BICA 2017: 2017 ANNUAL INTERNATIONAL CONFERENCE ON BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

2
2D images
2D transformation
3
3D environment
3D transformation
5
51% attack
A
Action Recognition
active learning
Active Perception
activity in networks
adaptive behavior
adaptive behaviour
adaptiveness
affective computing
agent-based modeling
AGI
AI theory
Alan Turing
algebraic topology
ambiguous image
analysis of non-stationary signals
Android Robot
animat
artificial emotional intelligence
artificial intelligence
artificial neural network
artificial neural networks
artificial social agent
association subsystem
associations
associative memory
asymmetric ciphersystems
atari 2600 games
Attack Kill Chain Model
Attacks Taxonomy (Classification)
attribute management
attribute-based encryption
authentication
authentication algorithms
auto-logistic models
autonomous learning from the environment
B
Bayesian Network
behavior modeling
Behaviour
benchmarking
BICA Challenge
BICA continuity
Big-Data
bio-inspired
bio-inspired learning
Biological inspiration
biologically inspired methods
Biomedical signal processing
bitcoin
Block cipher
blockchain
body
brain
Brain Computer Interface (BCI)
Brain Research Programs
business continuity
C
cellular automata
cellular homeostasis
CHC model
Chinese Room
Church-Turing Lovers
clustering
cognitive architecture
cognitive architectures
cognitive information processing
cognitive linguistic
cognitive modeling
cognitive process
cognitive systems
cognitive technologies
cognitive validity
collaborative robotics
competition
complex networks
computational model
computational neuroscience
computer proofs
Computer Vision
conceptual spaces
conflict
conflict of concept
conflict of concepts
connectivity
connectome
conscious program
conscious robot
conscious system
Consciousness
constructivist learning
control channel
control system
convolution networks
cooperation
covert channel
Cross-Correlation
Crypto headset
cryptocurrency
CST
Cumulative learning
curiosity
cybersecurity
cybersecurity violation risks
cyberspace
D
Data Driven Conceptual Spaces
data interpretation
Data Loss Prevention
Data mining
data model
Decision Making
deep learning
deep reinforcement learning
Developmental learning
dew
Dialogue
differential-algebraic equations
digital currency
digital economy
digital identity
digital society
digital watermarks
Discovery Machines
discrete dynamics
Disembodied cognition
disgust
distributed production control
distributed representation
domain-based natural languages
dopamine
double opponent
double-spending attack
DOZEN
Dreaming Machines
Dual-process Theory
Dynamic Subsumption
dynamical system
dynamics
E
education
edutainment
EEG
EEG analysis
effective connectivity
efficient engineering
embedding information
Emotion
Emotion Detection from Text
emotion learning
emotion modelling
emotional intelligence
Emotions
empirical neural circuits
Engineering Thesis in Machine Consciousness
ensuring the confidentiality of mobile communication
Episodic Simulation
Euclid
evaluation of personnel
Evolved information processing mechanisms
exploitation-oriented learning
extended brain-computer interface
eye movements
F
face detection
face identification
face matching
face representations
fMRI
Forecasting
functional
Functional Circuit Analysis
future product life cycle management
G
Geminoid
Geminoid Robot
general artificial intelligence
Genetic Algorithm
genetic assimilation
Goal directed planning
goal of behavior
GOST
Graphics processing unit(GPU)
Grid cell
grouping
H
handwritten signature
hardware encryption
hebbian rules
heterogeneous information
heterogeneous neural network
hiding effect
Hierarchical Models
hippocampus
Hipppcampus
Honest Signals
hue feature salience
Human Humanoid Interaction (HHI)
Human robot collaboration
Human-Humanoid Interaction
hybridization
hyperdimensional computing
hysteresis
I
iCub humanoid
indirect measurements
individual peculiarities of viewing
Industry 4.0
information duality
information flow
Information security
information security incident
information system
information transfer
insider identification
insider information security threat
insight
Intelligence Factor
intelligent design and manufacturing
interaction between learning and evolution
interactive visualization environment
internal representation system
Internet of Things
interpretation control
interprocess communication
intrinsic motivation
intuition
inverse problems
K
kitchen robots
Knapsack Problem
knowledge heterogeneity
knowledge level
knowledge representation
knowledge transfer
L
Language acquisition
lateral inhibition
Learning Environment
learning load
learning to predict
Liking
long-term synaptic plasticity
M
M2M communication
machine consciousness
Machine Leaning
machine learning
mandatory access control
manipulator
Mathematical reasoning
Meta-morphogenesis
Mixed Initiative
mobile application
Model
model compatibility
Modular neural networks
motivational system
Motivations
multi model
multi-agent framework
multidimensional data structure
multifingered hand
multilevel security
mutation
N
natural language
Natural Language Comprehension
Navigation
NetLogo
neural network
neural network based simulation
neural networks
Neural Systems
neurodynamic model
neuromodulation
neuromorphic computing
neuronal plasticity
neuroprocessor
non-malicious modifications
Non-Reductive Machine Consciousness
Non-Reductive Physicalism
non-structured data
nonlinear dynamical system
O
Object Detection
OLAP
open-ended learning
P
pain
pair-wise cliques
paradox
parallel computation
Partially-observable Markov Decision Processes
path planning
pattern recall
Pavlov Principle
Pedestrian Guidance
Peripheral Vision Display
personal agent
Personal pronouns
phenomenal consciousness
phenomenal maps
Place cell
Planning
pleasure
Probabilistic Inference
problem representation
Problem solving
profit sharing
proof-of-concept exploit
protection from eavesdropping
prototype theory
Q
Q-learning
Q-network
R
Rational Set of Methods
Reguard
reinforcement learning
rejected type
Remote Attack
resting state
restricted Boltzmann machine
return fixations
rich club
Roadmap to human-level intelligence
robot dream
Robot episodic memory
Robot learning
Robotic
robotic wheelchair
robotics
Rubin’s Vase
S
safe AI
Sanz's challenge
second-order neighborhood
secure communication system
Security Intelligence Center
Security module
Security Operations Center
self-awareness
self-organizing map
Self-Organizing Maps
semantic characteristics
semantic map
semantic modeling
semantic network
semantic search
semantic stability
semi-empirical model
Sensory Integration
sequential learning algorithm
Serotonin
Sex Robots
SIEM
sign
sign based world model
simulation
single image per person
smart city
smart contract
social awareness
social network
social phenomena
Social Robot
Social Robotics
Social Sensing
socio-inspired methods
soft skills
SOM
Somatosensory
spike-timing-dependent plasticity
spiking neural networks
Spinozian phenomenalism
stalking behavior
Story Understanding
Strong AI
Strong Semantic Computing
sub-consciousness
subjective feeling
subsymbolic representation
Sybil attack
symbolic representations
Syntactic Parser
synthesis
T
Tangled Logic
TCP socket
Text Analysis
Text Recognition
the self
theory of categories
THSOM
time patterns
Time series analysis
Time Series Data Analysis
transfer
transfer entropy
trustworthiness
Turing test
tutorial
U
unconscious
unknown environment
V
Value Calculation System
Vection
Vector Symbolic Architectures
venture
Verbal Attack Indicator
verification
video
video authentication
video sequence
virtual actor
Virtual Creatures
virtual environment
virtual reality
visual attention
visual processing
visualization support tools
visualizing heterogeneous information
VLSI
W
Wanting
wavelet phase coherence
whole brain architecture