Volume 27,Issue 11,2016 Table of Contents

Other Issues:  
  
Contents

  • Neural-Based Combinatory Categorical Grammar Supertagging
  • WU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing
  • 2016,27(11):2691-2700 [Abstract(2499)]  [View PDF(4062)1.22 M]
  • Simple Tabular Reduction for Generalized Arc Consistency on Negative Table Constraints
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2016,27(11):2701-2711 [Abstract(2878)]  [View PDF(3959)2.06 M]
  • Convergence of the Belief Propagation Algorithm for RB Model Instances
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(11):2712-2724 [Abstract(3083)]  [View PDF(4925)1.54 M]
  • Contents

  • Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical Records
  • YANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie
  • 2016,27(11):2725-2746 [Abstract(5199)]  [View PDF(13623)3.16 M]
  • Contents

  • Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social Networks
  • HU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo
  • 2016,27(11):2747-2762 [Abstract(2357)]  [View PDF(4507)2.05 M]
  • Optimization and Quality Factor of Clonal Selection Algorithm
  • SHU Wan-Neng and DING Li-Xin
  • 2016,27(11):2763-2776 [Abstract(2687)]  [View PDF(4568)1.64 M]
  • Modular Ontology Reuse Based on Conservative Extension Theory
  • LI Pu, JIANG Yun-Cheng and WANG Ju
  • 2016,27(11):2777-2795 [Abstract(2408)]  [View PDF(4174)2.42 M]
  • Transfer Affinity Propagation Clustering Algorithm
  • HANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong
  • 2016,27(11):2796-2813 [Abstract(3612)]  [View PDF(5426)2.34 M]
  • Contents

  • General Game Playing:A Research Field for Exploring Machine Intelligence in Games
  • ZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin
  • 2016,27(11):2814-2827 [Abstract(4119)]  [View PDF(8318)1.67 M]
  • Contents

  • Data Anonymization Approach for Microdata with Relational and Transaction Attributes
  • GONG Qi-Yuan, YANG Ming and LUO Jun-Zhou
  • 2016,27(11):2828-2842 [Abstract(3285)]  [View PDF(4393)2.23 M]
  • Implicit User Consumption Intent Recognition in Social Media
  • FU Bo and LIU Ting
  • 2016,27(11):2843-2854 [Abstract(2523)]  [View PDF(4441)1.73 M]
  • Calculation Method of Chinese Public Event Information Entropy
  • JIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing
  • 2016,27(11):2855-2869 [Abstract(3218)]  [View PDF(21385)1.85 M]
  • Traffic Classification Framework Based on Ensemble Clustering
  • LU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua
  • 2016,27(11):2870-2883 [Abstract(2758)]  [View PDF(5551)1.66 M]
  • Efficient Certificateless Encryption Schemes from Lattices
  • CHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen
  • 2016,27(11):2884-2897 [Abstract(3056)]  [View PDF(4921)1.80 M]
  • Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption Scheme
  • ZHOU Yan-Wei, YANG Bo and WANG Qing-Long
  • 2016,27(11):2898-2911 [Abstract(2501)]  [View PDF(4374)1.65 M]
  • Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud Storage
  • TAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu
  • 2016,27(11):2912-2928 [Abstract(3835)]  [View PDF(6741)2.15 M]
  • Online Learning of Tracking and Registration Based on Natural Scenes
  • GUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian
  • 2016,27(11):2929-2945 [Abstract(2856)]  [View PDF(4959)3.47 M]
  • Elastic Motion Estimation of Video Using Improved Gauss-Newton Method
  • SONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai
  • 2016,27(11):2946-2960 [Abstract(2443)]  [View PDF(4602)2.39 M]
  • Object Tracking Method Based on Vision Quantum
  • JIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao
  • 2016,27(11):2961-2984 [Abstract(2954)]  [View PDF(5469)10.21 M]