Catálogo de publicaciones - libros

Compartir en
redes sociales


Artificial Intelligence: Methodology, Systems, and Applications: 12th International Conference, AIMSA 2006, Varna, Bulgaria, September 12-15, 2006, Proceedings

Jérôme Euzenat ; John Domingue (eds.)

En conferencia: 12º International Conference on Artificial Intelligence: Methodology, Systems, and Applications (AIMSA) . Varna, Bulgaria . September 12, 2006 - September 15, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Computation by Abstract Devices; Information Storage and Retrieval; Pattern Recognition

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-40930-4

ISBN electrónico

978-3-540-40931-1

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Incorporating Privacy Concerns in Data Mining on Distributed Data

Hui-zhang Shen; Ji-di Zhao; Ruipu Yao

Data mining, with its objective to efficiently discover valuable and inherent information from large databases, is particularly sensitive to misuse. Therefore an interesting new direction for data mining research is the development of techniques that incorporate privacy concerns and to develop accurate models without access to precise information in individual data records. The difficulty lies in the fact that the two metrics for evaluating privacy preserving data mining methods: privacy and accuracy are typically contradictory in nature. We address privacy preserving mining on distributed data in this paper and present an algorithm, based on the combination of probabilistic approach and cryptographic approach, to protect high privacy of individual information and at the same time acquire a high level of accuracy in the mining result.

- User Concerns | Pp. 87-97

Multiagent Approach for the Representation of Information in a Decision Support System

Fahem Kebair; Frédéric Serin

In an emergency situation, the actors need an assistance allowing them to react swiftly and efficiently. In this prospect, we present in this paper a decision support system that aims to prepare actors in a crisis situation thanks to a decision-making support. The global architecture of this system is presented in the first part. Then we focus on a part of this system which is designed to represent the information of the current situation. This part is composed of a multiagent system that is made of factual agents. Each agent carries a semantic feature and aims to represent a partial part of a situation. The agents develop thanks to their interactions by comparing their semantic features using proximity measures and according to specific ontologies.

- Decision Support | Pp. 98-107

Flexible Decision Making in Web Services Negotiation

Yonglei Yao; Fangchun Yang; Sen Su

Negotiation is a crucial stage of Web Services interaction lifecycle. By exchanging a sequence of proposals in the negotiation stage, a service provider and a consumer try to establish a formal contract, to specify agreed terms on the service, particularly terms on non-functional aspects. To react to an ever-changing environment, flexible negotiation strategies that can make adjustable rates of concession should be adopted. This paper presents such flexible strategies for Web Services negotiation. In a negotiation round, the negotiation strategies first examine the environment situations by evaluating certain factors, which include time, resources, number of counterparts and current proposals from the counterparts. For each factor, there is a corresponding function that suggests the amount of concession in terms of that factor. Then considering the importance of each service attribute, the target concession per attribute is determined. As a final step, a set of experimental tests is executed to evaluate the performance of the negotiation strategies.

- Decision Support | Pp. 108-117

On a Unified Framework for Sampling With and Without Replacement in Decision Tree Ensembles

J. M. Martínez-Otzeta; B. Sierra; E. Lazkano; E. Jauregi

Classifier ensembles is an active area of research within the machine learning community. One of the most successful techniques is , where an algorithm (typically a decision tree inducer) is applied over several different training sets, obtained applying sampling with replacement to the original database. In this paper we define a framework where sampling with and without replacement can be viewed as the extreme cases of a more general process, and analyze the performance of the extension of bagging to such framework.

- Decision Support | Pp. 118-127

Spatio-temporal Proximities for Multimedia Document Adaptation

Sébastien Laborie

The multiplication of execution contexts for multimedia documents requires the adaptation of the document specification to the particularities of the contexts. In this paper, we propose to apply a semantic approach for multimedia document adaptation to the spatio-temporal dimension of documents. To guarantee that the adapted document is close to the initial one respecting adaptation constraints, we define proximities for adapting static documents ( documents without animations) and animated documents. Moreover, we show that these proximities can be refined according to multimedia object properties ( images, videos...). The approach is illustrated by an example.

- Models and Ontologies | Pp. 128-137

Deep into Color Names: Matching Color Descriptions by Their Fuzzy Semantics

Haiping Zhu; Huajie Zhang; Yong Yu

In daily life, description and location of certain objects on the web are much dependent on color names. Therefore, a maturely-implemented matching subsystem for color descriptions will certainly facilitate web applications in the domains concerned, such as image retrieval, clothing search, etc. However, both keyword matching and semantic mediation by the current ontologies are confronted with difficulties in precisely evaluating the similarity between color descriptions, which requests the exploitation of “deeper” semantics to bridge the semantic gap. What with the inherent variability and imprecision characterizing color naming, this paper proposes a novel approach for defining (1) the fuzzy semantics of color names on the HSL color space, and (2) the associated measures to evaluate the similarity between two fuzzified color descriptions. The experimental results have preliminarily shown the strength of the deeper semantics surpassing the ability of both keywords and WordNet, in dealing with the matching problem of color descriptions.

- Models and Ontologies | Pp. 138-149

Developing an Argumentation Ontology for Mailing Lists

Colin Fraser; Harry Halpin; Kavita E. Thomas

Managing emails from list-servs is an open problem that we believe may be partially resolved by the introduction of a principled, argumentation-based approach towards their representation. We propose an argumentation ontology, called “Argontonaut,” which has been developed for the domain of standards-driven W3C mailing lists. We use the extensible nature of RDF to fuse an argumentation-based approach with one grounded in an issue-management system. We motivate our ontology with reference to the domain and propose future work in this area.

- Models and Ontologies | Pp. 150-161

Clustering Approach Using Belief Function Theory

Sarra Ben Hariz; Zied Elouedi; Khaled Mellouli

Clustering techniques are considered as efficient tools for partitioning data sets in order to get homogeneous clusters of objects. However, the reality is connected to uncertainty by nature, and these standard algorithms of clustering do not deal with this uncertainty pervaded in their parameters. In this paper we develop a clustering method in an uncertain context based on the K-modes method and the belief function theory. This so-called belief K-modes method (BKM) provides a new clustering technique handling uncertainty in the attribute values of objects in both the clusters’ construction task and the classification one.

- Machine Learning | Pp. 162-171

Machine Learning for Spoken Dialogue Management: An Experiment with Speech-Based Database Querying

Olivier Pietquin

Although speech and language processing techniques achieved a relative maturity during the last decade, designing a spoken dialogue system is still a tailoring task because of the great variability of factors to take into account. Rapid design and reusability across tasks of previous work is made very difficult. For these reasons, machine learning methods applied to dialogue strategy optimization has become a leading subject of researches since the mid 90’s. In this paper, we describe an experiment of reinforcement learning applied to the optimization of speech-based database querying. We will especially emphasize on the sensibility of the method relatively to the dialogue modeling parameters in the framework of the Markov decision processes, namely the state space and the reinforcement signal. The evolution of the design will be exposed as well as results obtained on a simple real application.

- Machine Learning | Pp. 172-180

Exploring an Unknown Environment with an Intelligent Virtual Agent

In-Cheol Kim

We consider the problem of exploring an unknown environment with an intelligent virtual agent. Traditionally research efforts to address the exploration and mapping problem have focused on the graph-based space representations and the graph search algorithms. In this paper, we propose DFS-RTA* and DFS-PHA*, two real-time graph search algorithms for exploring and mapping an unknown environment. Both algorithms are based upon the simple depth-first search strategy. However, they adopt different real-time shortest path-finding methods for fast backtracking to the last unexhausted node. Through some experiments with a virtual agent deploying in a 3D interactive computer game environment, we confirm completeness and efficiency of two algorithms.

- Machine Learning | Pp. 181-189