Volume 27,Issue 11,2016 Table of Contents
Neural-Based Combinatory Categorical Grammar SupertaggingWU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing2016,27(11):2691-2700 [Abstract(2499)] [View PDF(4062)1.22 M]Simple Tabular Reduction for Generalized Arc Consistency on Negative Table ConstraintsLI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan2016,27(11):2701-2711 [Abstract(2878)] [View PDF(3959)2.06 M]Convergence of the Belief Propagation Algorithm for RB Model InstancesWANG Xiao-Feng and XU Dao-Yun2016,27(11):2712-2724 [Abstract(3083)] [View PDF(4925)1.54 M]
Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical RecordsYANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie2016,27(11):2725-2746 [Abstract(5199)] [View PDF(13623)3.16 M]
Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social NetworksHU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo2016,27(11):2747-2762 [Abstract(2357)] [View PDF(4507)2.05 M]Optimization and Quality Factor of Clonal Selection AlgorithmSHU Wan-Neng and DING Li-Xin2016,27(11):2763-2776 [Abstract(2687)] [View PDF(4568)1.64 M]Modular Ontology Reuse Based on Conservative Extension TheoryLI Pu, JIANG Yun-Cheng and WANG Ju2016,27(11):2777-2795 [Abstract(2408)] [View PDF(4174)2.42 M]Transfer Affinity Propagation Clustering AlgorithmHANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong2016,27(11):2796-2813 [Abstract(3612)] [View PDF(5426)2.34 M]
General Game Playing:A Research Field for Exploring Machine Intelligence in GamesZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin2016,27(11):2814-2827 [Abstract(4119)] [View PDF(8318)1.67 M]
Data Anonymization Approach for Microdata with Relational and Transaction AttributesGONG Qi-Yuan, YANG Ming and LUO Jun-Zhou2016,27(11):2828-2842 [Abstract(3285)] [View PDF(4393)2.23 M]Implicit User Consumption Intent Recognition in Social MediaFU Bo and LIU Ting2016,27(11):2843-2854 [Abstract(2523)] [View PDF(4441)1.73 M]Calculation Method of Chinese Public Event Information EntropyJIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing2016,27(11):2855-2869 [Abstract(3218)] [View PDF(21385)1.85 M]Traffic Classification Framework Based on Ensemble ClusteringLU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua2016,27(11):2870-2883 [Abstract(2758)] [View PDF(5551)1.66 M]Efficient Certificateless Encryption Schemes from LatticesCHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen2016,27(11):2884-2897 [Abstract(3056)] [View PDF(4921)1.80 M]Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption SchemeZHOU Yan-Wei, YANG Bo and WANG Qing-Long2016,27(11):2898-2911 [Abstract(2501)] [View PDF(4374)1.65 M]Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud StorageTAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu2016,27(11):2912-2928 [Abstract(3835)] [View PDF(6741)2.15 M]Online Learning of Tracking and Registration Based on Natural ScenesGUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian2016,27(11):2929-2945 [Abstract(2856)] [View PDF(4959)3.47 M]Elastic Motion Estimation of Video Using Improved Gauss-Newton MethodSONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai2016,27(11):2946-2960 [Abstract(2443)] [View PDF(4602)2.39 M]Object Tracking Method Based on Vision QuantumJIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao2016,27(11):2961-2984 [Abstract(2954)] [View PDF(5469)10.21 M]