AI Conference Program at a Glance:

Student Symposium
 May 28
9:00Greetings to GSS;
9:10GSS Paper 1
9:50GSS Paper 2
10:30Break
10:40GSS paper 3
11:20GSS paper 4
12:00Lunch (on your own)
13:00CAIAC MSC Winner
13:30GSS paper 5
14:10GSS paper 6
14:50Break
15:10GSS paper 7
15:50GSS paper 8
16:30Closing remarks
AI Main Conference
 May 29May 30May 31
8:00Welcome 
8:30Session 1Session 5Session 9
10:00Break
10:30Invited Talk 1Session 6Poster
Session 1
11:30Session 2
12:00Lunch (on your own)
13:30Session 3:
Industrial Track
Invited Talk 2Poster
Session 2
14:30Session 7
15:00Break
15:30Session 4Session 8Session 10
17:00End
17:30BBQ Bus to RCMP
18:00BanquetTour
20:30Bus to Hotels
21:00 Bus to HotelsBus to Hotels

Joint Conference Program

Overview of the joint conference program.

AI Conference Program:

All presentations will take place in ED 191

8.00 - 8.30 Conference Opening (ED 106)

Session 1 - MAY 29, 8.30 - 10.00

8.30 - 8.55  Construction of Privacy Preserving Hypertree Agent Organization as Distributed Maximum Spanning Tree

Yang Xiang and Kamala Srinivasan

8.55 - 9.20  Boundary Set Based Existence Recognition and Construction of Hypertree Agent Organization

Yang Xiang and Kamala Srinivasan

9.20 - 9.45 Fast Grid-based Path Finding for Video Games

William Lee and Ramon Lawrence

9.45 - 10.00  Quantitative Aspects of Behaviour Network Verification

Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch and Karsten Berns

10:00 - 10:30 Break

Session 2a - MAY 29, 10.30 - 11.30

10.30 - 11.30 Invited talk - From Services to the Cloud and into Space: Modeling and Customizing Component-Based Systems

 

Sheila McIlraith

Session 2b - MAY 29, 11.30 - 12.00

11.30 - 11.45 Classifying Organizational Roles using Email Social Networks

Fatemeh Razzaghi, Abtin Zohrabi Aliabadi, Seyed Pooria Madani Kochak and Ali Akbar Ghorbani

11.45 - 12.00 General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach

Amir Razavi, Diana Inkpen, Dmitry Brusilovsky and Lana Bogouslavski

12:00 - 13:30 Lunch (on your own)

Session 3 - MAY 29, 13:30 - 15:00 INDUSTRY TRACK

How GasBuddy uses pattern recognition to predict gas prices

Jason Toews

From prototype to product: building Datacratics real-time machine learning platform

Francoiss Maillet

Why Artificial Intelligence is Important to Retail

Ken Konkel

15:00 - 15:30 Break

Session 4 - MAY 29, 15.30 - 17.00

15.30 - 15.55 Move Pruning and Duplicate Detection

Robert C. Holte

15.55 - 16.20 d-Separation: Strong Completeness of Semantics in Bayesian Network Inference

Cory Butz, Wen Yan and Anders Madsen

16.20 - 16.45 Protocol Verification in a Theory of Action

Aaron Hunter, James Delgrande and Ryan McBride

16.45 - 17.00 Revisiting the Epistemics of Protocol Correctness

Aaron Hunter

Session 5 - MAY 30, 8.30 - 9.55

8.30 - 8.45 A Causal Approach for Mining Interesting Anomalies

Sakshi Babbar, Didi Surian and Sanjay Chawla

8.45 - 9.00 The K-Modes Method under Possibilistic Framework

Asma Ammar, Zied Elouedi and Pawan Lingras

9.00 - 9.15 An Ensemble Method Based on AdaBoost and Meta-learning

Xuan Liu, Xiaoguang Wang, Nathalie Japkowicz and Stan Matwin

9.15 - 9.30 Improvements to Boosting with Data Streams

Erico De Souza and Stan Matwin

9.30 - 9.55 Cost-Sensitive Boosting Algorithms for Imbalanced Multi-instance Datasets

Xiaoguang Wang, Stan Matwin, Nathalie Japkowicz and Xuan Liu

10:00 - 10:30 Break

Session 6 - MAY 30, 10.30 - 12.00

10.30 - 10.55 Detecting Statistically Significant Temporal Associations from Multiple Event Sequences

Han Liang and J org Sander

10.55 - 11.20 Maintaining Preference Networks that Adapt to Changing Preferences

Ki Hyang Lee, Scott Buffett and Michael Fleming

11.20 - 11.45 Navigation by Path Integration and the Fourier Transform: A Spiking-Neuron Model

Jeff Orchard, Hao Yang and Xiang Ji

11.45 - 12.00 Sensory Updates to Combat Path-Integration Drift

Xiang Ji, Shrinu Kushagra and Jeff Orchard

12:00 - 13:30 Lunch (on your own)

Session 7a - MAY 30, 13.30 - 14.30

13:30 - 14:30 Invited talk - An All-Inclusive New Paradigm of Learning of Graphical Models

Eric Xing

Session 7b - MAY 30, 14.30 - 15.00

14.30 - 14.45  Quantitatively Evaluating Formula-Variable Relevance by Forgetting

Xin Liang, Zuoquan Lin and Jan Van Den Bussche

14.45 - 15.00 Preference thresholds optimization by interactive variation

Mohamed Mouine and Guy Lapalme

15:00 - 15:30 Break

Session 8 - MAY 30, 15.30 - 17.00

15.30 - 15.55 Feature Combination for Sentence Similarity

Ehsan Shareghi and Sabine Bergler

15.55 - 16.20 Selective Retrieval for Categorization of Semi-Structured Web Resources

Marek Lipczak, Tomasz Niewiarowski, Vlado Keselj and Evangelos Milios

16.20 - 16.45 Exhaustive search with belief discernibility matrix and function

Salsabil Trabelsi, Zied Elouedi and Pawan Lingras

16.45 - 17.00 Path Finding by Demand Sensitive Map Abstraction

Sourodeep Bhattacharjee and Scott Goodwin

Session 9 - MAY 31, 8.30 - 10.00

8.30 - 8.55 Identifying Explicit Discourse Connectives in Text

Syeed Ibn Faiz and Robert Mercer

8.55 - 9.20 Detecting Health-related Privacy Leaks in Social Networks Using Text Mining Tools

Kambiz Ghazinour, Marina Sokolova and Stan Matwin

9.20 - 9.45 Unsupervised Extraction of Diagnosis Codes from EMRs Using Knowledge-Based and Extractive Text Summarization Techniques

Ramakanth Kavuluru, Sifei Han and Daniel Harris

9.45 - 10.00 Improved Arabic-French Machine Translation through Preprocessing Schemes and Language Analysis

Fatiha Sadat and Emad Mohamed

10:00 - 10:30 Break

Poster Session 1 - MAY 31, 10.30 - 12.00

8,14,24,26,27,29,34,36,37,38,50,55,65,66,68,70,71,73 (see below for list of titles and authors)

12:00 - 13:30 Lunch (on your own)

Poster Session 2 - MAY 31, 13.30 - 15.00

4,9,13,15,18,19,21,22,32,33,40,41,44,46,47,49,53,62 (see below for list of titles and authors)

15:00 - 15:30 Break

Session 10 - MAY 31, 15.30 - 17.00

15.30 - 16.10  PhD award winner

16.10 - 16.35 Logo recognition Based on the Dempster-Shafer Fusion of Multiple Classifiers

Mohammad Ali Bagheri, Qigang Gao and Sergio Escalera

16.35 - 16.50 Detecting and Categorizing Indices in Lecture Video using Supervised Machine Learning

Christopher Brooks, G. Scott Johnston, Craig Thompson and Jim Greer

16.50 - 17.05 An Application of Answer Set Programming for Situational Analysis in a Maritime Tra ffic Domain

Zahra Vaseqi and James Delgrande


List of Posters

Poster Session 1 - MAY 31, 10.30 - 12.00:

  • 8. Asma Ammar, Zied Elouedi and Pawan Lingras The K-Modes Method under Possibilistic Framework
  • 14. Aaron Hunter, James Delgrande and Ryan McBride Protocol Verification in a Theory of Action 24. William Lee and Ramon Lawrence Fast Grid-based Path Finding for Video Games
  • 26. Fatiha Sadat and Emad Mohamed Improved Arabic-French Machine Translation through Preprocessing Schemes and Language Analysis
  • 27. Fatemeh Razzaghi, Abtin Zohrabi Aliabadi, Seyed Pooria Madani Kochak and Ali Akbar Ghorbani Classifying Organizational Roles using Email Social Networks
  • 29. Mohamed Mouine and Guy Lapalme Preference thresholds optimization by interactive variation
  • 34. Erico De Souza and Stan Matwin Improvements to Boosting with Data Streams
  • 36. Sakshi Babbar, Didi Surian and Sanjay Chawla A Causal Approach for Mining Interesting Anomalies
  • 37. Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch and Karsten Berns Quantitative Aspects of Behaviour Network Verification
  • 38. Xuan Liu, Xiaoguang Wang, Nathalie Japkowicz and Stan Matwin An Ensemble Method Based on AdaBoost and Meta-learning
  • 50. Zahra Vaseqi and James Delgrande An Application of Answer Set Programming for Situational Analysis in a Maritime Traffic Domain
  • 55. Aaron Hunter Revisiting the Epistemics of Protocol Correctness
  • 65. Yifeng Li Sparse Representation for Machine Learning 66. Madeena Sultana A Novel Content Based Methodology for a Large Scale Multimodal Biometric System
  • 68. Amani Jamal Shape-based Analysis for Automatic Segmentation of Arabic Handwritten Texts 70. Eisa Alanazi Preference Constrained Optimization under Change 71. Shehroz Khan A Probabilistic Framework for Detecting Unusual Events in Mobile Sensor Networks
  • 73. Peter Lach Intelligent Tutoring Systems Measuring Student's Effort During Assessment

Poster Session 2 - MAY 31, 13.30 - 15.00:

  • 4. Sourodeep Bhattacharjee and Scott Goodwin Pathfinding by Demand Sensitive Map Abstraction
  • 9. Salsabil Trabelsi, Zied Elouedi and Pawan Lingras Exhaustive search with belief discernibility matrix and function
  • 13. Han Liang and Joerg Sander Detecting Statistically Significant Temporal Associations from Multiple Event Sequences
  • 15. Robert C. Holte Move Pruning and Duplicate Detection
  • 18. Cory Butz, Wen Yan and Anders Madsen d-Separation: Strong Completeness of Semantics in Bayesian Network Inference
  • 19. Christopher Brooks, G. Scott Johnston, Craig Thompson and Jim Greer Detecting and Categorizing Indices in Lecture Video using Supervised Machine Learning
  • 21 Ki Hyang Lee, Scott Buffett and Michael Fleming Maintaining Preference Networks that Adapt to Changing Preferences
  • 22. Amir Razavi, Diana Inkpen, Dmitry Brusilovsky and Lana Bogouslavski General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach
  • 32. Jeff Orchard, Hao Yang and Xiang Ji Navigation by Path Integration and the Fourier Transform: A Spiking-Neuron Model
  • 33. Xiang Ji, Shrinu Kushagra and Jeff Orchard Sensory Updates to Combat Path-Integration Drift
  • 40. Xiaoguang Wang, Stan Matwin, Nathalie Japkowicz and Xuan Liu Cost-Sensitive Boosting Algorithms for Imbalanced Multi-instance Datasets
  • 41 Kambiz Ghazinour, Marina Sokolova and Stan Matwin Detecting Health-related Privacy Leaks in Social Networks Using Text Mining Tools
  • 44. Mohammad Ali Bagheri, Qigang Gao and Sergio Escalera Logo recognition Based on the Dempster-Shafer Fusion of Multiple Classifiers
  • 46. Marek Lipczak, Tomasz Niewiarowski, Vlado Keselj and Evangelos Milios Selective Retrieval for Categorization of Semi-Structured Web Resources
  • 47. Ehsan Shareghi and Sabine Bergler Feature Combination for Sentence Similarity
  • 49. Syeed Ibn Faiz and Robert Mercer Identifying Explicit Discourse Connectives in Text
  • 53. Ramakanth Kavuluru, Sifei Han and Daniel Harris Unsupervised Extraction of Diagnosis Codes from EMRs Using Knowledge-Based and Extractive Text Summarization Techniques
  • 62. Xin Liang, Zuoquan Lin and Jan Van Den Bussche Quantitatively Evaluating Formula-Variable Relevance by Forgetting

List of Accepted Papers

  • 2. Yang Xiang and Kamala Srinivasan Construction of Privacy Preserving Hypertree Agent Organization as Distributed Maximum Spanning Tree
  • 3. Yang Xiang and Kamala Srinivasan Boundary Set Based Existence Recognition and Construction of Hypertree Agent Organization
  • 4. Sourodeep Bhattacharjee and Scott Goodwin Pathfinding by Demand Sensitive Map Abstraction
  • 8. Asma Ammar, Zied Elouedi and Pawan Lingras The K-Modes Method under Possibilistic Framework
  • 9. Salsabil Trabelsi, Zied Elouedi and Pawan Lingras Exhaustive search with belief discernibility matrix and function
  • 13. Han Liang and Joerg Sander Detecting Statistically Significant Temporal Associations from Multiple Event Sequences
  • 14. Aaron Hunter, James Delgrande and Ryan McBride Protocol Verification in a Theory of Action
  • 15. Robert C. Holte Move Pruning and Duplicate Detection
  • 18. Cory Butz, Wen Yan and Anders Madsen d-Separation: Strong Completeness of Semantics in Bayesian Network Inference
  • 19. Christopher Brooks, G. Scott Johnston, Craig Thompson and Jim Greer Detecting and Categorizing Indices in Lecture Video using Supervised Machine Learning
  • 21 Ki Hyang Lee, Scott Buffett and Michael Fleming Maintaining Preference Networks that Adapt to Changing Preferences
  • 22. Amir Razavi, Diana Inkpen, Dmitry Brusilovsky and Lana Bogouslavski General Topic Annotation in Social Networks: A Latent Dirichlet Allocation Approach
  • 24. William Lee and Ramon Lawrence Fast Grid-based Path Finding for Video Games
  • 26. Fatiha Sadat and Emad Mohamed Improved Arabic-French Machine Translation through Preprocessing Schemes and Language Analysis
  • 27. Fatemeh Razzaghi, Abtin Zohrabi Aliabadi, Seyed Pooria Madani Kochak and Ali Akbar Ghorbani Classifying Organizational Roles using Email Social Networks
  • 29. Mohamed Mouine and Guy Lapalme Preference thresholds optimization by interactive variation
  • 32. Jeff Orchard, Hao Yang and Xiang Ji Navigation by Path Integration and the Fourier Transform: A Spiking-Neuron Model
  • 33. Xiang Ji, Shrinu Kushagra and Jeff Orchard Sensory Updates to Combat Path-Integration Drift
  • 34. Erico De Souza and Stan Matwin Improvements to Boosting with Data Streams
  • 36. Sakshi Babbar, Didi Surian and Sanjay Chawla A Causal Approach for Mining Interesting Anomalies
  • 37. Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch and Karsten Berns Quantitative Aspects of Behaviour Network Verification
  • 38. Xuan Liu, Xiaoguang Wang, Nathalie Japkowicz and Stan Matwin An Ensemble Method Based on AdaBoost and Meta-learning
  • 40. Xiaoguang Wang, Stan Matwin, Nathalie Japkowicz and Xuan Liu Cost-Sensitive Boosting Algorithms for Imbalanced Multi-instance Datasets
  • 41 Kambiz Ghazinour, Marina Sokolova and Stan Matwin Detecting Health-related Privacy Leaks in Social Networks Using Text Mining Tools
  • 44. Mohammad Ali Bagheri, Qigang Gao and Sergio Escalera Logo recognition Based on the Dempster-Shafer Fusion of Multiple Classifiers
  • 46. Marek Lipczak, Tomasz Niewiarowski, Vlado Keselj and Evangelos Milios Selective Retrieval for Categorization of Semi-Structured Web Resources
  • 47. Ehsan Shareghi and Sabine Bergler Feature Combination for Sentence Similarity
  • 49. Syeed Ibn Faiz and Robert Mercer Identifying Explicit Discourse Connectives in Text
  • 50. Zahra Vaseqi and James Delgrande An Application of Answer Set Programming for Situational Analysis in a Maritime Traffic Domain
  • 53. Ramakanth Kavuluru, Sifei Han and Daniel Harris Unsupervised Extraction of Diagnosis Codes from EMRs Using Knowledge-Based and Extractive Text Summarization Techniques
  • 55. Aaron Hunter Revisiting the Epistemics of Protocol Correctness
  • 62. Xin Liang, Zuoquan Lin and Jan Van Den Bussche Quantitatively Evaluating Formula-Variable Relevance by Forgetting 

 

AI-2013 Graduate Student Symposium

Accepted Papers

  • 65. Yifeng Li Sparse Representation for Machine Learning  
  • 66. Madeena Sultana A Novel Content Based Methodology for a Large Scale Multimodal Biometric System
  • 67. Mohsen Hajiloo Learning Disease Patterns from High-Throughput Genomic Profiles: Why is it so Challenging?
  • 68. Amani Jamal Shape-based Analysis for Automatic Segmentation of Arabic Handwritten Texts  
  • 69. Rushdi Shams Extracting Information-rich Part of Texts using Text Denoising  
  • 70. Eisa Alanazi Preference Constrained Optimization under Change  
  • 71. Shehroz Khan A Probabilistic Framework for Detecting Unusual Events in Mobile Sensor Networks
  • 73. Peter Lach Intelligent Tutoring Systems Measuring Student's Effort During Assessment

 


 

Copyright © by Canadian Conference on Artificial Intelligence 2013

- All rights reserved