default search action
Computational Intelligence, Volume 30
Volume 30, Number 1, February 2014
- Ivan Marsá-Maestre, Miguel A. López-Carmona, Mark Klein, Takayuki Ito, Katsuhide Fujita:
Addressing Utility Space Complexity in Negotiations involving Highly Uncorrelated, Constraint-Based Utility Spaces. 1-29 - Katsuhide Fujita, Takayuki Ito, Mark Klein:
An Approach to Scalable Multi-Issue Negotiation: Decomposing the Contract Space. 30-47 - Raz Lin, Sarit Kraus, Tim Baarslag, Dmytro Tykhonov, Koen V. Hindriks, Catholijn M. Jonker:
Genius: an Integrated Environment for Supporting the Design of Generic Automated Negotiators. 48-70 - Simon Duff, John Thangarajah, James Harland:
Maintenance Goals in Intelligent Agents. 71-114 - Dongdong Yang, Licheng Jiao, Ruican Niu, Maoguo Gong:
Investigation of Combinational Clustering Indices in Artificial Immune Multi-objective Clustering. 115-144 - Tzung-Pei Hong, Chun-Wei Lin, Tsung-Ching Lin:
The MFFP-Tree fuzzy Mining Algorithm to Discover Complete Linguistic Frequent Itemsets. 145-166
Volume 30, Number 2, May 2014
- Liang Chen:
Robustness instead of accuracy Should be the Primary objective for Subjective Pattern Recognition Research: stability Analysis on multicandidate electoral College versus Direct Popular Vote. 167-204 - Kewen Wang, Zhe Wang, Rodney W. Topor, Jeff Z. Pan, Grigoris Antoniou:
Eliminating Concepts and Roles from Ontologies in Expressive Descriptive Logics. 205-232 - Yuexian Hou, Bo Wang, Dawei Song, Xiaochun Cao, Wenjie Li:
Quadratic Tsallis Entropy Bias and generalized Maximum Entropy Models. 233-262 - Tetsuya Yoshida:
A Graph-Based Approach for Semisupervised Clustering. 263-284 - Tingting Mu, Makoto Miwa, Junichi Tsujii, Sophia Ananiadou:
Discovering robust Embeddings in (DIS)Similarity Space for High-Dimensional Linguistic Features. 285-315 - Siyuan Liu, Jie Zhang, Chunyan Miao, Yin-Leng Theng, Alex C. Kot:
An Integrated Clustering-Based Approach to Filtering Unfair Multi-Nominal Testimonies. 316-341 - Huawen Liu, Xindong Wu, Shichao Zhang:
A New Supervised Feature Selection Method for Pattern Classification. 342-361 - Gauvain Bourgne, Nicolas Maudet:
Designing Protocols for Abductive Hypothesis Refinement in Dynamic Multiagent Environments. 362-401 - Pavel Surynek:
Solving Abstract Cooperative Path-Finding in Densely Populated Environments. 402-450
Volume 30, Number 3, August 2014
- Jiajin Huang, Ning Zhong, Yiyu Yao:
A Unified Framework of Targeted Marketing using Customer Preferences. 451-472 - Vicent Estruch, César Ferri, José Hernández-Orallo, M. José Ramírez-Quintana:
Bridging the Gap between Distance and Generalization. 473-513 - Ahmed Al-Faresi, Ahmed Alazzawe, Anis Alazzawe:
Privacy Leakage in Health Social Networks. 514-534 - Derrall Heath, Dan Ventura:
Improving Multilabel Classification by Avoiding Implicit Negativity with Incomplete Data. 535-561 - Chuan Shi, Philip S. Yu, Zhenyu Yan, Yue Huang, Bai Wang:
Comparison and Selection of objective Functions in multiobjective Community Detection. 562-582 - Ya Gao, Guangquan Zhang, Jie Lu, Jun Ma:
A bi-Level Decision Model for Customer Churn Analysis. 583-599 - Haibin Liu, Vlado Keselj, Christian Blouin:
Exploring a Subgraph Matching Approach for Extracting Biological Events from literature. 600-635 - Chien-Hsing Chen:
Feature Selection Based on compactness and Separability: Comparison with filter-Based Methods. 636-656
Volume 30, Number 4, November 2014
- Harm van Seijen, Shimon Whiteson, Leon J. H. M. Kester:
Efficient Abstraction Selection in Reinforcement Learning. 657-699 - Xin Liu, Gilles Trédan, Anwitaman Datta:
A Generic Trust Framework for Large-Scale Open Systems using Machine Learning. 700-721 - Yao Wang, Jie Zhang, Julita Vassileva:
A Super-Agent-Based Framework for Reputation Management and Community Formation in Decentralized Systems. 722-751 - Nattapon Harnsamut, Juggapong Natwichai, Xingzhi Sun, Xue Li:
Privacy Preservation for Associative Classification. 752-770 - Le-Hung Vu, Jie Zhang, Karl Aberer:
Using Identity Premium for Honesty Enforcement and whitewashing Prevention. 771-797 - César Estébanez, Yago Sáez, Gustavo Recio, Pedro Isasi Viñuela:
Automatic Design of Noncryptographic Hash Functions using Genetic Programming. 798-831
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.