Volume 27,Issue 11,2016 Table of Contents
Neural-Based Combinatory Categorical Grammar SupertaggingWU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing2016,27(11):2691-2700 [Abstract(2509)] [View PDF(4122)1.22 M]Simple Tabular Reduction for Generalized Arc Consistency on Negative Table ConstraintsLI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan2016,27(11):2701-2711 [Abstract(2883)] [View PDF(4037)2.06 M]Convergence of the Belief Propagation Algorithm for RB Model InstancesWANG Xiao-Feng and XU Dao-Yun2016,27(11):2712-2724 [Abstract(3093)] [View PDF(5017)1.54 M]
Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical RecordsYANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie2016,27(11):2725-2746 [Abstract(5215)] [View PDF(13709)3.16 M]
Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social NetworksHU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo2016,27(11):2747-2762 [Abstract(2360)] [View PDF(4582)2.05 M]Optimization and Quality Factor of Clonal Selection AlgorithmSHU Wan-Neng and DING Li-Xin2016,27(11):2763-2776 [Abstract(2689)] [View PDF(4631)1.64 M]Modular Ontology Reuse Based on Conservative Extension TheoryLI Pu, JIANG Yun-Cheng and WANG Ju2016,27(11):2777-2795 [Abstract(2410)] [View PDF(4245)2.42 M]Transfer Affinity Propagation Clustering AlgorithmHANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong2016,27(11):2796-2813 [Abstract(3617)] [View PDF(5511)2.34 M]
General Game Playing:A Research Field for Exploring Machine Intelligence in GamesZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin2016,27(11):2814-2827 [Abstract(4144)] [View PDF(8426)1.67 M]
Data Anonymization Approach for Microdata with Relational and Transaction AttributesGONG Qi-Yuan, YANG Ming and LUO Jun-Zhou2016,27(11):2828-2842 [Abstract(3289)] [View PDF(4487)2.23 M]Implicit User Consumption Intent Recognition in Social MediaFU Bo and LIU Ting2016,27(11):2843-2854 [Abstract(2527)] [View PDF(4506)1.73 M]Calculation Method of Chinese Public Event Information EntropyJIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing2016,27(11):2855-2869 [Abstract(3235)] [View PDF(22017)1.85 M]Traffic Classification Framework Based on Ensemble ClusteringLU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua2016,27(11):2870-2883 [Abstract(2765)] [View PDF(5617)1.66 M]Efficient Certificateless Encryption Schemes from LatticesCHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen2016,27(11):2884-2897 [Abstract(3071)] [View PDF(4988)1.80 M]Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption SchemeZHOU Yan-Wei, YANG Bo and WANG Qing-Long2016,27(11):2898-2911 [Abstract(2505)] [View PDF(4443)1.65 M]Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud StorageTAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu2016,27(11):2912-2928 [Abstract(3843)] [View PDF(6816)2.15 M]Online Learning of Tracking and Registration Based on Natural ScenesGUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian2016,27(11):2929-2945 [Abstract(2859)] [View PDF(5061)3.47 M]Elastic Motion Estimation of Video Using Improved Gauss-Newton MethodSONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai2016,27(11):2946-2960 [Abstract(2448)] [View PDF(4704)2.39 M]Object Tracking Method Based on Vision QuantumJIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao2016,27(11):2961-2984 [Abstract(2960)] [View PDF(5529)10.21 M]