By Topic

2006 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06)

Date 13-15 Nov. 2006

Filter Results

Displaying Results 1 - 25 of 119
  • 18th IEEE International Conference on Tools with Artificial Intelligence - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • 18th IEEE International Conference on Tools with Artificial Intelligence-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • 18th IEEE International Conference on Tools with Artificial Intelligence-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • 18th IEEE International Conference on Tools with Artificial Intelligence - TOC

    Publication Year: 2006, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (33 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Abstracts of keynote speeches

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Presents abstracts of keynote speeches from the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference Schedule

    Publication Year: 2006, Page(s):xxiv - xxix
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Models and Methods for Discovering Automatable Activity Segments in a Service--Oriented Environment

    Publication Year: 2006, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (26 KB) | HTML iconHTML

    Although computers were invented barely fifty years ago, their enormous value and impact on society has already relegated much of computing discipline into a commodity status. While the pedagogical theories of computing have failed to keep pace with the rapid technological advances, of immense importance, a systematic approach to achieving reliable systems design despite complexity compounding on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Service-Oriented Application Architecture and System Engineering

    Publication Year: 2006, Page(s): xx
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB) | HTML iconHTML

    Service-oriented computing is making strides due to acceptance by government and major computer and software companies, however there are several issues that we need to address. SOA is related to a number of traditional professional areas such as business models, programming languages, model construction, verification, software architecture and design, software reusability, databases, ontology, au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Human-Level Machine Intelligence

    Publication Year: 2006, Page(s): xxi
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (26 KB) | HTML iconHTML

    Can machines think? This question has been an object of discussion and debate for over half-a-century. My interest in the question goes back to the beginning of my academic career. Officially, AI was born in l956. At its birth there was widespread expectation that within a few years it will be possible to build machines that could think like humans. I did not share that belief. To the pioneers, sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secondary Structure Prediction: Helix, Sheet and Coil, which method is accurate? Which is more efficient?

    Publication Year: 2006, Page(s):xxii - xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (33 KB) | HTML iconHTML

    Feed-forward neural networks have been used to predict protein secondary structure for about 2 decades. Feed-forward nets are trained using a set of patterns known as the training set for which the desired outputs are known in advance - a process known in the neural network literature as supervised learning. These feedforward nets take known sequence-structure pairs as training examples and try to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Call Admission Control Based on Enhanced Genetic Algorithm in Wireless/Mobile Network

    Publication Year: 2006, Page(s):3 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    An adaptive threshold-based call admission control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class' CAC thresholds are solved through establishing a reward-penalty model which tries to maximize network's revenue in terms of each class's average new call arrival rate and average handoff call arrival rate, the reward or penalty when networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A (mu + lambda) - GP Algorithm and its use for Regression Problems

    Publication Year: 2006, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    The genetic programming (GP) is a powerful technique for symbolic regression. However, because it is a new area, many improvements can be obtained changing the basic behavior of the method. In this way, this work develop a different genetic programming algorithm doing some modifications on the classical GP algorithm and adding some concepts of evolution strategies. The new approach was evaluated u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Hybrid GA-MDP Algorithm For The Frequency Assignment Problem

    Publication Year: 2006, Page(s):18 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    We propose a novel algorithm called GA-MDP for solving the frequency assignment problem. GA-MDP inherits the spirit of genetic algorithms with an adaptation of Markov decision processes (MDPs). More precisely policy iteration (PI) and value iteration (VI) are used as mutation operators. Experimental results show that for our application, GA-MDP that uses PI as a mutation operator improves the qual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Correlation to Improve Boosting Technique: An Application for Time Series Forecasting

    Publication Year: 2006, Page(s):26 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    Time series forecasting has been widely used to support decision making, in this context a highly accurate prediction is essential to ensure the quality of the decisions. Ensembles of machines currently receive a lot of attention; they combine predictions from different forecasting methods as a procedure to improve the accuracy. This paper explores genetic programming and boosting technique to obt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering Expert System for Global Development

    Publication Year: 2006, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Software project control and software process improvement both depend on the ability to measure software development status. This paper introduces the software engineering expert system (SEES) tool where the software professional can gather metrics from CASE tool databases to reconstruct all activities in a software project from project initiation to project termination. SEES is Internet based and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Unified Framework for Defect Data Analysis Using the MBR Technique

    Publication Year: 2006, Page(s):39 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Failures of mission-critical software systems can have catastrophic consequences and, hence, there is strong need for scientifically rigorous methods for assuring high system reliability. To reduce the V&V cost for achieving high confidence levels, quantitatively based software defect prediction techniques can be used to effectively estimate defects from prior data. Better prediction models fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS Adaptive ISHM Systems

    Publication Year: 2006, Page(s):47 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Embedded systems are becoming highly complex and increasingly being used in critical applications. Integrated system health management (ISHM) techniques have therefore been developed to ensure the proper operation of these systems. However, some ISHM systems are relatively complex and may consume a significant amount of resources. In some situations, activating the full ISHM system may cause resou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodology for the Selection of Intelligence Analysis Tools

    Publication Year: 2006, Page(s):55 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    The use of commercial-off-the-shelf (COTS) / government-off-the-shelf (GOTS) applications as components in software systems is increasingly prevalent. The critical step of tool selection for an integrated suite is usually based on identifying the tools that best match the functionality requirements needed. Other factors tangential to technical performance are playing a more important role in the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnosability Test for Timed Discrete-Event Systems

    Publication Year: 2006, Page(s):63 - 72
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In this paper, an algorithm with polynomial time-complexity is presented for testing failure diagnosability in (untimed) discrete-event systems in a state-based framework. Furthermore, an algorithm for testing failure diagnosability in timed discrete-event systems is provided. The test for timed discrete-event systems, in particular, first gathers and complies the information about the timing of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum Spanning Tree Based Clustering Algorithms

    Publication Year: 2006, Page(s):73 - 81
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    The minimum spanning tree clustering algorithm is known to be capable of detecting clusters with irregular boundaries. In this paper, we propose two minimum spanning tree based clustering algorithms. The first algorithm produces a k-partition of a set of points for any given k. The algorithm constructs a minimum spanning tree of the point set and removes edges that satisfy a predefined criterion. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variables Interaction for Mining Negative and Positive Quantitative Association Rules

    Publication Year: 2006, Page(s):82 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    This paper introduces an efficient method for mining both positive and negative quantitative association rules using a tabular pruning and regrouping strategy coordinated with an interestingness measure. This measure evaluates the impact of a new variable on the concerned association View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Studies on Multi-label Classification

    Publication Year: 2006, Page(s):86 - 92
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    In classic pattern recognition problems, classes are mutually exclusive by definition. However, in many applications, it is quite natural that some instances belong to multiple classes at the same time. In other words, these applications are multi-labeled, classes are overlapped by definition and each instance may be associated to multiple classes. In this paper, we present a comparative study on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.