By Topic

Proceedings 11th International Conference on Tools with Artificial Intelligence

9-11 Nov. 1999

Filter Results

Displaying Results 1 - 25 of 66
  • Proceedings 11th International Conference on Tools with Artificial Intelligence

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s): 445
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Query reification based approach for object-oriented query formulation aid

    Publication Year: 1999, Page(s):349 - 356
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    We propose an approach facilitating query formulation for users sharing a common database. Our approach is based on two considerations. On the one hand, query formulation can be considered as a skill which can be shared entirely or partly between users. Accordingly we propose a model for storing and making available this skill to help users formulate their new queries. On the other hand we base ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A family of Delphi components for case-based reasoning

    Publication Year: 1999, Page(s):153 - 160
    Cited by:  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Nearest neighbour (NN) algorithms are one of the more popular approaches to implementing case-based reasoning systems. A family of Delphi components are presented that implements an NN approach based on the weighted Euclidean distance (WED). To make the approach more general, the distance measure of WED is implemented by so called comparators which are specialised components for comparing attribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Removing node and edge overlapping in graph layouts by a modified EGENET solver

    Publication Year: 1999, Page(s):218 - 223
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    Graph layout problems, such as node and edge overlapping, occur widely in many industrial computer-aided design applications. Usually, these problems are handled in an ad-hoc manner by some specially designed algorithms. GENET and its extended model EGENET are local search models that are used to efficiently solve constraint satisfaction problems such as the car-sequencing problems. Both models us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-sided hypotheses generation for abductive analogical reasoning

    Publication Year: 1999, Page(s):145 - 152
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    In general, if a knowledge base lacks the necessary knowledge, abductive reasoning cannot explain an observation. Therefore, it is necessary to generate missing hypotheses. CMS can generate missing hypotheses, but it can only generate short-cut hypotheses or hypotheses that will not be placed on real leaves. That is, the inference path is incomplete (truncated), so that abduction is not complete. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constrained simulated annealing with applications in nonlinear continuous constrained global optimization

    Publication Year: 1999, Page(s):381 - 388
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    This paper improves constrained simulated annealing (CSA), a discrete global minimization algorithm with asymptotic convergence to discrete constrained global minima with probability one. The algorithm is based on the necessary and sufficient conditions for discrete constrained local minima in the theory of discrete Lagrange multipliers. We extend CSA to solve nonlinear continuous constrained opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving hard satisfiability problems: a unified algorithm based on discrete Lagrange multipliers

    Publication Year: 1999, Page(s):210 - 217
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    Presents improved strategies in DLM-99-SAT (Discrete Lagrange Multipliers 1999, Satisfiability) to escape from traps and to select proper parameter sets to use when applied to solve some difficult but satisfiable SAT problems. One of the main issues in DLM-99-SAT is that it has a large number of tunable parameters, making it difficult to determine the best parameters to use when given a new instan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal trend identification with fuzzy methods

    Publication Year: 1999, Page(s):332 - 335
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    A fuzzy logic-based methodology for online signal trend identification is introduced. Although signal trend identification is complicated by the presence of noise, fuzzy logic can help capture important features of online signals and classify incoming power plant signals into increasing, decreasing and steady-state trend categories. In order to verify the methodology, a code named PROTREN is devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing user access patterns in the Web for data mining

    Publication Year: 1999, Page(s):345 - 348
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    Existing methods for knowledge discovery in the Web are mostly server-oriented and approaches taken are affected by the use of proxy servers. As a result, it is difficult to capture individual Web user behavior from the current log mechanism. As an effort to remedy this problem, we develop methods for design and implementation of an access pattern collection server to conduct data mining in the We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software tool for real-time low-level vision

    Publication Year: 1999, Page(s):131 - 139
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    This paper presents a software tool-methodology called ORASIS, for near real-time and real-time user driven segmentation of color images or sequences of images (video) by using a low cost approach (a low cost camera and a PC). The segmentation approach used is based on fuzzy-like reasoning and a color reflection. The ORASIS tool-methodology provides a human-like perception modeling in combination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamical cognitive network-an extension of fuzzy cognitive map

    Publication Year: 1999, Page(s):43 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    We present a dynamic cognitive network (DCN) which is a systematic extension of the fuzzy cognitive map (FCM). Each concept in a dynamic cognitive network can have its own value set, depending on how precisely it needs to be described in the network. This enables the dynamic cognitive network to describe the strength of the cause and the degree of the effect. This ability also enables DCN to carry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An in-service agent monitoring and analysis system

    Publication Year: 1999, Page(s):237 - 244
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Multi Agent Systems (MAS) have been experimented in building a variety of applications. Several agent-building tools are available to assist with the tasks of building agent-based systems. However the issues on how to visualize and monitor the behaviors, and to analyze the performance of in-service agents have largely not been addressed. This paper describes the system we have developed for visual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic email organization via relevance categories

    Publication Year: 1999, Page(s):399 - 405
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Many researchers have proposed classification systems that automatically classify email in order to reduce information overload. However, none of these systems are in use today. This paper examines some of the problems with classification technologies and proposes Relevance Categories as a method to avoid some of these problems. In particular, the dynamic nature of email categories, the cognitive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast and efficient searching of multimedia databases using holographic memory

    Publication Year: 1999, Page(s):365 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    With the ever-expanding size of multimedia databases it is important to seek new technologies that improve the performance of systems that manage these databases. One such technology is holographic memory which has some very interesting attributes such as massive parallelism, high speed, and content searching. A volume holographic database system (VHDS) serves as a building block for a postulated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Box consistency through weak box consistency

    Publication Year: 1999, Page(s):373 - 380
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Interval constraint solvers use local consistencies-among which one worth mentioning is box consistency-for computing verified solutions of real constraint systems. Though among the most efficient ones, the algorithm for enforcing box consistency suffers from the use of time-consuming operators. This paper first introduces boxφ consistency, a weakening of box consistency; this new n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protein secondary structure prediction using data mining tool C5

    Publication Year: 1999, Page(s):107 - 110
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    This paper reports our experimental results in protein secondary structure prediction using the machine learning software, C5. The accuracy improvement in the prediction of protein secondary structure is the focus of our study. Starting with a target protein with unknown secondary structures, we investigate three different approaches and find that training cases selected based on sequence homology... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strong local consistency for constraint satisfaction

    Publication Year: 1999, Page(s):202 - 209
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    Filtering techniques are essential for efficient solution searching in a constraint network (CN). However, for a long time, it has been considered that to efficiently reduce the search space, the best choice is the limited local consistency achieved by forward checking. However, more recently, it has been shown that maintaining arc consistency (which is a more pruningful local consistency) during ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining fuzzy quantitative association rules

    Publication Year: 1999, Page(s):99 - 102
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Given a relational database and a set of fuzzy terms defined for some attributes we consider the problem of mining fuzzy quantitative association rules that may contain crisp values, intervals, and fuzzy terms in both antecedent and consequent. We present an algorithm extended from the equi-depth partition (EDP) algorithm for solving this problem. Our approach combines interval partition with pre-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently detecting arbitrary shaped clusters in image databases

    Publication Year: 1999, Page(s):187 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Image databases contain data with high dimensions. Finding interesting patterns in these databases poses a very challenging problem because of the scalability, lack of domain knowledge and complex structures of the embedded clusters. High dimensionality adds severely to the scalability problem. In this paper, we introduce WaveCluster+, a novel approach to apply wavelet-based techniques ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neurules: improving the performance of symbolic rules

    Publication Year: 1999, Page(s):417 - 424
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    In this paper, we present a method for improving the performance of classical symbolic rules. This is achieved by introducing a type of hybrid rules, called neurules, which integrate neurocomputing into the symbolic framework of production rules. Neurules are produced by converting existing symbolic rules. Each neurule is considered as an adaline unit, where weights are considered as significance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Web representatives

    Publication Year: 1999, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    We present the design and implementation of an intelligent Web representative based on prevalent Internet and Web technologies. The design includes three parts: natural language parser, knowledge representation, and communication between the user and the computer. With an efficient pseudo-natural language processing, a database of knowledge stored in XML, and the user communication through Microso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmented transition networks as video browsing models for multimedia databases and multimedia information systems

    Publication Year: 1999, Page(s):175 - 182
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    In an interactive multimedia information system, users should have the flexibility to browse and choose various scenarios they want to see. This means that two-way communications should be captured by the conceptual model. Digital video has gained increasing popularity in many multimedia applications. Instead of sequential access to the video contents, the structuring and modeling of video data so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous filter engine based on knowledge acquisition from the Web

    Publication Year: 1999, Page(s):343 - 344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    For a long time filtering data has been a very important matter. With the growth of the Internet this question has become more and more pressing. Everyone knows that finding information is not always very easy, because of the large amount of data that the network contains. More generally, our concern here is not only to find what is interesting to download but also to avoid what is unsuitable. One... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.