Algorithms in ambient intelligence
暂无分享,去创建一个
[1] Andries P. Engelbrecht,et al. Computational Intelligence: An Introduction , 2002 .
[2] Terrence J. Sejnowski,et al. Parallel Networks that Learn to Pronounce English Text , 1987, Complex Syst..
[3] Efraim Turban,et al. Guest editor's note: Case-based reasoning and its applications , 1993 .
[4] R. Duda,et al. Expert Systems Research. , 1983, Science.
[5] Ramanathan V. Guha,et al. Building large knowledge-based systems , 1989 .
[6] Mark Weiser. The computer for the 21st century , 1991 .
[7] Anders Krogh,et al. Introduction to the theory of neural computation , 1994, The advanced book program.
[8] Pattie Maes,et al. Designing autonomous agents: Theory and practice from biology to engineering and back , 1990, Robotics Auton. Syst..
[9] Edward P. K. Tsang,et al. Foundations of constraint satisfaction , 1993, Computation in cognitive science.
[10] Michael Dertouzos. The Unfinished Revolution , 2001 .
[11] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[12] Lawrence G. Tesler,et al. Networked Computing in the 1990s. , 1991 .
[13] Umesh V. Vazirani,et al. An Introduction to Computational Learning Theory , 1994 .
[14] Nicholas Negroponte,et al. Being Digital , 1995 .
[15] Terry Winograd,et al. Understanding computers and cognition - a new foundation for design , 1987 .
[16] J. K. Lenstra,et al. Local Search in Combinatorial Optimisation. , 1997 .
[17] Michael J. Fischer,et al. The String-to-String Correction Problem , 1974, JACM.
[18] Trevor Darrell,et al. Ausio-visual Segmentation and "The Cocktail Party Effect" , 2000, ICMI.
[19] Peter Sinc̆ák,et al. Quo vadis computational intelligence? : new trends and approaches in computational intelligence , 2000 .
[20] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[21] Nils J. Nilsson,et al. Artificial Intelligence: A New Synthesis , 1997 .
[22] E. Shortliffe. Computer-based medical consultations: mycin (elsevier north holland , 1976 .
[23] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[24] G. Nemhauser,et al. Integer Programming , 2020 .
[25] Rosalind W. Picard. Affective Computing , 1997 .
[26] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[27] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[28] Eugene L. Lawler,et al. Sublinear approximate string matching and biological applications , 1994, Algorithmica.
[29] M. Dertouzos. THE FUTURE OF COMPUTING , 1999 .
[30] Steffen Pauws. Cubyhum: Algorithms for Query by Humming , 2004 .
[31] Edward H. Shortliffe,et al. Computer-based medical consultations, MYCIN , 1976 .
[32] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .
[33] Reinder J. Bril,et al. QoS Control Strategies for High-Quality Video Processing , 2004, ECRTS.
[34] Steve Mann,et al. Wearable Computing: A First Step Toward Personal Imaging , 1997, Computer.
[35] Terry Winograd,et al. Bringing Design to Software , 1996 .
[36] I H Osman,et al. Meta-Heuristics Theory and Applications , 2011 .
[37] Eugene W. Myers,et al. A sublinear algorithm for approximate keyword searching , 1994, Algorithmica.
[38] Jean-Marc Odobez,et al. Audio-visual speaker tracking with importance particle filters , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[39] Wim F. J. Verhaegh,et al. Dynamic Control of Scalable Media Processing Applications , 2004 .
[40] R. Brooks. Flesh and machines , 2001 .
[41] Sridha Sridharan,et al. Robust speaker recognition using microphone arrays , 2001, Odyssey.
[42] Gonzalo Navarro,et al. A guided tour to approximate string matching , 2001, CSUR.
[43] Alexander H. Waibel,et al. Visual tracking for multimodal human computer interaction , 1998, CHI.
[44] Gary Stix,et al. Encoding the "Neatness" of Ones and Zeroes , 1991 .
[45] R. Palmer,et al. Introduction to the theory of neural computation , 1994, The advanced book program.
[46] Peter H. Sellers,et al. The Theory and Computation of Evolutionary Distances: Pattern Recognition , 1980, J. Algorithms.
[47] E. Feigenbaum,et al. Computers and Thought , 1963 .
[48] R. Doyle. The American terrorist. , 2001, Scientific American.
[49] Donald A. Norman,et al. Things that make us smart , 1979 .
[50] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[51] Zehra F. Peynírcíğlu,et al. Name or hum that tune: Feeling of knowing for music , 1998, Memory & cognition.
[52] Aude Billard,et al. From Animals to Animats , 2004 .
[53] M. Minsky. The Society of Mind , 1986 .
[54] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[55] P. Rousseeuw,et al. Wiley Series in Probability and Mathematical Statistics , 2005 .
[56] Nello Cristianini,et al. An introduction to Support Vector Machines , 2000 .
[57] Pamela McCorduck,et al. Machines Who Think: A Personal Inquiry into the History and Prospects of Artificial Intelligence , 1979 .
[58] Ming Li,et al. An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.
[59] Peter J. Denning,et al. Beyond calculation - the next fifty years of computing , 1997 .
[60] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[61] James A. Hendler,et al. The Semantic Web" in Scientific American , 2001 .
[62] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[63] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.