Sciweavers

4457 search results - page 582 / 892
» Tests of Machine Intelligence
Sort
View
ACSAC
2004
IEEE
15 years 9 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
BMCBI
2010
129views more  BMCBI 2010»
15 years 5 months ago
LAITOR - Literature Assistant for Identification of Terms co-Occurrences and Relationships
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...
BMCBI
2008
138views more  BMCBI 2008»
15 years 5 months ago
Using neural networks and evolutionary information in decoy discrimination for protein tertiary structure prediction
Background: We present a novel method of protein fold decoy discrimination using machine learning, more specifically using neural networks. Here, decoy discrimination is represent...
Ching-Wai Tan, David T. Jones
PR
2006
111views more  PR 2006»
15 years 5 months ago
An adaptive error penalization method for training an efficient and generalized SVM
A novel training method has been proposed for increasing efficiency and generalization of support vector machine (SVM). The efficiency of SVM in classification is directly determi...
Yiqiang Zhan, Dinggang Shen
APIN
2002
121views more  APIN 2002»
15 years 5 months ago
Applying Learning by Examples for Digital Design Automation
This paper describes a new learning by example mechanism and its application for digital circuit design automation. This mechanism uses finite state machines to represent the infer...
Ben Choi