By Topic

IEEE Expert

Issue 6 • Nov.-Dec. 1997

Filter Results

Displaying Results 1 - 12 of 12
  • Banter on Bayes: debating the usefulness of Bayesian approaches to solving practical problems

    Publication Year: 1997, Page(s):18 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB)

    We consider the status of Bayesian statistical methods for the analysis of complex real-world problems. Most AI problems require a method for representing uncertainty. Currently, there is intense interest in the use of Bayesian reasoning, Bayesian belief networks, and other Bayesian methods for the modeling of uncertainty in many avenues of AI research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dictating this article to my computer: automatic speech recognition is coming of age

    Publication Year: 1997, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Automatic speech recognition technology is following the price-performance curve of much computing technology, namely, increasing functionality at decreasing price. When it also incorporates grammar and composition rules and, ultimately, natural language processing, we will see SUIs (speech-based user interfaces) overtaking GUIs, and conversational interfaces will be the standard. The author discu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PalmPilot and the handheld revolution

    Publication Year: 1997, Page(s):6 - 8
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    With many failed and still-failing efforts, handheld computation has been taking a long time to arrive. However, the unquestionable success of 3Com's PalmPilot heralds the start of a revolution in computation. The author discusses the many guises of portable computers and considers the reasons for Pilot's success. He discusses three enabling technologies: wireless networking, Global Positioning Sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizational modeling in CommonKADS: the emergency medical service

    Publication Year: 1997, Page(s):46 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Analysis-oriented modeling can help identify possible solutions to organizational problems. It also aids investigation of the impacts of and organizational support for these solutions, which helps identify the most feasible solution. We look at the problem of adequately equipping an emergency medical service to diagnose and treat heart attacks. This project required building a knowledge-based syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • No Bayesians in foxholes

    Publication Year: 1997, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    In World War II, there was a saying, “there are no atheists in foxholes.” The implication was that on the front lines and under pressure, soldiers needed someone to pray to. The implication in my title is that when big, real, tough problems need to be solved, there are no Bayesians. For decades, the pages of various statistical journals have been littered with theological arguments on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced password authentication through fuzzy logic

    Publication Year: 1997, Page(s):38 - 45
    Cited by:  Papers (33)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The authors have developed a software methodology that improves security by using typing biometrics to reinforce password authentication mechanisms. Typing biometrics is the analysis of a user's keystroke patterns. Each user has a unique way of using the keyboard to enter a password; for example, each user types the characters that constitute the password at different speeds. The methodology emplo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a composite syntax for expert system shells

    Publication Year: 1997, Page(s):60 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    The authors examine the syntactic similarities and differences of five expert system shell production-rule languages. To help knowledge engineers manage information, they develop a composite production-rule syntax that provides a common language for defining production rules. The expert system shells are the: Integrated Reasoning Shell (TIRS); Expert System Environment (ESE), KnowledgeTool; Knowle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based diagnosis for automotive repair

    Publication Year: 1997, Page(s):33 - 37
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The Integrated Diagnostic Expert Assistant system, used in 1,500 Fiat/Lancia/Alfa Romeo repair centers throughout Italy, helps diagnose faults in a variety of automotive electronic subsystems. The authors describe their experience in developing this system and compare the development of knowledge bases for a model-based system and a heuristic one View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three observations that changed my life [artificial intelligence]

    Publication Year: 1997, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    Exactly whose childhood do I remember? Why is it that splashes leave only ripples? Could I copy myself into a computer? These three questions have, over the years, shaped my perception of the universe, of science, and above all of artificial intelligence. The first is a question about materialism, the second about persistence, and the third about simulation. My attempts to answer them have brought... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating AI applications in an energy management system

    Publication Year: 1997, Page(s):53 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    To effectively integrate expert system applications in an energy management system, the authors created an environment that supports all the interfaces between the AI applications and the EMS. This environment also maintains a model of the power system common to all the AI applications. With this environment in place, users can easily plug AI applications into the EMS. The authors have designed an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian in principle, but not always in practice

    Publication Year: 1997, Page(s):24 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    Before considering the whys and wherefores of Bayesian reasoning in practice, the author considers the different uses of the term and the role that Bayesian reasoning should play for the scientific community. Probabilistic reasoning or modeling, together with its partner, decision theory, is a key theoretical tool for addressing uncertainty in intelligent systems of all kinds. Probabilistic reason... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using software agents to generate VLSI layouts

    Publication Year: 1997, Page(s):26 - 32
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Software agents can provide flexibility and scalability in a client-server architecture. To demonstrate how agents can aid layout generation, the authors created Agents, a scalable distributed system that generates full-custom digital and mixed-signal VLSI layouts implemented in CMOS or BiCMOS technologies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This Periodical ceased production in 1997. The current retitled publication is IEEE Intelligent Systems.

Full Aims & Scope