• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Flexible and Scalable Query Planning in Mediators
Flexible and Scalable Query Planning in Mediators

... the sources of complexity that result in the highly combinatorial nature query planning in mediators. Instead of exhaustively searching the space of query plans or optimize each aspect independently, PbR addresses the complexity in the three fronts simultaneously by using local search techniques. Pb ...
prise 2007
prise 2007

... distributed as-is. To address this problem, some approaches propose methods aimed at avoiding the distribution of the traces, totally preventing information leakage [1]. These approaches, however, cannot by followed if traffic traces have to be used to simulate and evaluate the performance of securi ...
IOSR Journal Of Humanities And Social Science (IOSR-JHSS)
IOSR Journal Of Humanities And Social Science (IOSR-JHSS)

... reasoning strategies in different areas in legal domain. Keywords: Expert system,Expertise,inference Engine, ,Knowledge Based System. I. Introduction According to Feigenbaum “An expert system is an intelligent computer program that uses knowledge and inference procedures to solve problems that are d ...
Knowledge Processing for Cognitive Robots
Knowledge Processing for Cognitive Robots

... are represented as fluents; location(R,L) thus becomes location(R,L,Time). Through the use of computable predicates, the symbolic information is always computed from the most current data and updated when the world changes. Computables are also used for generating object instances based on the curre ...
Turing Test - University of Windsor
Turing Test - University of Windsor

... The game is played between a man (A), a woman (B), and an interrogator (C). The interrogator’s aim is to distinguish between the man and the woman by the way his/her toe is stepped on. C stays in a room apart from the other two and cannot see or hear the toe-stepping counterparts. There is a small o ...
pdf file
pdf file

... Moreover, Agent Specific Task has the following two subcomponents: Process Analysis assesses the current state of the human, and Plan Determination determines whether action (intervention) has to be undertaken, and, if so, which ones. Finally, as in the model GAM, World Interaction Management and Ag ...
ibm-cognitive-curriculum-6-6
ibm-cognitive-curriculum-6-6

... in teams of augmented individuals in diverse contexts, to design of work in global organizations with support from crowd-sourced and machine intelligence in the cloud. Business (Reasoning): Market opportunities are changing. Reasoning about future opportunities is challenging as data becomes an abun ...
“Research Aspect of Expert system of Indian judiciary of crime
“Research Aspect of Expert system of Indian judiciary of crime

... judiciary and police. It can be used by prosecutors to evaluate their performance. With increasing crime rate, it was difficult to keep all information manually .Hence a software tool is necessary or needed to record pending cases which needs to be sorted and analyzed scientifically to highlight fac ...
Managing the Digital Firm - Department of Computer Engineering
Managing the Digital Firm - Department of Computer Engineering

... Forward chaining or data-driven inference works from an initial state, and by looking at the premises of the rules (IF-part), perform the actions (THEN-part), possibly updating the knowledge base or working memory. This continues until no more rules can be applied or some cycle limit is met, e.g. ...
Managing the Digital Firm
Managing the Digital Firm

... Forward chaining or data-driven inference works from an initial state, and by looking at the premises of the rules (IF-part), perform the actions (THEN-part), possibly updating the knowledge base or working memory. This continues until no more rules can be applied or some cycle limit is met, e.g. ...
PDF
PDF

... the foregoing discussion. The unsuitability of using expert systems for research has already been noted. The question, then, is whether they have a role in agricultural economics extension. I suspect that their role will be minor. The farm management problems of interest to agricultural economists g ...
Full Text - MECS Publisher
Full Text - MECS Publisher

... which co mplements the solution, acting as a memo ry of past cases which can be consulted in order to identify similar cases for the new problem. CBR is described as a cyclical process comprising of the four ‗Re‘s [8]. These are: (1) retrieve the most similar case, (2) re-use the case to attempt to ...
2015 - An International Journal of Advanced Computer
2015 - An International Journal of Advanced Computer

... Routes are established on demand as they are needed. Reactive routing protocols find a path between the source and the destination only when the path is needed. In AODV, the network is silent until a connection is needed. At that point the network node that needs a connection broadcasts a request fo ...
Executive Summary - The IEEE Standards Association
Executive Summary - The IEEE Standards Association

... We need to make sure that these technologies are aligned to humans in terms of our moral values and ethical principles.  AI/AS have to behave in a way that is beneficial to people beyond reaching functional goals and addressing technical problems. This will allow for an elevated level of trust betwe ...
COURSE: COMPUTER APPRECIATION FOR MANAGERS
COURSE: COMPUTER APPRECIATION FOR MANAGERS

... crystal displays and most of them use different memory modules for their random access memory (RAM), for instance, SO-DIMM in lieu of the larger DIMMs. In addition to a built-in keyboard, they may utilize a touchpad (also known as a trackpad) or a pointing stick for input, though an external keyboar ...
An Oz-Centric Review of Interactive Drama and
An Oz-Centric Review of Interactive Drama and

... This paper provides an overview of research in believable agents and interactive drama. Many of the original sources used in compiling this paper can be found on the web; the annotated bibliography provides URLs for these web resources. This paper unabashedly surveys its topic with the bias of the O ...
A Study on Artificial Intelligence IQ and Standard Intelligent Model
A Study on Artificial Intelligence IQ and Standard Intelligent Model

... , which is used to conduct more in-depth assessment on the computer ability to identify images. Moshe Vardi, the chief editor of Communications of ACM proposed that the computer’s intelligence characteristics cannot be verified with a single test, but a series of tests should be employed. Each of su ...
Expressive AI
Expressive AI

... are still committed to building generally applicable engineering tools. Subjective Avatars provides an example of expressive AI's focus on specificity. The characters in Subjective Avatars were built using Hap, a language designed to facilitate the crafting of specific, unique characters [20]. This ...
Natural intelligence in design*
Natural intelligence in design*

... since the emergence of designers as separate professions, it appears that some people have a design ability that is more highly-developed than other people—either through some genetic endowment or through social and educational development. In fact, some people are very good at designing. But can a ...
Expert systems
Expert systems

... what they really want and express what needs to be done to achieve this. Using a prototype must be an iterative process, as a number of cycles through the adaptation of the prototype and retesting on users is necessary. Weitzel and Kerschberg (1989) argue that knowledge-engineering can be done by av ...
Knowledge Building in User-Generated Online Virtual Realities
Knowledge Building in User-Generated Online Virtual Realities

... The services of Web 2.0 offer great opportunities for such a knowledge-building discourse. Through active user participation in the production of content, individuals have the opportunity to participate in a collective development of knowledge and, at the same time, benefit from a vast amount of kno ...
Beyond Keywords: The Revolution in Search
Beyond Keywords: The Revolution in Search

... a natural or intuitive way to ask a question. Conversational and natural language based search interfaces are an active area of research and innovation in search technology. Query Taxonomy There have been many attempts to create a systematic categorization of queries (Hearst 2009). An influential cl ...
Information system
Information system

... and having the ability to put this knowledge to work can result in a successful personal career, organizations that reach their goals, and a society with a higher quality of life – Identify the basic types of business information systems and discuss who uses them, how they are used, and what kinds o ...
Filename: sloman-clowestribute
Filename: sloman-clowestribute

... There is no doubt that for many students the result was an unforgettable learning experience. Whether they became expert programmers or not, they were changed persons, with a new view of themselves, and of computing. Some of this was due to his inimitable personality. In addition he advocated strate ...
CptS 440 / 540 Artificial Intelligence
CptS 440 / 540 Artificial Intelligence

... • AI needs to understand satire • An intelligent agent must be creative • Aaron, Computer Artist • Musical Intelligence ...
< 1 ... 14 15 16 17 18 19 20 21 22 ... 98 >

Human–computer interaction

Human-computer interaction (HCI) researches the design and use of computer technology, focusing particularly on the interfaces between people (users) and computers. Researchers in the field of HCI both observe the ways in which humans interact with computers and design technologies that let humans interact with computers in novel ways.As a field of research, Human-Computer Interaction is situated at the intersection of computer science, behavioral sciences, design, media studies, and several other fields of study. The term was popularized by Stuart K. Card and Allen Newell of Carnegie Mellon University and Thomas P. Moran of IBM Research in their seminal 1983 book, The Psychology of Human-Computer Interaction, although the authors first used the term in 1980 and the first known use was in 1975. The term connotes that, unlike other tools with only limited uses (such as a hammer, useful for driving nails, but not much else), a computer has many uses and this takes place as an open-ended dialog between the user and the computer. The notion of dialog likens human-computer interaction to human-to-human interaction, an analogy the discussion of which is crucial to theoretical considerations in the field.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report