Sold Out
Book Categories |
New Model for Time-series Forecasting using RBFS and Exogenous Data | 3 | |
On Improving Data Fitting Procedure in Reservoir Operation using Artificial Neural Networks | 13 | |
Automatic Vehicle License Plate Recognition using Artificial Neural Networks | 23 | |
Weather Forecasting Models Using Ensembles of Neural Networks | 33 | |
Neural Network Predictive Control Applied to Power System Stability | 43 | |
Identification of Residues Involved in Protein-Protein Interaction from Amino Acid Sequence - A Support Vector Machine Approach | 53 | |
From Short Term Memory to Semantics - a Computational Model | 63 | |
Axiomatization of Qualitative Multicriteria Decision Making with the Sugeno Integral | 77 | |
A Self-learning Fuzzy Inference for Truth Discovery Framework | 87 | |
Exact Approximations for Rough Sets | 97 | |
Correlation Coefficient Estimate for Fuzzy Data | 105 | |
A Framework for Multiagent-Based System for Intrusion Detection | 117 | |
An Adaptive Platform Based Multi-Agents for Architecting Dependability | 127 | |
Stochastic Distributed Algorithms for Target Surveillance | 137 | |
What-if Planning for Military Logistics | 149 | |
Effects of Reciprocal Social Exchanges on Trust and Autonomy | 159 | |
Real Time Graphical Chinese Chess Game Agents Based on the Client and Server Architecture | 173 | |
DIMS: an XML-Based Information Integration Prototype Accessing Web Heterogeneous Sources | 183 | |
A Frame-Work for High-Performance Web Mining in Dynamic Environments using Honeybee Search Strategies | 193 | |
Real-time Certificate Validation Service by Client's Selective Request | 207 | |
Internet Attack Representation using a Hierarchical State Transition Graph | 219 | |
A Secure Patch Distribution Architecture | 229 | |
Intrusion Detection Using Ensemble of Soft Computing Paradigms | 239 | |
NETMARK: Adding Hierarchical Object to Relational Databases | 251 | |
Academic KDD Project LISp-Miner | 263 | |
Performance Evaluation Metrics for Link Discovery Systems | 273 | |
Generalizing Association Rules: A Theoretical Framework and Implementation | 283 | |
New Geometric ICA Approach for Blind Separation of Sources | 293 | |
A Taxonomy of Data Mining Applications Supporting Software Reuse | 303 | |
Codifying the "Know How" Using CyKNIT Knowledge Integration Tools | 313 | |
Data Mining Techniques in Materialised Projection View | 321 | |
Data Mining Techniques in Index Techniques | 331 | |
Decision Tree Induction from Distributed Heterogeneous Autonomous Data Sources | 341 | |
Using IT To Assure a Culture For Success | 353 | |
Gender Differences in Performance Feedback Utilizing an Expert System: A Replication and Extension | 363 | |
Image Database Query Using Shape-Based Boundary Descriptors | 373 | |
Image Retrieval by Auto Weight Regulation PCA Algorithm | 383 | |
Improving the Initial Image Retrieval Set by Inter-Query Learning with One-Class SVMs | 393 | |
Tongue Image Analysis Software | 403 | |
2D Object Recognition Using the Hough Transform | 413 | |
Population Size Adaptation for Differential Evolution Algorithm Using Fuzzy Logic | 425 | |
Intelligent Management of QoS Requirements for Perceptual Benefit | 437 | |
Integrating Random Ordering into Multi-heuristic List Scheduling Genetic Algorithm | 447 | |
Scheduling to be Competitive in Supply Chains | 459 | |
Contract Net Protocol for Cooperative Optimisation and Dynamic Scheduling of Steel Production | 469 | |
A Peer-to-Peer System Architecture for Multi-Agent Collaboration | 483 | |
A Soft Real-Time Agent-Based Peer-to-Peer Architecture | 493 | |
Social Networks as a Coordination Technique for Multi-Robot Systems | 503 | |
Biology-Inspired Approaches to Peer to Peer Computing in BISON | 515 | |
UbAgent: A Mobile Agent Middleware Infrastructure for Ubiquitous/Pervasive Computing | 523 | |
Enhanced Cluster Visualization Using the Data Skeleton Model | 539 | |
Generating Concept Hierarchies for Categoriecal Attributes using Rough Entropy | 549 | |
Learning from Hierarchical Attribute Values by Rough Sets | 559 | |
Delivering Distributed Data Mining E-Services | 569 | |
Maintenance of Discovered Functional Dependencies: Incremental Deletion | 579 | |
Filtering Multilingual Web Content Using Fuzzy Logic | 589 | |
A Comparison of Patient Classification Using Data Mining in Acute Health Care | 599 | |
Criteria for a Comparative Study of Visualization Techniques in Data Mining | 609 | |
Controlling the Spread of Dynamic Self Organising Maps | 621 | |
Index of Contributors | 631 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionIntelligent Systems Design and Applications
X
This Item is in Your InventoryIntelligent Systems Design and Applications
X
You must be logged in to review the productsX
X
X
Add Intelligent Systems Design and Applications, The proceedings of the Third International Conference on Intelligent Systems Design and Applications (ISDA 2003) held in Tulsa, USA, August 10-13. Current research in all areas of computational intelligence is presented including design of artificial neur, Intelligent Systems Design and Applications to the inventory that you are selling on WonderClubX
X
Add Intelligent Systems Design and Applications, The proceedings of the Third International Conference on Intelligent Systems Design and Applications (ISDA 2003) held in Tulsa, USA, August 10-13. Current research in all areas of computational intelligence is presented including design of artificial neur, Intelligent Systems Design and Applications to your collection on WonderClub |