Journal of Experimental and Theoretical Artificial Intelligence, Volume 26 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 26, Number 1, 2014
Original Articles

Mohammad Hosein Yas, Saeed Kamarian
, Amin Pourasghar
:
Application of imperialist competitive algorithm and neural networks to optimise the volume fraction of three-parameter functionally graded beams. 1-12

Hongwei Wang, Pei Yin, Lijuan Zheng, James N. K. Liu:
Sentiment classification of online reviews: using sentence-based language model. 13-31

Lars Kotthoff
:
Reliability of computational experiments on virtualised hardware. 33-49

Chongbing Liu, Enrico Pontelli
:
Techniques to enhance efficiency and effectiveness of inductive logic programming systems: the TWEETY approaches. 51-107

Punam Bedi
, Harmeet Kaur
, Bhavna Gupta
:
Trust-based access control for collaborative systems. 109-126

Hosein Alizadeh, Behrouz Minaei-Bidgoli
, Hamid Parvin
:
To improve the quality of cluster ensembles by selecting a subset of base clusters. 127-150
Volume 26, Number 2, 2014
Articles

Prerna Mahajan
, Rekha Kandwal, Ritu Vijay:
Rough set-based approach for automated discovery of censored production rules. 151-166

Abdollah Kavousi-Fard
, Mohammad-Reza Akbari-Zadeh:
A hybrid method based on wavelet, ANN and ARIMA model for short-term load forecasting. 167-182
Miscellany

M. J. Estahbanati:
An adaptive control scheme for doubly fed induction generators - wind turbine implementation. 183-195
Articles

Saeed Kamarian
, Mohammad Hosein Yas, Amin Pourasghar
, M. Daghagh:
Application of firefly algorithm and ANFIS for optimisation of functionally graded beams. 197-209

Mohammad Sadegh Javadi
, M. Saniei, Habib Rajabi Mashhadi
:
An augmented NSGA-II technique with virtual database to solve the composite generation and transmission expansion planning problem. 211-234

Hongwei Wang, Wei Wang, Yuan Meng, Yiwei Zhang:
Degree of user attention to a webpage based on Baidu Index: an alternative to page view. 235-249

Soroor Behbahani
, Nader Jafarnia Dabanloo
, Ali Motie Nasrabadi
, César Alexandre Teixeira
, António Dourado:
A new algorithm for detection of epileptic seizures based on HRV signal. 251-265

Yilmaz Kaya, Lokman Kayci
, Ramazan Tekin, Ömer Faruk Ertugrul:
Evaluation of texture features for automatic detecting butterfly species using extreme learning machine. 267-281

M. J. Estahbanati:
Hybrid probabilistic-harmony search algorithm methodology in generation scheduling problem. 283-296
Volume 26, Number 3, 2014
Special Issue: Risks of General Artificial Intelligence
Editorial

Vincent C. Müller
:
Risks of general artificial intelligence. 297-301
Articles

Steve Omohundro:
Autonomous technology and the greater human good. 303-315

Stuart Armstrong
, Kaj Sotala
, Seán Sáirséal Ó hÉigeartaigh
:
The errors, insights and lessons of famous AI predictions - and what they mean for the future. 317-342

Ted Goertzel:
The path to more general artificial intelligence. 343-354

Miles Brundage:
Limitations and risks of machine ethics. 355-372

Roman V. Yampolskiy:
Utility function security in artificially intelligent agents. 373-389

Ben Goertzel:
GOLEM: towards an AGI meta-architecture enabling both goal preservation and radical self-improvement. 391-403

Alexey Potapov, Sergey Rodionov
:
Universal empathy and ethical bias for artificial general intelligence. 405-416

András Kornai
:
Bounding the impact of AGI. 417-438

Anders Sandberg
:
Ethics of brain emulations. 439-457
Volume 26, Number 4, 2014
Articles

Kazem Mohammadi Aghdam, Iraj Mirzaee, Nader Pourmahmood, Mohammad Pourmahmood Aghababa:
Design of water distribution networks using accelerated momentum particle swarm optimisation technique. 459-475

Ebenezer Owusu
, Yongzhao Zhan, Qirong Mao:
An SVM-AdaBoost-based face detection system. 477-491

Qi Chen, Amanda M. Whitbrook, Uwe Aickelin
, Chris M. Roadknight
:
Data classification using the Dempster-Shafer method. 493-517

Edgardo Ferretti, Marcelo Luis Errecalde
, Alejandro Javier García, Guillermo Ricardo Simari:
A possibilistic defeasible logic programming approach to argumentation-based decision-making. 519-550

Anifowose Fatai
, Suli C. Adeniye, Abdulazeez Abdulraheem
:
Recent advances in the application of computational intelligence techniques in oil and gas reservoir characterisation: a comparative study. 551-570

Qirong Tang, Peter Eberhard
:
Relative observation for multi-robot collaborative localisation based on multi-source signals. 571-591

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







