author: max bramer

Research and Development in Intelligent Systems XXXII: Incorporating Applications and Innovations in Intelligent Systems XXIII

... pros and 2 cons in compelling explanations. The extra pros in basic ... histograms also show the average betterThan and worseThan scores for these ... pros. For example, in Fig. 6a we can see that free breakfast appears as a con in 47,263 ...

Artificial Intelligence in Theory and Practice II: IFIP 20th World Computer Congress, TC 12: IFIP AI 2008 Stream, September 7-10, 2008, Milano, Italy

... code is generated and memorized to be used during troubleshooting sessions. A fault code is characterized by many fields, the most important are (1) the Message IDentifier (MID), that specifies the on–board computer generating the error ...

Artificial Intelligence XXXVII: 40th SGAI International Conference on Artificial Intelligence, AI 2020, Cambridge, UK, December 15–17, 2020, Proceedings

... process of selecting phrases that best describe a document [9]. And in this study, we are extending the framework introduced by Zammit et al. (2019) and focus ... Following a brief review in Sect.2 on related work, the paper presents in ...

Artificial Intelligence XXXVI: 39th SGAI International Conference on Artificial Intelligence, AI 2019, Cambridge, UK, December 17–19, 2019, Proceedings

... comprehensive survey. ISRN Softw. Eng. 2013, 1–37 (2013) 2. Al-Nasheri, A ... (2017) 3. Alasadi, S.A., Bhaya, W.S.: Review of data preprocessing techniques ... P.N., Kiss, S.: Rule-mining and clustering in business process analysis. In ...

Research and Development in Intelligent Systems XXIX: Incorporating Applications and Innovations in Intelligent Systems XX Proceedings of AI-2012, The Thirty-second SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence

... Facebook photo comments using either language model. 3. Methods. An emoticon is a sequence of characters with the appearance of a facial expression. For Tweets and Facebook photo comments, we follow the approach of Read [20] of using the ...

Artificial Intelligence XXXVIII: 41st SGAI International Conference on Artificial Intelligence, AI 2021, Cambridge, UK, December 14–16, 2021, Proceedings

... foolbox.attacks in Foolbox [17]. Attacks is to call the concrete attack methods and test whether the result generated by the methods satisfies all the constraints. In the Foolbox, the constraints only contain one distance, but in our ...

Artificial Intelligence XXXIX: 42nd SGAI International Conference on Artificial Intelligence, AI 2022, Cambridge, UK, December 13–15, 2022, Proceedings

... op-amp- based summation circuit, an activation function circuit, a voltage-controlled resistor, an op-amp multiplier ... amplifier is well understood (see Fig. 6(b) for an example) such as that adopted in the Yamashita-Nakamura neuron model ...

Research and Development in Intelligent Systems XXVII: Incorporating Applications and Innovations in Intelligent Systems XVIII Proceedings of AI-2010, The Thirtieth SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence

... RPG, it is possible to automatically build a qualitative relational model (i.e. a System Description) extended with special variables for capturing the different levels of observability. This process is not trivial for two reasons ...

Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence

... Facebook photo album names tended to contain mostly absolute temporal expressions (none of the form “2 months”, or ... upload timestamp9 in addition to the photo creation timestamp. We define the upload delay to be the time difference ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.