Algorithms in ambient intelligence

In this chapter, we discuss the new paradigm for user-centered computing known as ambient intelligence and its relation with methods and techniques from the field of computational intelligence, including problem solving, machine learning, and expert systems.

[1]  Andries P. Engelbrecht,et al.  Computational Intelligence: An Introduction , 2002 .

[2]  Terrence J. Sejnowski,et al.  Parallel Networks that Learn to Pronounce English Text , 1987, Complex Syst..

[3]  Efraim Turban,et al.  Guest editor's note: Case-based reasoning and its applications , 1993 .

[4]  R. Duda,et al.  Expert Systems Research. , 1983, Science.

[5]  Ramanathan V. Guha,et al.  Building large knowledge-based systems , 1989 .

[6]  Mark Weiser The computer for the 21st century , 1991 .

[7]  Anders Krogh,et al.  Introduction to the theory of neural computation , 1994, The advanced book program.

[8]  Pattie Maes,et al.  Designing autonomous agents: Theory and practice from biology to engineering and back , 1990, Robotics Auton. Syst..

[9]  Edward P. K. Tsang,et al.  Foundations of constraint satisfaction , 1993, Computation in cognitive science.

[10]  Michael Dertouzos The Unfinished Revolution , 2001 .

[11]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[12]  Lawrence G. Tesler,et al.  Networked Computing in the 1990s. , 1991 .

[13]  Umesh V. Vazirani,et al.  An Introduction to Computational Learning Theory , 1994 .

[14]  Nicholas Negroponte,et al.  Being Digital , 1995 .

[15]  Terry Winograd,et al.  Understanding computers and cognition - a new foundation for design , 1987 .

[16]  J. K. Lenstra,et al.  Local Search in Combinatorial Optimisation. , 1997 .

[17]  Michael J. Fischer,et al.  The String-to-String Correction Problem , 1974, JACM.

[18]  Trevor Darrell,et al.  Ausio-visual Segmentation and "The Cocktail Party Effect" , 2000, ICMI.

[19]  Peter Sinc̆ák,et al.  Quo vadis computational intelligence? : new trends and approaches in computational intelligence , 2000 .

[20]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[21]  Nils J. Nilsson,et al.  Artificial Intelligence: A New Synthesis , 1997 .

[22]  E. Shortliffe Computer-based medical consultations: mycin (elsevier north holland , 1976 .

[23]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[24]  G. Nemhauser,et al.  Integer Programming , 2020 .

[25]  Rosalind W. Picard Affective Computing , 1997 .

[26]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[27]  A. M. Turing,et al.  Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.

[28]  Eugene L. Lawler,et al.  Sublinear approximate string matching and biological applications , 1994, Algorithmica.

[29]  M. Dertouzos THE FUTURE OF COMPUTING , 1999 .

[30]  Steffen Pauws Cubyhum: Algorithms for Query by Humming , 2004 .

[31]  Edward H. Shortliffe,et al.  Computer-based medical consultations, MYCIN , 1976 .

[32]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[33]  Reinder J. Bril,et al.  QoS Control Strategies for High-Quality Video Processing , 2004, ECRTS.

[34]  Steve Mann,et al.  Wearable Computing: A First Step Toward Personal Imaging , 1997, Computer.

[35]  Terry Winograd,et al.  Bringing Design to Software , 1996 .

[36]  I H Osman,et al.  Meta-Heuristics Theory and Applications , 2011 .

[37]  Eugene W. Myers,et al.  A sublinear algorithm for approximate keyword searching , 1994, Algorithmica.

[38]  Jean-Marc Odobez,et al.  Audio-visual speaker tracking with importance particle filters , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[39]  Wim F. J. Verhaegh,et al.  Dynamic Control of Scalable Media Processing Applications , 2004 .

[40]  R. Brooks Flesh and machines , 2001 .

[41]  Sridha Sridharan,et al.  Robust speaker recognition using microphone arrays , 2001, Odyssey.

[42]  Gonzalo Navarro,et al.  A guided tour to approximate string matching , 2001, CSUR.

[43]  Alexander H. Waibel,et al.  Visual tracking for multimodal human computer interaction , 1998, CHI.

[44]  Gary Stix,et al.  Encoding the "Neatness" of Ones and Zeroes , 1991 .

[45]  R. Palmer,et al.  Introduction to the theory of neural computation , 1994, The advanced book program.

[46]  Peter H. Sellers,et al.  The Theory and Computation of Evolutionary Distances: Pattern Recognition , 1980, J. Algorithms.

[47]  E. Feigenbaum,et al.  Computers and Thought , 1963 .

[48]  R. Doyle The American terrorist. , 2001, Scientific American.

[49]  Donald A. Norman,et al.  Things that make us smart , 1979 .

[50]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[51]  Zehra F. Peynírcíğlu,et al.  Name or hum that tune: Feeling of knowing for music , 1998, Memory & cognition.

[52]  Aude Billard,et al.  From Animals to Animats , 2004 .

[53]  M. Minsky The Society of Mind , 1986 .

[54]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[55]  P. Rousseeuw,et al.  Wiley Series in Probability and Mathematical Statistics , 2005 .

[56]  Nello Cristianini,et al.  An introduction to Support Vector Machines , 2000 .

[57]  Pamela McCorduck,et al.  Machines Who Think: A Personal Inquiry into the History and Prospects of Artificial Intelligence , 1979 .

[58]  Ming Li,et al.  An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.

[59]  Peter J. Denning,et al.  Beyond calculation - the next fifty years of computing , 1997 .

[60]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[61]  James A. Hendler,et al.  The Semantic Web" in Scientific American , 2001 .

[62]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[63]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.