Feeds

Microsoft researchers build spam filter for HIV

Turns out spammers behave a lot like deadly virus...

Intelligent flash storage arrays

Researchers at Microsoft have discovered that tools first developed to fight email spam can be applied in helping to understand how the process by which HIV mutates to avoid attack by the immune system.

Microsoft Researchers David Heckerman and Jonathan Carlson were asked to help AIDS researchers in Africa to make sense of data from HIV vaccine testing programmes. The data was compiled by a consortium of hospitals and universities, including MIT, the Center for the AIDS Programme of Research in South Africa (CAPRISA) and the KwaZulu-Natal Research Institute for Tuberculosis and HIV.

To their surprise they discovered that Microsoft's algorithms for the detection of spam emails were useful in understanding the mutation of HIV.

"It turns out there are a lot of similarities between the way spammers evolve their approaches to avoid filters and the way the HIV virus is constantly mutating," a post by Steve Clayton on Microsoft Research's blog explains.

To make sense of the data the researchers hit on the idea of fine-tuning a computational biology tool, called PhyloD, with algorithms used for spam filtering. PhyloD contains an algorithm, code and visualisation tools to perform complex pattern recognition and analysis. By adding lessons learned from spam filtering it was possible to more quickly narrow in on possible areas of weakness that can be targeted for later lab research into developing therapies and possible vaccines.

Instead of trying to every possible variable and possible correlations the reapplied spam filtering algorithm created the basis of a more elegant search. Even so a huge number-crunching exercise was still needed. But access to Microsoft’s high-performance computing centre made it possible to carry out this task over a single weekend.

The work led to the discovery of six times as many possible attack points on the HIV virus than had previously been identified. Similar approaches might be applied to studies on the analysis of breast cancer and other deadly diseases, the Microsoft team reckons.

The HIV analysis research is part of a wider vaccine project. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
SECRET U.S. 'SPACE WARPLANE' set to return from SPY MISSION
Robot minishuttle X-37B returns after almost 2 years in orbit
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
You can crunch it all you like, but the answer is NOT always in the data
Hear that, 'data journalists'? Our analytics prof holds forth
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
America's super-secret X-37B plane returns to Earth after nearly TWO YEARS aloft
674 days in space for US Air Force's mystery orbital vehicle
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.