Volume 27,Issue 11,2016 Table of Contents

Other Issues:  
  
Contents

  • Neural-Based Combinatory Categorical Grammar Supertagging
  • WU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing
  • 2016,27(11):2691-2700 [Abstract(1014)]  [View PDF(991)1.22 M]
  • Simple Tabular Reduction for Generalized Arc Consistency on Negative Table Constraints
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2016,27(11):2701-2711 [Abstract(1005)]  [View PDF(862)2.06 M]
  • Convergence of the Belief Propagation Algorithm for RB Model Instances
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(11):2712-2724 [Abstract(1535)]  [View PDF(1289)1.54 M]
  • Contents

  • Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical Records
  • YANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie
  • 2016,27(11):2725-2746 [Abstract(2792)]  [View PDF(4191)3.16 M]
  • Contents

  • Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social Networks
  • HU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo
  • 2016,27(11):2747-2762 [Abstract(876)]  [View PDF(1171)2.05 M]
  • Optimization and Quality Factor of Clonal Selection Algorithm
  • SHU Wan-Neng and DING Li-Xin
  • 2016,27(11):2763-2776 [Abstract(1348)]  [View PDF(1286)1.64 M]
  • Modular Ontology Reuse Based on Conservative Extension Theory
  • LI Pu, JIANG Yun-Cheng and WANG Ju
  • 2016,27(11):2777-2795 [Abstract(843)]  [View PDF(778)2.42 M]
  • Transfer Affinity Propagation Clustering Algorithm
  • HANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong
  • 2016,27(11):2796-2813 [Abstract(1830)]  [View PDF(1742)2.34 M]
  • Contents

  • General Game Playing:A Research Field for Exploring Machine Intelligence in Games
  • ZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin
  • 2016,27(11):2814-2827 [Abstract(1700)]  [View PDF(1869)1.67 M]
  • Contents

  • Data Anonymization Approach for Microdata with Relational and Transaction Attributes
  • GONG Qi-Yuan, YANG Ming and LUO Jun-Zhou
  • 2016,27(11):2828-2842 [Abstract(1593)]  [View PDF(1222)2.23 M]
  • Implicit User Consumption Intent Recognition in Social Media
  • FU Bo and LIU Ting
  • 2016,27(11):2843-2854 [Abstract(981)]  [View PDF(1293)1.73 M]
  • Calculation Method of Chinese Public Event Information Entropy
  • JIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing
  • 2016,27(11):2855-2869 [Abstract(1531)]  [View PDF(1951)1.85 M]
  • Traffic Classification Framework Based on Ensemble Clustering
  • LU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua
  • 2016,27(11):2870-2883 [Abstract(1117)]  [View PDF(1221)1.66 M]
  • Efficient Certificateless Encryption Schemes from Lattices
  • CHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen
  • 2016,27(11):2884-2897 [Abstract(1472)]  [View PDF(1361)1.80 M]
  • Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption Scheme
  • ZHOU Yan-Wei, YANG Bo and WANG Qing-Long
  • 2016,27(11):2898-2911 [Abstract(1015)]  [View PDF(1004)1.65 M]
  • Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud Storage
  • TAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu
  • 2016,27(11):2912-2928 [Abstract(1878)]  [View PDF(2204)2.15 M]
  • Online Learning of Tracking and Registration Based on Natural Scenes
  • GUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian
  • 2016,27(11):2929-2945 [Abstract(1020)]  [View PDF(909)3.47 M]
  • Elastic Motion Estimation of Video Using Improved Gauss-Newton Method
  • SONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai
  • 2016,27(11):2946-2960 [Abstract(964)]  [View PDF(1370)2.39 M]
  • Object Tracking Method Based on Vision Quantum
  • JIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao
  • 2016,27(11):2961-2984 [Abstract(1565)]  [View PDF(1346)10.21 M]