium exchange (HDX) is used to investigate protein conformation, conformational changes and surface binding sites for other molecule...
Pornpat Nikamanon, Elroy Pun, Wayne Chou, Marek D....
SEMWEB
2007
Springer
15 years 3 months ago
Dynamic Ontology Co-Evolution from Texts: Principles and Case Study
As claimed in the Semantic Web project, a huge amount of physically distributed interacting software agents could find the semantic of available resources and answer more relevantl...
Kévin Ottens, Nathalie Aussenac-Gilles, Mar...
ICSE
2008
IEEE-ACM
15 years 10 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan
IJCAI
1989
14 years 10 months ago
A Critique of the Valiant Model
This paper considers the Valiant framework as it is applied to the task of learning logical concepts from random examples. It is argued that the current interpretation of this Val...
Wray L. Buntine