|
Artificial Intelligence (AI) is a rapidly growing inter-disciplinary field with a long and distinguished history that involves many countries and considerably pre-dates the development of computers. It can be traced back at least as far as Ancient Greece and has evolved over time to become a major subfield of computer science in general.
This state-of-the-art survey not only serves as a "position paper" on the field from the viewpoint of expert members of the IFIP Technical Committee 12, its Working Groups and their colleagues, but also presents overviews of current work in different countries.
The chapters describe important relatively new or emerging areas of work in which the authors are personally involved, including text and hypertext categorization; autonomous systems; affective intelligence; AI in electronic healthcare systems; artifact-mediated society and social intelligence design; multilingual knowledge management; agents, intelligence and tools; intelligent user profiling; and supply chain business intelligence. They provide an interesting international perspective on where this significant field is going at the end of the first decade of the twenty-first century. |
|
|
| | Semantic Web ProgrammingThe next major advance in the Web?Web 3.0?will be built on semantic Web technologies, which will allow data to be shared and reused across application, enterprise, and community boundaries. Written by a team of highly experienced Web developers, this book explains examines how this powerful new technology can unify and fully leverage the... | | |
HP-UX 11i Internals (Hewlett-Packard Professional Books)HP-UX under the hood: practical insight for optimization and troubleshooting
To maximize the performance, efficiency, and reliability of your HP-UX sysem, you need to know what's going on under the hood. HP-UX 11i Internals goes beyond generic UNIX internals, showing exactly how HP-UX works in PA-RISC environments.
HP experts... | | What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This... | | Handbook of Kidney Transplantation, Fourth edition
Now in its updated Fourth Edition, this popular handbook is a practical guide for physicians and surgeons who manage kidney transplant patients and for nurses and other professionals on the transplant team. In concise, readable, well-illustrated chapters, the book outlines the major concerns surrounding renal transplantation and the... |
|