Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

IEEE Intelligent Systems

Issue 5 • Sept.-Oct. 2014

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2404 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (481 KB)
    Freely Available from IEEE
  • From Artificial Intelligence to Cyborg Intelligence

    Publication Year: 2014, Page(s):2 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1176 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Network Evolution Model for Chinese Traditional Acquaintance Networks

    Publication Year: 2014, Page(s):5 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2111 KB) | HTML iconHTML

    The evolution model of Chinese traditional acquaintance relationship networks described in this article emphasizes individual heterogeneity and social culture. The model incorporates three distinct mechanisms that affect acquaintance network evolution and formation: heredity linking, variation linking, and similarity-based disconnection. The authors found that the degree distribution of Chinese tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?

    Publication Year: 2014, Page(s):14 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB) | HTML iconHTML

    Attack-defense models play an important role in the design of cybersecurity systems. Here, the authors review some traditional and prevailing attack-defense models along with their weaknesses. Then, they survey some recently proposed paradigm shifts to these models based on which more effective security strategies can be designed. Further, they provide some suggestions on how to adopt the new mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Intelligent Decision-Making Command and Control Agents: An Application to Air Defense

    Publication Year: 2014, Page(s):22 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4218 KB) | HTML iconHTML

    The article is halfway between agent technology and the mathematical reasoning needed to model tactical decision-making tasks. These models are applied to the air defense domain for command and control (C2). The article also addresses the issues related to evaluating agents, which are designed and implemented using the agent-programming paradigm. The agents are deployed in a simulated environment ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IEEE 1857 Standard: Empowering Smart Video Surveillance Systems

    Publication Year: 2014, Page(s):30 - 39
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3455 KB) | HTML iconHTML

    The IEEE 1857 Standard for Advanced Audio and Video Coding was released as IEEE 1857-2013 in June 2013. Despite consisting of several different groups, the most significant feature of IEEE 1857-2013 is its Surveillance Groups, which can not only achieve at least twice the coding efficiency on surveillance videos as H.264/AVC High Profile, but it's the most analysis-friendly video coding standard. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Word Association to Detect Multitopic Structures in Text Documents

    Publication Year: 2014, Page(s):40 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1249 KB) | HTML iconHTML

    A new method for detecting multitopic structures in text documents, called Associative Gravity, is based on a text-mining method entitled CIMAWA, which imitates the human ability of word association. Specifically, Associative Gravity utilizes word association to detect different topics in a text. The authors named it Associative Gravity because of its resemblance to the physical law of gravitation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society [Advertisement]

    Publication Year: 2014, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Characterizing the Evolution of Social Computing Research

    Publication Year: 2014, Page(s):48 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3828 KB) | HTML iconHTML

    With Web 2.0 advances, social computing has become an emerging research field in the past decade. This article analyzes the characteristics of social computing research from both static and dynamic perspectives. First, the authors present the overlapping relationships of content represented by keywords as of 2011. Next, they show the dynamics of social computing research through analyzing keyword ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Negotiation Game

    Publication Year: 2014, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1106 KB) | HTML iconHTML

    In this paper, the authors consider some of the main ideas underpinning attempts to build automated negotiators--computer programs that can effectively negotiate on our behalf. If we want to build programs that will negotiate on our behalf in some domain, then we must first define the negotiation domain and the negotiation protocol. Defining the negotiation domain simply means identifying the spac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Man versus Machine or Man + Machine?

    Publication Year: 2014, Page(s):62 - 69
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3915 KB) | HTML iconHTML

    Allocating roles and functions between the human and computer is critical in defining efficient and effective system architectures. However, past methodologies for balancing the roles and functionalities between humans and computers in complex systems have little connection to different types of required cognition, behaviors, or tasks, or don't address the role of uncertainty in the environment. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding AI and Crowdsourcing in the Big Data Lake

    Publication Year: 2014, Page(s):70 - 73
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB) | HTML iconHTML

    Daniel E. O'Leary examines the notion of the Big Data Lake and contrasts it with decision support-based data warehouses. In addition, some of the risks of the emerging Lake concept that ultimately require data governance are analyzed. O'Leary investigates using different AI and crowdsourcing (human intelligence) applications in that lake in order to integrate disparate data sources, facilitate mas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Efficient and Swarm Intelligence-Based Routing Protocol for Next-Generation Sensor Networks

    Publication Year: 2014, Page(s):74 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (879 KB) | HTML iconHTML

    After providing a brief overview of routing protocols for next-generation sensor networks (NGSNs), the authors propose Bee-Sensor-C, an energy-efficient, swarm intelligence-based, and scalable multipath routing protocol that integrates dynamic clustering, multipath routing, and bee-inspired routing to meet the performance requirements of NGSNs. A performance evaluation is also provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Transportation Systems 
  • Coordination Infrastructures for Future Smart Social Mobility Services

    Publication Year: 2014, Page(s):78 - 82
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1925 KB) | HTML iconHTML

    In this article, the authors introduce the vision of smart social mobility services, noting that widespread deployment will require the identification and implementation of a general-purpose coordination infrastructure to support the effective realization of such services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rock Stars of 3D Printing [Advertisement]

    Publication Year: 2014, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (1626 KB)
    Freely Available from IEEE
  • Computational Social Science for the World Wide Web

    Publication Year: 2014, Page(s):84 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (950 KB) | HTML iconHTML

    In this article, we want to introduce the field of computational social science to the intelligent systems community and discuss how this field can help to advance the current state of understanding and engineering social-computational systems on the World Wide Web. Overall, this article makes an argument that computational social science offers a unique range of challenges as well as methods and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2015 Richard E. Merwin Distinguished Service Award [call for award nominations]

    Publication Year: 2014, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (6473 KB)
    Freely Available from IEEE
  • Intelect [Advertisement]

    Publication Year: 2014, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1354 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona