IEEE Intelligent Systems

Issue 1 • Jan.-Feb. 2016

Filter Results

Displaying Results 1 - 18 of 18
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (2154 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):c2 - 1
    Request permission for commercial reuse | |PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Online Behavioral Analysis and Modeling [Guest Editorial]

    Publication Year: 2016, Page(s):2 - 4
    Request permission for commercial reuse | |PDF file iconPDF (2439 KB) | HTML iconHTML
    Freely Available from IEEE
  • Online Behavioral Analysis 
  • Topic-Aware Physical Activity Propagation in a Health Social Network

    Publication Year: 2016, Page(s):5 - 14
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2637 KB) | HTML iconHTML

    Modeling physical activity propagation, such as physical exercise level and intensity, is the key to preventing the conduct that can lead to obesity and to spreading wellness and healthy behavior in a social network. The authors introduce a model for Topic-aware Community-level Physical Activity Propagation (TaCPP) to analyze physical activity propagation and social influence at different granular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point-of-Interest Recommendations via a Supervised Random Walk Algorithm

    Publication Year: 2016, Page(s):15 - 23
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1143 KB) | HTML iconHTML

    Recently, location-based social networks (LBSNs) such as Foursquare and Whrrl have emerged as a new application for users to establish personal social networks and review various points of interest (POIs), triggering a new recommendation service aimed at helping users locate more preferred POIs. Although users' check-in activities could be explicitly considered as user ratings, in turn being utili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Agent-Based Behavior Induction in Social Networks

    Publication Year: 2016, Page(s):24 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1361 KB) | HTML iconHTML

    The essence of social networks is that they can influence people's public opinions and group behaviors form quickly. Negative group behavior influences societal stability significantly, but existing behavior-induction approaches are too simple and inefficient. To automatically and efficiently induct behavior in social networks, this article introduces trust agents and designs their features accord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suspicious Behavior Detection: Current Trends and Future Directions

    Publication Year: 2016, Page(s):31 - 39
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1244 KB) | HTML iconHTML

    Different real-world applications have varying definitions of suspicious behaviors. Detection methods often look for the most suspicious parts of the data by optimizing scores, but quantifying the suspiciousness of a behavioral pattern is still an open issue. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Multi-Scale Computing Systems

    Publication Year: 2016, Page(s): 40
    Request permission for commercial reuse | |PDF file iconPDF (632 KB)
    Freely Available from IEEE
  • Sentiment Analysis 
  • Contextual Sentiment Topic Model for Adaptive Social Emotion Classification

    Publication Year: 2016, Page(s):41 - 47
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (629 KB) | HTML iconHTML

    Social emotion classification is important for numerous applications, such as public opinion measurement, corporate reputation estimation, and customer preference analysis. However, topics that evoke a certain emotion in the general public are often context-sensitive, making it difficult to train a universal classifier for all collections. A multilabeled sentiment topic model, namely, the contextu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security 
  • Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario

    Publication Year: 2016, Page(s):48 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (531 KB) | HTML iconHTML

    Reputation mechanism effectiveness generally improves with certification, but it isn't clear when such mechanisms increase individual gain. Assessing the use of certified reputation in the context of competitive agents could offer a solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Future of AI 
  • AI's 10 to Watch

    Publication Year: 2016, Page(s):56 - 66
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4678 KB) | HTML iconHTML

    IEEE Intelligent Systems once again selected 10 young AI scientists as " AI's 10 to Watch." This acknowledgment and celebration not only recognizes these young scientists and makes a positive impact in their academic career but also promotes the community and cutting-edge AI research among next-generation AI researchers, the industry, and the general public alike. The contributions a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society

    Publication Year: 2016, Page(s): 67
    Request permission for commercial reuse | |PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Intelligent Transportation Systems 
  • An Assignment-Based Approach to Efficient Real-Time City-Scale Taxi Dispatching

    Publication Year: 2016, Page(s):68 - 77
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (6768 KB) | HTML iconHTML

    This study proposes and evaluates an efficient real-time taxi dispatching strategy that solves the linear assignment problem to find a globally optimal taxi-to-request assignment at each decision epoch. The authors compare the assignment-based strategy with two popular rule-based strategies. They evaluate dispatching strategies in detail in the city of Berlin and the neighboring region of Brandenb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human-Centered Computing 
  • To Know or Not to Know, What Is the Need?

    Publication Year: 2016, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2035 KB) | HTML iconHTML

    There are indications that the traditional "need to know" principle must be adapted to current circumstance. This essay discusses a "New Need to Know" principle and proposes two possible mechanisms for advancing the nation"s capability to develop intelligent systems for cyber defense. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Cloud Computing Call for Papers

    Publication Year: 2016, Page(s): 83
    Request permission for commercial reuse | |PDF file iconPDF (550 KB)
    Freely Available from IEEE
  • Predictive Analytics 
  • Prediction Using Propagation: From Flu Trends to Cybersecurity

    Publication Year: 2016, Page(s):84 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1491 KB) | HTML iconHTML

    This article discusses two applications of propagation-based concepts for predictive analytics: marrying epidemiological models with statistical topic models to tease out user phases for better flu-trends prediction, and using propagation-based models to generatively model estimates of malware attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Big Data

    Publication Year: 2016, Page(s): c3
    Request permission for commercial reuse | |PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • Keep Your Career Moving Forward

    Publication Year: 2016, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (69 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona