Volume 27,Issue 11,2016 Table of Contents
Neural-Based Combinatory Categorical Grammar SupertaggingWU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing2016,27(11):2691-2700 [Abstract(2526)] [View PDF(4193)1.22 M]Simple Tabular Reduction for Generalized Arc Consistency on Negative Table ConstraintsLI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan2016,27(11):2701-2711 [Abstract(2901)] [View PDF(4114)2.06 M]Convergence of the Belief Propagation Algorithm for RB Model InstancesWANG Xiao-Feng and XU Dao-Yun2016,27(11):2712-2724 [Abstract(3103)] [View PDF(5112)1.54 M]
Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical RecordsYANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie2016,27(11):2725-2746 [Abstract(5245)] [View PDF(13814)3.16 M]
Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social NetworksHU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo2016,27(11):2747-2762 [Abstract(2373)] [View PDF(4653)2.05 M]Optimization and Quality Factor of Clonal Selection AlgorithmSHU Wan-Neng and DING Li-Xin2016,27(11):2763-2776 [Abstract(2707)] [View PDF(4710)1.64 M]Modular Ontology Reuse Based on Conservative Extension TheoryLI Pu, JIANG Yun-Cheng and WANG Ju2016,27(11):2777-2795 [Abstract(2426)] [View PDF(4322)2.42 M]Transfer Affinity Propagation Clustering AlgorithmHANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong2016,27(11):2796-2813 [Abstract(3628)] [View PDF(5582)2.34 M]
General Game Playing:A Research Field for Exploring Machine Intelligence in GamesZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin2016,27(11):2814-2827 [Abstract(4194)] [View PDF(8578)1.67 M]
Data Anonymization Approach for Microdata with Relational and Transaction AttributesGONG Qi-Yuan, YANG Ming and LUO Jun-Zhou2016,27(11):2828-2842 [Abstract(3317)] [View PDF(4582)2.23 M]Implicit User Consumption Intent Recognition in Social MediaFU Bo and LIU Ting2016,27(11):2843-2854 [Abstract(2545)] [View PDF(4591)1.73 M]Calculation Method of Chinese Public Event Information EntropyJIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing2016,27(11):2855-2869 [Abstract(3257)] [View PDF(22721)1.85 M]Traffic Classification Framework Based on Ensemble ClusteringLU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua2016,27(11):2870-2883 [Abstract(2783)] [View PDF(5704)1.66 M]Efficient Certificateless Encryption Schemes from LatticesCHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen2016,27(11):2884-2897 [Abstract(3089)] [View PDF(5068)1.80 M]Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption SchemeZHOU Yan-Wei, YANG Bo and WANG Qing-Long2016,27(11):2898-2911 [Abstract(2516)] [View PDF(4518)1.65 M]Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud StorageTAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu2016,27(11):2912-2928 [Abstract(3858)] [View PDF(6919)2.15 M]Online Learning of Tracking and Registration Based on Natural ScenesGUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian2016,27(11):2929-2945 [Abstract(2869)] [View PDF(5185)3.47 M]Elastic Motion Estimation of Video Using Improved Gauss-Newton MethodSONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai2016,27(11):2946-2960 [Abstract(2471)] [View PDF(4857)2.39 M]Object Tracking Method Based on Vision QuantumJIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao2016,27(11):2961-2984 [Abstract(2973)] [View PDF(5601)10.21 M]