In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...
Background: We present a novel method of protein fold decoy discrimination using machine learning, more specifically using neural networks. Here, decoy discrimination is represent...
A novel training method has been proposed for increasing efficiency and generalization of support vector machine (SVM). The efficiency of SVM in classification is directly determi...
This paper describes a new learning by example mechanism and its application for digital circuit design automation. This mechanism uses finite state machines to represent the infer...