Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,240,474 papers from all fields of science
Search
Sign In
Create Free Account
Computational intelligence
Known as:
CI
, Computer intelligence
The expression computational intelligence usually refers to the ability of a computer to learn a specific task from data or experimental observation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AI winter
Artificial general intelligence
Artificial immune system
Artificial neural network
Expand
Broader (1)
Artificial intelligence
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Bipolar View on Medical Diagnosis in OvaExpert System
A. Stachowiak
,
Krzysztof Dyczkowski
,
Andrzej Wójtowicz
,
Patryk Żywica
,
Maciej Wygralak
International Conference on Flexible Query…
2015
Corpus ID: 2269427
In the paper we present OvaExpert - a unique tool for supporting gynecologists in the diagnosis of ovarian tumor, combining…
Expand
2012
2012
Trends in Developing Metaheuristics, Algorithms, and Optimization Approaches
Peng-Yeng Yin
2012
Corpus ID: 64472018
Developments in metaheuristics continue to advance computation beyond its traditional methods. With groundwork built on…
Expand
2011
2011
Automatic inspection of surface defects in die castings after machining
S. Świłło
,
M. Perzyk
2011
Corpus ID: 35879812
A new camera based machine vision system for the automatic inspection of surface defects in aluminum die casting was developed by…
Expand
2010
2010
An Exponential Cluster Validity Index for Fuzzy Clustering with Crisp and Fuzzy Data
M. Zarandi
,
M. Faraji
,
M. Karbasian
2010
Corpus ID: 13160237
. This paper presents a new cluster validity index for (cid:12)nding a suitable number of fuzzy clusters with crisp and fuzzy…
Expand
Review
2008
Review
2008
Learning intrusion detection based on adaptive bayesian algorithm
D. Farid
,
Mohammad Zahidur Rahman
International Conference on Computer and…
2008
Corpus ID: 17839586
Recent intrusion detection have emerged an important technique for information security systems. Its very important that the…
Expand
2008
2008
MonONTO: A Domain Ontology for Network Monitoring and Recommendation for Advanced Internet Applications Users
P.S. Moraes
,
L. Sampaio
,
J.A.S. Monteiro
,
M. Portnoi
NOMS Workshops - IEEE Network Operations and…
2008
Corpus ID: 17927848
In order to make recommendations to users about the potential performance of advanced Internet applications - in the scope of…
Expand
2008
2008
Integer-valued Particle Swarm Optimization applied to Sudoku puzzles
J. Hereford
,
H. Gerlach
IEEE Symposium on Swarm Intelligence
2008
Corpus ID: 14308189
In this paper we develop a variation of the particle swarm optimization (PSO) algorithm that is tailored to discrete optimization…
Expand
2002
2002
Computational Web Intelligence (CWI): synergy of computational intelligence and Web technology
Yanqing Zhang
,
T. Lin
IEEE World Congress on Computational Intelligence…
2002
Corpus ID: 17577082
With explosive growth of e-Business on the Internet, and wireless networks, users face more and more challenging network-based…
Expand
Review
1998
Review
1998
Cyberspace and Heidegger's pragmatics
R. Coyne
Information Technology and People
1998
Corpus ID: 18757111
This article focuses on some of the implications of Heidegger’s pragmatism for information technology analysis and critique. I…
Expand
1997
1997
Temporal relations in English and German narrative discourse
Frank Schilder
1997
Corpus ID: 153683968
Understanding the temporal relations which hold between situations described in a narrative is a highly complex process. The main…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE