Sciweavers

2081 search results - page 378 / 417
» codes 2006
Sort
View
JCB
2006
125views more  JCB 2006»
14 years 10 months ago
Hypothesis Generation in Signaling Networks
Biological signaling networks comprise the chemical processes by which cells detect and respond to changes in their environment. Such networks have been implicated in the regulati...
Derek A. Ruths, Luay Nakhleh, M. Sriram Iyengar, S...
83
Voted
JIB
2006
106views more  JIB 2006»
14 years 10 months ago
A structural keystone for drug design
3D-structures of proteins and potential ligands are the cornerstones of rational drug design. The first brick to build upon is selecting a protein target and finding out whether b...
Kristian Rother, Mathias Dunkel, Elke Michalsky, S...
90
Voted
JMLR
2006
132views more  JMLR 2006»
14 years 10 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
90
Voted
JMLR
2006
108views more  JMLR 2006»
14 years 10 months ago
The Interplay of Optimization and Machine Learning Research
The fields of machine learning and mathematical programming are increasingly intertwined. Optimization problems lie at the heart of most machine learning approaches. The Special T...
Kristin P. Bennett, Emilio Parrado-Hernánde...
84
Voted
ENGL
2007
100views more  ENGL 2007»
14 years 10 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin