Volume 27,Issue 11,2016 Table of Contents

Other Issues:  
  
Contents

  • Neural-Based Combinatory Categorical Grammar Supertagging
  • WU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing
  • 2016,27(11):2691-2700 [Abstract(2409)]  [View PDF(3410)1.22 M]
  • Simple Tabular Reduction for Generalized Arc Consistency on Negative Table Constraints
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2016,27(11):2701-2711 [Abstract(2812)]  [View PDF(3366)2.06 M]
  • Convergence of the Belief Propagation Algorithm for RB Model Instances
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(11):2712-2724 [Abstract(2993)]  [View PDF(4229)1.54 M]
  • Contents

  • Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical Records
  • YANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie
  • 2016,27(11):2725-2746 [Abstract(5019)]  [View PDF(12424)3.16 M]
  • Contents

  • Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social Networks
  • HU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo
  • 2016,27(11):2747-2762 [Abstract(2317)]  [View PDF(3838)2.05 M]
  • Optimization and Quality Factor of Clonal Selection Algorithm
  • SHU Wan-Neng and DING Li-Xin
  • 2016,27(11):2763-2776 [Abstract(2638)]  [View PDF(3904)1.64 M]
  • Modular Ontology Reuse Based on Conservative Extension Theory
  • LI Pu, JIANG Yun-Cheng and WANG Ju
  • 2016,27(11):2777-2795 [Abstract(2360)]  [View PDF(3470)2.42 M]
  • Transfer Affinity Propagation Clustering Algorithm
  • HANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong
  • 2016,27(11):2796-2813 [Abstract(3531)]  [View PDF(4722)2.34 M]
  • Contents

  • General Game Playing:A Research Field for Exploring Machine Intelligence in Games
  • ZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin
  • 2016,27(11):2814-2827 [Abstract(3975)]  [View PDF(7181)1.67 M]
  • Contents

  • Data Anonymization Approach for Microdata with Relational and Transaction Attributes
  • GONG Qi-Yuan, YANG Ming and LUO Jun-Zhou
  • 2016,27(11):2828-2842 [Abstract(3236)]  [View PDF(3663)2.23 M]
  • Implicit User Consumption Intent Recognition in Social Media
  • FU Bo and LIU Ting
  • 2016,27(11):2843-2854 [Abstract(2399)]  [View PDF(3666)1.73 M]
  • Calculation Method of Chinese Public Event Information Entropy
  • JIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing
  • 2016,27(11):2855-2869 [Abstract(3153)]  [View PDF(5798)1.85 M]
  • Traffic Classification Framework Based on Ensemble Clustering
  • LU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua
  • 2016,27(11):2870-2883 [Abstract(2684)]  [View PDF(4794)1.66 M]
  • Efficient Certificateless Encryption Schemes from Lattices
  • CHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen
  • 2016,27(11):2884-2897 [Abstract(2970)]  [View PDF(4071)1.80 M]
  • Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption Scheme
  • ZHOU Yan-Wei, YANG Bo and WANG Qing-Long
  • 2016,27(11):2898-2911 [Abstract(2461)]  [View PDF(3651)1.65 M]
  • Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud Storage
  • TAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu
  • 2016,27(11):2912-2928 [Abstract(3760)]  [View PDF(5923)2.15 M]
  • Online Learning of Tracking and Registration Based on Natural Scenes
  • GUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian
  • 2016,27(11):2929-2945 [Abstract(2799)]  [View PDF(4096)3.47 M]
  • Elastic Motion Estimation of Video Using Improved Gauss-Newton Method
  • SONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai
  • 2016,27(11):2946-2960 [Abstract(2403)]  [View PDF(3945)2.39 M]
  • Object Tracking Method Based on Vision Quantum
  • JIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao
  • 2016,27(11):2961-2984 [Abstract(2904)]  [View PDF(4791)10.21 M]