PRICAI 2000 Topics in Artificial Intelligence: 6th Pacific Rim International Conference on Artificial Intelligence Melbourne, Australia, August 28 - September 1, 2000 Proceedings

Front Cover
Springer Science & Business Media, Aug 21, 2000 - Computers - 835 pages
PRICAI 2000, held in Melbourne, Australia, is the sixth Pacific Rim Interna tional Conference on Artificial Intelligence and is the successor to the five earlier PRICAIs held in Nagoya (Japan), Seoul (Korea), Beijing (China), Cairns (Aus tralia) and Singapore in the years 1990, 1992, 1994, 1996 and 1998 respectively. PRICAI is the leading conference in the Pacific Rim region for the presenta tion of research in Artificial Intelligence, including its applications to problems of social and economic importance. The objectives of PRICAI are: To provide a forum for the introduction and discussion of new research results, concepts and technologies; To provide practising engineers with exposure to and an evaluation of evolving research, tools and practices; To provide the research community with exposure to the problems of practical applications of AI; and To encourage the exchange of AI technologies and experience within the Pacific Rim countries. PRICAI 2000 is a memorial event in the sense that it is the last one in the 20"" century. It reflects what researchers in this region believe to be promising for their future AI research activities. In fact, some salient features can be seen in the papers accepted. We have 12 papers on agents, while PRICAI 96 and 98 had no more than two or three. This suggests to us one of the directions in which AI research is going in the next century. It is true that agent research provides us with a wide range of research subjects from basic ones to applications.
 

Contents

Building Artificial Negotiators
1
Logic and Foundations of
16
A Unifying Semantics for Causal Ramifications
38
Induction and Logic Programming
61
Using Domain Knowledge in ILP to Discover Protein Functional Models
83
Knowledge Reformation
93
Reinforcement Learning
115
Agent Systems
125
Genetic Programming
435
Evolving Neural Networks for Decomposable Problems
446
Constraint Satisfaction
457
Consistency in General CSPs
469
Neural Networks
480
Productivity Improvements through Prediction of Electrolyte
490
Optimal Design of Neural Nets Using Hybrid Algorithms
510
Generating Hierarchical Structure in Reinforcement Learning
533

A Region Selecting Method Which Performs Observation and Action
136
The Lumberjack Algorithm for Learning Linked Decision Forests
156
An Efficient Learning Algorithm Using Natural Gradient
199
An Algorithm for Checking Dependencies of Attributes in a Table
219
Bayesian Networks
241
Efficient Inference in Dynamic Belief Networks
264
Beliefs and Intentions in Agents
277
Perceiving Environments for Intelligent Agents
297
Autonomous Agents
318
Unified Criterion of State Generalization for Reactive Autonomous Agents
340
A Multiagent Approach for Optical Inspection Technology
362
The Use of Mobile Agents in Tracing an Intruder in a Local Area Network
373
A Framework to Model Multiple Environments in Multiagent Systems
383
Task Models Intentions and Agent Conversation Policies
394
Genetic Algorithms
404
Designing Wastewater Collection Systems Using Genetic Algorithms
415
Hybrid Genetic Algorithms Are Better for Spatial Clustering
424
Overcoming the Effects of Sensory Delay by Using a Cerebellar Model
555
Image Processing and Pattern Recognition
577
A Framework of TwoStage Combination of Multiple Recognizers
617
Interactive JapanesetoBraille Translation
638
Statistical Model Based Approach to Spoken Language Acquisition
657
Collaborative Filtering with the Simple Bayesian Classifier
679
Solving the Personal Computer Configuration Problems
701
Functional Understanding Based on an Ontology of Functional Concepts
723
A Diagnosis Function of Arithmetical Word Problems
745
AI and Music
767
Posters
789
Data Mining in Disease Management A Diabetes Case Study
799
A Comparative Analysis
812
A Multiagent Approach for Simulating Bushfire Spread
814
ModelBased Software Requirements Design
827
Intrusion Detection by Combining Multiple Hidden Markov Models
829
Copyright

Common terms and phrases