Abstract is missing.
- Co-Evolutionary Data Mining to Deal with Adaptive AdversariesJames F. Smith III. 3-9
- An FPGA Based Evolutionary Controller for Mobile RobotsM. A. Hannan Bin Azhar, Keith R. Dimond. 10-16
- Arian: A General Architecture for Advisable AgentsMazda Ahmadi, Mehran Motamed, Jafar Habibi. 17-23
- Object-Oriented Genetic Programming: An Initial ImplementationRuss Abbott. 24-27
- Guided Genetic ProgrammingRuss Abbott. 28-34
- Fault Tolerance in Crab Walking of Quadruped RobotsJung-Min Yang, Kwang-Hyun Shim. 35-36
- A Novel Method for Dialogue Management Based on The Finite State AutomatonMin Lie Huang, Xiao-Yan Zhu. 37-43
- Fault Tolerant Gait Planning for a Hexapod Robot with MultipleLocked Joint FailuresJung-Min Yang, Kwang-Hyun Shim. 44-48
- Cognitive Approach to Language Structure Segmentation for Machine Translation AlgorithmsElena B. Kozerenko. 49-55
- Applying Machine Learning Techniques to Automating XML MarkupShazia Akhtar, Ronan G. Reilly, John Dunnion. 56-61
- Generation as Paraphrasing in the NL-Interface to a Data BaseMichael V. Boldasov, Elena G. Sokolova. 62-67
- Natural Language Processing as a Source of Linguistic KnowledgeLeonid L. Iomdin. 68-74
- The System for Extracting Semantic Information from Natural Language TextIgor P. Kuznetsov, Elena B. Kozerenko, Michael M. Charnine. 75-80
- Verbal Forms Synthesis Method for Linguistic ProcessorsElena N. Zaretskaya. 81-90
- Design of a Genetic Feature Selection Algorithm for Neuron Input Mapping in N-Tuple Based ClassifiersSerkawt Farhan-Khola, Gareth Howells. 91-96
- Statistical Comparisons of Multiple ClassifiersDechang Chen, Xiuzhen Cheng. 97-101
- Automated Essay Assessment System Using Text Categorization AlgorithmsHossein Tahani, Judy A. Pino. 102-107
- Mining for Features to Improve ClassificationSarah Zelikovitz. 108-114
- Syntactical Approach to Post-Processing of Fuzzy Recognized TextDmitriy L. Sholomov. 115-121
- Shot Change Detection Using Multiple Features and Classification and Regression Tree (CART)Seung-Bum Hong, Jong-Sung Kim, Joong-Hwan Baek, Gyo-Young Hong. 122-128
- Feature Selection for Support Vector Machines in Text CategorizationYi Liu, Haiming Lu, Zengxiang Lu, Pu Wang. 129-126
- Natural Language Parsing Using Simple Neural NetworksJ. Nelson Rushton. 137-141
- Neural Network for Signaling Abnormal Readings In an Electricity Consumption ApplicationHend F. Kendela. 142-147
- Neural Networks Evolutionary Learning in Chess GameAlberto Carrascal, Daniel Manrique, Juan Rios. 148-153
- Effects of SNR on System Modeling Using Neural NetworksAshraf A. M. Khalaf, M. A. M. Abo-Eldahab, M. Mones Ali. 154-160
- Improved Experimental Results Using Fuzzy Lattice Neurocomputing (FLN) ClassifiersAl Cripps, Vassilis G. Kaburlasos, Nghiep Nguyen, Stelios E. Papadakis. 161-166
- Matrix Calculation of Second Derivatives in Layered Networks: A Demonstrative ExampleShouling He. 167-176
- Visual K-Map: An Intelligent Tutorial for Solving Karnaugh MapsRondrell Flowers, Georgios A. Demetriou, W. Eugene Simmons. 177-180
- Using a Two-Layered Case-Based Reasoning for Prediction in Soccer CoachMazda Ahmadi, Abolfazl Keighobadi Lamjiri, Mayssam M. Nevisi, Jafar Habibi, Kambiz Badie. 181-185
- Tutoring and Adaptability: Case StudyAbdellah Bennane, Theo D Hondt. 186-191
- Building Artificial Brains at Universities Using a Purely Software Based ApproachHugo de Garis, Ravichandra Sriram. 192-196
- Establishing Limits of Kinematic Based Control for Wheeled Mobile RobotsJason Garbutt, Thurai Vinay, Sabu John. 197-202
- Collaborative Filtering Recommendation System Application Based on Stereotype ModelYongjun Lee, Sehoon Lee, Junghyun Lee. 203-208
- Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection ContextMaheshkumar Sabhnani, Gürsel Serpen. 209-215
- Machine Learning for Identifying Troubled Life InsurerTao Zhang, Jian Li, Zhi Li. 216-222
- Real-Time Optimization of Dynamic Stochastic Knapsack Problem Using a Multi-Layer Perceptron NetworkSharath Ramaraj, Dusan Teodorovic, Denis Gracanin. 223-229
- Web Users Identification Using Cyclic Access PatternsAhmed Elgorashi, Shmuel Rotenstreich. 230-236
- A Reinforcement Learning-Based Algorithm to Predict Vulnerability Occurrence in a Wireless Networking EnvironmentHooshang Sharif, Michael Conner. 237-241
- Using Markov-k Memory for Problems with Hidden-StateMatthew W. Mitchell. 242-248
- Risk Neutral Decision TreesRon Coleman, Matthew A. Johnson, Lakshmi Prasad Potluri. 249-255
- A Design of Constrained Controllers for Linear Systems with Markovian JumpsMohammed Benbrahim, Khalid Benjelloun. 256-260
- Comments on Using MLP and FFT for Fast Object/Face DetectionHazem M. El-Bakry. 261-264
- A Data-Filtering Algorithm for Linear SystemsJonathan P. Bernick. 265-272
- A Fast Morphological Algorithm with Unknown Word Guessing Induced by a Dictionary for a Web Search EngineIlya Segalovich. 273-280
- A Similarity-Based Learning Approach for Adaptive NegotiationsRaymond Y. K. Lau. 281-288
- Abstract Entities Ontology StructureValery Solovyev. 289-290
- Just-in-Time GrammarStephen Beale, Sergei Nirenburg, Marjorie McShane. 291-297
- A Metric for the Measurement of Relative Susceptibility to Training Data Noise for Multi-Layer PerceptronsJonathan P. Bernick. 298-301
- Independent Component Analysis of Fixed-Point Algorithm Based on Secant MethodYong-Hyun Cho, Yong Soo Park. 302
- An Effective Parallel Attribute Reduct Algorithm Based on Relation MatrixP. L. Zhou, Christine Mingins. 307-313