Abstract
No abstract available.
Cited By
- İnan R, Aksoy B and Salman O (2023). Estimation performance of the novel hybrid estimator based on machine learning and extended Kalman filter proposed for speed-sensorless direct torque control of brushless direct current motor, Engineering Applications of Artificial Intelligence, 126:PC, Online publication date: 1-Nov-2023.
- Stamenković S, Jovanović N, Vasović B, Cvjetković M and Jovanović Z (2023). Software tools for learning artificial intelligence algorithms, Artificial Intelligence Review, 56:9, (10297-10326), Online publication date: 1-Sep-2023.
- Banaeian Far S, Imani Rad A, Hosseini Bamakan S and Rajabzadeh Asaar M (2023). Toward Metaverse of everything, Journal of Network and Computer Applications, 217:C, Online publication date: 1-Aug-2023.
- Golemanova E and Golemanov T Declarative Implementations of Genetic Algorithms in Control Network Programming Proceedings of the 20th International Conference on Computer Systems and Technologies, (91-97)
- Chen T, Ran L and Gao X AI innovation for advancing public service Proceedings of the 20th Annual International Conference on Digital Government Research, (100-108)
- Akkaya C and Krcmar H Potential Use of Digital Assistants by Governments for Citizen Services Proceedings of the 20th Annual International Conference on Digital Government Research, (81-90)
- Kim D and Seo D Vector based 3D Emotion Expression for Emotion Robot Proceedings of the 5th International Conference on Mechatronics and Robotics Engineering, (113-117)
- Yan B and Luo J (2017). Filtering patent maps for visualization of diversification paths of inventors and organizations, Journal of the Association for Information Science and Technology, 68:6, (1551-1563), Online publication date: 1-Jun-2017.
- Montaghami V and Rayside D Bordeaux Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (22-39)
- Pang C (2016). An Agile Architecture for a Legacy Enterprise IT System, International Journal of Organizational and Collective Intelligence, 6:4, (65-97), Online publication date: 1-Oct-2016.
- Lin H and Su C (2013). A selective Bayes classifier with meta-heuristics for incomplete data, Neurocomputing, 106, (95-102), Online publication date: 1-Apr-2013.
- Lomax S and Vadera S (2013). A survey of cost-sensitive decision tree induction algorithms, ACM Computing Surveys, 45:2, (1-35), Online publication date: 1-Feb-2013.
- Viveros-Jiménez F, León-Borges J and Cruz-Cortés N A simple adaptive algorithm for numerical optimization Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (115-126)
- Herczeg M The smart, the intelligent and the wise Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, (17-26)
- Kratchanov K, Golemanova E, Golemanov T and Ercan T Non-procedural implementation of local heuristic search in control network programming Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (263-272)
- Kratchanov K, Golemanov T, Golemanova E and Ercan T Control network programming with SPIDER Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (253-262)
- Gimblett A and Thimbleby H User interface model discovery Proceedings of the 2nd ACM SIGCHI symposium on Engineering interactive computing systems, (145-154)
- Cheng J, Chen H and Lin Y (2010). A hybrid forecast marketing timing model based on probabilistic neural network, rough set and C4.5, Expert Systems with Applications: An International Journal, 37:3, (1814-1820), Online publication date: 1-Mar-2010.
- Brodt S, Bry F and Eisinger N Search for More Declarativity Proceedings of the 3rd International Conference on Web Reasoning and Rule Systems, (71-86)
- Prelipcean G, Moisescu F, Boscoianu M, Ciufudean C and Cioban G A hybrid trading system for defence procurement applications Proceedings of the 9th WSEAS international conference on Simulation, modelling and optimization, (173-178)
- Kratchanov K, Golemanov T and Golemanova E Control network programming Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (423-428)
- Kratchanov K, Golemanova E and Golemanov T Control network programs and their execution Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (417-422)
- Todt S, Langer M, Rezk-Salama C, Kolb A and Kuhnert K (2008). Spherical light field rendering in application for analysis by synthesis, International Journal of Intelligent Systems Technologies and Applications, 5:3/4, (304-314), Online publication date: 1-Nov-2008.
- Zhang Y and Freuder E (2008). Properties of tree convex constraints, Artificial Intelligence, 172:12-13, (1605-1612), Online publication date: 1-Aug-2008.
- Håkansson A and Hartung R An approach to event-driven algorithm for intelligent agents in multi-agent systems Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, (411-420)
- Loganantharaj R and Philip V (2007). On predicting secondary structure transition, International Journal of Bioinformatics Research and Applications, 3:4, (446-455), Online publication date: 1-Oct-2007.
- Lee M, Chen S and Liu X Mining learners' behavior in accessing web-based interface Proceedings of the 2nd international conference on Technologies for e-learning and digital entertainment, (336-346)
- Leigh R, Louis S and Miles C Using a Genetic Algorithm to Explore A*-like Pathfinding Algorithms Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, (72-79)
- Hicks R (2007). The no inference engine theory - Performing conflict resolution during development, Decision Support Systems, 43:2, (435-444), Online publication date: 1-Mar-2007.
- Chen Y, Hung Y, Yen T and Fuh C (2007). Fast and versatile algorithm for nearest neighbor search based on a lower bound tree, Pattern Recognition, 40:2, (360-375), Online publication date: 1-Feb-2007.
- Thomassey S and Fiordaliso A (2006). A hybrid sales forecasting system based on clustering and decision trees, Decision Support Systems, 42:1, (408-421), Online publication date: 1-Oct-2006.
- Poli R and Langdon W (2006). Backward-chaining evolutionary algorithms, Artificial Intelligence, 170:11, (953-982), Online publication date: 1-Aug-2006.
- Blair D (2006). The data-document distinction revisited, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 37:1, (77-96), Online publication date: 31-Jan-2006.
- Chorley A and Bench-Capon T AGATHA Proceedings of the 10th international conference on Artificial intelligence and law, (45-54)
- Lin C, Weng L and Yang H Deployment of an intelligent dynamic local power dispatch system using LAN and wireless technology Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II, (586-595)
- Budakova D and Dakovski L Generalized net model of a program system for composing verses Proceedings of the 5th international conference on Computer systems and technologies, (1-6)
- Brun Y and Ernst M Finding Latent Code Errors via Machine Learning over Program Executions Proceedings of the 26th International Conference on Software Engineering, (480-490)
- Chun H and Wong R (2004). CLSS, Applied Intelligence, 20:2, (179-194), Online publication date: 1-Mar-2004.
- Liu C, Jaeger S and Nakagawa M (2004). Online Recognition of Chinese Characters, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:2, (198-213), Online publication date: 1-Jan-2004.
- McLean C and Shao G Manufacturing case studies Proceedings of the 35th conference on Winter simulation: driving innovation, (1217-1224)
- Basu A, Lin A and Ramanathan S Routing using potentials Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, (37-48)
- Lamirel J, Al Shehabi S, Hoffmann M and François C Intelligent patent analysis through the use of a neural network Proceedings of the ACL-2003 workshop on Patent corpus processing - Volume 20, (7-23)
- Keedwell E and Narayanan A Genetic algorithms for gene expression analysis Proceedings of the 2003 international conference on Applications of evolutionary computing, (76-86)
- Lockerd A, Pham H, Sharon T and Selker T Mr.Web CHI '03 Extended Abstracts on Human Factors in Computing Systems, (812-813)
- Tyrrell A, Sanchez E, Floreano D, Tempesti G, Mange D, Moreno J, Rosenberg J and Villa A POEtic tissue Proceedings of the 5th international conference on Evolvable systems: from biology to hardware, (129-140)
- Wang C, Tsai C, Hong T and Tseng S (2003). Fuzzy Inductive Learning Strategies, Applied Intelligence, 18:2, (179-193), Online publication date: 1-Mar-2003.
- Minz S and Jain R Hybridized rough set framework for classification Design and application of hybrid intelligent systems, (631-640)
- Liu C, Koga M and Fujisawa H (2002). Lexicon-Driven Segmentation and Recognition of Handwritten Character Strings for Japanese Address Reading, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:11, (1425-1437), Online publication date: 1-Nov-2002.
- Badler N, Erignac C and Liu Y (2002). Virtual humans for validating maintenance procedures, Communications of the ACM, 45:7, (56-63), Online publication date: 1-Jul-2002.
- WU C and LEE S (2002). KJ3—a tool assisting formal validation of knowledge-based systems, International Journal of Human-Computer Studies, 56:5, (495-524), Online publication date: 1-Apr-2002.
- Zhang W Search techniques Handbook of data mining and knowledge discovery, (169-184)
- Zytkow J and Klösgen W Multidisciplinary contributions to knowledge discovery Handbook of data mining and knowledge discovery, (22-32)
- Terrasa A, García-Fornes A and J. Botti V (2002). Flexible Real-Time Linux*, Real-Time Systems, 22:1/2, (151-173), Online publication date: 1-Jan-2002.
- Banks J Panel: education for practice Proceedings of the 33nd conference on Winter simulation, (1571-1579)
- Hong T, Huang K and Lin W (2001). Adversarial Search by Evolutionary Computation, Evolutionary Computation, 9:3, (371-385), Online publication date: 1-Sep-2001.
- Favata J (2001). Offline General Handwritten Word Recognition Using an Approximate BEAM Matching Algorithm, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:9, (1009-1021), Online publication date: 1-Sep-2001.
- Merzbacher M (2001). Open artificial intelligence - one course for all, ACM SIGCSE Bulletin, 33:1, (110-113), Online publication date: 1-Mar-2001.
- Merzbacher M Open artificial intelligence - one course for all Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education, (110-113)
- Huang J and Powers D Large scale experiments on correction of confused words Proceedings of the 24th Australasian conference on Computer science, (77-82)
- Stahovich T Artificial intelligence for design Formal engineering design synthesis, (228-269)
- Huang J and Powers D (2001). Large scale experiments on correction of confused words, Australian Computer Science Communications, 23:1, (77-82), Online publication date: 1-Jan-2001.
- Eiter T, Faber W, Leone N and Pfeifer G Declarative problem-solving using the DLV system Logic-based artificial intelligence, (79-103)
- Chang P, Chen D and Kavi K (2000). Multimedia File Allocation on VC Networks Using Multipath Routing, IEEE Transactions on Computers, 49:9, (971-977), Online publication date: 1-Sep-2000.
- Edahiro M, Matsushita S, Yamashina M and Nishi N (2000). A Single-Chip Multiprocessor for Smart Terminals, IEEE Micro, 20:4, (12-20), Online publication date: 1-Jul-2000.
- Kent R (2000). Conceptual Knowledge Markup Language, Netnomics, 2:2, (139-169), Online publication date: 14-Jun-2000.
- Bonchi F, Giannotti F, Mainetto G and Pedreschi D A classification-based methodology for planning audit strategies in fraud detection Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, (175-184)
- Hwang S, Ho S and Tang J Mining Exception Instances to Facilitate Workflow Exception Handling Proceedings of the Sixth International Conference on Database Systems for Advanced Applications, (45-52)
- Herrero J and Mira J (1999). SCHEMA, Applied Intelligence, 10:2-3, (139-153), Online publication date: 1-Mar-1999.
- Ware J and Jones C (1998). Conflict Reduction in Map Generalization Using Iterative Improvement, Geoinformatica, 2:4, (383-407), Online publication date: 1-Dec-1998.
- Swets D, Pathak Y and Weng J (1998). An Image Database System with Support for Traditional Alphanumeric Queries and Content-Based Queries by Example, Multimedia Tools and Applications, 7:3, (181-212), Online publication date: 1-Nov-1998.
- Chang L and Moskowitz I Parsimonious downgrading and decision trees applied to the inference problem Proceedings of the 1998 workshop on New security paradigms, (82-89)
- Katz B Annotating the world wide web using natural language Computer-Assisted Information Searching on Internet, (136-155)
- Sagula J, Puricelli M, Bobeff G, Martin G and Pis Diez C GALOIS Proceedings of the first international conference on Autonomous agents, (506-507)
- Mokhtarian F (1995). Silhouette-Based Isolated Object Recognition through Curvature Scale Space, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:5, (539-544), Online publication date: 1-May-1995.
- Kaiser G (1981). Automatic extension of an ATN knowledge base, Communications of the ACM, 24:9, (587-593), Online publication date: 1-Sep-1981.
- (1978). LISP books, ACM Lisp Bulletin:2, (3-3), Online publication date: 1-Jul-1978.
Index Terms
- Artificial intelligence (3rd ed.)
Recommendations
Artificial intelligence
AbstractArtificial intelligence (AI) is the Science and Engineering domain concerned with the theory and practice of developing systems that exhibit the characteristics we associate with intelligence in human behavior. Starting with a brief history of ...