You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In this international collection of papers there is a wealth of knowledge on artificial intelligence (AI) and cognitive science (CS) techniques applied to the problem of providing help systems mainly for the UNIX operating system. The research described here involves the representation of technical computer concepts, but also the representation of how users conceptualise such concepts. The collection looks at computational models and systems such as UC, Yucca, and OSCON programmed in languages such as Lisp, Prolog, OPS-5, and C which have been developed to provide UNIX help. These systems range from being menu-based to ones with natural language interfaces, some providing active help, interv...
The Special Branch of the London Metropolitan Police has been a hidden but important part of Britain's political life for a hundred years. Opinions on its role have varied between those who saw it as protecting Britain from terrorism, revolution or worse and those who regarded the Special Branch as a threat to Britain's civil liberties. The truth has never been easy to establish, mainly due to the obsessive secrecy of the Branch.
This second volume in a two-volume series provides an extensive collection of conjectures and open problems in graph theory. It is designed for both graduate students and established researchers in discrete mathematics who are searching for research ideas and references. Each chapter provides more than a simple collection of results on a particular topic; it captures the reader’s interest with techniques that worked and failed in attempting to solve particular conjectures. The history and origins of specific conjectures and the methods of researching them are also included throughout this volume. Students and researchers can discover how the conjectures have evolved and the various approac...
We never create anything, We discover and reproduce. The Twelfth International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems has a distinguished theme. It is concerned with bridging the gap between the academic and the industrial worlds of Artificial Intelligence (AI) and Expert Systems. The academic world is mainly concerned with discovering new algorithms, approaches, and methodologies; however, the industrial world is mainly driven by profits, and concerned with producing new products or solving customers’ problems. Ten years ago, the artificial intelligence research gap between academia and industry was very broad. Recently, this ga...
This volume contains the 5 invited papers and 72 selected papers that were presented at the Fifth International Conference on Industrial and Engineering Applications of Artificial Intelligence. This is the first IEA/AIE conference to take place outside the USA: more than 120 papers were received from 23 countries, clearly indicating the international character of the conference series. Each paper was reviewed by at least three referees. The papers are grouped into parts on: CAM, reasoning and modelling, pattern recognition, software engineering and AI/ES, CAD, vision, verification and validation, neural networks, machine learning, fuzzy logic and control, robotics, design and architecture, configuration, finance, knowledge-based systems, knowledge representation, knowledge acquisition and language processing, reasoning and decision support, intelligent interfaces/DB and tutoring, fault diagnosis, planning and scheduling, and data/sensor fusion.
Denial-of-service attacks are one of the most severe challenges confronting the online world. This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. In addition, the book presents an alternative way to achieve strong hop integrity with hard sequence numbers.
John Myers married Ann Bruce in 1741. They had two children. He married Mary in about 1764. They had two children. Descendants and relatives lived mainly in South Carolina, Georgia, Alabama and Mississippi.
The presentations of theinvitedspeakersandauthorsmainlyfocusedondevelopingandstudyingnew methods to cope with the problems posed by real-life applications of arti?cial intelligence.Paperspresentedinthetwentythirdconferenceintheseriescovered theories as well as applications of intelligent systems in solving complex real-life problems. We received 297 papers for the main track, selecting 119 of them with the highest quality standards. Each paper was revised by at least three members of the Program Committee.
This volume includes the proceedings from Proceedings of the Ninth International Conference Fukuoka, Japan, June 4-7, 1996. This work represents a broad spectrum of new ideas in the field of applied artificial intelligence and expert systems, and serves to disseminate information regarding intelligent methodologies and their implementation in solving various problems in industry and engineering.