Sciweavers

FLAIRS
2003
13 years 6 months ago
Incremental Breakout Algorithm with Variable Ordering
This paper presents the Incremental Breakout Algorithm with Variable Ordering (IncBA). This algorithm belongs to the class of local search algorithms for solving Constraint Satisf...
Carlos Eisenberg, Boi Faltings
FLAIRS
2003
13 years 6 months ago
Using Bayesian Networks for Cleansing Trauma Data
Medical data is unique due to its large volume, heterogeneity and complexity. This necessitates costly active participation of medical domain experts in the task of cleansing medi...
Prashant Doshi, Lloyd Greenwald, John R. Clarke
FLAIRS
2003
13 years 6 months ago
Human-Centered Design in Synthetic Teammates for Aviation: The Challenge for Artificial Intelligence
Synthetic teammates are a special class of artificial intelligence that is intended to replace the human operator in some special capacity. This proposal outlines some guidelines ...
Shawn M. Doherty
FLAIRS
2003
13 years 6 months ago
Distributed Knowledge Representation in Neural-Symbolic Learning Systems: A Case Study
Neural-symbolic integration concerns the integration of symbolic and connectionist systems. Distributed knowledge representation is traditionally seen under a purely symbolic pers...
Artur S. d'Avila Garcez, Luís C. Lamb, Krys...
FLAIRS
2003
13 years 6 months ago
Using Mental Simulator for Emotional Rehabilitation of Autistic Patients
It has been discovered about a decade ago that autistic people cannot properly understand and reproduce mental states and emotions. In this study we suggest a particular emotion r...
Boris Galitsky
FLAIRS
2003
13 years 6 months ago
On the Computational Complexity of Spatio-Temporal Logics
Recently, a hierarchy of spatio-temporal languages based on the propositional temporal logic PTL and the spatial languages RCC-8, BRCC-8 and S4u has been introduced. Although a nu...
David Gabelaia, Roman Kontchakov, Agi Kurucz, Fran...
FLAIRS
2003
13 years 6 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
FLAIRS
2003
13 years 6 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson