Awarded Papers | |
Overview of Awarded Papers - The 20th Annual Conference of JSAI | p. 3 |
Translational Symmetry in Subsequence Time-Series Clustering | p. 5 |
Visualization of Contents Archive by Contour Map Representation | p. 19 |
Discussion Ontology: Knowledge Discovery from Human Activities in Meetings | p. 33 |
Predicting Types of Protein-Protein Interactions Using a Multiple-Instance Learning Model | p. 42 |
Lattice for Musical Structure and Its Arithmetics | p. 54 |
Viewlon: Visualizing Information on Semantic Sensor Network | p. 65 |
Cooperative Task Achievement System Between Humans and Robots Based on Stochastic Memory Model of Spatial Environment | p. 77 |
People Who Create Knowledge Sharing Communities | p. 88 |
Logic and Engineering of Natural Language Semantics | |
Logic and Engineering of Natural Language Semantics (LENLS) 3 | p. 101 |
A Dynamic Semantics of Intentional Identity | p. 103 |
Prolegomena to General-Imaging-Based Probabilistic Dynamic Epistemic Logic | p. 118 |
Logical Dynamics of Commands and Obligations | p. 133 |
On Factive Islands: Pragmatic Anomaly vs. Pragmatic Infelicity | p. 147 |
Aspects of the Indefiniteness Effect | p. 162 |
Interpreting Metaphors in a New Semantic Theory of Concept | p. 177 |
Covert Emotive Modality Is a Monster | p. 191 |
Conversational Implicatures Via General Pragmatic Pressures | p. 205 |
Dake-wa: Exhaustifying Assertions | p. 219 |
Unembedded 'Negative' Quantifiers | p. 232 |
Learning with Logics and Logics for Learning | |
The Fourth Workshop on Learning with Logics and Logics for Learning (LLLL2006) | p. 249 |
Consistency Conditions for Inductive Inference of Recursive Functions | p. 251 |
Inferability of Closed Set Systems from Positive Data | p. 265 |
An Extended Branch and Bound Search Algorithm for Finding Top-N Formal Concepts of Documents | p. 276 |
N-Gram Analysis Based on Zero-Suppressed BDDs | p. 289 |
Risk Mining | |
Risk Mining - Overview | p. 303 |
Analysis on a Relation Between Enterprise Profit and Financial State by Using Data Mining Techniques | p. 305 |
Unusual Condition Detection of Bearing Vibration in Hydroelectric Power Plants for Risk Management | p. 317 |
Structural Health Assessing by Interactive Data Mining Approach in Nuclear Power Plant | p. 332 |
Developing Mining-Grid Centric e-Finance Portals for Risk Management | p. 346 |
Knowledge Discovery from Click Stream Data and Effective Site Management | p. 360 |
Sampling-Based Stream Mining for Network Risk Management | p. 374 |
Relation Between Abductive and Inductive Types of Nursing Risk Management | p. 387 |
Author Index | p. 401 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.