Connectionist paradigms and Machine Learning | |
New Model for Time-series Forecasting using RBFS and Exogenous Data | p. 3 |
On Improving Data Fitting Procedure in Reservoir Operation using Artificial Neural Networks | p. 13 |
Automatic Vehicle License Plate Recognition using Artificial Neural Networks | p. 23 |
Weather Forecasting Models Using Ensembles of Neural Networks | p. 33 |
Neural Network Predictive Control Applied to Power System Stability | p. 43 |
Identification of Residues Involved in Protein-Protein Interaction from Amino Acid Sequence - A Support Vector Machine Approach | p. 53 |
From Short Term Memory to Semantics - a Computational Model | p. 63 |
Fuzzy Sets, Rough Sets and Approximate Reasoning | |
Axiomatization of Qualitative Multicriteria Decision Making with the Sugeno Integral | p. 77 |
A Self-learning Fuzzy Inference for Truth Discovery Framework | p. 87 |
Exact Approximations for Rough Sets | p. 97 |
Correlation Coefficient Estimate for Fuzzy Data | p. 105 |
Agent Architectures and Distributed Intelligence | |
A Framework for Multiagent-Based System for Intrusion Detection | p. 117 |
An Adaptive Platform Based Multi-Agents for Architecting Dependability | p. 127 |
Stochastic Distributed Algorithms for Target Surveillance | p. 137 |
What-if Planning for Military Logistics | p. 149 |
Effects of Reciprocal Social Exchanges on Trust and Autonomy | p. 159 |
Intelligent Web Computing | |
Real Time Graphical Chinese Chess Game Agents Based on the Client and Server Architecture | p. 173 |
DIMS: an XML-Based Information Integration Prototype Accessing Web Heterogeneous Sources | p. 183 |
A Frame-Work for High-Performance Web Mining in Dynamic Environments using Honeybee Search Strategies | p. 193 |
Internet Security | |
Real-time Certificate Validation Service by Client's Selective Request | p. 207 |
Internet Attack Representation using a Hierarchical State Transition Graph | p. 219 |
A Secure Patch Distribution Architecture | p. 229 |
Intrusion Detection Using Ensemble of Soft Computing Paradigms | p. 239 |
Data mining, Knowledge Management and Information Analysis | |
NETMARK: Adding Hierarchical Object to Relational Databases | p. 251 |
Academic KDD Project LISp-Miner | p. 263 |
Performance Evaluation Metrics for Link Discovery Systems | p. 273 |
Generalizing Association Rules: A Theoretical Framework and Implementation | p. 283 |
New Geometric ICA Approach for Blind Separation of Sources | p. 293 |
A Taxonomy of Data Mining Applications Supporting Software Reuse | p. 303 |
Codifying the ""Know How"" Using CyKNIT Knowledge Integration Tools | p. 313 |
Data Mining Techniques in Materialised Projection View | p. 321 |
Data Mining Techniques in Index Techniques | p. 331 |
Decision Tree Induction from Distributed Heterogeneous Autonomous Data Sources | p. 341 |
Computational Intelligence in Management | |
Using IT To Assure a Culture For Success | p. 353 |
Gender Differences in Performance Feedback Utilizing an Expert System: A Replication and Extension | p. 363 |
Image Processing and Retrieval | |
Image Database Query Using Shape-Based Boundary Descriptors | p. 373 |
Image Retrieval by Auto Weight Regulation PCA Algorithm | p. 383 |
Improving the Initial Image Retrieval Set by Inter-Query Learning with One-Class SVMs | p. 393 |
Tongue Image Analysis Software | p. 403 |
2 D Object Recognition Using the Hough Transform | p. 413 |
Optimization, Scheduling and Heuristics | |
Population Size Adaptation for Differential Evolution Algorithm Using Fuzzy Logic | p. 425 |
Intelligent Management of QoS Requirements for Perceptual Benefit | p. 437 |
Integrating Random Ordering into Multi-heuristic List Scheduling Genetic Algorithm | p. 447 |
Scheduling to be Competitive in Supply Chains | p. 459 |
Contract Net Protocol for Cooperative Optimisation and Dynamic Scheduling of Steel Production | p. 469 |
Special Session on Peer-to-Peer Computing | |
A Peer-to-Peer System Architecture for Multi-Agent Collaboration | p. 483 |
A Soft Real-Time Agent-Based Peer-to-Peer Architecture | p. 493 |
Social Networks as a Coordination Technique for Multi-Robot Systems | p. 503 |
Biology-Inspired Approaches to Peer to Peer Computing in BISON | p. 515 |
UbAgent: A Mobile Agent Middleware Infrastructure for Ubiquitous/Pervasive Computing | p. 523 |
2003 International Workshop on Intelligence, Soft computing and the Web | |
Enhanced Cluster Visualization Using the Data Skeleton Model | p. 539 |
Generating Concept Hierarchies for Categorical Attributes using Rough Entropy | p. 549 |
Learning from Hierarchical Attribute Values by Rough Sets | p. 559 |
Delivering Distributed Data Mining E-Services | p. 569 |
Maintenance of Discovered Functional Dependencies: Incremental Deletion | p. 579 |
Filtering Multilingual Web Content Using Fuzzy Logic | p. 589 |
A Comparison of Patient Classification Using Data Mining in Acute Health Care | p. 599 |
Criteria for a Comparative Study of Visualization Techniques in Data Mining | p. 609 |
Controlling the Spread of Dynamic Self Organising Maps | p. 621 |
Index of Contributors | p. 631 |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.