In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Machine learning (ML) is often used to obtain control knowledge to improve planning efficiency. Usually, ML techniques are used in isolation from experience that could be obtained...
We have constructed ADVISOR, a two-agent machine learning architecture for intelligent tutoring systems (ITS). The purpose of this architecture is to centralize the reasoning of a...
Predicting items a user would like on the basis of other users' ratings for these items has become a well-established strategy adopted by many recommendation services on the ...
We describe a Named Entity Recognition system for Dutch that combines gazetteers, handcrafted rules, and machine learning on the basis of seed material. We used gazetteers and a c...