IEEE Intelligent Systems

Issue 4 • July-Aug. 2008

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (1004 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008
    Request permission for commercial reuse | |PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • Why It Matters

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | |PDF file iconPDF (537 KB) | HTML iconHTML
    Freely Available from IEEE
  • In the News

    Publication Year: 2008, Page(s):4 - 7
    Request permission for commercial reuse | |PDF file iconPDF (550 KB) | HTML iconHTML
    Freely Available from IEEE
  • Joseph Weizenbaum (1923–2008)

    Publication Year: 2008, Page(s):8 - 9
    Request permission for commercial reuse | |PDF file iconPDF (211 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Most Cited Intelligent Systems Articles

    Publication Year: 2008, Page(s):10 - 13
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (109 KB) | HTML iconHTML Multimedia Media

    In a study of its most cited articles, IEEE Intelligent Systems achieved an H-Index rating of 30 using citation information from ISI's Web of Knowledge and Google Scholar. The author also found that computer science departments' H-Index is strongly related to their ranking in Newsweek's computer science department ranking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cassandra or False Prophet of Doom: AI Robots and War

    Publication Year: 2008, Page(s):14 - 17
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1842 KB) | HTML iconHTML

    The US military currently deploys more than 4,000 ground robots in Iraq. Most are for bomb disposal but some are armed. In addition to the robots, semi-autonomous unmanned air vehicles come equipped with hellfire missiles. For now, all these systems employ a human-in-the-loop for the application of lethal force. But this is set to change. In the near- to mid-term future, the military might allow a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational Cultural Dynamics

    Publication Year: 2008, Page(s):18 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (607 KB) | HTML iconHTML

    Computational cultural dynamics blends the behavioral and social sciences - fields such as political science, psychology, journalism, anthropology, and sociology - with technological fields such as computer science, computational linguistics, game theory, statistical modeling, and operations research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Modeling as an Interdisciplinary Research Practice

    Publication Year: 2008, Page(s):20 - 27
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1073 KB) | HTML iconHTML

    Social modeling applies computational methods and techniques to the analysis of social processes and human behavior. It's expected to provide conceptual and technological tools for supporting analysis and decision making in areas related to national and public security, political stability, law and order, and sociocultural changes. Modeling social and cultural processes must draw on the knowledge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computational Approach to Etiquette: Operationalizing Brown and Levinson's Politeness Model

    Publication Year: 2008, Page(s):28 - 35
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (203 KB) | HTML iconHTML

    A central source of cultural differences is the communication of politeness, which can powerfully affect perception and behavior. Our computational adaptation of a universal theory of human politeness (from Brown and Levinson, 1987) combines culture-specific aspects of social context to generate expectations, score, interpret and recommend polite and impolite behaviors. Tests show this approach co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Dynamic Multiscale Social Processes in Agent-Based Models

    Publication Year: 2008, Page(s):36 - 42
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (231 KB) | HTML iconHTML

    Identity-related issues play central roles in many current events, including those involving factional politics, sectarianism, and tribal conflicts. Two popular models from the computational-social-science (CSS) literature - the threat anticipation program and SharedID models - incorporate notions of identity (individual and collective) and processes of identity formation. A multiscale conceptual ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AVA: Adjective-Verb-Adverb Combinations for Sentiment Analysis

    Publication Year: 2008, Page(s):43 - 50
    Cited by:  Papers (46)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (332 KB) | HTML iconHTML

    Most research on determining the strength of subjective expressions in a sentence or document uses single, specific parts of speech such as adjectives, adverbs, or verbs. To date, almost no research covers the development of a single comprehensive framework in which we can analyze sentiment that takes all three into account. The authors propose the AVA (adjective verb adverb) framework for identif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior

    Publication Year: 2008, Page(s):51 - 57
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (593 KB) | HTML iconHTML

    A proposed framework for predicting a group's behavior associates two vectors with that group. The context vector tracks aspects of the environment in which the group functions; the action vector tracks the group's previous actions. Given a set of past behaviors consisting of a pair of these vectors and given a query context vector, the goal is to predict the associated action vector. To achieve t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Culture, Models, and Games: Incorporating Warfare's Human Dimension

    Publication Year: 2008, Page(s):58 - 61
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (385 KB) | HTML iconHTML

    Increasingly, modern conflict and military activity require soldiers to carry out their missions within foreign cultures in which the civilian populace rather than a battlefield becomes the focal point. So, from the commander to the soldier on the street, the warfighter must understand the society's values and the motivations of the groups within it. Gaming can help the military train soldiers for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral Inference across Cultures: Using Telephones as a Cultural Lens

    Publication Year: 2008, Page(s):62 - 64
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (100 KB) | HTML iconHTML

    Most people carry mobile telephones, which automatically capture behavioral data and store it in service provider databases around the world. The different types of captured data can provide insight into human cultures. Examples from various cultures and hundreds of millions of individuals illustrate how phones can serve as a cultural lens, improving our understanding of social networks, outlier e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interorganizational Knowledge Exchanges

    Publication Year: 2008, Page(s):65 - 74
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1709 KB) | HTML iconHTML

    The INKASS (intelligent knowledge assets sharing and trading) knowledge exchange system couples case-based reasoning with ontologies to assist match-making between knowledge offers and knowledge demands in an interorganizational context. A tool suite lets system administrators maintain and improve the knowledge exchange. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case-Based Plan Adaptation: An Analysis and Review

    Publication Year: 2008, Page(s):75 - 81
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (550 KB) | HTML iconHTML

    Case-based planning (CBP) is a problem-solving method that uses a library of cases, where a case associates a past problem and goal description with a plan that solves the problem by achieving the goal. Given a new problem, CBP systems retrieve one or more cases that solve similar problems and adapt the retrieved cases' plans to achieve the new goal. Case retrieval involves intelligent search of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is a Semantic Web Agent a Knowledge-Savvy Agent?

    Publication Year: 2008, Page(s):82 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (591 KB) | HTML iconHTML

    The issue of knowledge sharing has permeated the field of distributed AI and, in particular, its successor, multiagent systems. Through the years, many research and engineering efforts have tackled the problem of encoding and sharing knowledge without the need for a single, centralized knowledge base. The proposed solutions to this problem are based, more or less, on stringent assumptions, such as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Artificial Emergency-Logistics-Planning System for Severe Disasters

    Publication Year: 2008, Page(s):86 - 88
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (271 KB) | HTML iconHTML

    To help government and disaster relief organizations prepare for and manage severe disasters, the authors propose the artificial emergency-logistics-planning system (Aelps). Aelps, which is based on artificial-society theory, concurrently considers different subsystems dealing with weather, geology, epidemics, and so on. Aelps can form the basis of a complex computational platform that generates l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Intelligent Systems Call for Papers: Special Issue on AI and Cultural Heritage

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | |PDF file iconPDF (633 KB)
    Freely Available from IEEE
  • IEEE Intelligent Systems 2008 Editorial Calendar

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (1399 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona