For the patent classification task of the 2010 CLEF-IP evaluation we have used three different approaches combining semantics and statistics-driven techniques: first approach is b...
Franck Derieux, Mihaela Bobeica, Delphine Pois, Je...
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
Face recognition degrades when faces are of very low resolution since many details about the difference between one person and another can only be captured in images of sufficient...
Pablo H. Hennings-Yeomans, Simon Baker, B. V. K. V...
Evaluation measures play an important role in machine learning because they are used not only to compare different learning algorithms, but also often as goals to optimize in cons...
: Feature selection methods are often applied in the context of document classification. They are particularly important for processing large data sets that may contain millions of...
Janez Brank, Dunja Mladenic, Marko Grobelnik, Nata...