By Topic

IEEE Intelligent Systems

Issue 5 • Date Sept.-Oct. 2005

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (966 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • A Letter from the Editor: Avoiding Rejection

    Publication Year: 2005, Page(s):2 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2744 KB) | HTML iconHTML

    The editor in chief offers advice on how to improve your submission's chances of acceptance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machines mimicking humans

    Publication Year: 2005, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    The more we come to understand human biological systems, the more biomemesis, the study of imitating nature, is proving to be a powerful inspiration to roboticists. The research has potential as a human prosthetic and in robotics applications in which a machine needs visual input to do a job, such as in space or a dangerous environment. Much robotics research seeks ways to create machines that can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robert Milne (1956-2005)

    Publication Year: 2005, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    This department looks back at the life of Robert Milne, accomplished AI academic, business entrepreneur, and mountaineer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Artificial Intelligence for Homeland Security

    Publication Year: 2005, Page(s):12 - 16
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    In the post-9/11 world, information technology is an indispensable part of making our nation safer. Critical national security missions in the context of various data and technical domain challenges could benefit from establishing an intelligence and security informatics research discipline. Just as biomedical informatics addresses information management issues in biological and medical applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-based computing on manets: enabling dynamic interoperability of first responders

    Publication Year: 2005, Page(s):17 - 25
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Mobile ad hoc networks will form a critical part of the first-responder communications infrastructure. Empirical data shows how network-aware, autonomous, mobile agents can manage information services on live manet environments. A multidisciplinary team in Drexel University's College of Engineering has been working with local law enforcement and transportation officials to identify problems in ena... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-centered syndromic surveillance for bioterrorism

    Publication Year: 2005, Page(s):26 - 35
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    In recent years, public health surveillance has become a priority, driven by concerns of possible bioterrorist attacks and disease outbreaks. Authorities argue that syndromic surveillance, or the monitoring of prediagnostic health-related data for early detection of nascent outbreaks, is crucial to preventing massive illness and death. Syndromic surveillance could prevent widespread illness and de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deception detection through automatic, unobtrusive analysis of nonverbal behavior

    Publication Year: 2005, Page(s):36 - 43
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Every day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide whether the individual is being forthright o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • US domestic extremist groups on the Web: link and content analysis

    Publication Year: 2005, Page(s):44 - 51
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Although US domestic extremist and hate groups might not be as well-known as some international groups, they nevertheless pose a significant threat to homeland security. Increasingly, these groups are using the Internet as a tool for facilitating recruitment, linking with other extremist groups, reaching global audiences, and spreading hate materials that encourage violence and terrorism. A study ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule+exception strategies for security information analysis

    Publication Year: 2005, Page(s):52 - 57
    Cited by:  Papers (10)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Broadly defined, intelligence and security informatics is "the study of the use and development of advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applications". Processing security-related information is a critical component of ISI research, which involves studying a wide range of technical and systems challenges related to the acq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed interactive video arrays for event capture and enhanced situational awareness

    Publication Year: 2005, Page(s):58 - 66
    Cited by:  Papers (36)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1856 KB) | HTML iconHTML

    Video surveillance activity has dramatically increased over the past few years. Earlier work dealt mostly with single stationary cameras, but the recent trend is toward active multicamera systems. Such systems offer several advantages over single camera systems - multiple overlapping views for obtaining 3D information and handling occlusions, multiple nonoverlapping cameras for covering wide areas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying authorship analysis to extremist-group Web forum messages

    Publication Year: 2005, Page(s):67 - 75
    Cited by:  Papers (93)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    The speed, ubiquity, and potential anonymity of Internet media - email, Web sites, and Internet forums - make them ideal communication channels for militant groups and terrorist organizations. Analyzing Web content has therefore become increasingly important to the intelligence and security agencies that monitor these groups. Authorship analysis can assist this activity by automatically extracting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Homeland security

    Publication Year: 2005, Page(s):76 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Trends & Controversies this issue grows out of a panel discussion at the 2005 AAAI Spring Symposium on Al Technologies and Homeland Security, held at Stanford University in March 2005. Robert Popp, who gave the keynote speech at the symposium, describes a DARPA initiative for dealing with the 21st-century strategic threat triad: failed states, global terrorism, and weapons of mass destruction prol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a semantic wiki

    Publication Year: 2005, Page(s):87 - 91
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    The semantic Web vision of a "unifying logical language that enables concepts to be progressively linked into a universal Web" is part of along lineage of dreams of a universal repository of ideas: from Diderot's universal encyclopedia in the 18th century to Vannevar Bush's Memex at the beginning of the computer age to Ted Nelson's Xanadu in the 1970s. However, the semantic Web's development so fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based control for networked traffic management systems

    Publication Year: 2005, Page(s):92 - 96
    Cited by:  Papers (102)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Agent or multiagent systems have evolved and diversified rapidly since their inception around the mid 1980s as the key concept and method in distributed artificial intelligence. They have become an established, promising research and application field drawing on and bringing together results and concepts from many disciplines, including AI, computer science, sociology, economics, organization and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona