ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (21)
  • Articles  (82,713)
  • 2010-2014  (21,365)
  • 2005-2009
  • 1995-1999  (23,408)
  • 1980-1984  (15,700)
  • 1975-1979  (17,778)
  • 1960-1964
  • 1935-1939  (2,303)
  • 1930-1934
  • 1925-1929  (2,180)
  • 2014  (21,365)
  • 1997  (10,815)
  • 1995  (12,593)
  • 1984  (7,888)
  • 1983  (7,812)
  • 1978  (7,296)
  • 1977  (5,107)
  • 1975  (5,375)
  • 1938  (2,303)
  • 1925  (2,180)
  • Computer Science  (74,437)
  • History  (8,297)
Collection
  • Books  (21)
  • Articles  (82,713)
Language
Years
  • 2010-2014  (21,365)
  • 2005-2009
  • 1995-1999  (23,408)
  • 1980-1984  (15,700)
  • 1975-1979  (17,778)
  • +
Year
  • 1
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Computer Science ; Programming Techniques
    Description / Table of Contents: The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices, such as Samsung, Lenovo, and Asus. The increase in Android devices featuring Intel processors has created a demand for Android applications optimized for Intel Architecture: Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform—including for smartphones, tablets, and embedded devices—covering performance tuning, debugging and optimization. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University
    Pages: Online-Ressource (XX, 520 pages) , 278 illustrations
    ISBN: 9781484201008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Description / Table of Contents: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Pages: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations
    Pages: Online-Ressource (XXIV, 300 pages) , 74 illustrations
    ISBN: 9781430264972
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Pages: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    Amsterdam ; New York : Elsevier Science
    Keywords: DDC 512.9/42 ; LC QA214 ; Equations, Simultaneous - Numerical solutions ; Iterative methods (Mathematics)
    Pages: Online-Ressource (vii, 400 pages)
    ISBN: 9780444827777
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: DDC 512/.72 ; LC QA242 ; Algebras, Linear ; Euclidean algorithm ; Orthogonal polynomials ; Pade´ approximant
    Pages: Online-Ressource (xvii, 446 pages)
    ISBN: 9780444828729
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Bonn : Galileo Press
    Keywords: Windows Server 2012 R2 ; Hyper-V ; Active Directory ; Remotedesktopdienste ; Webserver IIS ; Netzwerkprotokolle ; Kerberos-Authentifizierung
    Description / Table of Contents: Das lösungsorientierte und umfassende Buch zum Windows Server 2012 R2 mit zahlreichen fundierten Hintergrundinformationen. Der Autor Ulrich B. Boddenberg greift bei der Beschreibung des Servers auf seine praktischen Erfahrungen in zahlreichen Projekten bei mittleren und großen Kunden zurück. Denn ein modernes Betriebssystem wie Windows Server 2012 R2 bietet weit mehr als nur die Möglichkeit, Programme auszuführen. Er beschreibt alle zentralen Technologien wie die Virtualisierung mit Hyper-V V3, Active Directory, Remotedesktopdienste, den Webserver IIS sowie SharePoint. Neben diesen konkreten Technologien geht es auch um Grundlagen wie Netzwerkprotokolle, Kerberos-Authentifizierung oder die eingesetzte Hardware. Zentrale Aspekte wie Performance, Verfügbarkeit und Sicherheit ziehen sich durch das gesamte Buch.
    Pages: Online-Ressource (1392 Seiten)
    Edition: 4., akt. Aufl.
    ISBN: 9783836220132
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Keywords: 3D Surface Reconstruction - Bildanalyse - Bildverarbeitung - Bildverarbeitungsanwenungen - Closing - Computer Vision ; Mustererkennung ; Triangulation ; digital elevation model ; genetic algorithms ; hidden Markov Model ; image analysis ; model ; rendering ; robot
    Description / Table of Contents: This book presents the proceedings of the Sixth International Conference on Computer Analysis of Images and Patterns, CAIP '95, held in Prague, Czech Republic in September 1995. The volume presents 61 full papers and 75 posters selected from a total of 262 submissions and thus gives a comprehensive view on the state-of-the-art in computer analysis of images and patterns, research, design, and advanced applications. The papers are organized in sections on invariants, segmentation and grouping, optical flow, model recovery and parameter estimation, low level vision, motion detection, structure and matching, active vision and shading, human face recognition, calibration, contour, and sessions on applications in diverse areas.
    Pages: Online-Ressource (XVIII, 962 pages)
    ISBN: 9783540447818
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Unknown
    London : Ubiquity Press
    Keywords: Open Data ; Open Science ; Open Access ; Text Mining ; Data Mining
    Description / Table of Contents: In 2010 the Panton Principles for Open Data in Science were published. These principles were founded upon the idea that "Science is based on building on, reusing and openly criticising the published body of scientific knowledge" (http://pantonprinciples.org) and they provide a succinct list of the fundamentals to observe when making your data open. Intended for a broad audience of academics, publishers and librarians, Issues in Research Data explores the implications of the Panton Principles through a number of perspectives on open research data in the sciences and beyond. The book features chapters by open data experts in a range of academic disciplines, covering practical information on licensing, ethics, and advice for data curators, alongside more theoretical issues surrounding the adoption of open data. As the book is open access, each chapter can stand alone from the main volume so that communities can host, distribute, build upon and remix the content that is relevant to them. Readers can access the online version via the QR code or DOI link at the front of the book.
    Pages: Online-Ressource (VI, 164 Seiten)
    ISBN: 9781909188327
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: data science
    Description / Table of Contents: Chapter 1 Introduction --- Overview --- Data Science Is OSEMN --- Intermezzo Chapters --- What Is the Command Line? --- Why Data Science at the Command Line? --- A Real-World Use Case --- Further Reading --- Chapter 2 Getting Started --- Overview --- Setting Up Your Data Science Toolbox --- Essential Concepts and Tools --- Further Reading --- Chapter 3 Obtaining Data --- Overview --- Copying Local Files to the Data Science Toolbox --- Decompressing Files --- Converting Microsoft Excel Spreadsheets --- Querying Relational Databases --- Downloading from the Internet --- Calling Web APIs --- Further Reading --- Chapter 4 Creating Reusable Command-Line Tools --- Overview --- Converting One-Liners into Shell Scripts --- Creating Command-Line Tools with Python and R --- Further Reading --- Chapter 5 Scrubbing Data --- Overview --- Common Scrub Operations for Plain Text --- Working with CSV --- Working with HTML/XML and JSON --- Common Scrub Operations for CSV --- Further Reading --- Chapter 6 Managing Your Data Workflow --- Overview --- Introducing Drake --- Installing Drake --- Obtain Top Ebooks from Project Gutenberg --- Every Workflow Starts with a Single Step --- Well, That Depends --- Rebuilding Specific Targets --- Discussion --- Further Reading --- Chapter 7 Exploring Data --- Overview --- Inspecting Data and Its Properties --- Computing Descriptive Statistics --- Creating Visualizations --- Further Reading --- Chapter 8 Parallel Pipelines --- Overview --- Serial Processing --- Parallel Processing --- Distributed Processing --- Discussion --- Further Reading --- Chapter 9 Modeling Data --- Overview --- More Wine, Please! --- Dimensionality Reduction with Tapkee --- Clustering with Weka --- Regression with SciKit-Learn Laboratory --- Classification with BigML --- Further Reading --- Chapter 10 Conclusion --- Let’s Recap --- Three Pieces of Advice --- Where to Go from Here? --- Getting in Touch
    Pages: Online-Ressource (XVII, 191 pages) , illustrations, diagrams
    ISBN: 9781491947852
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Unknown
    Berkeley, CA : Apress
    Keywords: Open source software ; Computer programming ; Software engineering ; Open Source ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you’ll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It’s the best book for all your Git needs
    Pages: Online-Ressource (XXI, 456 pages) , 208 illustrations
    Edition: 2nd edition
    ISBN: 9781484200766
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Russell, Stuart and Norvig, Peter Artificial Intelligence: A Modern ApproachEdwards, Alistair, D.N. (ed.) Extra-Ordinary Human-Computer Interaction: Interfaces for Users with DisabilitiesVacca, John R. VRML: Bringing Virtual Reality to the Internet
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The blackboard architecture, originally developed for the system that permits the comprehension of language, HEARSAY II, has later been used in a great variety of domains and in various environments for the construction of systems. From the classic architecture of HEARSAY II, many applications, generalizations, extensions and refinements have been developed. In this paper we present REDSIEX, (RED de SIstemas EXpertos) which is a network of expert systems within a blackboard architecture, for the cooperation solution of distributed problems. The REDSIEX system inherits various of the elements defined by the architecture of HEARSAY II and incorporates new components and organization. These produce a very characteristic and exclusive global work style in the solution of problems, within a conceptual framework of emergent control. The main structural and functional characteristics of REDSIEX are discussed.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: This paper presents an intelligent system to assist small investors to determine stock trend signals for investment in stock business. A pilot system is built providing three main categories of technical and analysis theories, namely momentum, moving average, and support/resistance line. It has extensive graphic interface design to facilitate the usage of the system. For novice investors, the system is associated with tutoring features and it supports analysis study of the rationale behind some system recommendations. Skilful investors can explore the various theories for the prediction by means of adjusting the weightings, combinations and even some independent variables allocated by the intelligent system. General users can therefore formulate their investment strategies upon system recommendations under different investment criteria accordingly.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The manner in which CARMEN (Constraints And Rules Management ENgine), an operational expert system generator developed as part of the ESPRIT project ITHACA, models and acquires knowledge is discussed. Central to CARMEN are three types of control entities (TASKs, MKSs and BKSs) which are used to describe problem-solving at the knowledge-use level. Modeling of domain knowledge is done both at the deep and surface levels. The Integrity Checking Task (or ICT) is used to illustrate the manner in which CARMEN works. We conclude the paper with a comparison of CARMEN with other approaches in knowledge modeling.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The Allen and Koomen planner is intractable in two ways: the Allen interval algebra is an intractable temporal reasoner, and the collapsing problem introduces a large branching factor in the search space for a solution plan. We define independence and dependence for networks to address both problems. Independence is used to find a decomposition of an interval network, and dependence is used to focus search when faced with the collapsing problem.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: We analyze the problem of computing the minimal labels for a network of temporal relations in point algebra. Van Beek proposes an algorithm for accomplishing this task, which takes O(max(n3, n2 m)) time (for n points and m ≠-relations). We show that the proof of the correctness of this algorithm given by van Beek and Cohen is faulty, and we provide a new proof showing that the algorithm is indeed correct.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: As influence diagrams become a popular representational tool for decision analysis, influence diagram evaluation attracts more and more research interests. In this article, we present a new, two-phase method for influence diagram evaluation. In our method, an influence diagram is first mapped onto a decision graph and then the analysis is carried out by evaluating the decision graph. Our method is more efficient than Howard and Matheson's because, among other reasons, our method generates a much smaller decision graph for the same influence diagram. Like those most recent algorithms reported in the literature, our method also provides a clean interface between influence diagram evaluation and Bayesian net evaluation. Consequently, various well-established algorithms for Bayesian net evaluation can be used in influence diagram evaluation. Furthermore, our method has a few unique merits. First, it takes advantage of asymmetry in influence diagrams to avoid unnecessary computation. Second, by using heuristic search techniques, it provides an explicit mechanism for using heuristic information that may be available in a domain-specific form. These additional merits make our method more efficient than the current algorithms in general. Finally, by using decision graphs as an intermediate representation, the value of perfect information can be computed in a more efficient way.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Vagueness and uncertainty have attracted the attention of philosophers and logicians for many years. Recently, AI researchers contributed essentially to this area of research. Fuzzy set theory and the theory of evidence are seemingly the most appealing topics. On this note we present a new approach, based on the rough set theory, for looking to these problems. The theory of rough sets seems a suitable mathematical tool for dealing with problems of vagueness and uncertainty. This paper is a modified version of the author's lecture titled “An inquiry into vagueness and uncertainty,” which was delivered at the AI Conference in Wigry (Poland), 1994.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: This paper presents results of experiments showing how machine learning methods arc useful for rule induction in the process of knowledge acquisition for expert systems. Four machine learning methods were used: ID3, ID3 with dropping conditions, and two options of the system LERS (Learning from Examples based on Rough Sets): LEM1 and LEM2. Two knowledge acquisition options of LERS were used as well. All six methods were used for rule induction from six real-life data sets. The main objective was to lest how an expert system, supplied with these rule sets, performs without information on a few attributes. Thus an expert system attempts to classify examples with all missing values of some attributes. As a result of experiments, it is clear that all machine learning methods performed much worse than knowledge acquisition options of LERS. Thus, machine learning methods used for knowledge acquisition should be replaced by other methods of rule induction that will generate complete sets of rules. Knowledge acquisition options of LERS are examples of such appropriate ways of inducing rules for building knowledge bases.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Knowledge discovery in databases, or dala mining, is an important direction in the development of data and knowledge-based systems. Because of the huge amount of data stored in large numbers of existing databases, and because the amount of data generated in electronic forms is growing rapidly, it is necessary to develop efficient methods to extract knowledge from databases. An attribute-oriented rough set approach has been developed for knowledge discovery in databases. The method integrates machine-learning paradigm, especially learning-from-examples techniques, with rough set techniques. An attribute-oriented concept tree ascension technique is first applied in generalization, which substantially reduces the computational complexity of database learning processes. Then the cause-effect relationship among the attributes in the database is analyzed using rough set techniques, and the unimportant or irrelevant attributes are eliminated. Thus concise and strong rules with little or no redundant information can be learned efficiently. Our study shows that attribute-oriented induction combined with rough set theory provide an efficient and effective mechanism for knowledge discovery in database systems.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: This paper presents an empirical study of the use of the rough set approach to reduction of data for a neural network classifying objects described by quantitative and qualitative attributes. Two kinds of reduction are considered: reduction of the set of attributes and reduction of the domains of attributes. Computational tests were performed with five data sets having different character, for original and two reduced representations of data. The learning time acceleration due to data reduction is up to 4.72 times. The resulting increase of misclassification error does not exceed 11.06%. These promising results let us claim that the rough set approach is a useful tool for preprocessing of data for neural networks.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: In this paper, we introduce the notion of interval structures in an attempt to establish a unified framework for representing uncertain information. Two views are suggested for the interpretation of an interval structure. A typical example using the compatibility view is the rough set model in which the lower and upper approximations form an interval structure. Incidence calculus adopts the allocation view in which an interval structure is defined by the tightest lower and upper incidence bounds. The relationship between interval structures and interval-based numeric belief and plausibility functions is also examined. As an application of the proposed model, an algorithm is developed for computing the tightest incidence bounds.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: “Simpson's paradox,” first described nearly a century ago, is an anomaly that sometimes arises from pooling data. Dramatic instances of the paradox have occurred in real life in the domains of epidemiology and admissions policies. Many writers have recently described hypothetical examples of the paradox arising in other areas of life and it seems possible that the paradox may occur frequently in mundane domains but with less serious implications. Thus, it is not surprising that the paradox should arise in commonsense reasoning, that subarea of artificial intelligence that seeks to axiomatize reasoning in such mundane domains. It arises as the problem “approximate proof by cases” and the question of whether to accept it may well depend on whether we wish to construct performance or competence models of reasoning. This article gives a brief history of the paradox and discusses its occurrence in our own discipline. It argues that if the paradox occurs frequently but undramatically in real life, every uncertain reasoning system will have to deal with the problem in some way.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: We present the syntax and proof theory of a logic of argumentation, LA. We also outline the development of a category theoretic semantics for LA. LA is the core of a proof theoretic model for reasoning under uncertainty. In this logic, propositions are labeled with a representation of the arguments which support their validity. Arguments may then be aggregated to collect more information about the potential validity of the propositions of interest. We make the notion of aggregation primitive to the logic, and then define strength mappings from sets of arguments to one of a number of possible dictionaries. This provides a uniform framework which incorporates a number of numerical and symbolic techniques for assigning subjective confidences to propositions on the basis of their supporting arguments. These aggregation techniques are also described with examples.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: In this paper we focus on the temporal constraints between causes and effects of causal relations, and, to deal correctly with such relations, we stress the importance of analyzing the action-types (aspectual category) of causes and effects. In particular, we propose a domain-independent ontology in which the distinctions between action-types (e.g., the distinction between durative and punctual situations) are dealt with, and different types of causal relations are distinguished, on the basis of (i) the temporal constraints they impose between causes and effects (these constraints are expressed in a temporal formalism that extends Vilain's point interval algebra) and (ii) the action-types of their causes and effects. Our ontology allows one to capture precisely the temporal constraints imposed by causation and the action-types of the related situations. Moreover, in case the user has no accurate knowledge about the action-types of some situations and/or the types of some causal connections to be dealt with, our formalism allows the user to leave the descriptions underspecified, and more specific pieces of information may be inferred. Inferences provide a flow of information about action-types to information about temporal constraints in causation and vice versa, and demonstrate that a deep integration of time and causation is provided also at the inferential level.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The Galois (or concept) lattice produced from a binary relation has proved useful for many applications. Building the Galois lattice can be considered a conceptual clustering method because it results in a concept hierarchy. This article presents incremental algorithms for updating the Galois lattice and corresponding graph, resulting in an incremental concept formation method. Different strategies are considered based on a characterization of the modifications implied by such an update. Results of empirical tests are given in order to compare the performance of the incremental algorithms to three other batch algorithms. Surprisingly, when the total time for incremental generation is used, the simplest and less efficient variant of the incremental algorithms outperforms the batch algorithms in most cases. When only the incremental update time is used, the incremental algorithm outperforms all the batch algorithms. Empirical evidence shows that, on the average, the incremental update is done in time proportional to the number of instances previously treated. Although the worst case is exponential, when there is a fixed upper bound on the number of features related to an instance, which is usually the case in practical applications, the worst-case analysis of the algorithm also shows linear growth with respect to the number of instances.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: We propose a procedure for estimating DBLEARN's potential for knowledge discovery, given a relational database and concept hierarchies. This procedure is most useful for evaluating alternative concept hierarchies for the same database. The DBLEARN knowledge discovery program uses an attribute-oriented inductive-inference method to discover potentially significant high-level relationships in a database. A concept forest, with at most one concept hierarchy for each attribute, defines the possible generalizations that DBLEARN can make for a database. The potential for discovery in a database is estimated by examining the complexity of the corresponding concept forest. Two heuristic measures are defined based on the number, depth, and height of the interior nodes. Higher values for these measures indicate more complex concept forests and arguably more potential for discovery. Experimental results using a variety of concept forests and four commercial databases show that in practice both measures permit quite reliable decisions to be made; thus, the simplest may be most appropriate.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The inverted pendulum poses serious problems for qualitative modeling methods, so it is a good benchmark to lest their performance. This paper shows how a new data analysis method known as rough set theory can be utilized to swing up and stabilize the pendulum. Our approach to this task consists of deriving control rules from the actions of a human operator stabilizing the pendulum and subsequently using them for automatic control. Rule derivation is based on the “learning from examples” principle and does not require knowledge of a quantitative model of the system.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: We present some methods, based on the rough set and Boolean reasoning approaches, for extracting laws from decision tables. First we discuss several procedures for decision rules synthesis from decision tables. Next we show how to apply some near-to-functional relations between data to data filtration. Two methods of searching for new classifiers (features) are described: searching for new classifiers in a given set of logical formulas, and searching for some functions approximating near-to-functional relations.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Computational intelligence 11 (1995), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: We apply rough set constructs to inductive learning from a database. A design guideline is suggested, which provides users the option to choose appropriate attributes, for the construction of data classification rules. Error probabilities for the resultant rule are derived. A classification rule can be further generalized using concept hierarchies. The condition for preventing overgeneralization is derived. Moreover, given a constraint, an algorithm for generating a rule with minimal error probability is proposed.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Electronic Resource
    Electronic Resource
    Boston, USA and Oxford, UK : Blackwell Publishers Inc
    Computational intelligence 13 (1997), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The standard AI method for representing temporal information in a first-order logic is to directly associate the information with a time point or interval via a relation. We present a new paradigm for temporal knowledge representation. All point-based temporal information is translated to real-valued functions in the Cartesian plane. For example, information that is true/false at a point becomes a 0–1 function. Other types of information, such as velocity, are directly represented with real-valued functions. The unique feature of the proposed approach is the use of the Riemann integral to represent interval-based information. Our approach is based on the fact that what is true at every point in an interval completely determines what is true over the interval. We conclude with a formal presentation of a first-order logic that is based on the proposed representation.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Electronic Resource
    Electronic Resource
    Boston, USA and Oxford, UK : Blackwell Publishers Inc
    Computational intelligence 13 (1997), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: In this paper the idea is presented that human communication is carried through messages that are the result of the integration of a set of communicative acts, some of which are, in a traditional view, contextual phenomena with respect to a main (linguistic) communication act. A formalization of the notion of communicative situation is attempted, which eliminates the distinction between context and main communication acts. The ideas presented in this paper come from a re-thinking of a prototype implemented in 1989 for the ESPRIT Project 527, CFID whose main features are presented in Section 4.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Inc.
    Computational intelligence 13 (1997), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: In description logics, default knowledge is exclusively treated as incidental rules. However, as few concepts are definable using only strict knowledge, imposing strict definitions leads to terminological knowledge bases that mostly contain partially defined concepts. This is a real problem because such concepts can only be inserted as leaves of the terminology. Moreover, instance recognition is biased as these concepts must be explicitly mentioned as properties of these instances. It follows that partially defined concepts are described with necessary but not sufficient conditions. As a solution to these problems, we propose to integrate defaults in concept definitions and we argue that this is essential for our diagnosis application. We introduce a description language ALεδ with default(δ) and exception(ε) connectives. The cornerstone of our approach is the introduction of a definitional point of view where a default can be part of a concept definition, whereas in the classical inheritance one it is only viewed as a weak implication. We go on to describe a map between the definition of a concept and its inherited properties, and we show that the combination of these definitional and inheritance levels considerably improves the capabilities of classification processes. In particular this allows us to distinguish sure from probable instances and typical from exceptional instances. Finally we provide a specific operation, object refinement, which consists in enlarging object descriptions with exceptions in order to find additional concepts the object is an instance of. This operation is useful for our diagnosis application.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Inc.
    Computational intelligence 13 (1997), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: We present a mathematical model providing a formal basis for analogical reasoning, referred to as abstractional concept mapping. The approach provides a formal basis for all comparison–based reasoning (e.g., literal similarity, analogy, metaphor, and scientific models) in that given any two descriptions in first–order logic, arbitrary comparisons of similarity are representable as first–order theories (referred to as “comparison theories”), dependent only on the notion of logical truth and not on domain–specific heuristics or particular features of the knowledge representation.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Inc.
    Computational intelligence 13 (1997), S. 0 
    ISSN: 1467-8640
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Fifteen years of work on nonmonotonic logic has certainly increased our understanding of the area. However, given a problem in which nonmonotonic reasoning is called for, it is far from clear how one should go about modeling the problem using the various approaches. We explore this issue in the context on two of the best–known approaches, Reiter's default logic and Moore's autoepistemic logic, as well as two related notions of “only knowing,” due to Halpern and Moses and to Levesque. In particular, we return to the original technical definitions given in these papers and examine the extent to which they capture the intuitions they were designed to capture.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Increased interest in problem-solving decisions in the area of engineering leads to an increased demand for expert system applications. This paper presents an expert system that detects faults in hydraulic systems by simulating the reasoning of the expert, using as guide the hydraulic circuit of the system on the screen and extensive graphical information. A graphical user interface, appropriate explanations by using hypertext and user modelling have been implemented in order to produce a system that overcomes the usual interface problems of expert systems in engineering. This system has been developed in close collaboration with the company Automation Systems SA (Mannesmann Rexroth — Greece) and is currently used to detect faults in hydraulic presses, a fact that presents evidence of its usefulness.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Retrieving ad hoc data from information systems is difficult for non-expert users. Despite the efforts made in improving query tools (e.g. visual query construction, Query By Example, query templates), empirical research shows that constructing a request is still difficult (Reisner 1988). The core of the problem seems to be in the difference between the way the user perceives the application domain and the way the system requires the user to see it (Carroll & Olsen 1988). In this paper we describe the design and implementation of an ad hoc query tool developed by RCC for a personnel information system, and how AI techniques contributed to this module. The main novel idea incorporated in the query tool is to present the user with a means to question the conceptual model of the system instead of the technical model. To support this, a blackboard architecture has been designed and implemented with knowledge sources that translate the user's questions to database queries. The query tool is used in daily practice by over 100 users.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: A fuzzy reasoning algorithm is presented in this paper. It is based on the concept of a generalised fuzzy production rule that adds new conjunctions such as ADD and REL to the usual AND and OR conjunctions for the linkage of premises in conventional rules. A definition is given for weights and related factors, to express and measure a relation between the premises. A formal representation for fuzzy premises is presented, together with the introduction of a fuzzy match method. Multiple thresholds are used to convert the uncertainty measures of reasoning results into linguistic variables. We have applied the fuzzy reasoning algorithm to a frame-based hybrid expert system tool. An object-oriented approach is used in implementing the system. Some results of the application are presented and discussed.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Architectural design is a complex task which requires expert knowledge, a great deal of experience and no small amount of creativity and artistic flair. However, while humans are very good at creativity, intuition, artistry and evaluation, they are notoriously bad at routine mundane tasks. Searching through large databases of past designs can be such a task. This can result in useful design knowledge being ignored. In this paper we present a way to aid architects in their work by providing a software tool aimed at recording, retrieving and evaluating architectural designs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: The purpose of this research is to present a comprehensive bibliography of neural network application research in business. One hundred and twenty-seven neural network application papers and reports are identified through exhaustive literature searches. A classification of these articles by application area reveals that neural networks are being used for a diverse range of corporate functional activities, particularly in the areas of production/operations and finance. Information on the neural network development language/tool, the learning paradigm and the computer operating environment as reported in each article is included. Those journals which have published the most neural network business applications are also presented.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: A real-time visual servo tracking system for an industrial robot has been developed. Instead of a charge coupled device (CCD), a position sensitive detector (PSD) is used as the real-time vision sensor due to its fast response (the light position is transduced to analogue current). A neural network learns the complex association between the 3D object position and its sensor reading, and uses it to track that object, either moving or stationary. It also turns out that this scheme lends itself to a user-friendly way to teach workpaths for industrial robots. Furthermore, for real-time use of the neural net, an efficient neural network architecture has been developed based on the concept of input space partitioning and local learning. Real experiments indicate the system's characteristics of fast processing and learning as well as optimal usage of network resources.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Computational support for concurrent engineering design presents a number of issues in the design of knowledge-based systems. A fundamental concern is the need to provide the life-cycle perspective in recommending design alternatives. It is argued that such a complex knowledge-based system should be distributed, due to the inherent problems with large knowledge bases and the maintenance of consistency. Inconsistent local views of a problem and different priorities on design issues are expected between different knowledge-based design perspectives. These inconsistencies and different priorities will lead inherently to conflict which has to be resolved. This paper addresses the issues and key variables in conflict resolution and presents a strategy that can be applied for managing the conflict resolution process. We propose negotiation as the method of analysing a conflict situation, applying an appropriate conflict resolution strategy and monitoring its performance. We present an overview of the nature of conflict and some conflict resolution strategies, and see in what situations certain strategies are appropriate.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Research into the development and impacts of expert systems has accumulated to a point where it may be said to constitute a distinct field of study. As such, the evolution, organisation and dissemination of expert system research are themselves topics for investigation. Here we focus on the dissemination aspect, providing objective rankings of journals that have had the greatest impacts on recent expert system research. Our study examines the citation patterns of all research published in five expert systems journals during the past five years. Over 14 000 citations to more than 800 journals are analysed under two kinds of ranking schemes. These are based on cumulative citation counts and normalised citation counts. The latter adjusts for the number of years a journal article has been available to be cited. The reported rankings will be of interest to all who want to know where scientific developments that influence expert system research are reported: those who conduct, support, evaluate and study expert system research.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: In this paper we describe TheMD (The Methods Designer) shell and its use in the development of an expert system, known as Dust-Expert, for the relief of dust explosions. We begin by providing the motivation for the development of TheMD Shell by evaluating a prototype implementation of Dust-Expert using a conventional shell. This evaluation is carried out in terms of the transparency, reliability and extensibility of the system.The lessons learned from this evaluation have led to the development of TheMD Shell. We describe the main features of the shell which include more appropriate schemas, more complete explanation capabilities, a ranking scheme and equation-solving capabilities. We illustrate the use of the schemas and the importance of the equation-solving capabilities by examples from the domain of dust explosions. We also provide a formal specification of the ranking scheme that we adopt. We conclude by highlighting the benefits of our approach in comparison to the usual process of developing knowledge-based systems.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Subjective Probability George Wright and Peter Ayton (Eds.)Knowledge-based Information Systems D. Partridge and K. M. HussainIntelligent Agents: the New Revolution in Software Christine Guilfoyle and Ellie WarnerHigh Performance Computing Demystified D. Loshin, AP ProfessionalKnowledge Processing and Applied Artificial Intelligence Soumitra Dutta
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: A knowledge-based system (KBS) could be an ideal decision tool to reduce the complexity of planning non-destructive evaluation (NDE) or scheduling inspections. Such a KBS would have to evaluate the advantages and limitations of each available technique, given the specificity of a problem, and incorporate the fundamental knowledge derived from failure analysis. The KBS should include topics such as materials vs. defect size and type, probability of failure, and basic reliability information. In order to organise knowledge of materials degradation efficiently, the parameters that control various forms of failure first have to be rationalised in a general framework. This framework and their factors would then constitute a quantitative and easily programmable description of the independent variables controlling the intensity of a failure. This paper describes such a framework which could guide the general selection of NDE for materials failure, with a particular emphasis on corrosion related failures. The framework architecture itself was constructed using an object-oriented methodology for maximum flexibility, since it was anticipated that the materials parameters could easily be described as multidimensional objects.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: They all stink: food and drink, perfumery, household products, soaps, shampoos, paints, manufacturing processes, printing processes, waste products, contaminated air, and automotive emissions and environmental testing. In every case, small is a criterion of quality.Automated techniques to ‘smell’ or ‘taste’ liquids using mass spectrometry and gas chromatography are time consuming, require skilled personnel and often do not give the information required for qualitative ‘testing’. A new technique is now available due to the advances in neural computing technology and multi-sensor array technology. The combination of these two approaches tries to simulate the human olfactory system in a simplified form. This paper shows that the recognition ability of an odour sensor array will be significantly improved using a neural computing approach in order to discriminate between similar odours.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The complexity of the monitored data available in modern intensive care units (ICUs) means that they are best processed, for presentation to medical staff, by expert system techniques. This article describes an expert system that has an appropriately designed inference engine, handling the temporal considerations inherent in monitoring and manages data acquisition via a Medical Information Bus. Also, we will describe how we extended our monitoring system in ICUs by writing an interface allowing communication in dynamic SQL with a relational database management system. The extended system facilitates both permanent filing of case data and the use of filed data by the rules of the expert system, and allows automatic intelligent screening of data prior to permanent filing so as to ensure data reliability.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: In this paper, we stress the importance of considering evaluation from an overall viewpoint in order to product higher quality Knowledge-based Systems (KBS), that is, measuring attributes of products generated throughout the entire system life cycle rather than the final system alone. A framework for measuring typical products obtained during the development phases is proposed here. This measurement framework includes the definition of the products and the definition of attributes that characterize these products. The attributes are ordered as a multilevel hierarchy. The aim of the measurement framework proposed is to facilitate the application of measurement plans to KBS, using associated metrics. When building this environment, we sought to unify other work in the field of KBS evaluation.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Scheduling is a prevalent function that is omnipresent throughout many industries and applications (Pinedo, 1995; Morton & Pentico, 1993; Zweben & Fox, 1994; Brown & Scherer, 1995). A great need exists for developing scheduling toolkits that can be generically applied to a number of different scheduling problems. To meet this need, more research is warranted for developing a state-of-the-art generic constraint problem-solver as related to scheduling. This paper discusses the development and testing of the Generically Used Expert Scheduling System (GUESS).
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Electronic Resource
    Electronic Resource
    Oxford, UK and Boston, USA : Blackwell Publishers Ltd
    Expert systems 14 (1997), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Much recent research effort in the field of knowledge acquisition (KA) has focussed on extending knowledge acquisition techniques and processes to include a wider array of participants and knowledge sources in a variety of knowledge acquisition scenarios. As the domain of expert systems applications and research has expanded, techniques have been developed to acquire and incorporate knowledge from groups of experts and from various sources such as text, video, and audio tapes. However, the dominant participant-role model remains that of the knowledge engineer eliciting knowledge from one or more human experts. This conceptual gap has contributed to the major divisions in the KA field between researchers interested in manual KA and those developing tools for automated KA. This article considers the wide variety of possible KA scenarios and presents a meta-view of KA participants and the roles they may assume.We suggest that it is more appropriate to think of knowledge acquisition participants as playing one or more roles. These include knowledge sources, agents and targets for KA processes. We also present a participant model drawn from research in decision support systems that more accurately characterizes the diversity of the entities participating in the KA process. This view is more inclusive as it allows us to consider both human-human and human-computer KA interactions as well as the whole variety of knowledge sources and targets. A careful consideration of the meta-view and its associated role-participant mappings also yields the new ideas of the elemental and composite role and the multi-role entity. These new constructs are then used to identify areas where research is currently needed and to generate specific research issues. Taken altogether, this view allows a more flexible consideration of the many possible combinations that can and frequently do occur in actual KA situations.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: This paper presents a knowledge-based system for task allocation in a network of processors. Since the problem is NP-complete, optimisation techniques are computationally prohibitive and impractical. Our approach reduces computational burden by using (1) a two-level hierarchical scheduling model to alleviate the problem complexity, and (2) a search strategy that uses knowledge from the knowledge base to limit the search space to a manageable size. The major goal of our approach is to generate good but not necessarily optimal solutions quickly. The system is implemented on a Sun SPARCstation 1 + using Common Lisp. Our computational experience in using this system for task allocation indicates that the two-level hierarchical approach generates better schedules in shorter computational time than a non-hierarchical approach.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: This paper proposes a fuzzy post adjustment (FPA) mechanism so that human knowledge and machine knowledge can be integrated more synergistically to improve the performance of expert systems. Machine knowledge means knowledge algorithmically derived from past instances. Human knowledge implies (1) expert knowledge judging the trends of external factors and (2) user knowledge representing users’personal views about information given by both expert knowledge and machine knowledge. We consider an expert system that uses the FPA mechanism to incorporate the effect of external factors effectively into its inference process. The goal of this expert system is stock market timing prediction, which is divided into four kinds: bull, edged-up, edged-down and bear. Empirical tests showed that the proposed FPA mechanism can improve the performance of an expert system significantly, even in a turbulent decision-making environment.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: There is still a need for new knowledge elicitation techniques and tools. Laddering is a technique which has a long history in a wide range of disciplines and which has proved extremely useful in knowledge elicitation. There have, however, been few attempts to describe and survey the technique per se. This paper describes the technique, its background, its use, analysis, and automation, with particular reference to knowledge elicitation. The advantages and disadvantages of the technique are described. It is concluded that laddering is a valuable technique which could be used in a wide range of settings.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: The Art and Science of Smalltalk: An Introduction to Object Oriented Programming Using VisualWorks Simon LewisThe Book of GENESIS: Exploring Realistic Neural Models with the General Neural Simulation System James Bower and D. BeemanThe Book of GENESIS: Exploring Real istic Neural Models with the General Neural Simulation System James Bower and D. BeemanThe ISDN Literacy Book Gerald L. HopkinsThe Virtual Reality Casebook Carl Eugene LoeHer and Tim
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: The design of telecommunication networks is a complex activity involving a vast amount of input data and numerous design rules. Much of the data is estimated and many of the rules are based upon experiential knowledge. The use of existing uncertainty techniques in expert systems is not really suited to the complexity of telecommunication network design. Having investigated the uncertainty problem, it is believed that a more rational method has been found for use in this application area. The paper presents the ‘Uncertainty Window’technique and its testing on one aspect of network design, namely that of network synchronisation.The essence of this uncertainty process is one of associating individual uncertainty windows with the relevant rules, data and facts of a design problem, which results in providing the network designer with an insight into the possible uncertainties within a design at each stage of the process. It indicates which information sources provide the dominant uncertainty and which assumptions are critical, needing further investigation, in order to improve the level of confidence in the overall design. The windowing technique works by virtue of its ability to retain the composition of the uncertainties within the problem and their associated values, assumptions, and so forth and allows for better solutions to be obtained.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Prolog/Rex supports the construction of knowledge-based systems, allowing frames (Prolog/Rex concepts) and rules to be combined, and providing language level support for hypothetical reasoning and assumption-based truth maintenance (Prolog/Rex viewpoint mechanism). To increase run-time performance during rule execution, Prolog/Rex provides two complementary rule compilation techniques: the simple indexing scheme and the heavily modified Rete expansion method. To improve the efficiency of the inference engine, we built an agenda-based rule manager that uses priority mechanism and/or heuristics embedded in meta-rules to control the rule firing order. Forward- and backward-chaining can be combined within the same program.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: Process supervision consists of following the temporal evolution (change) of process behaviours. This task has usually been performed based on the knowledge and experience of domain experts and operators. Actually, these experts and operators almost always express their experience and knowledge about process evolution in an imprecise, fuzzy and vague way. A good supervision system should be capable of dealing at once with two different kinds of knowledge: time and uncertainty.For many years, time and uncertainty have been two of the most important topics in Artificial Intelligence research and applications. Many approaches have been proposed to deal with either one or the other. Among the various approaches for time, reified logic has been considered as the most influent one. Possibilistic logic, on the other hand, has shown its ability to handle uncertain knowledge and information. This paper describes an approach for managing temporal uncertainty based on fuzzy logic and possibility theory. A fuzzy temporal expert system shell has been developed to perform process supervision tasks.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: During the last decade, cumulative trauma disorders have become a major concern both to occupational health and safety professionals and manufacturing industries. This paper will present the development of a knowledge-based system for predicting the potential of developing strain injuries among employees exposed to repetitive and forceful activities. This potential is identified through the use of an expert system incorporating a fuzzy set algorithm. Recommendations for the prevention of the resulting CTDs are then provided by the system. The system executes on a microcomputer platform, and was constructed utilising a commercial object-oriented expert system shell.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Notes: Abstract: The recent surge of interest in connectionist models arose through the availability of high speed parallel supercomputers and the advent of new learning algorithms. The computations performed on concurrent architectures are less costly than similar ones performed on sequential machines. In this paper, the design and implementation of a parallel version of fuzzy ARTMAP (Carpenter et al. 1992), which encompasses both neural and fuzzy logic, is discussed. Fuzzy ARTMAP is a supervised learning algorithm utilising two fuzzy ART modules and an associated mapping network. A simplified version of fuzzy ARTMAP (SFAM) was designed by incorporating a simplification of the match tracking concept on unsupervised fuzzy ART paradigms. The proposed simplified version consists of only one fuzzy ART module and an associated mapping network. A parallel fuzzy ARTMAP (PFAM) algorithm is then designed and implemented on a hypercube simulator (iPSC). The algorithm is parallelised for any architecture and, with the exception of issues related to communications, the implementation remains the same on any type of parallel machine. PFAM enjoys the advantage of reduced training time that makes the algorithm a successful candidate for applications that require both online testing and training. Such applications can range from underwater sonar detection and chemical plant processing control to nuclear reactor process control, flexible manufacturing and systems analysis.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Electronic Resource
    Electronic Resource
    Oxford, UK : Blackwell Publishing Ltd
    Expert systems 12 (1995), S. 0 
    ISSN: 1468-0394
    Source: Blackwell Publishing Journal Backfiles 1879-2005
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...