Sciweavers

8381 search results - page 1602 / 1677
» The security of machine learning
Sort
View
96
Voted
BMCBI
2010
113views more  BMCBI 2010»
15 years 20 days ago
Gene prioritization and clustering by multi-view text mining
Background: Text mining has become a useful tool for biologists trying to understand the genetics of diseases. In particular, it can help identify the most interesting candidate g...
Shi Yu, Léon-Charles Tranchevent, Bart De M...
99
Voted
BMCBI
2010
127views more  BMCBI 2010»
15 years 20 days ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
86
Voted
BMCBI
2008
132views more  BMCBI 2008»
15 years 20 days ago
Clustering ionic flow blockade toggles with a Mixture of HMMs
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties with potential implications f...
Alexander G. Churbanov, Stephen Winters-Hilt
85
Voted
BMCBI
2007
178views more  BMCBI 2007»
15 years 16 days ago
SVM clustering
Background: Support Vector Machines (SVMs) provide a powerful method for classification (supervised learning). Use of SVMs for clustering (unsupervised learning) is now being cons...
Stephen Winters-Hilt, Sam Merat
97
Voted
SIGIR
2008
ACM
15 years 14 days ago
Query dependent ranking using K-nearest neighbor
Many ranking models have been proposed in information retrieval, and recently machine learning techniques have also been applied to ranking model construction. Most of the existin...
Xiubo Geng, Tie-Yan Liu, Tao Qin, Andrew Arnold, H...
« Prev « First page 1602 / 1677 Last » Next »