7
Articles Advanced Heuristics in Transportation and Logistics “Advanced Heuristics in Transportation and Logistics” [Guest Editors’ Introduc- tion], Christos D. Tarantilis, Diomidis Spinellis, and Michel Gendreau, July/ Aug., pp. 16–18. “Case Study: An Intelligent Decision-Sup- port System,” Zbigniew Michalewicz, Martin Schmidt, Matthew Michalewicz, and Constantin Chiriac, July/Aug., pp. 44–49. “A GRASP Approach to the Container-Load- ing Problem,” Ana Moura and José Fer- nando Oliveira, July/Aug., pp. 50–57. “A Guided Cooperative Search for the Vehicle Routing Problem with Time Windows,” Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. “A Hybrid Algorithm for Distribution Problems,” David Bredström, Dick Carlsson, and Mikael Rönnqvist, July/Aug., pp. 19–25. “A Hybrid Approach to Designing Inbound- Resupply Strategies,” Wout Dullaert, Birger Raa, Bert Vernimmen, and Frank Witlox, July/Aug., pp. 31–35. “Sequential and Parallel Path-Relinking Algorithms for the Quadratic Assignment Problem,” Tabitha James, Cesar Rego, and Fred Glover, July/Aug., pp. 58–65. “Using Simulated Annealing to Design a Material-Handling System,” Pierpaolo Caricato and Antonio Grieco, July/Aug., pp. 26–30. Artificial Intelligence for Homeland Security “Applying Authorship Analysis to Extrem- ist-Group Web Forum Messages,”Ahmed Abbasi and Hsinchun Chen, Sept./Oct., pp. 67–75. “Artificial Intelligence for Homeland Security” [Guest Editors’ Introduction], Hsinchun Chen and Fei-Yue Wang, Sept./Oct., pp. 12–16. “Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior,” Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Gabriel Tsechpenakis, Judee K. Burgoon, Dimitris N. Metaxas, and Jay F. Nunamaker Jr., Sept./Oct., pp. 36–43. “Distributed Interactive Video Arrays for Event Capture and Enhanced Situational Awareness,” Mohan M. Trivedi, Tarak L. Gandhi, and Kohsia S. Huang, Sept./Oct., pp. 58–66. “Ontology-Centered Syndromic Surveil- lance for Bioterrorism,” Monica Crubézy, Martin O’Connor, David L. Buckeridge, Zachary Pincus, and Mark A. Musen, Sept./Oct., pp. 26–35. “Rule + Exception Strategies for Security Information Analysis,”Yiyu Yao, Fei- Yue Wang, Jue Wang, and Daniel Zeng, Sept./Oct., pp. 52–57. “Service-Based Computing on Manets: Enabling Dynamic Interoperability of First Responders,” Joseph Kopena, Evan Sultanik, Gaurav Naik, Iris Howley, Maxim Peysakhov, Vincent A. Cicirello, Moshe Kam, and William Regli, Sept./ Oct., pp. 17–25. “US Domestic Extremist Groups on the Web: Link and Content Analysis,”Yilu Zhou, Edna Reid, Jialun Qin, Hsinchun Chen, and Guanpi Lai, Sept./Oct., pp. 44–51. Bioinformatics “Sigmoid: A Software Infrastructure for Pathway Bioinformatics and Systems Biology,” Jianlin Cheng, Lucas Scharen- broich, Pierre Baldi, and Eric Mjolsness, May/June, pp. 68–75. Constraint-Based Reasoning “Automatic Generation of Artistic Chinese Calligraphy,” Songhua Xu, Francis C.M. Lau, William K. Cheung, and Yunhe Pan, May/June, pp. 32–39. Constraint Progamming “Constraints and AI Planning,” Alexander Nareyek, Eugene C. Freuder, Robert Fourer, Enrico Giunchiglia, Robert P. Goldman, Henry Kautz, Jussi Rintanen, and Austin Tate, Mar./Apr., pp. 62–72. Data Mining “Agents and Stream Data Mining: A New 88 1541-1672/05/$20.00 © 2005 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society 2005 Annual Index – Volume 20 VOLUME 20 VOLUME 20 VOLUME 20 VOLUME 20 VOLUME 20 VOLUME 20 VOLUME 20

VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

  • Upload
    vantram

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

Articles

Advanced Heuristics inTransportation and Logistics“Advanced Heuristics in Transportation

and Logistics” [Guest Editors’ Introduc-tion], Christos D. Tarantilis, DiomidisSpinellis, and Michel Gendreau, July/Aug., pp. 16–18.

“Case Study: An Intelligent Decision-Sup-port System,” Zbigniew Michalewicz,Martin Schmidt, Matthew Michalewicz,and Constantin Chiriac, July/Aug., pp.44–49.

“A GRASP Approach to the Container-Load-ing Problem,” Ana Moura and José Fer-nando Oliveira, July/Aug., pp. 50–57.

“A Guided Cooperative Search for theVehicle Routing Problem with TimeWindows,” Alexandre Le Bouthillier,Teodor G. Crainic, and Peter Kropf,July/Aug., pp. 36–42.

“A Hybrid Algorithm for DistributionProblems,” David Bredström, DickCarlsson, and Mikael Rönnqvist,July/Aug., pp. 19–25.

“A Hybrid Approach to Designing Inbound-Resupply Strategies,” Wout Dullaert,Birger Raa, Bert Vernimmen, and FrankWitlox, July/Aug., pp. 31–35.

“Sequential and Parallel Path-RelinkingAlgorithms for the Quadratic AssignmentProblem,” Tabitha James, Cesar Rego,and Fred Glover, July/Aug., pp. 58–65.

“Using Simulated Annealing to Design aMaterial-Handling System,” PierpaoloCaricato and Antonio Grieco, July/Aug.,pp. 26–30.

Artificial Intelligence forHomeland Security“Applying Authorship Analysis to Extrem-

ist-Group Web Forum Messages,” AhmedAbbasi and Hsinchun Chen, Sept./Oct.,pp. 67–75.

“Artificial Intelligence for HomelandSecurity” [Guest Editors’ Introduction],Hsinchun Chen and Fei-Yue Wang,Sept./Oct., pp. 12–16.

“Deception Detection through Automatic,Unobtrusive Analysis of NonverbalBehavior,” Thomas O. Meservy, MatthewL. Jensen, John Kruse, Douglas P.Twitchell, Gabriel Tsechpenakis, JudeeK. Burgoon, Dimitris N. Metaxas, andJay F. Nunamaker Jr., Sept./Oct., pp.36–43.

“Distributed Interactive Video Arrays forEvent Capture and Enhanced SituationalAwareness,” Mohan M. Trivedi, Tarak L.Gandhi, and Kohsia S. Huang, Sept./Oct.,pp. 58–66.

“Ontology-Centered Syndromic Surveil-

lance for Bioterrorism,” Monica Crubézy,Martin O’Connor, David L. Buckeridge,Zachary Pincus, and Mark A. Musen,Sept./Oct., pp. 26–35.

“Rule + Exception Strategies for SecurityInformation Analysis,” Yiyu Yao, Fei-Yue Wang, Jue Wang, and Daniel Zeng,Sept./Oct., pp. 52–57.

“Service-Based Computing on Manets:Enabling Dynamic Interoperability ofFirst Responders,” Joseph Kopena, EvanSultanik, Gaurav Naik, Iris Howley,Maxim Peysakhov, Vincent A. Cicirello,Moshe Kam, and William Regli, Sept./Oct., pp. 17–25.

“US Domestic Extremist Groups on theWeb: Link and Content Analysis,” YiluZhou, Edna Reid, Jialun Qin, HsinchunChen, and Guanpi Lai, Sept./Oct., pp.44–51.

Bioinformatics“Sigmoid: A Software Infrastructure for

Pathway Bioinformatics and SystemsBiology,” Jianlin Cheng, Lucas Scharen-broich, Pierre Baldi, and Eric Mjolsness,May/June, pp. 68–75.

Constraint-Based Reasoning“Automatic Generation of Artistic Chinese

Calligraphy,” Songhua Xu, Francis C.M.Lau, William K. Cheung, and Yunhe Pan,May/June, pp. 32–39.

Constraint Progamming“Constraints and AI Planning,” Alexander

Nareyek, Eugene C. Freuder, RobertFourer, Enrico Giunchiglia, Robert P.Goldman, Henry Kautz, Jussi Rintanen,and Austin Tate, Mar./Apr., pp. 62–72.

Data Mining“Agents and Stream Data Mining: A New

88 1541-1672/05/$20.00 © 2005 IEEE IEEE INTELLIGENT SYSTEMSPublished by the IEEE Computer Society

2 0 0 5 A n n u a l I n d e x – V o l u m e 2 0VOLUME 20VOLUME 20 VOLUME 20 VOLUME 20 VOLUME 20 VOLUME 20VOLUME 20

Page 2: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

Perspective,” Kok-Leong Ong, ZiliZhang, Wee-Keong Ng, and Ee-PengLim, May/June, pp. 60–67.

“ExAnte: A Preprocessing Method for Frequent-Pattern Mining,” FrancescoBonchi, Fosca Giannotti, Alessio Maz-zanti, and Dino Pedreschi, May/June,pp. 25–31.

“Identifying Interesting Visitors throughWeb Log Classification,” JeffreyXu Yu, Yuming Ou, Chengqi Zhang,and Shichao Zhang, May/June, pp.55–59.

Data Mining in Bioinformatics“Building Innovative Representations of

DNA Sequences to Facilitate Gene Find-ing,” Jianbo Gao, Yinhe Cao, Yan Qi, andJing Hu, Nov./Dec., pp. 34–39.

“Choosing the Optimal Hidden MarkovModel for Secondary-Structure Predic-tion,” Juliette Martin, Jean-FrançoisGibrat, and François Rodolphe, Nov./Dec.,pp. 19–25.

“Data Mining in Bioinformatics” [GuestEditors’ Introduction], Jinyan Li, Lim-soon Wong, and Qiang Yang, Nov./Dec.,pp. 16–18.

“Finding Protein Domain Boundaries:An Automated, Non-Homology-BasedMethod,” Brian M. Gurbaxani and ParagMallick, Nov./Dec., pp. 26–33.

“MicroCluster: Efficient DeterministicBiclustering of Microarray Data,”Lizhuang Zhao and Mohammed J. Zaki,Nov./Dec., pp. 40–49.

“Using Semantic Dependencies to MineDepressive Symptoms from Consulta-tion Records,” Chung-Hsien Wu, Liang-Chih Yu, and Fong-Lin Jang, Nov./Dec.,pp. 50–58.

Enhancing Information“Scoring and Selecting Terms for Text Cat-

egorization,” Elena Montañés, IreneDíaz, José Ranilla, Elías F. Combarro,and Javier Fernández, May/June, pp.40–47.

Human-Centered Computing“Work-Centered Support Systems: A

Human-Centered Approach to Intelli-gent System Design,” Ronald Scott,Emilie M. Roth, Stephen E. Deutsch,Erika Malchiodi, Thomas E. Kazmier-czak, Robert G. Eggleston, Samuel R.Kuper, and Randall D. Whitaker, Mar./Apr., pp. 73–81.

Image Processing“Using Intelligent Digital Cameras to

Monitor Aerodrome Surface Traffic,”Niovi Pavlidou, Nikos Grammalidis,Kosmas Dimitropoulos, Dimitrios Simi-topoulos, Alan Gilbert, Enrico Piazza,Christof Herrlich, Ralf Heidger, andMichael Strintzis, May/June, pp. 76–81.

Information Retrieval“A Fuzzy Semantic Approach to Retriev-

ing Bird Information Using HandheldDevices,” Yo-Ping Huang and TienweiTsai, Jan./Feb., pp. 16–23.

Intelligent ManufacturingControl“ADACOR: A Collaborative Production

Automation and Control Architecture,”Paulo Leitão, Armando W. Colombo,and Francisco J. Restivo, Jan./Feb., pp.58–66.

“Aggressive Pricing to Exploit MarketNiches in Supply Chains,” SabyasachiSaha and Sandip Sen, Jan./Feb., pp.36–41.

“ExPlanTech: Multiagent Support for Man-ufacturing Decision Making,” MichalPechoucek, Jirí Vokrínek, and PetrBecvár, Jan./Feb., pp. 67–74.

“Holonic Job Shop Scheduling Using aMultiagent System,” Scott S. Walker,Robert W. Brennan, and Douglas H.Norrie, Jan./Feb., pp. 50–57.

“Industrial Adoption of Agent-Based Tech-nologies,” Vladimír Marík and DuncanMcFarlane, Jan./Feb., pp. 27–35.

“Intelligent Control in the ManufacturingSupply Chain” [Guest Editors’ Introduc-

tion], Duncan McFarlane, VladimírMarík, and Paul Valckenaers, Jan./Feb.,pp. 24–26.

“Methodologies and Tools for IntelligentAgents in Distributed Control,” FranciscoP. Maturana, Raymond J. Staron, andKenwood H. Hall, Jan./Feb., pp. 42–49.

Intelligent TransportationSystems“Navigation and Multimodal Transporta-

tion with EasyTransport,” Maria Fragouliand Alex Delis, Mar./Apr., pp. 54–61.

Knowledge Sharing“Personal Knowledge Publishing: Foster-

ing Interdisciplinary Communication,”Esma Aïmeur, Gilles Brassard, andSébastien Paquet, Mar./Apr., pp. 46–53.

Multiagent Systems“Distributed Problem Solving in Multi-

agent Systems: A Spring Net Approach,”Dianxun Shuai and Xiang Feng, July/Aug., pp. 66–74.

Planning with Templates“Applications of SHOP and SHOP2,” Dana

Nau, Tsz-Chiu Au, Okhtay Ilghami, UgurKuter, Héctor Muñoz-Avila, J. WilliamMurdock, Dan Wu, and Fusun Yaman,Mar./Apr., pp. 34–41.

“Authoring Templates with Tracker,” AliceM. Mulvehill, Mar./Apr., pp. 42–45.

“Comirem: An Intelligent Form for ResourceManagement,” Stephen F. Smith, DavidW. Hildum, and David R. Crimm, Mar./Apr., pp. 16–24.

“Conditional Constraint Networks forInterleaved Planning and InformationGathering,” José Luis Ambite, Craig A.Knoblock, Maria Muslea, and StevenMinton, Mar./Apr., pp. 25–33.

“Planning with Templates” [Guest Editors’Introduction], Doug Dyer, Steve Cross,Craig A. Knoblock, Steven Minton, andAustin Tate, Mar./Apr., pp. 13–15.

Web Search“A Concept-Driven Algorithm for Cluster-

ing Search Results,” Stanislaw Osinskiand Dawid Weiss, May/June, pp. 48–54.

Web Services“Customized Delivery of E-Government

Web Services,” Brahim Medjahed andAthman Bouguettaya, Nov./Dec., pp.77–84.

NOVEMBER/DECEMBER 2005 www.computer.org/intelligent 89

Page 3: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

Departments

AI in Space“An Autonomous Earth-Observing Sensor-

web,” Steve Chien, Benjamin Cichy, Ash-ley Davies, Daniel Tran, Gregg Rabideau,Rebecca Castaño, Rob Sherwood, DanMandl, Stuart Frye, Seth Shulman,Jeremy Jones, and Sandy Grosvenor,May/June, pp. 16–24.

Applications“TEXTAL: AI-Based Structural Determina-

tion for X-ray Protein Crystallography,”Tod Romo, Kreshna Gopal, Erik McKee,Lalji Kanbi, Reetal Pai, Jacob Smith,James Sacchettini, and Thomas Ioerger,Nov./Dec., pp. 59–63.

Global IS“E-Government and E-Democracy in Latin

America,” Julian Padget, Jan./Feb., pp.94–96.

“From Hardware to Software to Knowware:IT’s Third Liberation?” Ruqian Lu, Mar./Apr., pp. 82–85.

“WINES: Wired and Wireless IntelligentNetworked Systems,” Alun Preece,Nov./Dec., pp. 85–87.

Histories & Futures“AI and Philosophy: How Can You Know

the Dancer from the Dance?” LindaWorld, July/Aug., pp. 84–85.

“Evolutionary Computing: The Rise ofElectronic Breeding,” Sara Reese Hed-berg, Nov./Dec., pp. 12–15.

“Naomi Ehrich Leonard’s School of Col-laboration,” Danna Voth, May/June, pp.82–84.

Human-Centered Computing“Decision(?)Making(?),” Robert R. Hoff-

man and J. Frank Yates, July/Aug., pp.76–83.

“Toward a Theory of Complex and Cogni-tive Systems,” Robert R. Hoffman andDavid D. Woods, Jan./Feb., pp. 76–79.

In Memoriam“Robert Milne (1956–2005),” Sara Reese

Hedberg, Sept./Oct., pp. 10–11.“Trapped with Robots,” Kate Murphy,

May/June, pp. 10–11.

In the News“AI Robots Team Up to Win Prisoner’s

Dilemma,” Benjamin Alfonsi, Mar./Apr.,pp. 6–7.

“Computer Vision Strives for 20/20,” Ben-jamin Alfonsi, July/Aug., pp. 7–9.

“Dual Photography: New in ComputerVision?” Benjamin Alfonsi, Sept./Oct.,pp. 8–9.

“Found in Translation,” Danna Voth,Nov./Dec., pp. 6–8.

“Machines Mimicking Humans,” DannaVoth, Sept./Oct., pp. 6–8.

“Mimicking Bat Echolocation,” BenjaminAlfonsi, May/June, pp. 8–9.

“Minding Your Business with AI,” DannaVoth, July/Aug., pp. 4–7.

“Phonologica: Quantum Physics Meets AI?”Benjamin Alfonsi, Jan./Feb., pp. 8–9.

“Practical Agents Help Out,” Danna Voth,Mar./Apr., pp. 4–6.

“Robotic Physiotherapy Yields PositiveResults,” Benjamin Alfonsi, Nov./Dec.,pp. 8–10.

“Segway to the Future,” Danna Voth,May/June, pp. 5–8.

“Using AI to Detect Breast Cancer,” DannaVoth, Jan./Feb., pp. 5–7.

Intelligent TransportationSystems“Agent-Based Control for Networked Traf-

fic Management Systems,” Fei Yue Wang,Sept./Oct., pp. 92–96.

“DartGrid II: A Semantic Grid Platform for ITS,” Zhaohui Wu, Shuming Tang,Shuiguang Deng, Jian Wu, Huajun Chen,and Haijun Gao, May/June, pp. 12–15.

“IVS 05: New Developments and ResearchTrends for Intelligent Vehicles,” Li Li,Jingyan Song, Fei-Yue Wang, WolfgangNiehsen, and Nan-Ning Zheng, July/Aug.,pp. 10–14.

“Making Driver Modeling Attractive,” Anto-nio Pellecchia, Christian Igel, JohannEdelbrunner, and Gregor Schöner, Mar./Apr., pp. 8–12.

“RHODES to Intelligent Transportation Sys-tems,” Pitu Mirchandani and Fei-YueWang, Jan./Feb., pp. 10–15.

A Letter from the Editor“Avoiding Rejection,” James Hendler,

Sept./Oct., pp. 2–4.“Enlarging Our Tent,” James Hendler,

July/Aug., pp. 2–3.“Fathoming Funding,” James Hendler,

Mar./Apr., pp. 2–3.“I’m Sorry, Dave …,” James Hendler,

Nov./Dec., pp. 2–4.“Impact and Action,” James Hendler,

Jan./Feb., pp. 2–4.“Systems, Systematically Speaking,”

James Hendler, May/June, pp. 2–4.

The Semantic Web“Building a Semantic Wiki,” Adam Souzis,

Sept./Oct., pp. 87–91.“Modeling with the Semantic Web in the

Geosciences,” Femke Reitsma andJochen Albrecht, Mar./Apr., pp. 86–88.

“The Semantic Web in One Day,” YorkSure, Pascal Hitzler, Andreas Eberhart,and Rudi Studer, May/June, pp. 85–87.

Trends & Controversies“AI and the Modern Networked Organiza-

tion,” George Cybenko, Sept./Oct., pp.79–80.

“Analyzing Social Networks on the Seman-tic Web,” Li Ding, Tim Finin, and Anu-pam Joshi, Jan./Feb., pp. 86–90.

“The Changing Face of Privacy Policy andthe New Policy-Technology Interface,”Paul Rosenzweig, Sept./Oct., pp. 84–86.

“Evolving Feature Selection,” Huan Liu,Nov./Dec., p. 64.

“Feature Selection for Unlabeled Data,”Jennifer G. Dy, Nov./Dec., pp. 66–68.

“Feature-Selection Overfitting with Small-Sample Classifier Design,” Edward R.Dougherty, Nov./Dec., pp. 64–66.

“Feature Selection: We’ve Barely Scratchedthe Surface,” George Forman, Nov./Dec.,pp. 74–76.

“Fostering Biological Relevance in Feature

90 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS

Page 4: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

Selection for Microarray Data,” MichaelBerens, Huan Liu, Lance Parsons, Lei Yu,and Zheng Zhao, Nov./Dec., pp. 71–73.

“Homeland Security,” John Yen and RobertPopp, Sept./Oct., p. 76.

“Information and Influence in the Construc-tion of Shared Reality,” Andrzej Nowakand Robin R. Vallacher, Jan./Feb., pp.90–93.

“Minimum Redundancy–Maximum Rele-vance Feature Selection,” HanchuanPeng, Chris Ding, and Fuhui Long,Nov./Dec., pp. 70–71.

“Mining Social Networks for Viral Market-ing,” Pedro Domingos, Jan./Feb., pp.80–82.

“Privacy-Preserving Surveillance UsingDatabases from Daily Life,” LatanyaSweeney, Sept./Oct., pp. 83–84.

“Sharing and Using Links in Social Net-works,” Jennifer Golbeck, Jan./Feb., pp.85–86.

“Social Networks and the Semantic Web:The Next Challenge,” Peter Mika, Jan./Feb., pp. 82–85.

“Social Networks Applied,” Steffen Staab,Jan./Feb., p. 80.

“The Trusted Systems Problem: SecurityEnvelopes, Statistical Threat Analysis,and the Presumption of Innocence,”K.A. Taipale, Sept./Oct., pp. 80–83.

“Using Social Science Technology to Under-stand and Counter the 21st-CenturyStrategic Threat,” Robert Popp, Sept./Oct.,pp. 76–79.

“Variable Selection Using Ensemble Meth-ods,” Kari Torkkola and Eugene Tuv,Nov./Dec., pp. 68–70.

Authors

AAbbasi, Ahmed, and Hsinchun Chen, “Applying

Authorship Analysis to Extremist-Group WebForum Messages,” Sept./Oct., pp. 67–75.

Aïmeur, Esma, Gilles Brassard, and SébastienPaquet, “Personal Knowledge Publishing:Fostering Interdisciplinary Communication,”Mar./Apr., pp. 46–53.

Albrecht, Jochen, see Reitsma, Femke.Alfonsi, Benjamin, “AI Robots Team Up to Win

Prisoner’s Dilemma” [In the News],Mar./Apr., pp. 6–7.

———, “Computer Vision Strives for 20/20” [Inthe News], July/Aug., pp. 7–9.

———, “Dual Photography: New in ComputerVision?” [In the News], Sept./Oct., pp. 8–9.

———, “Mimicking Bat Echolocation” [In theNews], May/June, pp. 8–9.

———, “Phonologica: Quantum Physics MeetsAI?” [In the News], Jan./Feb., pp. 8–9.

———, “Robotic Physiotherapy Yields PositiveResults” [In the News], Nov./Dec., pp. 8–10.

Ambite, José Luis, Craig A. Knoblock, MariaMuslea, and Steven Minton, “Conditional Con-straint Networks for Interleaved Planning andInformation Gathering,” Mar./Apr., pp. 25–33.

Au, TszChiu, see Nau, Dana.

BBaldi, Pierre, see Cheng, Jianlin.Becvár, Petr, see Pechoucek, Michal.Berens, Michael, Huan Liu, Lance Parsons, Lei

Yu, and Zheng Zhao, “Fostering BiologicalRelevance in Feature Selection for MicroarrayData” [Trends & Controversies], Nov./Dec.,pp. 71–73.

Bonchi, Francesco, Fosca Giannotti, AlessioMazzanti, and Dino Pedreschi, “ExAnte: APreprocessing Method for Frequent-PatternMining,” May/June, pp. 25–31.

Bouguettaya, Athman, see Medjahed, Brahim.Brassard, Gilles, see Aïmeur, Esma.Bredström, David, Dick Carlsson, and Mikael

Rönnqvist, “A Hybrid Algorithm for Distribu-tion Problems,” July/Aug., pp. 19–25.

Brennan, Robert W., see Walker, Scott S.Buckeridge, David L., see Crubézy, Monica.Burgoon, Judee K., see Meservy, Thomas O.

CCao, Yinhe, see Gao, Jianbo.Caricato, Pierpaolo, and Antonio Grieco, “Using

Simulated Annealing to Design a Material-Handling System,” July/Aug., pp. 26–30.

Carlsson, Dick, see Bredström, David.Castaño, Rebecca, see Chien, Steve.Chen, Hsinchun, and Fei-Yue Wang, “Artificial

Intelligence for Homeland Security” [GuestEditors’ Introduction], Sept./Oct., pp. 12–16.

Chen, Hsinchun, also see Abbasi, Ahmed, andZhou, Yilu.

Chen, Huajun, see Wu, Zhaohui.Cheng, Jianlin, Lucas Scharenbroich, Pierre

Baldi, and Eric Mjolsness, “Sigmoid: A Soft-ware Infrastructure for Pathway Bioinformaticsand Systems Biology,” May/June, pp. 68–75.

Cheung, William K., see Xu, Songhua.Chien, Steve, Benjamin Cichy, Ashley Davies,

Daniel Tran, Gregg Rabideau, Rebecca Castaño,Rob Sherwood, Dan Mandl, Stuart Frye, SethShulman, Jeremy Jones, and Sandy Grosvenor,“An Autonomous Earth-Observing Sensor-web” [AI In Space], May/June, pp. 16–24.

Chiriac, Constantin, see Michalewicz,Zbigniew.

Cichy, Benjamin, see Chien, Steve.Cicirello, Vincent A., see Kopena, Joseph.Colombo, Armando W., see Leitão, Paulo.Combarro, Elías F., see Montañés, Elena.Crainic, Teodor G., see Le Bouthillier,

Alexandre.Crimm, David R., see Smith, Stephen F.Cross, Steve, see Dyer, Doug.Crubézy, Monica, Martin O’Connor, David L.

Buckeridge, Zachary Pincus, and Mark A.Musen, “Ontology-Centered Syndromic Sur-veillance for Bioterrorism,” Sept./Oct., pp.26–35.

Cybenko, George, “AI and the Modern Net-worked Organization” [Trends & Controver-sies], Sept./Oct., pp. 79–80.

DDavies, Ashley, see Chien, Steve.Delis, Alex, see Fragouli, Maria.Deng, Shuiguang, see Wu, Zhaohui.Deutsch, Stephen E., see Scott, Ronald.Díaz, Irene, see Montañés, Elena.Dimitropoulos, Kosmas, see Pavlidou, Niovi.Ding, Chris, see Peng, Hanchuan.Ding, Li, Tim Finin, and Anupam Joshi, “Ana-

lyzing Social Networks on the SemanticWeb” [Trends & Controversies], Jan./Feb.,pp. 86–90.

Domingos, Pedro, “Mining Social Networks forViral Marketing” [Trends & Controversies],Jan./Feb., pp. 80–82.

Dougherty, Edward R., “Feature-SelectionOverfitting with Small-Sample ClassifierDesign” [Trends & Controversies], Nov./Dec., pp. 64–66.

Dullaert, Wout, Birger Raa, Bert Vernimmen,

NOVEMBER/DECEMBER 2005 www.computer.org/intelligent 91

Page 5: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

and Frank Witlox, “A Hybrid Approach toDesigning Inbound-Resupply Strategies,”July/Aug., pp. 31–35.

Dy, Jennifer G., “Feature Selection for Unla-beled Data” [Trends & Controversies],Nov./Dec., pp. 66–68.

Dyer, Doug, Steve Cross, Craig A. Knoblock,Steven Minton, and Austin Tate, “Planningwith Templates” [Guest Editors’ Introduc-tion], Mar./Apr., pp. 13–15.

EEberhart, Andreas, see Sure, York.Edelbrunner, Johann, see Pellecchia, Antonio.Eggleston, Robert G., see Scott, Ronald.

FFeng, Xiang, see Shuai, Dianxun.Fernández, Javier, see Montañés, Elena.Finin, Tim, see Ding, Li.Forman, George, “Feature Selection: We’ve

Barely Scratched the Surface” [Trends &Controversies], Nov./Dec., pp. 74–76.

Fourer, Robert, see Nareyek, Alexander.Fragouli, Maria, and Alex Delis, “Navigation

and Multimodal Transportation with Easy-Transport,” Mar./Apr., pp. 54–61.

Freuder, Eugene C., see Nareyek, Alexander.Frye, Stuart, see Chien, Steve.

GGandhi, Tarak L., see Trivedi, Mohan M.Gao, Haijun, see Wu, Zhaohui.Gao, Jianbo, Yinhe Cao, Yan Qi, and Jing Hu,

“Building Innovative Representations ofDNA Sequences to Facilitate Gene Finding,”Nov./Dec., pp. 34–39.

Gendreau, Michel, see Tarantilis, Christos D.Giannotti, Fosca, see Bonchi, Francesco.Gibrat, Jean-François, see Martin, Juliette.Gilbert, Alan, see Pavlidou, Niovi.Giunchiglia, Enrico, see Nareyek, Alexander.Glover, Fred, see James, Tabitha.Golbeck, Jennifer, “Sharing and Using Links in

Social Networks” [Trends & Controversies],Jan./Feb., pp. 85–86.

Goldman, Robert P., see Nareyek, Alexander.Gopal, Kreshna, see Romo, Tod.Grammalidis, Nikos, see Pavlidou, Niovi.Grieco, Antonio, see Caricato, Pierpaolo.Grosvenor, Sandy, see Chien, Steve.Gurbaxani, Brian M., and Parag Mallick,

“Finding Protein Domain Boundaries: AnAutomated, Non-Homology-Based Method,”Nov./Dec., pp. 26–33.

HHall, Kenwood H., see Maturana, Francisco P.

Hedberg, Sara Reese, “Evolutionary Comput-ing: The Rise of Electronic Breeding” [Histo-ries & Futures], Nov./Dec., pp. 12–15.

———, “Robert Milne (1956–2005)” [InMemoriam], Sept./Oct., pp. 10–11.

Heidger, Ralf, see Pavlidou, Niovi.Hendler, James, “Avoiding Rejection” [A Letter

from the Editor], Sept./Oct., pp. 2–4.———, “Enlarging Our Tent” [A Letter from

the Editor], July/Aug., pp. 2–3.———, “Fathoming Funding” [A Letter from

the Editor], Mar./Apr., pp. 2–3.———, “I’m Sorry, Dave …” [A Letter from the

Editor], Nov./Dec., pp. 2–4.———, “Impact and Action” [A Letter from the

Editor], Jan./Feb., pp. 2–4.———, “Systems, Systematically Speaking” [A

Letter from the Editor], May/June, pp. 2–4.Herrlich, Christof, see Pavlidou, Niovi.Hildum, David W., see Smith, Stephen F.Hitzler, Pascal, see Sure, York.Hoffman, Robert R., and David D. Woods,

“Toward a Theory of Complex and CognitiveSystems” [Human-Centered Computing],Jan./Feb., pp. 76–79.

Hoffman, Robert R., and J. Frank Yates, “Deci-sion(?)Making(?)” [Human-Centered Com-puting], July/Aug., pp. 76–83.

Howley, Iris, see Kopena, Joseph.Hu, Jing, see Gao, Jianbo.Huang, Kohsia S., see Trivedi, Mohan M.Huang, Yo Ping, and Tienwei Tsai, “A Fuzzy

Semantic Approach to Retrieving Bird Infor-mation Using Handheld Devices,” Jan./Feb.,pp. 16–23.

IIgel, Christian, see Pellecchia, Antonio.Ilghami, Okhtay, see Nau, Dana.Ioerger, Thomas, see Romo, Tod.

JJames, Tabitha, Cesar Rego, and Fred Glover,

“Sequential and Parallel Path-Relinking Algo-rithms for the Quadratic Assignment Prob-lem,” July/Aug., pp. 58–65.

Jang, Fong-Lin, see Wu, Chung-Hsien.Jensen, Matthew L., see Meservy, Thomas O.Jones, Jeremy, see Chien, Steve.Joshi, Anupam, see Ding, Li.

KKam, Moshe, see Kopena, Joseph.Kanbi, Lalji, see Romo, Tod.Kautz, Henry, see Nareyek, Alexander.Kazmierczak, Thomas E., see Scott, Ronald.Knoblock, Craig A., see Ambite, José Luis, and

Dyer, Doug.Kopena, Joseph, Evan Sultanik, Gaurav Naik,

Iris Howley, Maxim Peysakhov, Vincent A.Cicirello, Moshe Kam, and William Regli,“Service-Based Computing on Manets:Enabling Dynamic Interoperability of FirstResponders,” Sept./Oct., pp. 17–25.

Kropf, Peter, see Le Bouthillier, Alexandre.Kruse, John, see Meservy, Thomas O.Kuper, Samuel R., see Scott, Ronald.Kuter, Ugur, see Nau, Dana.

LLai, Guanpi, see Zhou, Yilu.Lau, Francis C.M., see Xu, Songhua.Le Bouthillier, Alexandre, Teodor G. Crainic,

and Peter Kropf, “A Guided CooperativeSearch for the Vehicle Routing Problem withTime Windows,” July/Aug., pp. 36–42.

Leitão, Paulo, Armando W. Colombo, and Fran-cisco J. Restivo, “ADACOR: A CollaborativeProduction Automation and Control Architec-ture,” Jan./Feb., pp. 58–66.

Li, Jinyan, Limsoon Wong, and Qiang Yang,“Data Mining in Bioinformatics” [Guest Edi-tors’ Introduction], Nov./Dec., pp. 16–18.

Li, Li, Jingyan Song, Fei-Yue Wang, WolfgangNiehsen, and Nan-Ning Zheng, “IVS 05: NewDevelopments and Research Trends for Intel-ligent Vehicles” [Intelligent TransportationSystems], July/Aug., pp. 10–14.

Lim, Ee-Peng, see Ong, Kok-Leong.Liu, Huan, “Evolving Feature Selection”

[Trends & Controversies], Nov./Dec., p. 64.———, also see Berens, Michael.Long, Fuhui, see Peng, Hanchuan.Lu, Ruqian, “From Hardware to Software to

92 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS

Page 6: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

Knowware: IT’s Third Liberation?” [GlobalIS], Mar./Apr., pp. 82–85.

MMalchiodi, Erika, see Scott, Ronald.Mallick, Parag, see Gurbaxani, Brian M.Mandl, Dan, see Chien, Steve.Marík, Vladimír, and Duncan McFarlane,

“Industrial Adoption of Agent-Based Tech-nologies,” Jan./Feb., pp. 27–35.

Marík, Vladimír, also see McFarlane, Duncan.Martin, Juliette, Jean-François Gibrat, and

François Rodolphe, “Choosing the OptimalHidden Markov Model for Secondary-Struc-ture Prediction,” Nov./Dec., pp. 19–25.

Maturana, Francisco P., Raymond J. Staron,and Kenwood H. Hall, “Methodologies andTools for Intelligent Agents in DistributedControl,” Jan./Feb., pp. 42–49.

Mazzanti, Alessio, see Bonchi, Francesco.McFarlane, Duncan, Vladimír Marík, and Paul

Valckenaers, “Intelligent Control in the Man-ufacturing Supply Chain” [Guest Editors’Introduction], Jan./Feb., pp. 24–26.

McFarlane, Duncan, also see Marík, Vladimír.McKee, Erik, see Romo, Tod.Medjahed, Brahim, and Athman Bouguettaya,

“Customized Delivery of E-Government WebServices,” Nov./Dec., pp. 77–84.

Meservy, Thomas O., Matthew L. Jensen, JohnKruse, Douglas P. Twitchell, Gabriel Tsech-penakis, Judee K. Burgoon, Dimitris N.Metaxas, and Jay F. Nunamaker Jr., “Decep-tion Detection through Automatic, UnobtrusiveAnalysis of Nonverbal Behavior,” Sept./Oct.,pp. 36–43.

Metaxas, Dimitris N., see Meservy, Thomas O.Michalewicz, Matthew, see Michalewicz,

Zbigniew.Michalewicz, Zbigniew, Martin Schmidt,

Matthew Michalewicz, and ConstantinChiriac, “Case Study: An Intelligent DecisionSupport System,” July/Aug., pp. 44–49.

Mika, Peter, “Social Networks and the Seman-tic Web: The Next Challenge” [Trends &Controversies], Jan./Feb., pp. 82–85.

Minton, Steven, see Ambite, José Luis, andDyer, Doug.

Mirchandani, Pitu, and Fei-Yue Wang,“RHODES to Intelligent Transportation Sys-tems” [Intelligent Transportation Systems],Jan./Feb., pp. 10–15.

Mjolsness, Eric, see Cheng, Jianlin.Montañés, Elena, Irene Díaz, José Ranilla,

Elías F. Combarro, and Javier Fernández,“Scoring and Selecting Terms for Text Cate-gorization,” May/June, pp. 40–47.

Moura, Ana, and José Fernando Oliveira, “A

GRASP Approach to the Container LoadingProblem,” July/Aug., pp. 50–57.

Mulvehill, Alice M., “Authoring Templates withTracker,” Mar./Apr., pp. 42–45.

Muñoz-Avila, Héctor, see Nau, Dana.Murdock, J. William, see Nau, Dana.Murphy, Kate, “Trapped with Robots” [In

Memoriam], May/June, pp. 10–11.Musen, Mark A., see Crubézy, Monica.Muslea, Maria, see Ambite, José Luis.

NNaik, Gaurav, see Kopena, Joseph.Nareyek, Alexander, Eugene C. Freuder,

Robert Fourer, Enrico Giunchiglia, Robert P.Goldman, Henry Kautz, Jussi Rintanen, andAustin Tate, “Constraints and AI Planning,”Mar./Apr., pp. 62–72.

Nau, Dana, Tsz-Chiu Au, Okhtay Ilghami, UgurKuter, Héctor Muñoz-Avila, J. William Mur-dock, Dan Wu, and Fusun Yaman, “Applica-tions of SHOP and SHOP2,” Mar./Apr., pp.34–41.

Ng, Wee-Keong, see Ong, Kok-Leong.Niehsen, Wolfgang, see Li, Li.Norrie, Douglas H., see Walker, Scott S.Nowak, Andrzej, and Robin R. Vallacher,

“Information and Influence in the Construc-tion of Shared Reality” [Trends & Controver-sies], Jan./Feb., pp. 90–93.

Nunamaker, Jay F. Jr., see Meservy, Thomas O.

OO’Connor, Martin, see Crubézy, Monica.Oliveira, José Fernando, see Moura, Ana.Ong, Kok-Leong, Zili Zhang, Wee-Keong Ng,

and Ee-Peng Lim, “Agents and Stream DataMining: A New Perspective,” May/June, pp.60–67.

Osinski, Stanislaw, and Dawid Weiss, “A Con-cept-Driven Algorithm for Clustering SearchResults,” May/June, pp. 48–54.

Ou, Yuming, see Yu, Jeffrey Xu.

PPadget, Julian, “E-Government and E-Democ-

racy in Latin America” [Global IS], Jan./Feb.,pp. 94–96.

Pai, Reetal, see Romo, Tod.Pan, Yunhe, see Xu, Songhua.Paquet, Sébastien, see Aïmeur, Esma.Parsons, Lance, see Berens, Michael.Pavlidou, Niovi, Nikos Grammalidis, Kosmas

Dimitropoulos, Dimitrios Simitopoulos, AlanGilbert, Enrico Piazza, Christof Herrlich, RalfHeidger, and Michael Strintzis, “Using Intel-ligent Digital Cameras to Monitor AerodromeSurface Traffic,” May/June, pp. 76–81.

Pechoucek, Michal, Jirí Vokrínek, and PetrBecvár, “ExPlanTech: Multiagent Support forManufacturing Decision Making,” Jan./Feb.,pp. 67–74.

Pedreschi, Dino, see Bonchi, Francesco.Pellecchia, Antonio, Christian Igel, Johann

Edelbrunner, and Gregor Schöner, “MakingDriver Modeling Attractive” [IntelligentTransportation Systems], Mar./Apr., pp. 8–12.

Peng, Hanchuan, Chris Ding, and Fuhui Long,“Minimum Redundancy–Maximum Rele-vance Feature Selection” [Trends & Contro-versies], Nov./Dec., pp. 70–71.

Peysakhov, Maxim, see Kopena, Joseph.Piazza, Enrico, see Pavlidou, Niovi.Pincus, Zachary, see Crubézy, Monica.Popp, Robert, “Using Social Science Technol-

ogy to Understand and Counter the 21st-Cen-tury Strategic Threat” [Trends & Controver-sies], Sept./Oct., pp. 76–79.

———, also see Yen, John.Preece, Alun, “WINES: Wired and Wireless Intel-

ligent Networked Systems” [Global IS],Nov./Dec., pp. 85–87.

QQi, Yan, see Gao, Jianbo.Qin, Jialun, see Zhou, Yilu.

RRaa, Birger, see Dullaert, Wout.Rabideau, Gregg, see Chien, Steve.Ranilla, José, see Montañés, Elena.Regli, William, see Kopena, Joseph.Rego, Cesar, see James, Tabitha.Reid, Edna, see Zhou, Yilu.Reitsma, Femke, and Jochen Albrecht, “Model-

ing with the Semantic Web in the Geosciences”[The Semantic Web], Mar./Apr., pp. 86–88.

NOVEMBER/DECEMBER 2005 www.computer.org/intelligent 93

Page 7: VOLUME 20 2005 Annual Index – Volume 20 VOLUME 20 · PDF fileWindows,”Alexandre Le Bouthillier, Teodor G. Crainic, and Peter Kropf, July/Aug., pp. 36–42. ... Birger Raa, Bert

Restivo, Francisco J., see Leitão, Paulo.Rintanen, Jussi, see Nareyek, Alexander.Rodolphe, François, see Martin, Juliette.Romo, Tod, Kreshna Gopal, Erik McKee, Lalji

Kanbi, Reetal Pai, Jacob Smith, James Sac-chettini, and Thomas Ioerger, “TEXTAL: AI-Based Structural Determination for X-rayProtein Crystallography” [Applications],Nov./Dec., pp. 59–63.

Rönnqvist, Mikael, see Bredström, David.Rosenzweig, Paul, “The Changing Face of Pri-

vacy Policy and the New Policy-TechnologyInterface” [Trends & Controversies], Sept./Oct.,pp. 84–86.

Roth, Emilie M., see Scott, Ronald.

SSacchettini, James, see Romo, Tod.Saha, Sabyasachi, and Sandip Sen, “Aggressive

Pricing to Exploit Market Niches in SupplyChains,” Jan./Feb., pp. 36–41.

Scharenbroich, Lucas, see Cheng, Jianlin.Schmidt, Martin, see Michalewicz, Zbigniew.Schöner, Gregor, see Pellecchia, Antonio.Scott, Ronald, Emilie M. Roth, Stephen E.

Deutsch, Erika Malchiodi, Thomas E. Kazmier-czak, Robert G. Eggleston, Samuel R. Kuper,and Randall D. Whitaker, “Work-CenteredSupport Systems: A Human-Centered Approachto Intelligent System Design,” Mar./Apr., pp.73–81.

Sen, Sandip, see Saha, Sabyasachi.Sherwood, Rob, see Chien, Steve.Shuai, Dianxun, and Xiang Feng, “Distributed

Problem Solving in Multiagent Systems: ASpring Net Approach,” July/Aug., pp. 66–74.

Shulman, Seth, see Chien, Steve.Simitopoulos, Dimitrios, see Pavlidou, Niovi.Smith, Jacob, see Romo, Tod.Smith, Stephen F., David W. Hildum, and David

R. Crimm, “Comirem: An Intelligent Form forResource Management,” Mar./Apr., pp. 16–24.

Song, Jingyan, see Li, Li.Souzis, Adam, “Building a Semantic Wiki” [The

Semantic Web], Sept./Oct., pp. 87–91.Spinellis, Diomidis, see Tarantilis, Christos D.Staab, Steffen, “Social Networks Applied”

[Trends & Controversies], Jan./Feb., p. 80.Staron, Raymond J., see Maturana, Francisco P.Strintzis, Michael, see Pavlidou, Niovi.Studer, Rudi, see Sure, York.Sultanik, Evan, see Kopena, Joseph.Sure, York, Pascal Hitzler, Andreas Eberhart, and

Rudi Studer, “The Semantic Web in One Day”[The Semantic Web], May/June, pp. 85–87.

Sweeney, Latanya, “Privacy-Preserving Surveil-lance Using Databases from Daily Life” [Trends& Controversies], Sept./Oct., pp. 83–84.

TTaipale, K.A., “The Trusted Systems Problem:

Security Envelopes, Statistical Threat Analysis,and the Presumption of Innocence” [Trends &Controversies], Sept./Oct., pp. 80–83.

Tang, Shuming, see Wu, Zhaohui.Tarantilis, Christos D., Diomidis Spinellis, and

Michel Gendreau, “Advanced Heuristics inTransportation and Logistics” [Guest Editors’Introduction], July/Aug., pp. 16–18.

Tate, Austin, see Dyer, Doug, and Nareyek,Alexander.

Torkkola, Kari, and Eugene Tuv, “FeatureSelection Using Ensemble Methods” [Trends& Controversies], Nov./Dec., pp. 68–70.

Tran, Daniel, see Chien, Steve.Trivedi, Mohan M., Tarak L. Gandhi, and Kohsia

S. Huang, “Distributed Interactive VideoArrays for Event Capture and Enhanced Situa-tional Awareness,” Sept./Oct., pp. 58–66.

Tsai, Tienwei, see Huang, Yo Ping.Tsechpenakis, Gabriel, see Meservy, Thomas O.Tuv, Eugene, see Torkkola, Kari.Twitchell, Douglas P., see Meservy, Thomas O.

VValckenaers, Paul, see McFarlane, Duncan.Vallacher, Robin R., see Nowak, Andrzej.Vernimmen, Bert, see Dullaert, Wout.Vokrínek, Jirí, see Pechoucek, Michal.Voth, Danna, “Found in Translation” [In the

News], Nov./Dec., pp. 6–8.———, “Machines Mimicking Humans” [In the

News], Sept./Oct., pp. 6–8.———, “Minding Your Business with AI” [In

the News], July/Aug., pp. 4–7.———, “Naomi Ehrich Leonard’s School of

Collaboration” [Histories & Futures],May/June, pp. 82–84.

———, “Practical Agents Help Out” [In theNews], Mar./Apr., pp. 4–6.

———, “Segway to the Future” [In the News],May/June, pp. 5–8.

———, “Using AI to Detect Breast Cancer” [Inthe News], Jan./Feb., pp. 5–7.

WWalker, Scott S., Robert W. Brennan, and Douglas

H. Norrie, “Holonic Job Shop Scheduling Usinga Multiagent System,” Jan./Feb., pp. 50–57.

Wang, Fei-Yue, “Agent-Based Control for Net-worked Traffic Management Systems” [Intel-ligent Transportation Systems], Sept./Oct.,pp. 92–96.

———, see Chen, Hsinchun; Li, Li; Mirchan-dani, Pitu; and Yao, Yiyu.

Wang, Jue, see Yao, Yiyu.Weiss, Dawid, see Osinski, Stanislaw.

Whitaker, Randall D., see Scott, Ronald.Witlox, Frank, see Dullaert, Wout.Wong, Limsoon, see Li, Jinyan.Woods, David D., see Hoffman, Robert R.World, Linda, “AI and Philosophy: How Can

You Know the Dancer from the Dance?” [His-tories & Futures], July/Aug., pp. 84–85.

Wu, Chung-Hsien, Liang-Chih Yu, and Fong-Lin Jang, “Using Semantic Dependencies toMine Depressive Symptoms from Consulta-tion Records,” Nov./Dec., pp. 50–58.

Wu, Dan, see Nau, Dana.Wu, Jian, see Wu, Zhaohui.Wu, Zhaohui, Shuming Tang, Shuiguang Deng,

Jian Wu, Huajun Chen, and Haijun Gao,“DartGrid II: A Semantic Grid Platform forITS” [Intelligent Transportation Systems],May/June, pp. 12–15.

XXu, Songhua, Francis C.M. Lau, William K.

Cheung, and Yunhe Pan, “Automatic Genera-tion of Artistic Chinese Calligraphy,”May/June, pp. 32–39.

YYaman, Fusun, see Nau, Dana.Yang, Qiang, see Li, Jinyan.Yao, Yiyu, Fei-Yue Wang, Jue Wang, and Daniel

Zeng, “Rule + Exception Strategies for Secu-rity Information Analysis,” Sept./Oct., pp.52–57.

Yates, J. Frank, see Hoffman, Robert R.Yen, John, and Robert Popp, “Homeland Secu-

rity” [Trends & Controversies], Sept./Oct.,pp. 76.

Yu, Jeffrey Xu, Yuming Ou, Chengqi Zhang,and Shichao Zhang, “Identifying InterestingVisitors through Web Log Classification,”May/June, pp. 55–59.

Yu, Lei, see Berens, Michael.Yu, Liang-Chih, see Wu, Chung-Hsien.

ZZaki, Mohammed J., see Zhao, Lizhuang.Zeng, Daniel, see Yao, Yiyu.Zhang, Chengqi, see Yu, Jeffrey Xu.Zhang, Shichao, see Yu, Jeffrey Xu.Zhang, Zili, see Ong, Kok-Leong.Zhao, Lizhuang, and Mohammed J. Zaki, “Micro-

Cluster: Efficient Deterministic Biclustering ofMicroarray Data,” Nov./Dec., pp. 40–49.

Zheng, Nan-Ning, see Li, Li.Zhou, Yilu, Edna Reid, Jialun Qin, Hsinchun

Chen, and Guanpi Lai, “US Domestic Extrem-ist Groups on the Web: Link and Content Analy-sis,” Sept./Oct., pp. 44–51.

Zhao, Zheng, see Berens, Michael.

94 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS