dblp: AIKE 2019 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


2nd AIKE 2019: Sardinia, Italy

jump to- Session I: Learning I
- Session II: Sentiment and Emotion
- Session III: Data, Knowledge and Rules
- Session IV: System and Applications
- Session V: Learning 2
- Session VI: Ontologies and Knowledge Graphs
- Session VII: Learning 3
- Session VIII: Classification and Clustering
- Session IX: Actions and Planning
- Doctoral Consortium
- International Workshop on Technology Enhanced Learning and Assessment (TELA)
- International Workshop on AI Bigdata Cloud Technologies (ABC)

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2019, Sardinia, Italy, June 3-5, 2019. IEEE 2019, ISBN 978-1-7281-1488-0
Session I: Learning I

Mudit Verma
, Pradyumna Sinha, Karan Goyal, Apoorva Verma, Seba Susan
:
A Novel Framework for Neural Architecture Search in the Hill Climbing Domain. 1-8

Amine Chemchem, François Alin, Michaël Krajecki:
Combining SMOTE Sampling and Machine Learning for Forecasting Wheat Yields in France. 9-14

M. M. Manohara Pai, Vaibhav Mehrotra, Shreyas Aiyar, Ujjwal Verma
, Radhika M. Pai
:
Automatic Segmentation of River and Land in SAR Images: A Deep Learning Approach. 15-20

Girisha S
, M. M. Manohara Pai, Ujjwal Verma
, Radhika M. Pai
:
Semantic Segmentation of UAV Aerial Videos using Convolutional Neural Networks. 21-27

Mengqi Yuan, Jinke Xu, Zhongnian Li:
Long Tail Multi-label Learning. 28-31

Adrien Legrand, Harold Trannois, Alain Cournier:
Use of Uncertainty with Autoencoder Neural Networks for Anomaly Detection. 32-35
Session II: Sentiment and Emotion
Session III: Data, Knowledge and Rules

Nonyelum Ndefo, Enrico Franconi:
On Preserving Information in Schema Transformations: A Constructive Perspective. 57-64

Michael R. Genesereth
, Abhijeet Mohapatra:
Practical Reformulation of Deductive Databases. 65-72

Elio Masciari
, Domenico Saccà, Irina Trubitsyna:
Simple User Assistance by Data Posting. 73-80

Beniamino Di Martino, Claudio Mirarchi
, Fedele Federico D'Abrunzo, Luigi Fiorillo, Nicola Iovine, Caterina Trebbi, Alberto Pavan:
A Semantic and Rule Based Technique and Inference Engine for Discovering Real Estate Units in Building Information Models. 81-88

Mark Proctor, Davide Sottara:
Rule Modularity and Execution Control Enhancements for a Java-Based Rule Engine. 89-96
Session IV: System and Applications

Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Sylvie Calabretto, Liyun He-Guelton, Frédéric Oblé, Michael Granitzer:
Dataset Shift Quantification for Credit Card Fraud Detection. 97-100

Lorenzo Lepore, Manuel Namici, Giacomo Ronconi, Marco Ruzzi, Valerio Santarelli:
The Mastro Ecosystem: Ontology-Based Data Management from Theory to Practice. 101-102

Simon Delecourt, Li Guo:
Building a Robust Mobile Payment Fraud Detection System with Adversarial Examples. 103-106

Nicola Fiorentino, Sergio Greco
, Cristian Molinaro, Irina Trubitsyna:
ACQUA: Approximate Consistent Query Answering Over Inconsistent Knowledge Bases. 107-110

Mattia Atzeni, Maurizio Atzori
:
AskCO: A Multi-language and Extensible Smart Virtual Assistant. 111-112

Felix Zhan:
How to Optimize Social Network Influence. 113-116
Session V: Learning 2

Ronghua Hu, Samir Bouindour, Hichem Snoussi, Abel Cherouat, Charbel Chahla:
Multiple Cues Association for Multiple Object Tracking Based on Convolutional Neural Network. 117-122

Chetan Nadiger, Anil Kumar, Sherine Abdelhak:
Federated Reinforcement Learning for Fast Personalization. 123-127

Stefan Kerscher
, Bernd Ludwig, Nikolaus Müller:
Investigating the Added Value of Combining Regression Results from Different Window Lengths. 128-135

Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error. 136-139
Session VI: Ontologies and Knowledge Graphs

Yogita Suryawanshi, Haonan Qiu, Adel Ayara, Birte Glimm:
An Ontological Model for Map Data in Automotive Systems. 140-147

Bilal Said
, Lilia Cheniti-Belcadhi, Ghada A. El Khayat:
An Ontology for Personalization in Serious Games for Assessment. 148-154

Federico Maria Scafoglieri
, Domenico Lembo:
A Formal Framework for Coupling Document Spanners with Ontologies. 155-162

Lilia Cheniti-Belcadhi, Ghada A. El Khayat, Bilal Said
:
Knowledge Engineering for Competence Assessment on Serious Games Based on Semantic Web. 163-166

Alexander Sakharov:
Hierarchical Rules for Knowledge Representation and Learning. 167-171
Session VII: Learning 3

Samir Bouindour, Ronghua Hu, Hichem Snoussi:
Enhanced Convolutional Neural Network for Abnormal Event Detection in Video Streams. 172-178

Taketo Yoshida, Yasuo Kuniyoshi:
Adversarial Imitation Learning between Agents with Different Numbers of State Dimensions. 179-186

Neda Nasiriani, Anna Cinzia Squicciarini, Zara Saldanha, Sanchit Goel, Nicola Zannone
:
Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach. 187-194

Deogratias Mzurikwao
, Oluwarotimi Williams Samuel, Mojisola Grace Asogbon, Xiangxin Li, Guanglin Li
, Woon-Hong Yeo
, Christos Efstratiou, Chee Siang Ang:
A Channel Selection Approach Based on Convolutional Neural Network for Multi-channel EEG Motor Imagery Decoding. 195-202

Stephen Camilleri, Joel Azzopardi
, Matthew R. Agius:
Investigating the Relationship between Earthquakes and Online News. 203-210

Quentin Fournier
, Daniel Aloise
:
Empirical Comparison between Autoencoders and Traditional Dimensionality Reduction Methods. 211-214
Session VIII: Classification and Clustering

Ujjwal Pasupulety
, Aiman Abdullah Anees, Subham Anmol, Biju R. Mohan
:
Predicting Stock Prices using Ensemble Learning and Sentiment Analysis. 215-222

Marco Calderisi, Gabriele Galatolo, Ilaria Ceppa, Tommaso Motta, Francesco Vergentini:
Improve Image Classification Tasks Using Simple Convolutional Architectures with Processed Metadata Injection. 223-230

Andrea Pasini, Elena Baralis:
Detecting Anomalies in Image Classification by Means of Semantic Relationships. 231-238

Rodrigo Monteiro de Aquino
, Fábio Gagliardi Cozman
:
Natural Language Explanations of Classifier Behavior. 239-242
Session IX: Actions and Planning

Yaniel Carreno
, Ronald P. A. Petrick, Yvan R. Pétillot
:
Multi-agent Strategy for Marine Applications via Temporal Planning. 243-250

Alper Öner
, Mehmet Selçuk Albayrak, Furkan Guner, Idris Murat Atakli:
An Activity Recognition Application Based on Markov Decision Process Through Fish Eye Camera. 251-258

D. Michael Franklin
:
Hierarchical Modeling for Strategy-Based Multi-agent Multi-team Systems. 259-266

Rizwan Asif
, Hendrik Löffel, Vorapol Assavasangthong, Giulio Martinelli, Phillip Gajland, Borja Gálvez:
Aerial Path Planning for Multi-Vehicles. 267-272
Doctoral Consortium

Antonela Tommasel:
Friend or Foe: Studying user Trustworthiness for Friend Recommendation in the Era of Misinformation. 273-276

Selam Waktola, Krzysztof Grudzien
, Laurent Babout
:
Stagnant Zone Segmentation with U-Net. 277-280

Ignacio Gatti:
A Hybrid Approach for Artwork Recommendation. 281-284

Sujoy Chatterjee
:
Decision Making from Multiple Crowd Opinions. 285-288

Mrinal Kanti Baowaly
, Chao-Lin Liu, Kuan-Ta Chen:
Realistic Data Synthesis Using Enhanced Generative Adversarial Networks. 289-292

Sangeeta Yadav
, Sashikumaar Ganesan:
How Deep Learning performs with Singularly Perturbed Problems? 293-297

Rafael Elias de Lima Escalfoni
, Mônica Ferreira da Silva
, Jonice Oliveira:
Coral Framework - A Big Social Data Approach to Boost Startup Ecosystem. 298-301

Vu Nguyen
:
Bayesian Optimization for Accelerating Hyper-Parameter Tuning. 302-305
International Workshop on Technology Enhanced Learning and Assessment (TELA)

Sara Nasr, Oleg V. German:
Assessment of Graduate Students' Resumes Using Short Text Searching Method. 306-308
International Workshop on AI Bigdata Cloud Technologies (ABC)

Jaemin Jung, Kyeonghwan Lim, Byoungchul Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Detecting Malicious Android Apps using the Popularity and Relations of APIs. 309-312

Ali Jabbari, Olivier Sauvage, Nicolas Cabioch:
Towards a Knowledge Base of Financial Relations: Overview and Project Description. 313-316

Minjae Kim, SungHwan Jeon, Heeseong Shin, Wonseok Choi, Haejin Chung, Yunmook Nah:
Movie Recommendation based on User Similarity of Consumption Pattern Change. 317-319

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






