Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000

15-15 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 67
  • Proceedings 12th IEEE Internationals Conference On Tools With Artificial Intelligence

    Publication Year: 2000, Page(s):iii - ix
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (878 KB)
    Freely Available from IEEE
  • About the use of local consistency in solving CSPs

    Publication Year: 2000, Page(s):104 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB)

    Local consistency is often a suitable paradigm for solving constraint satisfaction problems. We show how search algorithms could be improved, thanks to a smart use of two filtering techniques (path consistency and singleton arc consistency). We propose a possible way to get benefits from using a partial form of path consistency (PC) during the search. We show how local treatment based on singleton... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent content-based retrieval

    Publication Year: 2000, Page(s):262 - 265
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    This paper deals with the challenge of extending classical image retrieval by including visual rules. The visual rules are extracted automatically from classes of images. They contribute to making the retrieval process more accurate. The visual-rules extraction is based on symbolic representations of image descriptors. The symbolic representations are the results of color and texture clustering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):426 - 427
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Implementing an action language using a SAT solver

    Publication Year: 2000, Page(s):96 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    In recent years, research on planning algorithms has made big progress. Recent approaches encode the plan search space into a data structure called the planning graph. To extract plans, a planning graph is transformed into the satisfiability problem (SAT), which is solved by a high-speed SAT solver. This kind of planning is called SAT planning. On the other hand, recent research on reasoning about... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The n-dimensional projective approach as a tool for spatial reasoning

    Publication Year: 2000, Page(s):237 - 240
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    In this paper, we describe the n-dimensional projective approach as a hierarchical and modular architecture with a processing mechanism that underlies both spatial backtracking and multiple physical properties of entities. Also, it is shown in Euclidean space how cognitive activities of an agent are improved in terms of flexibility (e.g. alternative solutions), reliability (e.g. error recovery) an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model selection via meta-learning: a comparative study

    Publication Year: 2000, Page(s):406 - 413
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The selection of an appropriate inducer is crucial for performing effective classification. In previous work we presented a system called NOEMON which relied on a mapping between dataset characteristics and inducer performance to propose inducers for specific datasets. Instance based learning was used to create that mapping. Here we extend and refine the set of data characteristics; we also use a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel mining of association rules with a Hopfield type neural network

    Publication Year: 2000, Page(s):90 - 93
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    Association rule mining (ARM) is one of the data mining problems receiving a great deal of attention in the database community. The main computation step in an ARM algorithm is frequent itemset discovery. In this paper, a frequent itemset discovery algorithm based on the Hopfield model is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy cellular automata: from theory to applications

    Publication Year: 2000, Page(s):320 - 323
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    In this paper we present a fuzzified cellular automata structure called fuzzy cellular automata. We begin our paper with a fuzzified entity called fuzzy automaton, then we present basics of cellular automata and finally we define fuzzy cellular automata. At the end we present some simulation results from the field of fire spread in homogeneous nature environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision based localisation for a mobile robot

    Publication Year: 2000, Page(s):229 - 236
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    Presents a vision-based localisation system for a mobile robot that uses a representative set of images obtained during an initial exploration of the environment. This set of images makes it possible to represent the environment as a partially Markov decision process. The originality of this approach is the resulting data fusion process that uses both image matching and the decisions made by the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated reasoning on monotonic constraints

    Publication Year: 2000, Page(s):401 - 404
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    We study the properties of monotonic parts of (continuous) constraints. We design a general framework to reason about them : directions can be abstracted by signs, which capture significant information on the location of solutions. We show that this formalism is appropriate to study the relative position of solution sets. Efficient algorithms are proposed to diagnose the behaviour of some consiste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What's new? Using prior models as a measure of novelty in knowledge discovery

    Publication Year: 2000, Page(s):86 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    One of the challenges of knowledge discovery is identifying patterns that are interesting, with novelty an important component of interestingness. Another important aspect of knowledge discovery is making efficient use of background knowledge. This paper develops a definition of novelty relative to a prior model of the domain. The definition of novelty is tested using pneumonia outcome data and a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • History checking of temporal fuzzy logic formulas for monitoring behavior-based mobile robots

    Publication Year: 2000, Page(s):312 - 319
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    Behavior-based robot control systems have shown remarkable success for controlling robots evolving in real world environments. However, they can fail in different manners due to their distributed control and their local decision making. In this case, monitoring can be used to detect failures and help to recover from them. In this work, we present an approach for specifying monitoring knowledge and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitively adequate modelling of spatial reference in human-robot interaction

    Publication Year: 2000, Page(s):222 - 228
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    The question addressed in this paper is which types of spatial reference human users employ in their interaction with a robot and how a cognitively adequate model of these strategies can be implemented. Experiments in human-robot interaction were carried out which show how human users approach an artificial communication partner which was designed on the basis of empirical findings regarding spati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining heuristics for default logic reasoning systems

    Publication Year: 2000, Page(s):393 - 400
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    In Artificial Intelligence, Default Logic is recognized as a powerful framework for knowledge representation when one has to deal with incomplete information. Its expressive power is suitable for nonmonotonic reasoning, but the counterpart is its very high level of theoretical complexity. Today, some operational systems are able to deal with real world applications. However finding a default logic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using heuristic-based optimizers to handle the personal computer configuration problems

    Publication Year: 2000, Page(s):108 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    Given the diversity of PC hardware components, and the limited compatibility between some of these hardware components, most people are interested to obtain a (sub)optimal configuration for some specific usage restricted by their budget limits and other possible criteria. We firstly formulate the widely occurring configuration problems as discrete optimization problems. More interestingly, we prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a learning-automata-based controller for client/server systems: a methodology

    Publication Year: 2000, Page(s):422 - 425
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A client/server model which employs a polling policy as its access strategy is considered. We propose a learning-automata-based approach for polling in order to improve the throughput-delay performance of the system. Each client has an associated queue and the server performs selective polling such that the next client to be served is identified by a learning automaton. The learning automaton upda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency checking for Euclidean spatial constraints: a dimension graph approach

    Publication Year: 2000, Page(s):333 - 342
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    In this paper, we address the problem of consistency checking for Euclidean spatial constraints. A dimension graph representation is proposed to maintain the Euclidean spatial constraints among objects. The basic idea is to project the spatial constraints on both X and Y dimensions, and to construct a dimension graph on each dimension. Using a dimension graph representation transforms the problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From data mining to rule refining. A new tool for post data mining rule optimisation

    Publication Year: 2000, Page(s):82 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The discovery of information from data and its presentation to the user have long been the primary goals of data mining. This paper describes a new software tool, the Rule Refiner, which focuses on post data mining operations, the optimisation of rules, the visualisation of rule characteristics and their validity within domain data. The system also provides facilities for the manipulation of this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient prediction of interconnect crosstalk using neural networks

    Publication Year: 2000, Page(s):122 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Interconnect crosstalk prediction has become increasingly important with deep submicron downscaling of ICs and wafer scale integration. Existing tools for management of the emi problem are computationally expensive and not very broad in application. The unique approach proposed involves the creation of parameterized models of primitive interconnect structures, wirecells, using modular artificial n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpretation of self-organizing maps with fuzzy rules

    Publication Year: 2000, Page(s):304 - 311
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    Exploration of large and high-dimensional data sets is one of the main problems in data analysis. Self-organizing maps (SOMs) can be used to map large data sets to a simpler; usually two-dimensional topological structure. This mapping is able to illustrate dependencies in the data in a very intuitive manner and allows fast location of clusters. However because of the black-box design of neural net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local search algorithm for the compacted cells area problem

    Publication Year: 2000, Page(s):294 - 297
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The minimum area joining of k compacted cells problem is an open problem that is not known whether to be polynomial-time solvable or NP-hard. In this paper we derive a divide-and-conquer approach for determining a lower-bound on the optimal cost of large problems. We also devise a taboo search algorithm whose performance can be measured and evaluated for large cases by using the derived lower boun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling software quality: the Software Measurement Analysis and Reliability Toolkit

    Publication Year: 2000, Page(s):54 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    The paper presents the Software Measurement Analysis and Reliability Toolkit (SMART) which is a research tool for software quality modeling using case based reasoning (CBR) and other modeling techniques. Modern software systems must have high reliability. Software quality models are tools for guiding reliability enhancement activities to high risk modules for maximum effectiveness and efficiency. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse mapping of referral links from storage hierarchy for Web documents

    Publication Year: 2000, Page(s):216 - 219
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Due to the lack of back-pointers, information about the referral parent(s) of a given Web page is not usually available to Web surfers. This significantly reduces the effectiveness of Web surfing and information discovery. We propose a mechanism to locate the referral parent(s) for a given fragment of a Web document (in terms of an URL address) from the client side. The basic idea is to explore th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.