| Connectionist paradigms and Machine Learning | |
| New Model for Time-series Forecasting using RBFS and Exogenous Data | p. 3 |
| On Improving Data Fitting Procedure in Reservoir Operation using Artificial Neural Networks | p. 13 |
| Automatic Vehicle License Plate Recognition using Artificial Neural Networks | p. 23 |
| Weather Forecasting Models Using Ensembles of Neural Networks | p. 33 |
| Neural Network Predictive Control Applied to Power System Stability | p. 43 |
| Identification of Residues Involved in Protein-Protein Interaction from Amino Acid Sequence - A Support Vector Machine Approach | p. 53 |
| From Short Term Memory to Semantics - a Computational Model | p. 63 |
| Fuzzy Sets, Rough Sets and Approximate Reasoning | |
| Axiomatization of Qualitative Multicriteria Decision Making with the Sugeno Integral | p. 77 |
| A Self-learning Fuzzy Inference for Truth Discovery Framework | p. 87 |
| Exact Approximations for Rough Sets | p. 97 |
| Correlation Coefficient Estimate for Fuzzy Data | p. 105 |
| Agent Architectures and Distributed Intelligence | |
| A Framework for Multiagent-Based System for Intrusion Detection | p. 117 |
| An Adaptive Platform Based Multi-Agents for Architecting Dependability | p. 127 |
| Stochastic Distributed Algorithms for Target Surveillance | p. 137 |
| What-if Planning for Military Logistics | p. 149 |
| Effects of Reciprocal Social Exchanges on Trust and Autonomy | p. 159 |
| Intelligent Web Computing | |
| Real Time Graphical Chinese Chess Game Agents Based on the Client and Server Architecture | p. 173 |
| DIMS: an XML-Based Information Integration Prototype Accessing Web Heterogeneous Sources | p. 183 |
| A Frame-Work for High-Performance Web Mining in Dynamic Environments using Honeybee Search Strategies | p. 193 |
| Internet Security | |
| Real-time Certificate Validation Service by Client's Selective Request | p. 207 |
| Internet Attack Representation using a Hierarchical State Transition Graph | p. 219 |
| A Secure Patch Distribution Architecture | p. 229 |
| Intrusion Detection Using Ensemble of Soft Computing Paradigms | p. 239 |
| Data mining, Knowledge Management and Information Analysis | |
| NETMARK: Adding Hierarchical Object to Relational Databases | p. 251 |
| Academic KDD Project LISp-Miner | p. 263 |
| Performance Evaluation Metrics for Link Discovery Systems | p. 273 |
| Generalizing Association Rules: A Theoretical Framework and Implementation | p. 283 |
| New Geometric ICA Approach for Blind Separation of Sources | p. 293 |
| A Taxonomy of Data Mining Applications Supporting Software Reuse | p. 303 |
| Codifying the ""Know How"" Using CyKNIT Knowledge Integration Tools | p. 313 |
| Data Mining Techniques in Materialised Projection View | p. 321 |
| Data Mining Techniques in Index Techniques | p. 331 |
| Decision Tree Induction from Distributed Heterogeneous Autonomous Data Sources | p. 341 |
| Computational Intelligence in Management | |
| Using IT To Assure a Culture For Success | p. 353 |
| Gender Differences in Performance Feedback Utilizing an Expert System: A Replication and Extension | p. 363 |
| Image Processing and Retrieval | |
| Image Database Query Using Shape-Based Boundary Descriptors | p. 373 |
| Image Retrieval by Auto Weight Regulation PCA Algorithm | p. 383 |
| Improving the Initial Image Retrieval Set by Inter-Query Learning with One-Class SVMs | p. 393 |
| Tongue Image Analysis Software | p. 403 |
| 2 D Object Recognition Using the Hough Transform | p. 413 |
| Optimization, Scheduling and Heuristics | |
| Population Size Adaptation for Differential Evolution Algorithm Using Fuzzy Logic | p. 425 |
| Intelligent Management of QoS Requirements for Perceptual Benefit | p. 437 |
| Integrating Random Ordering into Multi-heuristic List Scheduling Genetic Algorithm | p. 447 |
| Scheduling to be Competitive in Supply Chains | p. 459 |
| Contract Net Protocol for Cooperative Optimisation and Dynamic Scheduling of Steel Production | p. 469 |
| Special Session on Peer-to-Peer Computing | |
| A Peer-to-Peer System Architecture for Multi-Agent Collaboration | p. 483 |
| A Soft Real-Time Agent-Based Peer-to-Peer Architecture | p. 493 |
| Social Networks as a Coordination Technique for Multi-Robot Systems | p. 503 |
| Biology-Inspired Approaches to Peer to Peer Computing in BISON | p. 515 |
| UbAgent: A Mobile Agent Middleware Infrastructure for Ubiquitous/Pervasive Computing | p. 523 |
| 2003 International Workshop on Intelligence, Soft computing and the Web | |
| Enhanced Cluster Visualization Using the Data Skeleton Model | p. 539 |
| Generating Concept Hierarchies for Categorical Attributes using Rough Entropy | p. 549 |
| Learning from Hierarchical Attribute Values by Rough Sets | p. 559 |
| Delivering Distributed Data Mining E-Services | p. 569 |
| Maintenance of Discovered Functional Dependencies: Incremental Deletion | p. 579 |
| Filtering Multilingual Web Content Using Fuzzy Logic | p. 589 |
| A Comparison of Patient Classification Using Data Mining in Acute Health Care | p. 599 |
| Criteria for a Comparative Study of Visualization Techniques in Data Mining | p. 609 |
| Controlling the Spread of Dynamic Self Organising Maps | p. 621 |
| Index of Contributors | p. 631 |
| Table of Contents provided by Publisher. All Rights Reserved. |