|
[3GPP, 2005] 3GPP (2005). Requirements for support of radio resource management (fdd). 3GPP Release 6, V 6.12.0. [Amir and Shalom, 2009] Amir, A. Z. G. and Shalom, B. R. (2009). Weighted lcs. IWOCA 2009, LNCS 5874, pages 36 – 47. [Baek and Yun, 2008] Baek, J. and Yun, B. J. (2008). A sequence-action recognition applying state machine for user interface. IEEE Transactions on Consumer Electronics, 54(2). [Barbancho et al., 2007] Barbancho, J., Leon, C., Molina, F., and Barbancho, A. (2007). Using artificial intelligence in routing schemes for wireless networks. Computer Com- munications, 30(14-15):2802 – 2811. Data-aggregation;MAC protocols;Network algorithms; OLIMPO;Routing paradigms;Wireless sensor nodes;. [Baum, 1972] Baum, L. E. (1972). An inequality and associated maximization technique in statistical estimation for probabilistic functions of markov processes. Inequalities, 3:1 – 8. [Baum and Egon, 1967] Baum, L. E. and Egon, J. A. (1967). An inequality with applications to statistical estimation for probabilistic functions of a markov process and to a model for ecology. Bull. Amer. Meteorol. Soc., 73:360 – 363. [Baum and Petrie, 1966] Baum, L. E. and Petrie, T. (1966). Statistical inference for probabilistic functions of finite state markov chains. Ann. Math. Statist., 37(6):1554 – 1563. [Baum et al., 1970] Baum, L. E., Petrie, T., and Soules, G. (1970). A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. Ann. Math. Stat., 41:164 – 171. [Baum and Sell, 1967] Baum, L. E. and Sell, G. R. (1967). Growth functions for transformations on manifolds. Pac. J. Math, 27(2):211 – 227. [Chen and Petriu, 2008] Chen, Qing, N. D. G. and Petriu, E. M. (2008). Hand gesture recognition using haar-like features and a stochastic context-free grammar. IEEE Trans. on Instrumentation and Measurement, 57(8):1562 – 1571. [Cho and Choi, 2006] Cho, S. J. and Choi, E. a. (2006). Two-stage recognition of raw acceleration signals for 3-d gesture- understanding cell phones. [Choi and Bang, 2006] Choi, E.-S. and Bang, W.-C. a. (2006). Beatbox music phone: Gesture interactive cell phone using tri-axis accelerometer. [Choi et al., 2006] Choi, S.-D., Lee, A., and Lee, S.-Y. (2006). On-line handwritten character recognition with 3d accelerometer. pages 845–850. [Cormen and Rivest, 1985] Cormen, T. H., C. E. L. and Rivest, R. L. (1985). Introduction to Algorithms. The MIT Press. [Cortes and Vapnik, 1995] Cortes, C. and Vapnik, V. (1995). Support-vector networks. 20:273 – 297. [D. Drianko, 1992] D. Drianko, H. Hellendoorn, M. R. (1992). An Introduction to Fuzzy Control. Springer-Verlag. [Davis and Rougeaux, 1999] Davis, J. A. and Rougeaux, B. (1999). Development of a computer model of a gps disciplined oscillator to aid error budget determination. volume 1, pages 291 – 295, United States. [Dubois D, 1998] Dubois D, P. H. (1998). An introduction to fuzzy systems. Clin. Chim. Acta., (270):3 – 29. [Eskelinen, 1999] Eskelinen, P. (1999). Observations on stability measurements of commercial atomic clocks. Proceedings of the Annual IEEE International Frequency Control Symposium, 1:186 – 189. [Fawcett, 2006] Fawcett, T. (2006). An introduction to roc analysis. pages 861 – 874. [Fraser, 1992] Fraser, J. (1992). What is artificial intelligence? Petroleum Review, 46(541):66, 68 – 69. Artificial intelligence disciplines;Knowledge-based systems;Natural language;. [Guler I, ] Guler I, U. E. Application of adaptive neuro-fuzzy inference system for detection of electrocardiographic changes in patients with partial epilepsy using feature extraction. Expert Syst. Appl., 33. [IEEE, 2005] IEEE (2005). Ieee std. 802.16e-2005 and ieee 802.16-2004/cor1-2005. IEEE, New York, USA. [Isasi et al., 2007] Isasi, P., Quintana, D., Saez, Y., and Mochon, A. (2007). Applied computational intelligence for finance and economics. Computational Intelligence, 23(2):111 – 116. Economics problems;Finance problems. [Jang, 1993] Jang, J.-S. (1993). Anfis: adaptive-network-based fuzzy inference system. IEEE Transactions on Systems, Man and Cybernetics, 23(3):665 – 685. [Miller AS, 1990] Miller AS, Blott BH, H. T. (1990). Review of neural network applications in medical imaging and signal processing. Med. Biol. Eng. Comput., (30):449 – 464. [Mitra and Acharya, 2007] Mitra, S. and Acharya, T. (2007). Gesture recognition: a survey. IEEE Trans. on Sys., Man, and Cyber, (3):311 – 324. [Naso and Maione, 2001] Naso, D. and Maione, G. (2001). Recent developments in the application of computational intelligence to multi-agent manufacturing control. volume 2, pages 990 – 994, Melbourne, Australia. Fuzzy controller;Multi-agent manufacturing control;. [Nicholls and Carleton, 2004] Nicholls, C. and Carleton, G. (2004). Adaptive ocxo drift correction algorithm. pages 509 – 517, Montreal, Canada. [R., 1989] R., R. L. (1989). Tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257 – 286. [Rabiner and Juang, 1986] Rabiner, L. R. and Juang, B.-H. (1986). Introduction to hidden markov models. IEEE ASSP magazine, 3(1):4 – 16. [S. Kallio and J.Mantyjarvi, 2003] S. Kallio, J. K. and J.Mantyjarvi (2003). Online gesture recognition system for mobile interaction. pages 2070 – 2076. [TTA, 2004] TTA (2004). Specifications for 2.3 ghz band portable internet servicevphysical layer. TTA, Korea. [Tu et al., 2008] Tu, K.-Y., Hsu, W.-H., Wu, J.-S., and Liao, C.-S. (2008). Frequency calibration based on adaptive neural-fuzzy inference system. pages 616 – 617, Broomfield, CO, United states. [Vapnik, 1999] Vapnik, V. (1999). The Nature of Statistical Learning Theory. Springer Press, New York. [Vasilakos and Spyrou, 2008] Vasilakos, A. V. and Spyrou, G. (2008). Computational intelligence in medicine and biology: A survey. Journal of Computational and Theoretical Nanoscience, 5(12):2365 – 2376. Computational intelligence;Ethics;Genomics;Machine learning;Medical informatics;Proteomics;. [Viterbi, 1995] Viterbi, A. J. (1995). Principles of Spread Spectrum Communication. Addison Wesley. [Wagner and Fischer, 1974] Wagner, R. and Fischer, M. (1974). The string-to-string correction problem. J. ACM, 21:168 – 173. [WG., 1990] WG., B. (1990). Use of an artificial neural network for data analysis in clinical decision making: the diagnosis of acute coronary occlusion. Neural Comput., (2):480 – 489. [Zhang and Lin, 2002] Zhang, Y.-Q. and Lin, T. (2002). Computational web intelligence (cwi): Synergy of computational intelligence and web technology. volume 2, pages 1104 – 1107, Honolulu, HI, United states. Computational web intelligence;Electronic business; Quality of intelligence;Web technology;Wireless networks.
|