|
Part I: Connectionist Paradigms and Machine Learning |
|
|
|
New Model for Time-series Forecasting using RBFS and Exogenous Data |
|
|
3 | (10) |
|
|
|
|
|
On Improving Data Fitting Procedure in Reservoir Operation using Artificial Neural Networks |
|
|
13 | (10) |
|
|
|
Automatic Vehicle License Plate Recognition using Artificial Neural Networks |
|
|
23 | (10) |
|
|
|
Weather Forecasting Models Using Ensembles of Neural Networks |
|
|
33 | (10) |
|
|
|
|
Neural Network Predictive Control Applied to Power System Stability |
|
|
43 | (10) |
|
|
Identification of Residues Involved in Protein-Protein Interaction from Amino Acid Sequence - A Support Vector Machine Approach |
|
|
53 | (10) |
|
|
|
|
From Short Term Memory to Semantics - a Computational Model |
|
|
63 | (14) |
|
|
|
Part II: Fuzzy Sets, Rough Sets and Approximate Reasoning |
|
|
|
Axiomatization of Qualitative Multicriteria Decision Making with the Sugeno Integral |
|
|
77 | (10) |
|
|
|
A Self-learning Fuzzy Inference for Truth Discovery Framework |
|
|
87 | (10) |
|
|
|
|
|
Exact Approximations for Rough Sets |
|
|
97 | (8) |
|
|
|
|
|
Correlation Coefficient Estimate for Fuzzy Data |
|
|
105 | (12) |
|
|
|
Part III: Agent Architectures and Distributed Intelligence |
|
|
|
A Framework for Multiagent-Based System for Intrusion Detection |
|
|
117 | (10) |
|
|
|
|
|
An Adaptive Platform Based Multi-Agents for Architecting Dependability |
|
|
127 | (10) |
|
|
|
|
Stochastic Distributed Algorithms for Target Surveillance |
|
|
137 | (12) |
|
|
|
|
|
|
What-if Planning for Military Logistics |
|
|
149 | (10) |
|
|
Effects of Reciprocal Social Exchanges on Trust and Autonomy |
|
|
159 | (14) |
|
|
|
Part IV: Intelligent Web Computing |
|
|
|
Real Time Graphical Chinese Chess Game Agents Based on the Client and Server Architecture |
|
|
173 | (10) |
|
|
|
|
|
DIMS: an XML-Based Information Integration Prototype Accessing Web Heterogeneous Sources |
|
|
183 | (10) |
|
|
|
|
A Frame-Work for High-Performance Web Mining in Dynamic Environments using Honeybee Search Strategies |
|
|
193 | (14) |
|
|
Part V: Internet Security |
|
|
|
Real-time Certificate Validation Service by Client's Selective Request |
|
|
207 | (12) |
|
|
|
|
|
Internet Attack Representation using a Hierarchical State Transition Graph |
|
|
219 | (10) |
|
|
|
|
A Secure Patch Distribution Architecture |
|
|
229 | (10) |
|
|
|
|
|
|
|
Intrusion Detection Using Ensemble of Soft Computing Paradigms |
|
|
239 | (12) |
|
|
|
|
Part VI: Data mining, Knowledge Management and Information Analysis |
|
|
|
NETMARK: Adding Hierarchical Object to Relational Databases |
|
|
251 | (12) |
|
|
|
Academic KDD Project LISp-Miner |
|
|
263 | (10) |
|
|
Performance Evaluation Metrics for Link Discovery Systems |
|
|
273 | (10) |
|
|
Generalizing Association Rules: A Theoretical Framework and Implementation |
|
|
283 | (10) |
|
|
|
New Geometric ICA Approach for Blind Separation of Sources |
|
|
293 | (10) |
|
|
|
|
|
|
|
A Taxonomy of Data Mining Applications Supporting Software Reuse |
|
|
303 | (10) |
|
|
|
Codifying the ``Know How'' Using CyKNIT Knowledge Integration Tools |
|
|
313 | (8) |
|
|
Data Mining Techniques in Materialised Projection View |
|
|
321 | (10) |
|
|
|
Data Mining Techniques in Index Techniques |
|
|
331 | (10) |
|
|
|
Decision Tree Induction from Distributed Heterogeneous Autonomous Data Sources |
|
|
341 | (12) |
|
|
|
|
Part VII: Computational Intelligence in Management |
|
|
|
Using IT To Assure a Culture For Success |
|
|
353 | (10) |
|
|
Gender Differences in Performance Feedback Utilizing an Expert System: A Replication and Extension |
|
|
363 | (10) |
|
|
|
|
|
Part VIII: Image Processing and Retrieval |
|
|
|
Image Database Query Using Shape-Based Boundary Descriptors |
|
|
373 | (10) |
|
|
|
|
Image Retrieval by Auto Weight Regulation PCA Algorithm |
|
|
383 | (10) |
|
|
|
Improving the Initial Image Retrieval Set by Inter-Query Learning with One-Class SVMs |
|
|
393 | (10) |
|
|
|
|
Tongue Image Analysis Software |
|
|
403 | (10) |
|
|
|
2 D Object Recognition Using the Hough Transform |
|
|
413 | (12) |
|
|
|
Part IX: Optimization, Scheduling and Heuristics |
|
|
|
Population Size Adaptation for Differential Evolution Algorithm Using Fuzzy Logic |
|
|
425 | (12) |
|
|
|
Intelligent Management of QoS Requirements for Perceptual Benefit |
|
|
437 | (10) |
|
|
|
|
Integrating Random Ordering into Multi-heuristic List Scheduling Genetic Algorithm |
|
|
447 | (12) |
|
|
|
|
Scheduling to be Competitive in Supply Chains |
|
|
459 | (10) |
|
|
|
Contract Net Protocol for Cooperative Optimisation and Dynamic Scheduling of Steel Production |
|
|
469 | (14) |
|
|
|
|
Part X: Special Session on Peer-to-Peer Computing |
|
|
|
A Peer-to-Peer System Architecture for Multi-Agent Collaboration |
|
|
483 | (10) |
|
|
A Soft Real-Time Agent-Based Peer-to-Peer Architecture |
|
|
493 | (10) |
|
|
|
Social Networks as a Coordination Technique for Multi-Robot Systems |
|
|
503 | (12) |
|
|
|
Biology-Inspired Approaches to Peer to Peer Computing in BISON |
|
|
515 | (8) |
|
|
|
UbAgent: A Mobile Agent Middleware Infrastructure for Ubiquitous/Pervasive Computing |
|
|
523 | (16) |
|
|
|
Part XI: 2003 International Workshop on Intelligence, Soft computing and the Web |
|
|
|
Enhanced Cluster Visualization Using the Data Skeleton Model |
|
|
539 | (10) |
|
|
|
|
Generating Concept Hierarchies for Categorical Attributes using Rough Entropy |
|
|
549 | (10) |
|
|
|
|
Learning from Hierarchical Attribute Values by Rough Sets |
|
|
559 | (10) |
|
|
|
|
|
Delivering Distributed Data Mining E-Services |
|
|
569 | (10) |
|
|
Maintenance of Discovered Functional Dependencies: Incremental Deletion |
|
|
579 | (10) |
|
|
|
|
|
Filtering Multilingual Web Content Using Fuzzy Logic |
|
|
589 | (10) |
|
|
|
A Comparison of Patient Classification Using Data Mining in Acute Health Care |
|
|
599 | (10) |
|
|
|
|
|
Criteria for a Comparative Study of Visualization Techniques in Data Mining |
|
|
609 | (12) |
|
|
|
Controlling the Spread of Dynamic Self Organising Maps |
|
|
621 | (10) |
|
Index of Contributors |
|
631 | |