Volume 27,Issue 11,2016 Table of Contents

Other Issues:  
  
Contents

  • Neural-Based Combinatory Categorical Grammar Supertagging
  • WU Hui-Jia, ZHANG Jia-Jun and ZONG Cheng-Qing
  • 2016,27(11):2691-2700 [Abstract(1182)]  [View PDF(1220)1.22 M]
  • Simple Tabular Reduction for Generalized Arc Consistency on Negative Table Constraints
  • LI Hong-Bo, LIANG Yan-Chun and LI Zhan-Shan
  • 2016,27(11):2701-2711 [Abstract(1239)]  [View PDF(1081)2.06 M]
  • Convergence of the Belief Propagation Algorithm for RB Model Instances
  • WANG Xiao-Feng and XU Dao-Yun
  • 2016,27(11):2712-2724 [Abstract(1716)]  [View PDF(1480)1.54 M]
  • Contents

  • Corpus Construction for Named Entities and Entity Relations on Chinese Electronic Medical Records
  • YANG Jin-Feng, GUAN Yi, HE Bin, QU Chun-Yan, YU Qiu-Bin, LIU Ya-Xin and ZHAO Yong-Jie
  • 2016,27(11):2725-2746 [Abstract(3196)]  [View PDF(4944)3.16 M]
  • Contents

  • Hybrid Quantum Swarm Intelligence Indexing for Event Detection in Social Networks
  • HU Wen-Bin, WANG Huan, YAN Li-Ping, QIU Zhen-Yu, XIAO Lei and DU Bo
  • 2016,27(11):2747-2762 [Abstract(1052)]  [View PDF(1369)2.05 M]
  • Optimization and Quality Factor of Clonal Selection Algorithm
  • SHU Wan-Neng and DING Li-Xin
  • 2016,27(11):2763-2776 [Abstract(1512)]  [View PDF(1487)1.64 M]
  • Modular Ontology Reuse Based on Conservative Extension Theory
  • LI Pu, JIANG Yun-Cheng and WANG Ju
  • 2016,27(11):2777-2795 [Abstract(1030)]  [View PDF(994)2.42 M]
  • Transfer Affinity Propagation Clustering Algorithm
  • HANG Wen-Long, JIANG Yi-Zhang, LIU Jie-Fang and WANG Shi-Tong
  • 2016,27(11):2796-2813 [Abstract(2143)]  [View PDF(1950)2.34 M]
  • Contents

  • General Game Playing:A Research Field for Exploring Machine Intelligence in Games
  • ZHANG Hai-Feng, LIU Dang-Yi and LI Wen-Xin
  • 2016,27(11):2814-2827 [Abstract(1958)]  [View PDF(2196)1.67 M]
  • Contents

  • Data Anonymization Approach for Microdata with Relational and Transaction Attributes
  • GONG Qi-Yuan, YANG Ming and LUO Jun-Zhou
  • 2016,27(11):2828-2842 [Abstract(1892)]  [View PDF(1338)2.23 M]
  • Implicit User Consumption Intent Recognition in Social Media
  • FU Bo and LIU Ting
  • 2016,27(11):2843-2854 [Abstract(1151)]  [View PDF(1403)1.73 M]
  • Calculation Method of Chinese Public Event Information Entropy
  • JIN Rui, ZHANG Hong-Li, ZHANG Yue and WANG Xing
  • 2016,27(11):2855-2869 [Abstract(1736)]  [View PDF(2132)1.85 M]
  • Traffic Classification Framework Based on Ensemble Clustering
  • LU Gang, YU Xiang-Zhan, ZHANG Hong-Li and GUO Rong-Hua
  • 2016,27(11):2870-2883 [Abstract(1312)]  [View PDF(1563)1.66 M]
  • Efficient Certificateless Encryption Schemes from Lattices
  • CHEN Hu, HU Yu-Pu, LIAN Zhi-Zhu and JIA Hui-Wen
  • 2016,27(11):2884-2897 [Abstract(1687)]  [View PDF(1554)1.80 M]
  • Provably Secure Leakage-Resilient Certificateless Hybrid Signcryption Scheme
  • ZHOU Yan-Wei, YANG Bo and WANG Qing-Long
  • 2016,27(11):2898-2911 [Abstract(1266)]  [View PDF(1209)1.65 M]
  • Threshold Secret Sharing Scheme Based on Multidimensional Sphere for Cloud Storage
  • TAN Zhen-Hua, YANG Guang-Ming, WANG Xing-Wei, CHENG Wei and NING Jing-Yu
  • 2016,27(11):2912-2928 [Abstract(2174)]  [View PDF(2345)2.15 M]
  • Online Learning of Tracking and Registration Based on Natural Scenes
  • GUI Zhen-Wen, LIU Yue, CHEN Jing and WANG Yong-Tian
  • 2016,27(11):2929-2945 [Abstract(1238)]  [View PDF(1097)3.47 M]
  • Elastic Motion Estimation of Video Using Improved Gauss-Newton Method
  • SONG Chuan-Ming, ZHAO Chang-Wei, LIU Dan and WANG Xiang-Hai
  • 2016,27(11):2946-2960 [Abstract(1153)]  [View PDF(1547)2.39 M]
  • Object Tracking Method Based on Vision Quantum
  • JIANG Wen-Tao, LIU Wan-Jun, YUAN Heng and ZHANG Hai-Tao
  • 2016,27(11):2961-2984 [Abstract(1736)]  [View PDF(1491)10.21 M]