A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
The aim of this paper is to show how abduction can be used in classification tasks when we deal with incomplete data. Some classifiers, even if based on decision tree induction lik...
This paper addresses personal E-mail filtering by casting it in the framework of text classification. Modeled as semi-structured documents, Email messages consist of a set of field...
The Federal Highway Administration (FHWA) Office of Highway Planning requires states to furnish vehicle classification data as part of the Highway Performance Monitoring Systems (...
Valerian Kwigizile, Majura F. Selekwa, Renatus N. ...
In this paper we solve the problem of classifying chestnut plants according to their place of origin. We compare the results obtained by state of the art classifiers, among which,...