Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

IEEE Intelligent Systems

Issue 6 • Nov.-Dec. 2015

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1426 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (298 KB)
    Freely Available from IEEE
  • Policy Informatics for Smart Policy-Making

    Publication Year: 2015, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (522 KB) | HTML iconHTML
    Freely Available from IEEE
  • Nonoccurring Behavior Analytics: A New Area

    Publication Year: 2015, Page(s):4 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Nonoccurring behaviors (NOBs) refer to those behaviors that should happen but do not take place for some reasons. They are widely seen in online, business, government, health, medical, scientific, and social data and applications. Very limited research has been undertaken to explore such behaviors owing to their invisibility and the significant challenges in analyzing NOBs. This article outlines t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Informatics: From Methodology to Applications

    Publication Year: 2015, Page(s):12 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4532 KB) | HTML iconHTML

    This installment of Trends & Controversies provides an array of perspectives on the latest research in system informatics. Kang Zhao, Yao Xie, and Kwok-Leung Tsui introduce the work in "System Informatics: From Methodology to Applications." On the methodology side, in "Projection-Based Process Monitoring and Empirical Divergence," Wenpo Huang, Wei Jiang, Qingmin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Projection of RFID-Obtained Product Information on a Retail Stores Indoor Panoramas

    Publication Year: 2015, Page(s):30 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3821 KB) | HTML iconHTML

    RFID can be used to obtain information about objects present in a physical space, including their approximate location. Handheld RFID readers, smart shelves, zenithal antennas, and autonomous robots can obtain additional information with varying time and space resolutions. The authors present a system that projects this information on a panoramic view of a retail store, allowing users to virtually... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noninvasive and Continuous Blood Pressure Monitoring Using Wearable Body Sensor Networks

    Publication Year: 2015, Page(s):38 - 48
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3649 KB) | HTML iconHTML

    Hypertension is a major health risk that influences the quality of life for many people. The importance of monitoring hypertension in a continuous and noninvasive manner increases as more people experience raised blood pressure (BP). The authors present a smartphone-centric body sensor network to measure the pulse transit time (PTT) in real time. Their robust method for calculating BP uses PPT inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society [Advertisement]

    Publication Year: 2015, Page(s): 49
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • A Boundary Assembling Method for Chinese Entity-Mention Recognition

    Publication Year: 2015, Page(s):50 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1527 KB) | HTML iconHTML

    A boundary assembling (BA) method is presented for Chinese entity-mention recognition. Given a sentence, instead of recognizing entity mentions in a unitary style, the authors' BA method first detects boundaries of entity mentions and then assembles detected boundaries into entity-mention candidates. Each candidate is further assessed by a classifier trained on nonlocal features. This method can m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Get the Recognition You Deserve [Advertisement]

    Publication Year: 2015, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (1113 KB)
    Freely Available from IEEE
  • Extended Conflict-Based Search for the Convoy Movement Problem

    Publication Year: 2015, Page(s):60 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (926 KB) | HTML iconHTML

    The Convoy Movement Problem (CMP) is a common military scenario that requires a clash-free plan for moving large convoys from one location to another with constraints on time and space. This article proposes a distributed agent-based approach for CMP that meets most on-field deployment constraints. The solution is based on a multi-agent path-finding algorithm called conflict-based search (CBS) for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keep Your Career Moving Forward [Advertisement]

    Publication Year: 2015, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Strategic Threat Probabilities with Hierarchical Spatiotemporal Predictions

    Publication Year: 2015, Page(s):72 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (983 KB) | HTML iconHTML

    After many years involved in unconventional warfare and an increase in fiscal constraints, quantitative support for decision making is more important today than in the past. Decisions focused on risk and strategic objectives are critical for changing how we approach the global terrorism threat. This article examines a framework for threat likelihood prediction models based on the underlying patter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers: Advances of multimedia big data on the cloud

    Publication Year: 2015, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Principles for Interaction Design, Part 3: Spanning the Creativity Gap

    Publication Year: 2015, Page(s):82 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2072 KB) | HTML iconHTML

    The various responsibilities in intelligent systems design--responsibilities to acquire certain knowledge and skills--suggest strongly that effective interaction design is inherently interdisciplinary. As a consequence, gaps in knowledge acquisition and creativity on the part of design teams are bound to emerge as long as responsibilities are abrogated because they are tied to roles (such as cogni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data and Privacy: Emerging Issues

    Publication Year: 2015, Page(s):92 - 96
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The goals of big data and privacy are fundamentally opposed to each other. Big data and knowledge discovery are aimed reducing information asymmetries between organizations and the data sources, whereas privacy is aimed at maintaining information asymmetries of data sources. A number of different definitions of privacy are used to investigate some of the tensions between different characteristics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Take the CS Library Wherever You Go! [Advertisement]

    Publication Year: 2015, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (3135 KB)
    Freely Available from IEEE
  • IEEE Cloud Computing Call for Papers

    Publication Year: 2015, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (549 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona