Default Cover Image

2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

Aug. 22 2016 to Aug. 23 2016

Palo Alto, CA, USA

Table of Contents

Formal description of a supervised learning algorithm for concept elicitation by cognitive robotsFull-text access may be available. Sign in or learn about subscription options.pp. 5-14
Experiments on the supervised learning algorithm for formal concept elicitation by cognitive robotsFull-text access may be available. Sign in or learn about subscription options.pp. 86-96
[Front matter]Freely available from IEEE.pp. i-v
Table of contentsFreely available from IEEE.pp. vi-x
Author indexFreely available from IEEE.pp. 558-559
[Back cover]Freely available from IEEE.pp. c4-c4
Image-to-image face recognition using Dual Linear Regression based Classification and Electoral College votingFull-text access may be available. Sign in or learn about subscription options.pp. 106-110
Design and implementation of user-oriented video streaming service based on machine learningFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
Deep learning and deep thinking: New application framework by CICTFull-text access may be available. Sign in or learn about subscription options.pp. 117-128
Performance of Licklider transmission protocol (LTP) in LEO-satellite communications with link disruptionsFull-text access may be available. Sign in or learn about subscription options.pp. 154-159
An information theoretic criterion for adaptive multiobjective memetic optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 15-28
An action guided constraint satisfaction technique for planning problemFull-text access may be available. Sign in or learn about subscription options.pp. 167-173
Simplification and visualization of brain network extracted from fMRI data using CEREBRAFull-text access may be available. Sign in or learn about subscription options.pp. 174-181
Qualitative analysis of pre-performance routines in throwing using simple brain-wave sensorFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
A geometrical and logical unification of mind, light and matterFull-text access may be available. Sign in or learn about subscription options.pp. 188-197
A Sparse Temporal Mesh Model for brain decodingFull-text access may be available. Sign in or learn about subscription options.pp. 198-206
Sentiment user profile analysis based on forgetting curve in mobile environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 207-211
An efficient reduction algorithm based on natural neighbor and nearest enemyFull-text access may be available. Sign in or learn about subscription options.pp. 212-218
A weighted hybrid model for unsteady nonlinear aerodynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 219-225
Logical consensuses for case-based reasoning and for mathematical engineering of AIFull-text access may be available. Sign in or learn about subscription options.pp. 29-33
Semantic computing of simplicity in attributed generalized treesFull-text access may be available. Sign in or learn about subscription options.pp. 244-251
On cognitive foundations of big data science and engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 252-259
A geometric dynamic temporal reasoning method with tagsFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Active mining process for software quality estimationFull-text access may be available. Sign in or learn about subscription options.pp. 268-274
Knowledge-oriented society: The problem of surviving the permanently uncertain future and the Requirement of PermanenceFull-text access may be available. Sign in or learn about subscription options.pp. 275-282
Similarity metric induced metrics with application in machine learning and bioinformaticsFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
The hybrid intelligence swam algorithm for berth-quay cranes and trucks scheduling optimization problemFull-text access may be available. Sign in or learn about subscription options.pp. 288-293
Deductive reasoning and computing based on propositional logicFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Cooperative Compounded Particle Swarm Optimization and applicationFull-text access may be available. Sign in or learn about subscription options.pp. 300-309
Cognitive visual analytics of multi-dimensional cloud system monitoring dataFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
A feature selection framework based on supervised data clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Detecting preferences based on eye movement using combinatorial fusionFull-text access may be available. Sign in or learn about subscription options.pp. 336-343
MetaThink: A MOF-based metacognitive modeling toolFull-text access may be available. Sign in or learn about subscription options.pp. 351-358
Meta-cognition for inferring car driver cognitive behavior from driving recorder dataFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
Light-adaptive face registration based on drivers' videoFull-text access may be available. Sign in or learn about subscription options.pp. 373-376
Dimensional music emotion recognition by valence-arousal regressionFull-text access may be available. Sign in or learn about subscription options.pp. 42-49
Considering eye movement type when applying random forest to detect cognitive distractionFull-text access may be available. Sign in or learn about subscription options.pp. 377-382
Development of a cognitive vehicle system for simulation of driving behaviorFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
Machine-learning approach to analysis of driving simulation dataFull-text access may be available. Sign in or learn about subscription options.pp. 398-402
Terrorism risk assessment using hierarchical bidirectional fuzzy rule interpolationFull-text access may be available. Sign in or learn about subscription options.pp. 403-410
Soft sensing of the burning through point in iron-making processFull-text access may be available. Sign in or learn about subscription options.pp. 415-418
Ensemble cuckoo search biclustering of the gene expression dataFull-text access may be available. Sign in or learn about subscription options.pp. 419-422
Towards scalable computational models of emotions for autonomous agentsFull-text access may be available. Sign in or learn about subscription options.pp. 442-450
A user authentication protocol combined with trust model and ECC for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 451-458
Utilizing finger movement data to cluster patients with everyday action impairmentFull-text access may be available. Sign in or learn about subscription options.pp. 459-464
Feature extraction of video using deep neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 465-470
A copula based method for fish species classificationFull-text access may be available. Sign in or learn about subscription options.pp. 471-478
Improving pattern classification by nonlinearly combined classifiersFull-text access may be available. Sign in or learn about subscription options.pp. 489-495
A new multifunctional neural network with high performance and low energy consumptionFull-text access may be available. Sign in or learn about subscription options.pp. 496-504
Modelling and designing multilingual cognitive systems for collaborative research A progress reportFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
Logic of natural language: Through the eyes of ontological semanticsFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
Quantum cognitive computation by CICTFull-text access may be available. Sign in or learn about subscription options.pp. 60-71
Construction of linguistic variables based on rule induction and concept hierarchyFull-text access may be available. Sign in or learn about subscription options.pp. 516-522
A novel method for document summarization using Word2VecFull-text access may be available. Sign in or learn about subscription options.pp. 523-529
Ranking preferences deduction based on semantic similarity for the stable marriage problemFull-text access may be available. Sign in or learn about subscription options.pp. 530-534
Soft biometric: Give me your favorite images and i will tell your genderFull-text access may be available. Sign in or learn about subscription options.pp. 535-541
Finding a disease-related gene from microarray data using random forestFull-text access may be available. Sign in or learn about subscription options.pp. 542-546
Segmentation of nuclei in digital pathology imagesFull-text access may be available. Sign in or learn about subscription options.pp. 547-550
Bio-inspired cognitive model for sustained attentionFull-text access may be available. Sign in or learn about subscription options.pp. 551-557
A key issue of semantics of informationFull-text access may be available. Sign in or learn about subscription options.pp. 1-1
Hebbian learning and the LMS algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 2-2
Deep reasoning and thinking beyond deep learning by cognitive robots and brain-inspired systemsFull-text access may be available. Sign in or learn about subscription options.pp. 3-3
Autonomous robot controller using bitwise gibbs samplingFull-text access may be available. Sign in or learn about subscription options.pp. 72-76
Learnings and innovations in speech recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 4-4
Showing 84 out of 84