By Topic

IEEE Intelligent Systems

Issue 5 • Sept.-Oct. 2007

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (927 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • Reinventing Academic Publishing-Part 1

    Publication Year: 2007, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The nature of academic publishing is changing, and computer scientists need to lead the way. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In the News

    Publication Year: 2007, Page(s):4 - 7
    Request permission for commercial reuse | PDF file iconPDF (391 KB) | HTML iconHTML
    Freely Available from IEEE
  • Protecting Transportation Infrastructure

    Publication Year: 2007, Page(s):8 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    In the context of homeland security, critical infrastructures are "those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, would have a serious impact on the health, safety, security, or economic well-being of citizens or the effective functioning of governments." Transportation infrastructures are a key component of a nation's critical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web Services, Part 1

    Publication Year: 2007, Page(s):12 - 17
    Cited by:  Papers (21)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    Semantic Web services (SWS) has been a vigorous technology research area for about six years. A great deal of innovative work has been done, and a great deal remains. Several large research initiatives have been producing substantial bodies of technology, which are gradually maturing. SOA vendors are looking seriously at semantic technologies and have made initial commitments to supporting selecte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The International Technology Alliance in Network and Information Sciences

    Publication Year: 2007, Page(s):18 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    In May 2006, the US Army Research Laboratory and UK Ministry of Defense created the international technology alliance. The consortium of 26 partners including the ARL and MoD offers an open research environment in which leading US and UK companies and universities can collaborate (see table 1). It will also fuse the best aspects of the US Army's Collaborative Technology Alliances and UK MoD's Defe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Social Computing

    Publication Year: 2007, Page(s):20 - 22
    Cited by:  Papers (13)
    Request permission for commercial reuse | PDF file iconPDF (458 KB) | HTML iconHTML
    Freely Available from IEEE
  • Context-Aware Middleware for Anytime, Anywhere Social Networks

    Publication Year: 2007, Page(s):23 - 32
    Cited by:  Papers (49)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB) | HTML iconHTML

    Anytime, anywhere social computing requires several support mechanisms and tools, including location and proximity systems, expressive representation models of physical place and user characteristics, and effective social-matching algorithms. Anytime, anywhere social-network computing also requires shared and interoperable vocabularies for modeling location and entity characteristics. Current solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Social Simulation Incorporating Cognitive Architectures

    Publication Year: 2007, Page(s):33 - 39
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Agent-based social simulation modeling, a social phenomena on the basis of models of autonomous agents has grown tremendously in recent decades. Researchers use this approach to study a wide range of social and economic issues, including social beliefs and norms, resource allocation, traffic patterns, social cooperation, stock market dynamics, group interaction and dynamics, and organizational dec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions

    Publication Year: 2007, Page(s):40 - 49
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2143 KB) | HTML iconHTML

    A simple theoretical multiagent model reasons about the criticality of terrorists and regions as terrorist interactions coevolve in geographical and social spaces. Social and spatial relations evolve over time. Estimating their evolutions is important for management, command and control structures, and intelligence analysis research. By knowing future agent social and spatial distributions, an ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Based Modeling of Ambidextrous Organizations: Virtualizing Competitive Strategy

    Publication Year: 2007, Page(s):50 - 57
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    Turbulence, uncertainty, dynamic processes, and networks increasingly characterize competitive markets and business strategies. Consequently, there's a need to model such markets and strategies as dynamic, evolutionary processes that is, as complex adaptive systems. Agent-based modeling, a rich platform for studying complex evolving systems, is used to model a market where ambidextrous and nonambi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Irrational Investors Survive? A Social-Computing Perspective

    Publication Year: 2007, Page(s):58 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    Standard financial theory includes a rigorous theoretical system for equilibrium asset pricing. Among the assumptions this system is founded on is the necessity of investors' homogeneity and rationality. The proposed agent-based model accounts for interactions between irrational and rational investors, expanding on existing work and offering hope for irrational-investor survival in artificial stoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Paradigm Shift in Social Computing: The ACP Approach

    Publication Year: 2007, Page(s):65 - 67
    Cited by:  Papers (88)
    Request permission for commercial reuse | PDF file iconPDF (193 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce

    Publication Year: 2007, Page(s):68 - 78
    Cited by:  Papers (78)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Collaborative filtering is one of the most widely adopted and successful recommendation approaches. Unlike approaches based on intrinsic consumer and product characteristics, CF characterizes consumers and products implicitly by their previous interactions. The simplest example is to recommend the most popular products to all consumers. Researchers are advancing CF technologies in such areas as al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexecution as a Paradigm for Replanning, Part 1

    Publication Year: 2007, Page(s):79 - 83
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    This is the first of two essays about planning and execution with ill-defined and conflicting goals. The concept of flexecution - flexible execution - goes beyond simply adapting a plan as needed in order to reach our goals. Rather, flexecution entails changing the goals themselves based on discoveries made during execution. In pursuing ill-defined goals, we must expect to revise and even replace ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Semantic Web Vision: Where Are We?

    Publication Year: 2007, Page(s):84 - 88
    Cited by:  Papers (62)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Semantic Web developers have adopted OWL to represent knowledge. OWL, or a language with similar theoretical foundations, will lead the way in the semantic exploration of the Web. Currently, Web-based standards are the preferred way to represent knowledge. Furthermore, respondents mainly use ontologies to allow both humans and computers to understand knowledge and domain models. Web 3.0 can bring ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Membership

    Publication Year: 2007, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (765 KB)
    Freely Available from IEEE
  • IEEE Intelligent Systems Subscription

    Publication Year: 2007, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (2189 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona