Abstract is missing.
- Toward human level machine intelligence - is it achievable?Lotfi A. Zadeh. 1 [doi]
- Probabilistic roadmaps: An incremental sampling approach to approximate the connectivity of robot configuration spacesJean-Claude Latombe. 2 [doi]
- On abstract intelligence and its denotational mathematics foundationsYingxu Wang. 3-12 [doi]
- Complexity and its measures in cognitive and other complex systemsWitold Kinsner. 13-29 [doi]
- The cognitive processes of consciousness and attentionYingxu Wang, Ying Wang. 30-39 [doi]
- On bioinformatics and cognitive informatics: Emerging pattern, dissipative structure, and evolving cognitionM. He. 40-49 [doi]
- The reactive-causal architecture: Combining intentional notion and theories of needsAli Orhan Aydin, Mehmet A. Orgun, Abhaya C. Nayak. 50-59 [doi]
- The optimum method for building delaunay triangulation based on the Virtual GridLichao Chen, Shaofang Xia, Jia Liu. 60-66 [doi]
- Modeling a secure sensor network system using an Extended Elementary Object SystemVineela Devarashetty, Jeffrey J. P. Tsai, Lu Ma, Du Zhang. 67-74 [doi]
- A uniform framework for orientation relations based on distance comparisonTiansi Dong, Hans W. Guesgen. 75-82 [doi]
- Premature atrial complexes detection using the Fisher Linear DiscriminantMohamed Elgendi, Mirjam Jonkman, Friso De Boer. 83-88 [doi]
- A pharmacogenomic study on the polymorphic gene response to risperidone in schizophrenia patientsLei Wang, Daniel O Connor, Ying Wang, Guoyin Feng, Lin He. 89-93 [doi]
- The computational manifold approach to consciousness and symbolic processing in the cerebral cortexDouglas S. Greer. 94-103 [doi]
- On cognitive foundations of creativity and the cognitive process of creationYingxu Wang. 104-113 [doi]
- Cognitive prism: A bridge between meta cognitive model and higher cognitive modelsTiansi Dong. 114-121 [doi]
- A novel cognitive model of reading: Neuropsychology research on internal processing of the brainXiu-Li Zheng, Fei Luo, Chun-Lei Shan, Wen-Gang Yin. 122-127 [doi]
- Adaptive evaluation of complex time series using nonconventional neural unitsIvo Bukovsky, Jiri Bila. 128-137 [doi]
- Intelligent adaptation and the nature of software changesPaolo Rocchi. 138-143 [doi]
- Role-based systems are autonomicHaibin Zhu. 144-152 [doi]
- A web personalization system based on users interested domainsMinxiao Lei, Lisa Fan. 153-159 [doi]
- Verification and validation of a Neural-Symbolic Hybrid System using an enhanced Petri netRicardo R. Jorge, Gerardo Reyes Salgado, Vianey Guadalupe Cruz Sánchez. 160-167 [doi]
- Strategies to recommend groupware tools according to virtual team characteristicsGabriela N. Aranda, Aurora Vizcaíno, Alejandra Cechich, Mario Piattini. 168-174 [doi]
- Spatio-temporal topological relationships based on rough setAnahid Bassiri, Ali A. Alesheikh. 175-180 [doi]
- Software Process Fusion: Exploring process relationshipsKim Man Lui, Keith C. C. Chan. 181-184 [doi]
- A dualism based semantics formalization mechanism for model driven engineeringYucong Duan. 185-194 [doi]
- Evaluating text understanding based on contextNing Fang, Xiangfeng Luo, Weimin Xu. 195-204 [doi]
- Discover hierarchical lexical hyponymy relation from large-scale concept setJiayu Zhou, Youfang Lin, Shi Wang, Cungen Cao. 205-214 [doi]
- CompactLEM2: A scalable rough set based knowledge acquisition method that generates small number of short rulesYang Liu, Guohua Bai, Boqin Feng. 215-222 [doi]
- The cognitive processes of analysis and synthesis in formal inferencesYingxu Wang. 223-231 [doi]
- Application of artificial neural computation in topex waveform data: A case study in water ratio regressionB. Zhang, F. W. Schwartz, D. Tong. 232-238 [doi]
- The cognitive processes of perceptions on spatiality, time, and motionYingxu Wang. 239-248 [doi]
- A learning automata-based method for estimating the mobility model of nodes in Mobile Ad-Hoc NETworksAmir H. Jamalian, Reza Iraji, M. T. Manzuri-Shalmani. 249-254 [doi]
- On mining rules that involve inequalities from decision tableYang Liu, Guohua Bai, Boqin Feng. 255-260 [doi]
- Superblock scheduling using genetic programming for embedded systemsAnjali Mahajan, M. S. Ali. 261-266 [doi]
- Following the evolution of distributed Communities of PracticeGilson Yukio Sato, Jean-Paul A. Barthès, Ke-Jia Chen. 267-276 [doi]
- A design of cognitive agents for recognizing real space - towards symbiotic computing - Kenji Sugawara, Shigeru Fujita, Tetsuo Kinoshita, Norio Shiratori. 277-285 [doi]
- Agent interoperability mechanism among heterogeneous Agent Platforms for symbiotic computingTakahiro Uchiya, Takahide Maemura, Xiaolu Li, Susumu Konno, Tetsuo Kinoshita. 286-293 [doi]
- Conversation support for people with aphasia in distant communicationNilar Aye, Takuro Ito, Fumio Hattori, Kazuhiro Kuwabara, Kiyoshi Yasuda. 294-299 [doi]
- Agent-based middleware for advanced ubiquitous communication services based on symbiotic computingTakuo Suganuma, Hideyuki Takahashi, Norio Shiratori. 300-309 [doi]
- Flexible open 3D digital space combination scheme for symbiotic collaborative worksTakayuki Kuroda, Akira Sakatoku, Gen Kitagata, Debasish Chakraborty, Norio Shiratori. 310-316 [doi]
- A cognitive informatics theory for visual information processingYingxu Wang. 317-323 [doi]
- Optical flow-based facial feature tracking using prior measurementKun He, Guoyin Wang, Yong Yang. 324-331 [doi]
- Hierarchical dual memory structure determines cognitive logic of the human brainSherwin Han. 332-340 [doi]
- Using cognitive techniques for assessing the influence of coupling on the maintainability of OCL expressionsLuis Reynoso, Marcela Genero, Mario Piattini, M. Esperanza Manso. 341-350 [doi]
- Speech segmentation using multifractal measures and amplification of signal featuresWitold Kinsner, Warren Grieder. 351-357 [doi]
- A Double-Piped iterated hash function based on a hybrid of chaotic mapsJun Peng, Du Zhang, Yongguo Liu, Xiaofeng Liao. 358-365 [doi]
- Protect mobile RFID location privacy using dynamic identityMing-Hour Yang, Jain-Shing Wu, Shih-Jen Chen. 366-374 [doi]
- A new approach for classification of fingerprint image qualityJun Wu, Shan Juan Xie, Dong-Hun Seo, Won Don Lee. 375-383 [doi]
- On Visual Semantic Algebra (VSA) and the cognitive process of pattern recognitionYingxu Wang. 384-393 [doi]
- A real-time Clearance-Based approach for motion planning of mobile robotsM. Naderan Tahan, Reza Iraji, M. T. Manzuri-Shalmani. 394-401 [doi]
- Giving an office assistant agent a memory mechanismKe-Jia Chen, Jean-Paul A. Barthès. 402-410 [doi]
- Vision based navigation for power transmission line inspection robotSi-Yao Fu, Zi-ze Liang, Zeng-Guang Hou, Min Tan. 411-417 [doi]
- On Long Lifespan systemsYingxu Wang. 418-428 [doi]
- Specialisation Cognitive Informatics at the Prague University of EconomicsVaclav Repa. 429-434 [doi]
- Qualitative fuzzy sets and granularityTsau Young Lin, Shusaku Tsumoto. 435-440 [doi]
- Micro and macro evaluation of classification rulesYiyu Yao, Bing Zhou. 441-448 [doi]
- Case-Based Reasoning with feature clusteringTzung-Pei Hong, Yan-Liang Liou. 449-454 [doi]
- Fuzziness from attribute generalization in information tableShusaku Tsumoto, Shoji Hirano. 455-461 [doi]
- Measurement of granulesLi-Quan Zhao, Ling Zhang. 462-467 [doi]
- Statistical independence in three-variables contingency cubeShusaku Tsumoto, Shoji Hirano. 468-474 [doi]
- Improved offline signature verification scheme using feature point extraction methodDebasish Jena, Banshidhar Majhi, Saroj Kumar Panigrahy, Sanjay Kumar Jena. 475-480 [doi]
- Semantic approach to text entailment for question answering - new domain for uncertainty modelingAsli Çelikyilmaz, Marcus Thint. 481-487 [doi]