14th IEEE International Conference on Tools with Artificial Intelligence, 2002. (ICTAI 2002). Proceedings.

4-6 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 72
  • Proceedings 14th IEEE International Conference on Tools with Artificial Intelligence

    Publication Year: 2002
    Request permission for commercial reuse | |PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • Error-based pruning of decision trees grown on very large data sets can work!

    Publication Year: 2002, Page(s):233 - 238
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (254 KB) | HTML iconHTML

    It has been asserted that, using traditional pruning methods, growing decision trees with increasingly larger amounts of training data will result in larger tree sizes even when accuracy does not increase. With regard to error-based pruning, the experimental data used to illustrate this assertion have apparently been obtained using the default setting for pruning strength; in particular, using the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):547 - 548
    Request permission for commercial reuse | |PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Maintenance scheduling of oil storage tanks using tabu-based genetic algorithm

    Publication Year: 2002, Page(s):209 - 215
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (358 KB) | HTML iconHTML

    Due to the entry of Taiwan into WTO and the recently liberalized Petroleum Management Law, the oil market in Taiwan is liberalized and thus is becoming more competitive. However, the space limitation and the residents' increasing awareness of environmental protection issues in the island make international vendors unavoidably have to rent tanks from domestic oil companies. In order to help the lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSatz: a directional SAT solver for planning

    Publication Year: 2002, Page(s):199 - 208
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (260 KB) | HTML iconHTML

    SAT-based planners have been characterized as disjunctive planners that maintain a compact representation of search space of action sequences. Several ideas from refinement planners (conjunctive planners) have been used to improve performance of SAT-based planners or get a better understanding of planning as SAT One important lesson from refinement planning is that backward search being goal direc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic refinement of classification rules

    Publication Year: 2002, Page(s):189 - 196
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (251 KB) | HTML iconHTML

    Given a set of training examples in the form of (input, output) pairs, induction generates a set of rules that when applied to an input example, can come up with a target output or class for that example. At deduction time, these rules can be applied to a pre-classified test set to evaluate their accuracy. With existing rule induction systems, the rules are "frozen" on the training set, and they c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnosis of component failures in the Space Shuttle main engines using Bayesian belief networks: a feasibility study

    Publication Year: 2002, Page(s):181 - 188
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (441 KB) | HTML iconHTML

    Although the Space Shuttle is a high reliability system, its condition must he accurately diagnosed in real-time. Two problems plague the system - false alarms that may be costly, and missed alarms which may be not only expensive, but also dangerous to the crew. This paper describes the results of a feasibility study in which a multivariate state estimation technique is coupled with a Bayesian bel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining for selective visualization of large spatial datasets

    Publication Year: 2002, Page(s):41 - 48
    Cited by:  Papers (3)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (410 KB) | HTML iconHTML

    Data mining is the process of extracting implicit, valuable, and interesting information from large sets of data. Visualization is the process of visually exploring data for pattern and trend analysis, and it is a common method of browsing spatial datasets to look for patterns. However the growing volume of spatial datasets make it difficult for humans to browse such datasets in their entirety, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural-network approach to modeling and analysis

    Publication Year: 2002, Page(s):489 - 493
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1375 KB) | HTML iconHTML

    A backpropagation network can always be used in modeling. This study is concerned with the stability problem of a neural network (NN) system which consists of a few subsystems represented by NN models. In this paper, the dynamics of each NN model is converted into linear inclusion representation. Subsequently, based on the representations, the stability conditions in terms of Lyapunov's direct met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The semantics of proactive communication acts among team-based agents

    Publication Year: 2002, Page(s):447 - 454
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    Psychological studies about human teamwork have shown that members of an effective team can often anticipate needs of other teammates, and choose to assist teammates through appropriate ways. However the fulfillment of help behaviors among teammates is subject to team members' understanding of the underpinning communicative acts performed by individual agents. By extending the mental state analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection process of intelligent decision support tool for real-time monitoring system

    Publication Year: 2002, Page(s):173 - 180
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (368 KB) | HTML iconHTML

    The decision support tool market has seen exponential growth in recent years, with the introduction of different tools for various applications and domains. These include tools for data mining, on-line analysis and reporting, and expert systems (rule-based and case-based systems). This paper presents an approach for evaluating and selecting intelligent decision supports tools suitable for capturin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining using cultural algorithms and regional schemata

    Publication Year: 2002, Page(s):33 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2432 KB) | HTML iconHTML

    In the paper we demonstrate how evolutionary search for functional optima can be used as a vehicle for data mining, that is, in the process of searching for optima in a multi-dimensional space we can keep track of the constraints that must be placed on related variables in order to move towards the optima. Thus, a side effect of evolutionary search can be the mining of constraints for related vari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NeuroWeb: an Internet-based neural network simulator

    Publication Year: 2002, Page(s):407 - 412
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (528 KB) | HTML iconHTML

    The NeuroWeb project is an Internet-based framework for the simulation of neural networks. It aims for using the Internet as a transparent environment to allow users the exchange of information (neural network objects, neural network paradigms) and the exploit of available computing resources for neural network specific tasks (specifically training of neural networks). NeuroWeb's design principles... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Function approximation using robust wavelet neural networks

    Publication Year: 2002, Page(s):483 - 488
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    Wavelet neural networks (WNN) have recently attracted great interest, because of their advantages over radial basis function networks (RBFN) as they are universal approximators but achieve faster convergence and are capable of dealing with the so-called "curse of dimensionality". In addition, WNN are generalized RBFN. However, the generalization performance of WNN trained by least-squares approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of AI planning techniques to automated code synthesis and testing

    Publication Year: 2002, Page(s):131 - 137
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (269 KB) | HTML iconHTML

    Rapid growth in the demand for embedded systems and the increased complexity of embedded software pose an urgent need for advanced embedded software development techniques. One attractive approach is to enable semi-automated code generation and integration of systems from components. However, the implementation and validation of these systems requires a steep learning curve due to the large number... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the orthogonal range search k-windows algorithm

    Publication Year: 2002, Page(s):239 - 245
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (318 KB) | HTML iconHTML

    Clustering, that is the partitioning of a set of patterns into disjoint and homogeneous meaningful groups (clusters), is a fundamental process in the practice of science. k-windows is an efficient clustering algorithm that reduces the number of patterns that need to be examined for similarity. using a windowing technique. It exploits well known spatial data structures, namely the range free, that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local search algorithm to improve the local search

    Publication Year: 2002, Page(s):438 - 443
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (785 KB) | HTML iconHTML

    In this paper, we present a new cooperative framework based on using successively two local search algorithms to solve constraint satisfaction and optimization problems. Our technique is based on the integration of local search algorithms as a mechanism to diversify the search instead of using a build on diversification mechanisms. Thus we avoid tuning the multiple parameters to escape from a loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A TMO based approach to structuring real-time agents

    Publication Year: 2002, Page(s):165 - 172
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (522 KB) | HTML iconHTML

    Mobile agent structuring is an increasingly practiced branch of distributed computing software engineering. In this paper we discuss the major issues encountered in producing real-time (RT) agents which are designed to perform output actions in a manner meeting specified timing requirements. An approach to structuring RT agents, which is an extension of a high-level real-time distributed object pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine learning and software engineering

    Publication Year: 2002, Page(s):22 - 29
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (259 KB) | HTML iconHTML

    Machine learning deals with the issue of how to build programs that improve their performance at some task through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. Not surprisingly, the field of software engineering turns out to be a fertile ground where many software development and maintenance tasks could be formulated as lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic repairing of Web wrappers by combining redundant views

    Publication Year: 2002, Page(s):399 - 406
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (263 KB) | HTML iconHTML

    We address the problem of automatic maintenance of Web wrappers used in data integration systems to encapsulate an access to Web information providers. The maintenance of Web wrappers is critical as providers often changes the page format and/or structure making wrappers inoperable. The solution we propose extends the conventional wrapper architecture with a novel component of automatic maintenanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural network-based segmentation tool for color images

    Publication Year: 2002, Page(s):500 - 511
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1273 KB) | HTML iconHTML

    The paper focuses on the development of an efficient and accurate tool for segmenting color images. The segmentation is a problem that has been widely studied since machine vision first evolved as a research area. The neural network segmentation tools and technology developed and presented in this paper show great potential in application where the accuracy is the major factor. Similar requirement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative co-learning: a model-based approach for solving multi-agent reinforcement problems

    Publication Year: 2002, Page(s):463 - 468
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (271 KB) | HTML iconHTML

    Solving multiagent reinforcement learning problems is a key issue. Indeed, the complexity of deriving multiagent plans, especially when one uses an explicit model of the problem, is dramatically increasing with the number of agents. This papers introduces a general iterative heuristic: at each step one chooses a sub-group of agents and update their policies to optimize the task given the rest of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hiding a logo watermark into the multiwavelet domain using neural networks

    Publication Year: 2002, Page(s):477 - 482
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (342 KB) | HTML iconHTML

    This paper proposes a novel watermarking scheme for an image, in which a logo watermark is embedded into the multiwavelet domain of the image using neural networks. The multiwavelet domain provides us with a multiresolution representation of the image like the scalar wavelet case. However, there are four subblocks in the coarsest level of the multiwavelet domain, where there is only one in that of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Actions with duration and constraints: the ramification problem in temporal databases

    Publication Year: 2002, Page(s):83 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (295 KB) | HTML iconHTML

    The ramification problem is a hard and ever present problem in systems exhibiting dynamic behavior. The area of temporal databases in particular still lacks satisfactory solutions to the ramification problem. In this paper we address the ramification problem based on causal relationships that take time into account. We study the problem for both instantaneous actions and actions with duration. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology construction for information selection

    Publication Year: 2002, Page(s):122 - 127
    Cited by:  Papers (27)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (347 KB) | HTML iconHTML

    Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential for exchange and retrieval of information is vast and daunting. The key problem in achieving efficient and user-friendly retrieval is the development of a search mechanism to guarantee delivery of minimal irrelevant inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.