Volume 27,Issue 11,2016 Table of Contents

Other Issues:  
  
Contents

  • Neural-Based Combinatory Categorical Grammar Supertagging
  • WU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing
  • 2016,27(11):2691-2700 [Abstract(1074)]  [View PDF(1021)1.22 M]
  • Simple Tabular Reduction for Generalized Arc Consistency on Negative Table Constraints
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2016,27(11):2701-2711 [Abstract(1078)]  [View PDF(905)2.06 M]
  • Convergence of the Belief Propagation Algorithm for RB Model Instances
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(11):2712-2724 [Abstract(1600)]  [View PDF(1316)1.54 M]
  • Contents

  • Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical Records
  • YANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie
  • 2016,27(11):2725-2746 [Abstract(2996)]  [View PDF(4419)3.16 M]
  • Contents

  • Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social Networks
  • HU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo
  • 2016,27(11):2747-2762 [Abstract(931)]  [View PDF(1218)2.05 M]
  • Optimization and Quality Factor of Clonal Selection Algorithm
  • SHU Wan-Neng and DING Li-Xin
  • 2016,27(11):2763-2776 [Abstract(1413)]  [View PDF(1330)1.64 M]
  • Modular Ontology Reuse Based on Conservative Extension Theory
  • LI Pu, JIANG Yun-Cheng and WANG Ju
  • 2016,27(11):2777-2795 [Abstract(905)]  [View PDF(814)2.42 M]
  • Transfer Affinity Propagation Clustering Algorithm
  • HANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong
  • 2016,27(11):2796-2813 [Abstract(1941)]  [View PDF(1795)2.34 M]
  • Contents

  • General Game Playing:A Research Field for Exploring Machine Intelligence in Games
  • ZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin
  • 2016,27(11):2814-2827 [Abstract(1782)]  [View PDF(1948)1.67 M]
  • Contents

  • Data Anonymization Approach for Microdata with Relational and Transaction Attributes
  • GONG Qi-Yuan, YANG Ming and LUO Jun-Zhou
  • 2016,27(11):2828-2842 [Abstract(1706)]  [View PDF(1251)2.23 M]
  • Implicit User Consumption Intent Recognition in Social Media
  • FU Bo and LIU Ting
  • 2016,27(11):2843-2854 [Abstract(1038)]  [View PDF(1317)1.73 M]
  • Calculation Method of Chinese Public Event Information Entropy
  • JIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing
  • 2016,27(11):2855-2869 [Abstract(1615)]  [View PDF(1999)1.85 M]
  • Traffic Classification Framework Based on Ensemble Clustering
  • LU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua
  • 2016,27(11):2870-2883 [Abstract(1189)]  [View PDF(1300)1.66 M]
  • Efficient Certificateless Encryption Schemes from Lattices
  • CHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen
  • 2016,27(11):2884-2897 [Abstract(1557)]  [View PDF(1393)1.80 M]
  • Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption Scheme
  • ZHOU Yan-Wei, YANG Bo and WANG Qing-Long
  • 2016,27(11):2898-2911 [Abstract(1120)]  [View PDF(1060)1.65 M]
  • Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud Storage
  • TAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu
  • 2016,27(11):2912-2928 [Abstract(1977)]  [View PDF(2265)2.15 M]
  • Online Learning of Tracking and Registration Based on Natural Scenes
  • GUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian
  • 2016,27(11):2929-2945 [Abstract(1102)]  [View PDF(954)3.47 M]
  • Elastic Motion Estimation of Video Using Improved Gauss-Newton Method
  • SONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai
  • 2016,27(11):2946-2960 [Abstract(1033)]  [View PDF(1426)2.39 M]
  • Object Tracking Method Based on Vision Quantum
  • JIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao
  • 2016,27(11):2961-2984 [Abstract(1628)]  [View PDF(1378)10.21 M]