By Topic

Tools with Artificial Intelligence, 1999. Proceedings. 11th IEEE International Conference on

Date 9-11 Nov. 1999

Filter Results

Displaying Results 1 - 25 of 66
  • Proceedings 11th International Conference on Tools with Artificial Intelligence

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s): 445
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • An engine for cursive handwriting interpretation

    Publication Year: 1999, Page(s):271 - 278
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    This paper describes an engine for on-line cursive handwriting that requires very little initial training and that rapidly learns, and thus adapts to, the handwriting style of a user. Key features are a shape analysis algorithm that efficiently determines shapes in the handwritten word, a linear segmentation algorithm that optimally matches characters identified in the handwritten word to characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile robotics planning using abstract Markov decision processes

    Publication Year: 1999, Page(s):299 - 306
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Markov decision processes have been successfully used in robotics for indoor robot navigation problems. They allow the computation of optimal sequences of actions in order to achieve a given goal, accounting for actuator uncertainties. However, MDPs are unsatisfactory at avoiding unknown obstacles. On the other hand, reactive navigators are particularly adapted to that, and don't need any prior kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unsupervised collaborative learning method to refine classification hierarchies

    Publication Year: 1999, Page(s):263 - 270
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    This article deals with the design of a hybrid learning system. This system integrates different kinds of unsupervised learning methods and gives a set of class hierarchies as the result. The classes in these hierarchies are very similar. The method occurrences compare their results and automatically refine them to try to make them converge towards a unique hierarchy that unifies all the results. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamical cognitive network-an extension of fuzzy cognitive map

    Publication Year: 1999, Page(s):43 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    We present a dynamic cognitive network (DCN) which is a systematic extension of the fuzzy cognitive map (FCM). Each concept in a dynamic cognitive network can have its own value set, depending on how precisely it needs to be described in the network. This enables the dynamic cognitive network to describe the strength of the cause and the degree of the effect. This ability also enables DCN to carry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-sided hypotheses generation for abductive analogical reasoning

    Publication Year: 1999, Page(s):145 - 152
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    In general, if a knowledge base lacks the necessary knowledge, abductive reasoning cannot explain an observation. Therefore, it is necessary to generate missing hypotheses. CMS can generate missing hypotheses, but it can only generate short-cut hypotheses or hypotheses that will not be placed on real leaves. That is, the inference path is incomplete (truncated), so that abduction is not complete. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Examplar-based prototype selection for a multi-strategy learning system

    Publication Year: 1999, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Multistrategy learning (MSL) consists of combining at least two different learning strategies to bring out a powerful system, where the drawbacks of the basic algorithms are avoided. In this scope, instance-based learning (IBL) techniques are often used as the basic component. However, one of the major drawbacks of IBL is the prototype selection problem which consists in selecting a subset of repr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic email organization via relevance categories

    Publication Year: 1999, Page(s):399 - 405
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Many researchers have proposed classification systems that automatically classify email in order to reduce information overload. However, none of these systems are in use today. This paper examines some of the problems with classification technologies and proposes Relevance Categories as a method to avoid some of these problems. In particular, the dynamic nature of email categories, the cognitive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled flux results in stable decision trees

    Publication Year: 1999, Page(s):287 - 295
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    This work deals with stability in incremental induction of decision trees. Stability problems arise when an induction algorithm must revise a decision tree very often and oscillations between similar concepts decrease learning speed. We introduce a heuristic and an algorithm with theoretical and experimental backing to tackle this problem View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge representation and reasoning support for modeling and querying video data

    Publication Year: 1999, Page(s):167 - 174
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    Describes a knowledge-based approach for modelling and retrieving video data. Selected objects of interest in a video sequence are described and stored in a database. This database forms the object layer. On top of this layer, we define the schema layer that is used to capture the structured abstractions of the objects stored in the object layer. We propose two abstract languages on the basis of d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing user access patterns in the Web for data mining

    Publication Year: 1999, Page(s):345 - 348
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    Existing methods for knowledge discovery in the Web are mostly server-oriented and approaches taken are affected by the use of proxy servers. As a result, it is difficult to capture individual Web user behavior from the current log mechanism. As an effort to remedy this problem, we develop methods for design and implementation of an access pattern collection server to conduct data mining in the We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based approach to developing intelligent virtual reality-based training systems

    Publication Year: 1999, Page(s):253 - 260
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    This paper presents an agent-based approach to developing intelligent virtual reality-based training systems. The architecture of an intelligent virtual reality-based training system is modeled as five collaborative agents: training task-planning agent, simulation agent, performance evaluation agent, on-line instruction agent, and intelligent interface agent. The behavioral and knowledge models of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software tool for real-time low-level vision

    Publication Year: 1999, Page(s):131 - 139
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    This paper presents a software tool-methodology called ORASIS, for near real-time and real-time user driven segmentation of color images or sequences of images (video) by using a low cost approach (a low cost camera and a PC). The segmentation approach used is based on fuzzy-like reasoning and a color reflection. The ORASIS tool-methodology provides a human-like perception modeling in combination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overcoming the Christmas tree syndrome

    Publication Year: 1999, Page(s):425 - 430
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    We propose a new computational approach to logic-based systems that should reason in a fast but logically sound and complete manner about large-scale complex critical devices and systems that can exhibit unexpected faulty behaviors. The approach is original from at least two points of view. First, it makes use of local search techniques while preserving logical deductive completeness. Second, it p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using knowledge-based system with hierarchical architecture to guide the search of evolutionary computation

    Publication Year: 1999, Page(s):29 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    Regional knowledge is determined by function's fitness landscape patterns, such as basins, valleys and multi-modality. Furthermore, for constrained optimization problems, the knowledge of feasible/infeasible regions can also be regards as regional knowledge. Therefore, it would be very helpful if there were a general tool to allow for the representation of regional knowledge, which can be acquired... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology based personalized search

    Publication Year: 1999, Page(s):391 - 398
    Cited by:  Papers (51)  |  Patents (79)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    With the exponentially growing amount of information available on the Internet, the task of retrieving documents of interest has become increasingly difficult. Search engines usually return more than 1,500 results per query, yet out of the top twenty results, only one half turn out to be relevant to the user. One reason for this is that Web queries are in general very short and give an incomplete ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic scheduling benchmark: design, implementation and performance evaluation

    Publication Year: 1999, Page(s):311 - 318
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Puzzles have traditionally been used as popular benchmarks for evaluating different problem solving strategies. Many of the game benchmarks are suitable for evaluating static scheduling techniques. In such benchmarks, the scheduling phase and the execution phase (i.e. when the schedule is executed to play the game) are disjoint. The scheduling technique can be executed to compute a complete schedu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a deductive reasoning model and method for uncertainty

    Publication Year: 1999, Page(s):161 - 164
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    Discusses a problem of deduction with uncertainty that has been dealt with by various diagnostic expert systems. First, we propose a mathematical framework of deductive reasoning with uncertainty. The subject of the reasoning is the calculation of conditional probabilities. Second, we establish a new reasoning method. Our deduction algorithm can compute the conditional probabilities precisely. To ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning to identify interesting links in intelligent information discovery

    Publication Year: 1999, Page(s):410 - 413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    In the age of information overload intelligent agents have proven themselves as a very useful tool for discovering information of interest on the Web. The information seeking process may be either static, by utilizing existing search engines or using collaborative techniques, or dynamic, by actively browsing the Web. In the second case, agents need to evaluate encountered hyperlinks and choose the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial color histograms for content-based image retrieval

    Publication Year: 1999, Page(s):183 - 186
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    The color histogram is an important technique for color image database indexing and retrieval. In this paper, the traditional color histogram is modified to capture the spatial layout information of each color, and three types of spatial color histograms are introduced: annular, angular and hybrid color histograms. Experiments show that, with a proper trade-off between the granularity in the color... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query reification based approach for object-oriented query formulation aid

    Publication Year: 1999, Page(s):349 - 356
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    We propose an approach facilitating query formulation for users sharing a common database. Our approach is based on two considerations. On the one hand, query formulation can be considered as a skill which can be shared entirely or partly between users. Accordingly we propose a model for storing and making available this skill to help users formulate their new queries. On the other hand we base ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous filter engine based on knowledge acquisition from the Web

    Publication Year: 1999, Page(s):343 - 344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    For a long time filtering data has been a very important matter. With the growth of the Internet this question has become more and more pressing. Everyone knows that finding information is not always very easy, because of the large amount of data that the network contains. More generally, our concern here is not only to find what is interesting to download but also to avoid what is unsuitable. One... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the sufficiency of limited testing for knowledge based systems

    Publication Year: 1999, Page(s):431 - 440
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Knowledge-based engineering and computational intelligence are expected to become core technologies in the design and manufacturing for the next generation of space exploration missions. Yet, if one is concerned with the reliability of knowledge based systems, studies indicate significant disagreement regarding the amount of testing needed for system assessment. The sizes of standard black-box tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.