By Topic

Tools with Artificial Intelligence, 1992. TAI '92, Proceedings., Fourth International Conference on

10-13 Nov. 1992

Filter Results

Displaying Results 1 - 25 of 72
  • Proceedings. Fourth International Conference on Tools with Artificial Intelligence, TAI '92 (Cat. No. 92CH3203-7)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • The G2 development and deployment environment

    Publication Year: 1992, Page(s):458 - 459
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    G2 is an object-oriented development and deployment environment, combining rule-based and procedural reasoning, user interface graphics, database interface capabilities, dynamic simulation, and real-time execution in a single package. The applications of G2 typically have large knowledge bases, with tens of thousands of objects, and generally real-time execution is required. The online installatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain model for constructing a knowledge based system

    Publication Year: 1992, Page(s):467 - 468
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    An expert system tool, ASPROGEN (automatic search program generator), is described. It has a domain model editor, by which tool users can define their problems in an object-oriented way, and a built-in function for automatic generation of a domain-specific inference program. This function uses search-based program specifications and an abstract data type of search. The descriptiveness of this doma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New transitive closure algorithm for recursive query processing in deductive databases

    Publication Year: 1992, Page(s):268 - 275
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    An algorithm suitable for the full transitive closure problem, which is used to solve uninstantiated recursive queries in deductive databases, is presented. In this algorithm there are two phases. In the first phase a general graph is condensed into an acyclic graph and at the same time a special sparse matrix is formed from the acyclic graph. The second phase is the main one, where all of the pag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software automation: from `silly' to `intelligent'

    Publication Year: 1992, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The adaptation of some AI techniques to software automation is proposed. Inductive reasoning is used as the basis of inductive program synthesis, and explanation-based learning is used to learn algorithm design strategies. Methods for elementary algorithm learning, optimizing method learning, and analogical program derivation are also described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A user customizable X window system interface for simulation of neural networks

    Publication Year: 1992, Page(s):456 - 457
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    An X window system interface, the Neural Shell Version 3.5, which simplifies the use of neural-network simulators for neural-network research is presented. This interface can be customized by the user as additional simulators and toolkit programs are developed and added to the system. The Neural Shell runs on workstations and additionally supports the execution of large neural-network simulations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ClimBS: searching the bias space

    Publication Year: 1992, Page(s):146 - 153
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The literature on systems that address the selection of inductive bias explicitly is reviewed and a model of inductive bias selection as state space search, which is instantiated in a testbed system with biases as states and bias transformation operators used to move from state to state, is introduced. The testbed allows a system developer to address different dimensions in the bias space and diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge with real-time semantics

    Publication Year: 1992, Page(s):464 - 466
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    A method of incorporating real-time semantics in production rules, thus making them suitable for representing knowledge of a real-time expert system, is presented. It is intended that the knowledge representation should allow the incorporation of time-dependent heuristics and dynamic models in the knowledge base. An illustration of this method, the NetManager expert system, is noted View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependency-based concurrency control in logic-oriented object bases

    Publication Year: 1992, Page(s):260 - 267
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    A policy for scheduling concurrent transactions in which the preconditions and effects associated with the transactions can be specified is described. Also proposed is a recovery procedure for when transaction failures are detected. The advantages of the scheduling algorithm can be summarized as follows: for conventional transaction models, it is less constrained than the two-phased protocol, part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning object models in visual semantic networks

    Publication Year: 1992, Page(s):204 - 211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    Visual semantic networks, a representation scheme for a library of visual object models, are introduced. New models are learned in the library with the help of a knowledge engineer, who informs the system of the generic class of each new example, and then the system discovers potential cases of further classification, and gets them confirmed by the knowledge engineer. The details of discovery are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RCCN: radial basis competitive and cooperative network

    Publication Year: 1992, Page(s):78 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The radial basis bidirectional competitive and cooperative network (RCCN) is a bidirectional mapping network that accommodates and generates radial basis function units (RBFUs) with the help of efficient use of the accommodation boundaries. The analysis and simulation show that the automatic generation scheme provides the necessary and sufficient enhancement of the network, the hierarchical learni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of real-time search algorithms in dynamic worlds (summary of results)

    Publication Year: 1992, Page(s):6 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    A classification of different dynamic worlds is presented. A detailed model of a dynamic world where changes occur in edge costs around a zero mean is provided. A formal analysis of the model suggests that the static rank ordering of solution paths is preserved in the model. Two real-time search algorithms, DYNORAII and RTA*, for the real-time path planning problem are analyzed. Results on the pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern matching in unordered trees

    Publication Year: 1992, Page(s):352 - 361
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    The problem of comparison between unordered trees, i.e. trees for which the order among siblings is unimportant, is considered. The criterion for comparison is the distance as measured by a weighted sum of the costs of deletion, insertion, and relabel operations on tree nodes. Such comparisons may contribute to pattern recognition efforts in any field (e.g. genetics) where data can naturally be ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IASCE: an intelligent assistant to software cost estimation

    Publication Year: 1992, Page(s):114 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    A CASE (computer-aided software design) tool called IASCE has been developed to help the project manager estimate a proposed project cost. This tool collects accurate data from current software so that researchers can explore new software models and metrics. IASCE also supports multiple software cost estimation models and their corresponding metrics, tractable for project management control, feedb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural network based competitive learning for control

    Publication Year: 1992, Page(s):236 - 243
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The idea of competitive learning for pattern-recognition applications is introduced. A brief review of two competitive learning models, T. Kohonen's self-organizing feature maps (1982, 1989) and S. Grossberg's ART networks (1987), is presented. Neural-net-based partitioning algorithms for learning control are introduced. A simulation study, of these algorithms incorporated into the BOXES machine l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive abstraction for qualitative simulation

    Publication Year: 1992, Page(s):428 - 431
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    A framework for applying cognitive abstraction in the domain of qualitative physics to suppress irrelevant distinctions between the possible behaviors is presented. Cognitive abstraction is especially useful for inferring the behavior of a physical system based on incremental qualitative simulation. The framework of a prototype of cognitive abstraction, based on QSIM, is presented. The limitations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel blackboard generic tool for intelligent robotics

    Publication Year: 1992, Page(s):454 - 455
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    In order to specify intelligent control for robotic systems, a generic blackboard based methodology is proposed. It is based on a functional analysis of the problem of control. The control is viewed as a distributed multishape blackboard decomposition. Specific functionalities of blackboard architectures are specialized for each of the aspects of control: a graphical blackboard for interaction, a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Band search: an efficient alternative to guided depth-first search

    Publication Year: 1992, Page(s):154 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    A novel search algorithm called band search that generalizes guided depth-first and best-first searches is proposed. The performance of band search is studied, and it is evaluated using six benchmarks. The band-search algorithm and its properties are presented, the conditions when band search behaves like best first search are identified, and possible anomalous behavior when the bandwidth of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault diagnosis of power distribution lines by using discrimination tree

    Publication Year: 1992, Page(s):462 - 463
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    A method for creating a discrimination tree and its application in a machine-learning-based power fault diagnosis system are discussed. An algorithm for diagnosing a single distribution line that is developed automatically by the machine learning system is presented. The performance of machine learning for fault diagnosis using a discrimination tree, an artificial neural network, and an expert sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid architecture for text classification

    Publication Year: 1992, Page(s):286 - 292
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    SKIS, a prototype system that allows for the construction and use of text classification applications, is discussed. SKIS uses a combination of knowledge-based techniques, statistical techniques, morphological processing, and relevance feedback learning techniques to perform text classification. SKIS has been used to construct a prototype text classification application for the routing of customer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On reusing linkage designs

    Publication Year: 1992, Page(s):100 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    A representation for design cases and a method for indexing known cases to ease their retrieval, given the specification of a new problem, are presented. Each description includes structural and performance characteristics. Methods to retrieve known cases, to match them to often incomplete problem specifications, and to adapt them to solve the problem are devised View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving a knowledge based approach for recognition of typed text characters using a 2-D FT

    Publication Year: 1992, Page(s):251 - 258
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    A nonconventional text character extraction technique, called horizontal-vertical projection (HVP), has been used for feature extraction of numerous alphanumeric symbols. In an earlier paper a classification algorithm based on a 1-D Fourier transform (FT) was used with NVP. An alternative 2-D FT feature extraction technique is presented and shown to improve on the 1-D approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic algorithms as a tool for feature selection in machine learning

    Publication Year: 1992, Page(s):200 - 203
    Cited by:  Papers (41)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    An approach being explored to improve the usefulness of machine learning techniques for generating classification rules for complex, real-world data is described. The approach involves the use of genetic algorithms as a front end to a traditional rule induction system in order to identify and select the best subset of features to be used by the rule induction system. This approach has been impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The minimum entropy network

    Publication Year: 1992, Page(s):85 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    It is shown that, using as basic building block a linear neuron with an anti-Hebb rule and restricted weights, an asymmetric network which computes the eigenvectors in the ascending order of their corresponding eigenvalues can be built. The conditions for their convergence are obtained and demonstrated by simulations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a time map manager in a real-time expert system for alarm filtering

    Publication Year: 1992, Page(s):14 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    The issue of temporal reasoning in an online real-time expert system in the field of process control is addressed. An alarm filtering problem is described, and the integration of a point-based time map manager (TMM) with an inference engine, to manage the temporal constraints, is proposed. The TMM manages only imprecise future time points and must comply with the constant modification of the curre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.