AI Conference Program at a Glance:
Student Symposium
| May 28 |
9:00 | Greetings to GSS; |
9:10 | GSS Paper 1 |
9:50 | GSS Paper 2 |
10:30 | Break |
10:40 | GSS paper 3 |
11:20 | GSS paper 4 |
12:00 | Lunch (on your own) |
13:00 | CAIAC MSC Winner |
13:30 | GSS paper 5 |
14:10 | GSS paper 6 |
14:50 | Break |
15:10 | GSS paper 7 |
15:50 | GSS paper 8 |
16:30 | Closing remarks |
|
AI Main Conference
| May 29 | May 30 | May 31 |
8:00 | Welcome | |
8:30 | Session 1 | Session 5 | Session 9 |
10:00 | Break |
10:30 | Invited Talk 1 | Session 6 | Poster Session 1 |
11:30 | Session 2 |
12:00 | Lunch (on your own) |
13:30 | Session 3: Industrial Track | Invited Talk 2 | Poster Session 2 |
14:30 | Session 7 |
15:00 | Break |
15:30 | Session 4 | Session 8 | Session 10 |
17:00 | End |
17:30 | BBQ | | Bus to RCMP |
18:00 | Banquet | Tour |
20:30 | Bus to Hotels |
21:00 | | Bus to Hotels | Bus to Hotels |
|
Joint Conference Program
Overview of the joint conference program.
AI Conference Program:
All presentations will take place in ED 191
8.00 - 8.30 Conference Opening (ED 106)
Session 1 - MAY 29, 8.30 - 10.00
8.30 - 8.55 Construction of Privacy Preserving Hypertree Agent Organization as Distributed Maximum Spanning Tree
Yang Xiang and Kamala Srinivasan
8.55 - 9.20 Boundary Set Based Existence Recognition and Construction of Hypertree Agent Organization
Yang Xiang and Kamala Srinivasan
9.20 - 9.45 Fast Grid-based Path Finding for Video Games
William Lee and Ramon Lawrence
9.45 - 10.00 Quantitative Aspects of Behaviour Network Verification
Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch and Karsten Berns
10:00 - 10:30 Break
Session 2a - MAY 29, 10.30 - 11.30
10.30 - 11.30 Invited talk - From Services to the Cloud and into Space: Modeling and Customizing Component-Based Systems
Sheila McIlraith
Session 2b - MAY 29, 11.30 - 12.00
11.30 - 11.45 Classifying Organizational Roles using Email Social Networks
Fatemeh Razzaghi, Abtin Zohrabi Aliabadi, Seyed Pooria Madani Kochak and Ali Akbar Ghorbani
11.45 - 12.00 General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach
Amir Razavi, Diana Inkpen, Dmitry Brusilovsky and Lana Bogouslavski
12:00 - 13:30 Lunch (on your own)
Session 3 - MAY 29, 13:30 - 15:00 INDUSTRY TRACK
How GasBuddy uses pattern recognition to predict gas prices
Jason Toews
From prototype to product: building Datacratics real-time machine learning platform
Francoiss Maillet
Why Artificial Intelligence is Important to Retail
Ken Konkel
15:00 - 15:30 Break
Session 4 - MAY 29, 15.30 - 17.00
15.30 - 15.55 Move Pruning and Duplicate Detection
Robert C. Holte
15.55 - 16.20 d-Separation: Strong Completeness of Semantics in Bayesian Network Inference
Cory Butz, Wen Yan and Anders Madsen
16.20 - 16.45 Protocol Verification in a Theory of Action
Aaron Hunter, James Delgrande and Ryan McBride
16.45 - 17.00 Revisiting the Epistemics of Protocol Correctness
Aaron Hunter
Session 5 - MAY 30, 8.30 - 9.55
8.30 - 8.45 A Causal Approach for Mining Interesting Anomalies
Sakshi Babbar, Didi Surian and Sanjay Chawla
8.45 - 9.00 The K-Modes Method under Possibilistic Framework
Asma Ammar, Zied Elouedi and Pawan Lingras
9.00 - 9.15 An Ensemble Method Based on AdaBoost and Meta-learning
Xuan Liu, Xiaoguang Wang, Nathalie Japkowicz and Stan Matwin
9.15 - 9.30 Improvements to Boosting with Data Streams
Erico De Souza and Stan Matwin
9.30 - 9.55 Cost-Sensitive Boosting Algorithms for Imbalanced Multi-instance Datasets
Xiaoguang Wang, Stan Matwin, Nathalie Japkowicz and Xuan Liu
10:00 - 10:30 Break
Session 6 - MAY 30, 10.30 - 12.00
10.30 - 10.55 Detecting Statistically Significant Temporal Associations from Multiple Event Sequences
Han Liang and J org Sander
10.55 - 11.20 Maintaining Preference Networks that Adapt to Changing Preferences
Ki Hyang Lee, Scott Buffett and Michael Fleming
11.20 - 11.45 Navigation by Path Integration and the Fourier Transform: A Spiking-Neuron Model
Jeff Orchard, Hao Yang and Xiang Ji
11.45 - 12.00 Sensory Updates to Combat Path-Integration Drift
Xiang Ji, Shrinu Kushagra and Jeff Orchard
12:00 - 13:30 Lunch (on your own)
Session 7a - MAY 30, 13.30 - 14.30
13:30 - 14:30 Invited talk - An All-Inclusive New Paradigm of Learning of Graphical Models
Eric Xing
Session 7b - MAY 30, 14.30 - 15.00
14.30 - 14.45 Quantitatively Evaluating Formula-Variable Relevance by Forgetting
Xin Liang, Zuoquan Lin and Jan Van Den Bussche
14.45 - 15.00 Preference thresholds optimization by interactive variation
Mohamed Mouine and Guy Lapalme
15:00 - 15:30 Break
Session 8 - MAY 30, 15.30 - 17.00
15.30 - 15.55 Feature Combination for Sentence Similarity
Ehsan Shareghi and Sabine Bergler
15.55 - 16.20 Selective Retrieval for Categorization of Semi-Structured Web Resources
Marek Lipczak, Tomasz Niewiarowski, Vlado Keselj and Evangelos Milios
16.20 - 16.45 Exhaustive search with belief discernibility matrix and function
Salsabil Trabelsi, Zied Elouedi and Pawan Lingras
16.45 - 17.00 Path Finding by Demand Sensitive Map Abstraction
Sourodeep Bhattacharjee and Scott Goodwin
Session 9 - MAY 31, 8.30 - 10.00
8.30 - 8.55 Identifying Explicit Discourse Connectives in Text
Syeed Ibn Faiz and Robert Mercer
8.55 - 9.20 Detecting Health-related Privacy Leaks in Social Networks Using Text Mining Tools
Kambiz Ghazinour, Marina Sokolova and Stan Matwin
9.20 - 9.45 Unsupervised Extraction of Diagnosis Codes from EMRs Using Knowledge-Based and Extractive Text Summarization Techniques
Ramakanth Kavuluru, Sifei Han and Daniel Harris
9.45 - 10.00 Improved Arabic-French Machine Translation through Preprocessing Schemes and Language Analysis
Fatiha Sadat and Emad Mohamed
10:00 - 10:30 Break
Poster Session 1 - MAY 31, 10.30 - 12.00
8,14,24,26,27,29,34,36,37,38,50,55,65,66,68,70,71,73 (see below for list of titles and authors)
12:00 - 13:30 Lunch (on your own)
Poster Session 2 - MAY 31, 13.30 - 15.00
4,9,13,15,18,19,21,22,32,33,40,41,44,46,47,49,53,62 (see below for list of titles and authors)
15:00 - 15:30 Break
Session 10 - MAY 31, 15.30 - 17.00
15.30 - 16.10 PhD award winner
16.10 - 16.35 Logo recognition Based on the Dempster-Shafer Fusion of Multiple Classifiers
Mohammad Ali Bagheri, Qigang Gao and Sergio Escalera
16.35 - 16.50 Detecting and Categorizing Indices in Lecture Video using Supervised Machine Learning
Christopher Brooks, G. Scott Johnston, Craig Thompson and Jim Greer
16.50 - 17.05 An Application of Answer Set Programming for Situational Analysis in a Maritime Tra ffic Domain
Zahra Vaseqi and James Delgrande
List of Posters
Poster Session 1 - MAY 31, 10.30 - 12.00:
- 8. Asma Ammar, Zied Elouedi and Pawan Lingras The K-Modes Method under Possibilistic Framework
- 14. Aaron Hunter, James Delgrande and Ryan McBride Protocol Verification in a Theory of Action 24. William Lee and Ramon Lawrence Fast Grid-based Path Finding for Video Games
- 26. Fatiha Sadat and Emad Mohamed Improved Arabic-French Machine Translation through Preprocessing Schemes and Language Analysis
- 27. Fatemeh Razzaghi, Abtin Zohrabi Aliabadi, Seyed Pooria Madani Kochak and Ali Akbar Ghorbani Classifying Organizational Roles using Email Social Networks
- 29. Mohamed Mouine and Guy Lapalme Preference thresholds optimization by interactive variation
- 34. Erico De Souza and Stan Matwin Improvements to Boosting with Data Streams
- 36. Sakshi Babbar, Didi Surian and Sanjay Chawla A Causal Approach for Mining Interesting Anomalies
- 37. Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch and Karsten Berns Quantitative Aspects of Behaviour Network Verification
- 38. Xuan Liu, Xiaoguang Wang, Nathalie Japkowicz and Stan Matwin An Ensemble Method Based on AdaBoost and Meta-learning
- 50. Zahra Vaseqi and James Delgrande An Application of Answer Set Programming for Situational Analysis in a Maritime Traffic Domain
- 55. Aaron Hunter Revisiting the Epistemics of Protocol Correctness
- 65. Yifeng Li Sparse Representation for Machine Learning 66. Madeena Sultana A Novel Content Based Methodology for a Large Scale Multimodal Biometric System
- 68. Amani Jamal Shape-based Analysis for Automatic Segmentation of Arabic Handwritten Texts 70. Eisa Alanazi Preference Constrained Optimization under Change 71. Shehroz Khan A Probabilistic Framework for Detecting Unusual Events in Mobile Sensor Networks
- 73. Peter Lach Intelligent Tutoring Systems Measuring Student's Effort During Assessment
Poster Session 2 - MAY 31, 13.30 - 15.00:
- 4. Sourodeep Bhattacharjee and Scott Goodwin Pathfinding by Demand Sensitive Map Abstraction
- 9. Salsabil Trabelsi, Zied Elouedi and Pawan Lingras Exhaustive search with belief discernibility matrix and function
- 13. Han Liang and Joerg Sander Detecting Statistically Significant Temporal Associations from Multiple Event Sequences
- 15. Robert C. Holte Move Pruning and Duplicate Detection
- 18. Cory Butz, Wen Yan and Anders Madsen d-Separation: Strong Completeness of Semantics in Bayesian Network Inference
- 19. Christopher Brooks, G. Scott Johnston, Craig Thompson and Jim Greer Detecting and Categorizing Indices in Lecture Video using Supervised Machine Learning
- 21 Ki Hyang Lee, Scott Buffett and Michael Fleming Maintaining Preference Networks that Adapt to Changing Preferences
- 22. Amir Razavi, Diana Inkpen, Dmitry Brusilovsky and Lana Bogouslavski General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach
- 32. Jeff Orchard, Hao Yang and Xiang Ji Navigation by Path Integration and the Fourier Transform: A Spiking-Neuron Model
- 33. Xiang Ji, Shrinu Kushagra and Jeff Orchard Sensory Updates to Combat Path-Integration Drift
- 40. Xiaoguang Wang, Stan Matwin, Nathalie Japkowicz and Xuan Liu Cost-Sensitive Boosting Algorithms for Imbalanced Multi-instance Datasets
- 41 Kambiz Ghazinour, Marina Sokolova and Stan Matwin Detecting Health-related Privacy Leaks in Social Networks Using Text Mining Tools
- 44. Mohammad Ali Bagheri, Qigang Gao and Sergio Escalera Logo recognition Based on the Dempster-Shafer Fusion of Multiple Classifiers
- 46. Marek Lipczak, Tomasz Niewiarowski, Vlado Keselj and Evangelos Milios Selective Retrieval for Categorization of Semi-Structured Web Resources
- 47. Ehsan Shareghi and Sabine Bergler Feature Combination for Sentence Similarity
- 49. Syeed Ibn Faiz and Robert Mercer Identifying Explicit Discourse Connectives in Text
- 53. Ramakanth Kavuluru, Sifei Han and Daniel Harris Unsupervised Extraction of Diagnosis Codes from EMRs Using Knowledge-Based and Extractive Text Summarization Techniques
- 62. Xin Liang, Zuoquan Lin and Jan Van Den Bussche Quantitatively Evaluating Formula-Variable Relevance by Forgetting
List of Accepted Papers
- 2. Yang Xiang and Kamala Srinivasan Construction of Privacy Preserving Hypertree Agent Organization as Distributed Maximum Spanning Tree
- 3. Yang Xiang and Kamala Srinivasan Boundary Set Based Existence Recognition and Construction of Hypertree Agent Organization
- 4. Sourodeep Bhattacharjee and Scott Goodwin Pathfinding by Demand Sensitive Map Abstraction
- 8. Asma Ammar, Zied Elouedi and Pawan Lingras The K-Modes Method under Possibilistic Framework
- 9. Salsabil Trabelsi, Zied Elouedi and Pawan Lingras Exhaustive search with belief discernibility matrix and function
- 13. Han Liang and Joerg Sander Detecting Statistically Significant Temporal Associations from Multiple Event Sequences
- 14. Aaron Hunter, James Delgrande and Ryan McBride Protocol Verification in a Theory of Action
- 15. Robert C. Holte Move Pruning and Duplicate Detection
- 18. Cory Butz, Wen Yan and Anders Madsen d-Separation: Strong Completeness of Semantics in Bayesian Network Inference
- 19. Christopher Brooks, G. Scott Johnston, Craig Thompson and Jim Greer Detecting and Categorizing Indices in Lecture Video using Supervised Machine Learning
- 21 Ki Hyang Lee, Scott Buffett and Michael Fleming Maintaining Preference Networks that Adapt to Changing Preferences
- 22. Amir Razavi, Diana Inkpen, Dmitry Brusilovsky and Lana Bogouslavski General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach
- 24. William Lee and Ramon Lawrence Fast Grid-based Path Finding for Video Games
- 26. Fatiha Sadat and Emad Mohamed Improved Arabic-French Machine Translation through Preprocessing Schemes and Language Analysis
- 27. Fatemeh Razzaghi, Abtin Zohrabi Aliabadi, Seyed Pooria Madani Kochak and Ali Akbar Ghorbani Classifying Organizational Roles using Email Social Networks
- 29. Mohamed Mouine and Guy Lapalme Preference thresholds optimization by interactive variation
- 32. Jeff Orchard, Hao Yang and Xiang Ji Navigation by Path Integration and the Fourier Transform: A Spiking-Neuron Model
- 33. Xiang Ji, Shrinu Kushagra and Jeff Orchard Sensory Updates to Combat Path-Integration Drift
- 34. Erico De Souza and Stan Matwin Improvements to Boosting with Data Streams
- 36. Sakshi Babbar, Didi Surian and Sanjay Chawla A Causal Approach for Mining Interesting Anomalies
- 37. Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch and Karsten Berns Quantitative Aspects of Behaviour Network Verification
- 38. Xuan Liu, Xiaoguang Wang, Nathalie Japkowicz and Stan Matwin An Ensemble Method Based on AdaBoost and Meta-learning
- 40. Xiaoguang Wang, Stan Matwin, Nathalie Japkowicz and Xuan Liu Cost-Sensitive Boosting Algorithms for Imbalanced Multi-instance Datasets
- 41 Kambiz Ghazinour, Marina Sokolova and Stan Matwin Detecting Health-related Privacy Leaks in Social Networks Using Text Mining Tools
- 44. Mohammad Ali Bagheri, Qigang Gao and Sergio Escalera Logo recognition Based on the Dempster-Shafer Fusion of Multiple Classifiers
- 46. Marek Lipczak, Tomasz Niewiarowski, Vlado Keselj and Evangelos Milios Selective Retrieval for Categorization of Semi-Structured Web Resources
- 47. Ehsan Shareghi and Sabine Bergler Feature Combination for Sentence Similarity
- 49. Syeed Ibn Faiz and Robert Mercer Identifying Explicit Discourse Connectives in Text
- 50. Zahra Vaseqi and James Delgrande An Application of Answer Set Programming for Situational Analysis in a Maritime Traffic Domain
- 53. Ramakanth Kavuluru, Sifei Han and Daniel Harris Unsupervised Extraction of Diagnosis Codes from EMRs Using Knowledge-Based and Extractive Text Summarization Techniques
- 55. Aaron Hunter Revisiting the Epistemics of Protocol Correctness
- 62. Xin Liang, Zuoquan Lin and Jan Van Den Bussche Quantitatively Evaluating Formula-Variable Relevance by Forgetting
AI-2013 Graduate Student Symposium
Accepted Papers
- 65. Yifeng Li Sparse Representation for Machine Learning
- 66. Madeena Sultana A Novel Content Based Methodology for a Large Scale Multimodal Biometric System
- 67. Mohsen Hajiloo Learning Disease Patterns from High-Throughput Genomic Profiles: Why is it so Challenging?
- 68. Amani Jamal Shape-based Analysis for Automatic Segmentation of Arabic Handwritten Texts
- 69. Rushdi Shams Extracting Information-rich Part of Texts using Text Denoising
- 70. Eisa Alanazi Preference Constrained Optimization under Change
- 71. Shehroz Khan A Probabilistic Framework for Detecting Unusual Events in Mobile Sensor Networks
- 73. Peter Lach Intelligent Tutoring Systems Measuring Student's Effort During Assessment