skip to main content
Skip header Section
Artificial intelligence (3rd ed.)January 1992
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-53377-4
Published:02 January 1992
Pages:
737
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. İnan R, Aksoy B and Salman O (2023). Estimation performance of the novel hybrid estimator based on machine learning and extended Kalman filter proposed for speed-sensorless direct torque control of brushless direct current motor, Engineering Applications of Artificial Intelligence, 126:PC, Online publication date: 1-Nov-2023.
  2. Stamenković S, Jovanović N, Vasović B, Cvjetković M and Jovanović Z (2023). Software tools for learning artificial intelligence algorithms, Artificial Intelligence Review, 56:9, (10297-10326), Online publication date: 1-Sep-2023.
  3. Banaeian Far S, Imani Rad A, Hosseini Bamakan S and Rajabzadeh Asaar M (2023). Toward Metaverse of everything, Journal of Network and Computer Applications, 217:C, Online publication date: 1-Aug-2023.
  4. ACM
    Golemanova E and Golemanov T Declarative Implementations of Genetic Algorithms in Control Network Programming Proceedings of the 20th International Conference on Computer Systems and Technologies, (91-97)
  5. ACM
    Chen T, Ran L and Gao X AI innovation for advancing public service Proceedings of the 20th Annual International Conference on Digital Government Research, (100-108)
  6. ACM
    Akkaya C and Krcmar H Potential Use of Digital Assistants by Governments for Citizen Services Proceedings of the 20th Annual International Conference on Digital Government Research, (81-90)
  7. ACM
    Kim D and Seo D Vector based 3D Emotion Expression for Emotion Robot Proceedings of the 5th International Conference on Mechatronics and Robotics Engineering, (113-117)
  8. Yan B and Luo J (2017). Filtering patent maps for visualization of diversification paths of inventors and organizations, Journal of the Association for Information Science and Technology, 68:6, (1551-1563), Online publication date: 1-Jun-2017.
  9. Montaghami V and Rayside D Bordeaux Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (22-39)
  10. Pang C (2016). An Agile Architecture for a Legacy Enterprise IT System, International Journal of Organizational and Collective Intelligence, 6:4, (65-97), Online publication date: 1-Oct-2016.
  11. Lin H and Su C (2013). A selective Bayes classifier with meta-heuristics for incomplete data, Neurocomputing, 106, (95-102), Online publication date: 1-Apr-2013.
  12. ACM
    Lomax S and Vadera S (2013). A survey of cost-sensitive decision tree induction algorithms, ACM Computing Surveys, 45:2, (1-35), Online publication date: 1-Feb-2013.
  13. Viveros-Jiménez F, León-Borges J and Cruz-Cortés N A simple adaptive algorithm for numerical optimization Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (115-126)
  14. ACM
    Herczeg M The smart, the intelligent and the wise Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, (17-26)
  15. Kratchanov K, Golemanova E, Golemanov T and Ercan T Non-procedural implementation of local heuristic search in control network programming Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (263-272)
  16. Kratchanov K, Golemanov T, Golemanova E and Ercan T Control network programming with SPIDER Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (253-262)
  17. ACM
    Gimblett A and Thimbleby H User interface model discovery Proceedings of the 2nd ACM SIGCHI symposium on Engineering interactive computing systems, (145-154)
  18. Cheng J, Chen H and Lin Y (2010). A hybrid forecast marketing timing model based on probabilistic neural network, rough set and C4.5, Expert Systems with Applications: An International Journal, 37:3, (1814-1820), Online publication date: 1-Mar-2010.
  19. Brodt S, Bry F and Eisinger N Search for More Declarativity Proceedings of the 3rd International Conference on Web Reasoning and Rule Systems, (71-86)
  20. Prelipcean G, Moisescu F, Boscoianu M, Ciufudean C and Cioban G A hybrid trading system for defence procurement applications Proceedings of the 9th WSEAS international conference on Simulation, modelling and optimization, (173-178)
  21. Kratchanov K, Golemanov T and Golemanova E Control network programming Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (423-428)
  22. Kratchanov K, Golemanova E and Golemanov T Control network programs and their execution Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (417-422)
  23. Todt S, Langer M, Rezk-Salama C, Kolb A and Kuhnert K (2008). Spherical light field rendering in application for analysis by synthesis, International Journal of Intelligent Systems Technologies and Applications, 5:3/4, (304-314), Online publication date: 1-Nov-2008.
  24. Zhang Y and Freuder E (2008). Properties of tree convex constraints, Artificial Intelligence, 172:12-13, (1605-1612), Online publication date: 1-Aug-2008.
  25. Håkansson A and Hartung R An approach to event-driven algorithm for intelligent agents in multi-agent systems Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, (411-420)
  26. Loganantharaj R and Philip V (2007). On predicting secondary structure transition, International Journal of Bioinformatics Research and Applications, 3:4, (446-455), Online publication date: 1-Oct-2007.
  27. Lee M, Chen S and Liu X Mining learners' behavior in accessing web-based interface Proceedings of the 2nd international conference on Technologies for e-learning and digital entertainment, (336-346)
  28. Leigh R, Louis S and Miles C Using a Genetic Algorithm to Explore A*-like Pathfinding Algorithms Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, (72-79)
  29. Hicks R (2007). The no inference engine theory - Performing conflict resolution during development, Decision Support Systems, 43:2, (435-444), Online publication date: 1-Mar-2007.
  30. Chen Y, Hung Y, Yen T and Fuh C (2007). Fast and versatile algorithm for nearest neighbor search based on a lower bound tree, Pattern Recognition, 40:2, (360-375), Online publication date: 1-Feb-2007.
  31. Thomassey S and Fiordaliso A (2006). A hybrid sales forecasting system based on clustering and decision trees, Decision Support Systems, 42:1, (408-421), Online publication date: 1-Oct-2006.
  32. Poli R and Langdon W (2006). Backward-chaining evolutionary algorithms, Artificial Intelligence, 170:11, (953-982), Online publication date: 1-Aug-2006.
  33. ACM
    Blair D (2006). The data-document distinction revisited, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 37:1, (77-96), Online publication date: 31-Jan-2006.
  34. ACM
    Chorley A and Bench-Capon T AGATHA Proceedings of the 10th international conference on Artificial intelligence and law, (45-54)
  35. Lin C, Weng L and Yang H Deployment of an intelligent dynamic local power dispatch system using LAN and wireless technology Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II, (586-595)
  36. ACM
    Budakova D and Dakovski L Generalized net model of a program system for composing verses Proceedings of the 5th international conference on Computer systems and technologies, (1-6)
  37. Brun Y and Ernst M Finding Latent Code Errors via Machine Learning over Program Executions Proceedings of the 26th International Conference on Software Engineering, (480-490)
  38. Chun H and Wong R (2004). CLSS, Applied Intelligence, 20:2, (179-194), Online publication date: 1-Mar-2004.
  39. Liu C, Jaeger S and Nakagawa M (2004). Online Recognition of Chinese Characters, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:2, (198-213), Online publication date: 1-Jan-2004.
  40. McLean C and Shao G Manufacturing case studies Proceedings of the 35th conference on Winter simulation: driving innovation, (1217-1224)
  41. ACM
    Basu A, Lin A and Ramanathan S Routing using potentials Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, (37-48)
  42. Lamirel J, Al Shehabi S, Hoffmann M and François C Intelligent patent analysis through the use of a neural network Proceedings of the ACL-2003 workshop on Patent corpus processing - Volume 20, (7-23)
  43. Keedwell E and Narayanan A Genetic algorithms for gene expression analysis Proceedings of the 2003 international conference on Applications of evolutionary computing, (76-86)
  44. ACM
    Lockerd A, Pham H, Sharon T and Selker T Mr.Web CHI '03 Extended Abstracts on Human Factors in Computing Systems, (812-813)
  45. Tyrrell A, Sanchez E, Floreano D, Tempesti G, Mange D, Moreno J, Rosenberg J and Villa A POEtic tissue Proceedings of the 5th international conference on Evolvable systems: from biology to hardware, (129-140)
  46. Wang C, Tsai C, Hong T and Tseng S (2003). Fuzzy Inductive Learning Strategies, Applied Intelligence, 18:2, (179-193), Online publication date: 1-Mar-2003.
  47. Minz S and Jain R Hybridized rough set framework for classification Design and application of hybrid intelligent systems, (631-640)
  48. Liu C, Koga M and Fujisawa H (2002). Lexicon-Driven Segmentation and Recognition of Handwritten Character Strings for Japanese Address Reading, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:11, (1425-1437), Online publication date: 1-Nov-2002.
  49. ACM
    Badler N, Erignac C and Liu Y (2002). Virtual humans for validating maintenance procedures, Communications of the ACM, 45:7, (56-63), Online publication date: 1-Jul-2002.
  50. WU C and LEE S (2002). KJ3—a tool assisting formal validation of knowledge-based systems, International Journal of Human-Computer Studies, 56:5, (495-524), Online publication date: 1-Apr-2002.
  51. Zhang W Search techniques Handbook of data mining and knowledge discovery, (169-184)
  52. Zytkow J and Klösgen W Multidisciplinary contributions to knowledge discovery Handbook of data mining and knowledge discovery, (22-32)
  53. Terrasa A, García-Fornes A and J. Botti V (2002). Flexible Real-Time Linux*, Real-Time Systems, 22:1/2, (151-173), Online publication date: 1-Jan-2002.
  54. Banks J Panel: education for practice Proceedings of the 33nd conference on Winter simulation, (1571-1579)
  55. Hong T, Huang K and Lin W (2001). Adversarial Search by Evolutionary Computation, Evolutionary Computation, 9:3, (371-385), Online publication date: 1-Sep-2001.
  56. Favata J (2001). Offline General Handwritten Word Recognition Using an Approximate BEAM Matching Algorithm, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:9, (1009-1021), Online publication date: 1-Sep-2001.
  57. ACM
    Merzbacher M (2001). Open artificial intelligence - one course for all, ACM SIGCSE Bulletin, 33:1, (110-113), Online publication date: 1-Mar-2001.
  58. ACM
    Merzbacher M Open artificial intelligence - one course for all Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education, (110-113)
  59. Huang J and Powers D Large scale experiments on correction of confused words Proceedings of the 24th Australasian conference on Computer science, (77-82)
  60. Stahovich T Artificial intelligence for design Formal engineering design synthesis, (228-269)
  61. Huang J and Powers D (2001). Large scale experiments on correction of confused words, Australian Computer Science Communications, 23:1, (77-82), Online publication date: 1-Jan-2001.
  62. Eiter T, Faber W, Leone N and Pfeifer G Declarative problem-solving using the DLV system Logic-based artificial intelligence, (79-103)
  63. Chang P, Chen D and Kavi K (2000). Multimedia File Allocation on VC Networks Using Multipath Routing, IEEE Transactions on Computers, 49:9, (971-977), Online publication date: 1-Sep-2000.
  64. Edahiro M, Matsushita S, Yamashina M and Nishi N (2000). A Single-Chip Multiprocessor for Smart Terminals, IEEE Micro, 20:4, (12-20), Online publication date: 1-Jul-2000.
  65. Kent R (2000). Conceptual Knowledge Markup Language, Netnomics, 2:2, (139-169), Online publication date: 14-Jun-2000.
  66. ACM
    Bonchi F, Giannotti F, Mainetto G and Pedreschi D A classification-based methodology for planning audit strategies in fraud detection Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, (175-184)
  67. Hwang S, Ho S and Tang J Mining Exception Instances to Facilitate Workflow Exception Handling Proceedings of the Sixth International Conference on Database Systems for Advanced Applications, (45-52)
  68. Herrero J and Mira J (1999). SCHEMA, Applied Intelligence, 10:2-3, (139-153), Online publication date: 1-Mar-1999.
  69. Ware J and Jones C (1998). Conflict Reduction in Map Generalization Using Iterative Improvement, Geoinformatica, 2:4, (383-407), Online publication date: 1-Dec-1998.
  70. Swets D, Pathak Y and Weng J (1998). An Image Database System with Support for Traditional Alphanumeric Queries and Content-Based Queries by Example, Multimedia Tools and Applications, 7:3, (181-212), Online publication date: 1-Nov-1998.
  71. ACM
    Chang L and Moskowitz I Parsimonious downgrading and decision trees applied to the inference problem Proceedings of the 1998 workshop on New security paradigms, (82-89)
  72. Katz B Annotating the world wide web using natural language Computer-Assisted Information Searching on Internet, (136-155)
  73. ACM
    Sagula J, Puricelli M, Bobeff G, Martin G and Pis Diez C GALOIS Proceedings of the first international conference on Autonomous agents, (506-507)
  74. Mokhtarian F (1995). Silhouette-Based Isolated Object Recognition through Curvature Scale Space, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:5, (539-544), Online publication date: 1-May-1995.
  75. ACM
    Kaiser G (1981). Automatic extension of an ATN knowledge base, Communications of the ACM, 24:9, (587-593), Online publication date: 1-Sep-1981.
  76. ACM
    (1978). LISP books, ACM Lisp Bulletin:2, (3-3), Online publication date: 1-Jul-1978.
Contributors
  • Massachusetts Institute of Technology

Recommendations

Reviews

Doris C. Appleby

Rather than being a third edition of <__?__Pub Fmt italic>Artificial intelligence,<__?__Pub Fmt /italic> this “textbook” is almost entirely new. The quotes are intentional. The book does have exercises and various suggested syllabi, but is more in the nature of an introduction or survey than a text on AI. It is twice as long as the second edition [1] and has more than twice as many exercises. Methods, algorithms, and programs are described in procedural English, which is a well-done half-English, half-program form. The reader interested in LISP details is directed to Winston and Horn's 1989 LISP text [2]. This edition has 29 chapters<__?__Pub Caret> divided into three parts, plus an appendix on relational databases, included to facilitate understanding the Rete procedure (fast-forward chaining) of chapter 7, and natural-language access to database information. The sections are “Representation and Method,” “Learning and Regularity Recognition,” and “Vision and Language.” Winston provides simple descriptions of 18 applications in use today, from the 1976 MYCIN rule-based system, to aid in the determination of appropriate antibiotic treatment for patients with bacterial infections, to the 1992 GENINFER program, which performs Bayesian probability analysis as an aid in genetic counseling. Where the book works best as a text is when a technique (such as backward chaining) is described, followed by a toy system, including software (such as Zookeeper, an identification-oriented deduction system), followed by the commercial application, in this case MYCIN. The supporting software is easily available via the Internet, as described in the text. As of October 1992, 16 programs were available, supporting 13 chapters of the text plus the database appendix. All are written in Common Lisp, and they run on a variety of platforms. Each program comes with at least four files, including a “.txt” file describing the experiments to be performed, an “.exp” file containing the LISP calls to run the experiments, one or more “.lsp” files containing the actual LISP code, and a “.ref” file with a transcript of a program run. The “.txt” files include directions on running the programs, their intended purposes, a number of “performance experiments” involving running the programs as is, “knowledge experiments” involving modifying the data (rules, frame definitions, and so on) used by the programs, and “LISP projects” involving programming to enhance the programs in various ways. Unfortunately, little description of the algorithms, data formats, or semantics of the user commands is included. The experiments and projects are generally interesting, although the performance experiments provide little more insight than would be obtained by visually examining the “.ref” files. The programs, and particularly the documentation, are of mixed quality. While several support the text examples quite well, such as those dealing with rule-based systems (chapter<__?__Pub Fmt hardspace>7) and version space learning (chapter 20), others are sorely lacking in documentation or, as in the case of the various search programs, use data in a form different from, and not always compatible with, the text examples. This book is intended for students of computer science or engineering as well as non-numeric practitioners such as biologists, psychologists, philosophers, and linguists. <__?__Pub Fmt nolinebreak>Winston<__?__Pub Fmt /nolinebreak> claims that people in this second group “need to know about artificial intelligence to understand the principles that make intelligence possible.” In this regard, he performs the same function for AI that Isaac Asimov did for the hard sciences. He does an excellent job of describing highly technical material in a form that laypeople can understand. As a popularizer, he is subject to the same criticism as was Asimov—oversimplification. This book is good, but it is not clear who would gain from it. Also, it may add to the number of people for whom a little knowledge is a dangerous thing. What will a commercial AI shop look like__?__ Will it have statisticians and mathematicians who know whether Fisher's exact test, which the book discusses, makes sense__?__ Will expert LISP programmers who can modify a commercial product to meet the needs of the actual application being developed be available__?__ Or will non-technical people blindly use inappropriate tools they do not have the background to understand__?__ One group that will benefit from this book is those who are using an existing AI system appropriately and want to know, to satisfy their own intellectual curiosity, why it works as it does. Another is those who want a general survey, with the intent of delving deeper into some topics, guided by the excellent reference list.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.