


default search action
25. IEA/AIE 2012: Dalian, China
- He Jiang, Wei Ding

, Moonis Ali, Xindong Wu:
Advanced Research in Applied Artificial Intelligence - 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2012, Dalian, China, June 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7345, Springer 2012, ISBN 978-3-642-31086-7
Section 1: Machine Learning Methods
- Qing He, Ye Duan

, Danyang Zhang:
Automatic Detailed Localization of Facial Features. 1-9 - Ozer Ozdikis, Pinar Senkul

, Siyamed S. Sinir:
Confidence-Based Incremental Classification for Objects with Limited Attributes in Vertical Search. 10-19 - Huaming Huang, Kishan Mehrotra, Chilukuri K. Mohan:

Algorithms for Detecting Outliers via Clustering and Ranks. 20-29 - Takuya Yoshimura, Yutaro Fujii, Takayuki Ito:

Grouping Co-occurrence Filtering Based on Bayesian Filtering. 30-39 - Chunsheng Yang, Yubin Yang, Jie Liu:

Model Fusion-Based Batch Learning with Application to Oil Spills Detection. 40-47 - Marzena Kryszkiewicz:

Efficient Determination of Binary Non-negative Vector Neighbors with Regard to Cosine Similarity. 48-57 - Katsutoshi Itoyama, Tetsuya Ogata

, Hiroshi G. Okuno
:
Automatic Chord Recognition Based on Probabilistic Integration of Acoustic Features, Bass Sounds, and Chord Transition. 58-67
Section 2: Cyber-Physical System for Intelligent Transportation Applications
- Hai-Guang Li, Zhao Li, Robert T. White, Xindong Wu:

A Real-Time Transportation Prediction System. 68-77 - Henry Z. Lo, Dan A. Simovici, Wei Ding

:
Several Remarks on Mining Frequent Trajectories in Graphs. 78-87 - Daiheng Ni, Hong Liu, Wei Ding

, Yuanchang Xie, Honggang Wang
, Hossein Pishro-Nik, Qian Yu:
Cyber-Physical Integration to Connect Vehicles for Transformed Transportation Safety and Efficiency. 88-94 - Tzu-Yang Yu, Christopher Niezrecki, Farhad Ansari:

Multi-modal Remote Sensing System for Transportation Infrastructure Inspection and Monitoring. 95-103
Section 3: AI Applications
- Axel Tidemann, Finn Olav Bjørnson, Agnar Aamodt

:
Operational Support in Fish Farming through Case-Based Reasoning. 104-113 - Yasser F. O. Mohammad

, Yoshimasa Ohmoto
, Toyoaki Nishida:
CPMD: A Matlab Toolbox for Change Point and Constrained Motif Discovery. 114-123 - Binu Muraleedharan Nair, Vijayan K. Asari:

Time Invariant Gesture Recognition by Modelling Body Posture Space. 124-133 - Xing Tan:

Go beyond the SCOPE: A Temporal Situation Calculus-Based Software Tool for Time Petri Nets. 134-143 - Xiaochen Lai, Quanli Liu, Wei Wang, Likun Li, Simin Lu, Di Wu:

An Algorithm of Channel Assignment of MAC Layer in Ad Hoc Network Based on Dynamic Game with Perfect and Complete Information. 144-155 - Dai Quoc Nguyen, Dat Quoc Nguyen, Son Bao Pham:

A Semantic Approach for Question Analysis. 156-165
Section 4: Evolutionary Algorithms, Combinatorial Optimization
- Peter Großmann, Steffen Hölldobler, Norbert Manthey, Karl Nachtigall, Jens Opitz, Peter Steinke:

Solving Periodic Event Scheduling Problems with SAT. 166-175 - Dan E. Tamir, Charles R. King, Mark McKenney:

Improving the Performance of Constructive Multi-Start Search Using Record-Keeping. 176-186 - Li Ma, Babak Forouraghi:

A Modified Particle Swarm Optimizer for Engineering Design. 187-196 - Karthik Nadig, William M. Potter, Walter D. Potter:

Homogeneous RF Coil Design Using a GA. 197-205 - Javier Pérez-Rodríguez

, Alexis G. Arroyo-Peña
, Nicolás García-Pedrajas:
A Comparative Study of Content Statistics of Coding Regions in an Evolutionary Computation Framework for Gene Prediction. 206-215 - My Ha Le, Andrey Vavilin

, Sung-Min Yang, Kang-Hyun Jo
:
Enhancing Point Clouds Accuracy of Small Baseline Images Based on Convex Optimization. 216-225 - He Jiang, Yan Hu:

Subset Quadratic Assignment Problem. 226-230
Section 5: Modeling and Support of Cognitive and Affective Human Processes
- Guanghua Song, Zhitang Li, Hao Tu:

Forward or Ignore: User Behavior Analysis and Prediction on Microblogging. 231-241 - Catholijn M. Jonker, M. Birna van Riemsdijk

, Iris van de Kieft, Maria L. Gini
:
Compositionality of Team Mental Models in Relation to Sharedness and Team Performance. 242-251
Section 6: Data Mining and Computational Intelligence for Digital Forensics and Information Assurance
- Ram B. Basnet, Andrew H. Sung, Qingzhong Liu

:
Feature Selection for Improved Phishing Detection. 252-261 - Qingzhong Liu

, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper, Zhongxue Chen
, Mengyu Qiao, Andrew H. Sung:
Identification of Smartphone-Image Source and Manipulation. 262-271 - Hyuk Cho, Deepthi Mandava, Qingzhong Liu

, Lei Chen, Sangoh Jeong, Doreen Cheng:
Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and Extensions. 272-282
Section 7: Natural Language Processing and Its Applications
- Mostafa Parchami, Bahareh Akhtar, Mirhossein Dezfoulian:

Persian Text Classification Based on K-NN Using Wordnet. 283-291 - Sina Lin, Zengchang Qin, Zehua Huang, Tao Wan:

An Efficient Minimum Vocabulary Construction Algorithm for Language Modeling. 292-301 - David Hinote, Carlos Ramírez, Ping Chen:

Effective Co-reference Resolution in Clinical Text. 302-312 - Hui-Ngo Goh, Lay-Ki Soon

, Su-Cheng Haw
:
VAHA: Verbs Associate with Human Activity - A Study on Fairy Tales. 313-322
Section 8: Social Network and Its Applications
- Elnaz Davoodi, Keivan Kianmehr:

A Semantic-Based Social Network of Academic Researchers. 323-332 - Zheng Chen, Lei Wu, Jiansong Zhang, Xuemei Hu, Yang Xu:

Heuristic Resource Discovery in P2P Network. 333-342
Section 9: Mission-Critical Applications and Case Studies of Intelligent Systems
- Yoshihiro Mitani, Yusuke Fujita, Naofumi Matsunaga, Yoshihiko Hamamoto:

The Use of a Local Histogram Feature Vector of Classifying Diffuse Lung Opacities in High-Resolution Computed Tomography. 343-350 - Zhiwen Yu, Hantao Chen, Jane You

, Le Li, Guoqiang Han:
SOM 2 CE: Double Self-Organizing Map Based Cluster Ensemble Framework and its Application in Cancer Gene Expression Profiles. 351-360 - Hao Wang, Qingwei Liu, Tangjian Deng, Ling Feng:

A Context-Aware Enterprise Search Engine for Aviation. 361-370 - Tibor Bosse, Nataliya M. Mogles:

Formal Analysis of Aviation Incidents. 371-380
Section 10: AI Methods
- Yasser F. O. Mohammad

, Yoshimasa Ohmoto
, Toyoaki Nishida:
Common Sensorimotor Representation for Self-initiated Imitation Learning. 381-390 - Frank Yeong-Sung Lin, Pei-Yu Chen, Quen-Ting Chen:

Near-Optimal Evaluation of Network Survivability under Multi-stage Attacks. 391-399 - Ricardo Soto

, Håkan Kjellerstrand, Juan Gutiérrez, Alexis López, Broderick Crawford
, Éric Monfroy:
Solving Manufacturing Cell Design Problems Using Constraint Programming. 400-406 - Wojciech A. Lorkiewicz, Grzegorz Skorupa, Radoslaw P. Katarzyniak

:
A Pragmatic Approach to Grounding Data Computation for Modal Statements. 407-416 - Yasser F. O. Mohammad

, Yoshimasa Ohmoto
, Toyoaki Nishida:
G-SteX: Greedy Stem Extension for Free-Length Constrained Motif Discovery. 417-426
Section 11: Sentiment Analysis for Asian Languages
- Cheng-Yu Lu, William W. Y. Hsu, Jan-Ming Ho:

Event-Level Textual Emotion Sensing Based on Common Action Distributions between Event Participants. 427-436 - Erik Cambria

, Amir Hussain
, Tariq S. Durrani, Jiajun Zhang:
Towards a Chinese Common and Common Sense Knowledge Base for Sentiment Analysis. 437-446 - Dipankar Das

, Sagnik Roy, Sivaji Bandyopadhyay:
Emotion Tracking on Blogs - A Case Study for Bengali. 447-456
Section 12: Aspects on Cognitive Computing and Intelligent Interaction
- Petr Sosnin

:
Pseudo-code Programming of Designer Activities in Development of Software Intensive Systems. 457-466 - Yutaka Watanobe, Lin Gu, Nikolay N. Mirenkov:

Intelligent Aspects of AIDA Programming. 467-476 - Roberto Revetria, Alessandro Catania A., Lucia Cassettari

, Guido Guizzi, Elpidio Romano
, Teresa Murino, Giovanni Improta
, Hamido Fujita
:
Improving Healthcare Using Cognitive Computing Based Software: An Application in Emergency Situation. 477-490 - Wojtek Kowalczyk, C. Natalie van der Wal

:
Detecting Changing Emotions in Natural Speech. 491-500 - Azizi Ab Aziz

, Jan Treur, C. Natalie van der Wal
:
An Ambient Agent Model for Support of Informal Caregivers during Stress. 501-513 - Kohei Sugawara, Hamido Fujita

:
Interruption Theory for Improving Work Efficiency by Reasoning Workflow. 514-520 - Mark Hoogendoorn, Robbert-Jan Merk:

Action Selection Using Theory of Mind: A Case Study in the Domain of Fighter Pilot Training. 521-533 - Alejandro Peña Ayala

, Riichiro Mizoguchi:
Intelligent Decision-Making Approach Based on Fuzzy-Causal Knowledge and Reasoning. 534-543
Section 13: Spatio-temporal Data Mining, Structured Learning and Their Applications
- Andrey Vavilin

, Le-My Ha, Kang-Hyun Jo
:
Camera Motion Estimation and Moving Object Detection Based on Local Feature Tracking. 544-552 - Dawei Wang, Wei Ding

, Tomasz F. Stepinski, Josue Salazar, Henry Z. Lo, Melissa Morabito:
Optimization of Criminal HotSpots Based on Underlying Crime Controlling Factors Using Geospatial Discriminative Pattern. 553-562 - Anthony Y. Chang:

Spatio-temporal Reasoning with Qualitative and Quantitative Information about Constraints and Approximations. 563-573
Section 14: Decision Making and Knowledge Based Systems
- Jan Treur

, Muhammad Umair
:
A Human-Like Agent Model for Attribution of Actions Using Ownership States and Inverse Mirroring. 574-585 - Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita

:
Fault Resolution Support Based on Activated Knowledge and Information. 586-595 - Harumi Murakami

, Kenta Mitsuhashi, Keita Senba:
Creating User's Knowledge Space from Various Information Usages to Support Human Recollection. 596-605
Section 15: Pattern Recognition
- Oliviu Matei

, Petrica C. Pop
, Honoriu Valean:
A Robust Approach to Digit Recognition in Noisy Environments. 606-615 - Bai-En Shie, Ji-Hong Cheng, Kun-Ta Chuang, Vincent S. Tseng:

A One-Phase Method for Mining High Utility Mobile Sequential Patterns in Mobile Commerce Environments. 616-626 - Jerzy Martyna:

The Use of Shapley Value to Power Allocation Games in Cognitive Radio Networks. 627-636 - Show-Jane Yen, Yue-Shi Lee

:
Mining Time-Gap Sequential Patterns. 637-646 - Chun-Ming Tsai:

Intelligent Post-processing via Bounding-Box-Based Morphological Operations for Moving Objects Detection. 647-657
Section 16: Agent Based Systems
- Tibor Bosse, Rianne van Lambalgen

, Peter-Paul van Maanen, Jan Treur
:
An Integrated Agent Model for Attention and Functional State. 658-668 - Jinwei Hu, Khaled M. Khan

, Yun Bai, Yan Zhang:
Tracking and Constraining Authorization Provenance. 669-678 - Hiroki Nakagawa, Akihiko Nagai, Takayuki Ito:

A Framework for Collaborative Business Development Based on Middle Agent Model. 679-688 - Xiaowei Zhao, Haoxiang Xia, Hong Yu, Linlin Tian:

Agents' Cooperation Based on Long-Term Reciprocal Altruism. 689-698 - Dai Quoc Nguyen, Dat Quoc Nguyen, Son Bao Pham:

A Vietnamese Text-Based Conversational Agent. 699-708
Section 17: Decision Making Techniques and Innovative Knowledge Management
- Yu-Chien Ko, Hamido Fujita

, Gwo-Hshiung Tzeng:
Using DRSA and Fuzzy Measure to Enlighten Policy Making for Enhancing National Competitiveness by WCY 2011. 709-719 - Chi-Yo Huang, Po-Yen Wang, Gwo-Hshiung Tzeng:

Evaluating Top Information Technology Firms in Standard and Poor's 500 Index by Using a Multiple Objective Programming Based Data Envelopment Analysis. 720-730 - Chi-Yo Huang, Ming-Jenn Wu, Yu-Wei Liu, Gwo-Hshiung Tzeng:

Using the DEMATEL Based Network Process and Structural Equation Modeling Methods for Deriving Factors Influencing the Acceptance of Smart Phone Operation Systems. 731-741 - Chia-Li Lin

:
Determine the Service Value Position for Package Tour Plan Based on a Novel MCDM Approach. 742-753
Section 18: Machine Learning Applications
- Ze-Huan Yuan, Lu Tong, Hao-Yi Zhou, Chen Bin, Jia-Ning Li:

Incremental 3D Reconstruction Using Bayesian Learning. 754-763 - Anis Yazidi, Ole-Christoffer Granmo

, B. John Oommen
:
A Stochastic Search on the Line-Based Solution to Discretized Estimation. 764-773 - Anis Yazidi, Ole-Christoffer Granmo

, B. John Oommen
, Morten Goodwin Olsen:
A Hierarchical Learning Scheme for Solving the Stochastic Point Location Problem. 774-783 - Xuan Zhang, Ole-Christoffer Granmo

, B. John Oommen
:
Discretized Bayesian Pursuit - A New Scheme for Reinforcement Learning. 784-793 - Xiaochen Lai, Kuanjiu Zhou, Likun Li, Lemin Tang, Yanshuang Yao, Liang Yu:

A Method of Software Defects Mining Based on Static Analysis. 794-807 - Hong Yu, Xianchao Zhang, Yuansheng Yang, Xiaowei Zhao, Lei Cai:

An Extended ISOMAP by Enhancing Similarity for Clustering. 808-815 - Yukang Jin, Tong Lu, Feng Su:

Movie Keyframe Retrieval Based on Cross-Media Correlation Detection and Context Model. 816-825

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














