Xiaoyan Zhu
According to our database1, Xiaoyan Zhu
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
Sentiment Analysis by Capsules.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Learning to Collaborate: Multi-Scenario Ranking via Multi-Agent Reinforcement Learning.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
2017
FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins.
IEEE Trans. Vehicular Technology, 2017
Combined Redundancy Allocation and Maintenance Planning Using a Two-Stage Stochastic Programming Model for Multiple Component Systems.
IEEE Trans. Reliability, 2017
Encoding Syntactic Knowledge in Neural Networks for Sentiment Classification.
ACM Trans. Inf. Syst., 2017
Birnbaum importance based heuristics for multi-type component assignment problems.
Rel. Eng. & Sys. Safety, 2017
Reliability and importance measures for m-consecutive-k, l-out-of-n system with non-homogeneous Markov-dependent components.
Rel. Eng. & Sys. Safety, 2017
Emotional Chatting Machine: Emotional Conversation Generation with Internal and External Memory.
CoRR, 2017
Assigning personality/identity to a chatting machine for coherent conversation generation.
CoRR, 2017
SAR: A Semantic Analysis Approach for Recommendation.
CoRR, 2017
Expected Completion Time Aware Message Scheduling for UM-BUS Interconnected System.
IEEE Access, 2017
Predicting Bugs in Software Code Changes Using Isolation Forest.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Expected Completion Time Aware Message Scheduling for UM-BUS Interconnected System.
Proceedings of the 20th IEEE International Symposium on Real-Time Distributed Computing, 2017
Linguistically Regularized LSTM for Sentiment Classification.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017
SSP: Semantic Space Projection for Knowledge Graph Embedding with Text Descriptions.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Reliability and Joint Reliability Importance in a Consecutive-k-Within-m-out-of-n: F System With Markov-Dependent Components.
IEEE Trans. Reliability, 2016
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.
IEEE Trans. Intelligent Transportation Systems, 2016
A Bayesian approach to degradation-based burn-in optimization for display products exhibiting two-phase degradation patterns.
Rel. Eng. & Sys. Safety, 2016
A machine learning based software process model recommendation method.
Journal of Systems and Software, 2016
Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
IJGUC, 2016
Linguistically Regularized LSTMs for Sentiment Classification.
CoRR, 2016
Knowledge Semantic Representation: A Generative Model for Interpretable Knowledge Graph Embedding.
CoRR, 2016
SSP: Semantic Space Projection for Knowledge Graph Embedding with Text Descriptions.
CoRR, 2016
Balanced loop retiming to effectively architect STT-RAM-based hybrid cache for VLIW processors.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Knowledge Graph Embedding by Flexible Translation.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, 2016
UM-BUS: An online fault-tolerant bus for embedded systems.
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016
From One Point to a Manifold: Knowledge Graph Embedding for Precise Link Prediction.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Sliding Window Network Coding for Free Viewpoint Multimedia Streaming in MANETs.
Proceedings of the Social Computing, 2016
A Chinese text paraphrase detection method based on dependency tree.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016
Context-aware location recommendations with tensor factorization.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Personalized Location Recommendations with Local Feature Awareness.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Integrated feature preprocessing for classification based on neural incremental attribute learning.
Proceedings of the 19th International Conference on Information Fusion, 2016
Attention-based LSTM for Aspect-level Sentiment Classification.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016
Context-aware Natural Language Generation for Spoken Dialogue Systems.
Proceedings of the COLING 2016, 2016
Product Review Summarization by Exploiting Phrase Properties.
Proceedings of the COLING 2016, 2016
GAKE: Graph Aware Knowledge Embedding.
Proceedings of the COLING 2016, 2016
Single Classifier Selection for Ensemble Learning.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016
TransG : A Generative Model for Knowledge Graph Embedding.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016
Performance Analysis of Sliding Window Network Coding in MANET.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016
Semi-Supervised Multinomial Naive Bayes for Text Classification by Leveraging Word-Level Statistical Constraint.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Joint Reliability Importance in a Consecutive-k-out-of-n : F System and an m-Consecutive-k-out-of-n: F System for Markov-Dependent Components.
IEEE Trans. Reliability, 2015
An analysis of programming language statement frequency in C, C++, and Java source code.
Softw., Pract. Exper., 2015
EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015
A novel ensemble method for classifying imbalanced data.
Pattern Recognition, 2015
A novel attack to spatial cloaking schemes in location-based services.
Future Generation Comp. Syst., 2015
Margin-Based Feed-Forward Neural Network Classifiers.
CoRR, 2015
Max-Entropy Feed-Forward Clustering Neural Network.
CoRR, 2015
From One Point to A Manifold: Orbit Models for Knowledge Graph Embedding.
CoRR, 2015
TransA: An Adaptive Approach for Knowledge Graph Embedding.
CoRR, 2015
TransG : A Generative Mixture Model for Knowledge Graph Embedding.
CoRR, 2015
A Selective Detector Ensemble for Concept Drift Detection.
Comput. J., 2015
An improved data characterization method and its application in classification algorithm recommendation.
Appl. Intell., 2015
A Question Answering System Built on Domain Knowledge Base.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
Regression based on neural incremental attribute learning with correlation-based feature ordering.
Proceedings of the 7th International Conference on Cybernetics and Intelligent Systems, 2015
Clustering Sentiment Phrases in Product Reviews by Constrained Co-clustering.
Proceedings of the Natural Language Processing and Chinese Computing - 4th CCF Conference, 2015
Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Tackling Data Sparseness in Recommendation using Social Media based Topic Hierarchy Modeling.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
G2G: Privacy-preserving group matching for proximity-based mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Privacy-preserving use of genomic data on mobile devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Cloud-assisted privacy-preserving genetic paternity test.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Protecting router cache privacy in named data networking.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Efficient private matching based on blind signature for proximity-based mobile social networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Publicly Verifiable Boolean Query over Outsourced Encrypted Data.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Sentiment Extraction by Leveraging Aspect-Opinion Association Structure.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Heterogeneous energy-efficient cache design in warehouse scale computers.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015
Optimizing the Bayesian Inference of Phylogeny on Graphic Processors.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015
Learning Tag Embeddings and Tag-specific Composition Functions in Recursive Neural Network.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015
2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wireless Personal Communications, 2014
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2014
Estimating feature ratings through an effective review selection approach.
Knowl. Inf. Syst., 2014
Exploring the Interactions of Storylines from Informative News Events.
J. Comput. Sci. Technol., 2014
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014
Importance measures in reliability and mathematical programming.
Annals OR, 2014
A Birnbaum-importance based genetic local search algorithm for component assignment problems.
Annals OR, 2014
Sampling dilemma: towards effective data sampling for click prediction in sponsored search.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014
A Chinese Question Answering System for Specific Domain.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Contextual Combinatorial Bandit and its Application on Diversified Online Recommendation.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014
Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014
Two-party and multi-party private matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014
QOS Performance Analysis for Flexible Workflow Supporting Exception Handling.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
Clustering Aspect-related Phrases by Leveraging Sentiment Distribution Consistency.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014
Customized Organization of Social Media Contents using Focused Topic Hierarchy.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
New Word Detection for Sentiment Analysis.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014
2013
Automated Identification of Change-Prone Classes in Open Source Software Projects.
JSW, 2013
Implementation of a three-stage approach for the dynamic resource-constrained shortest-path sub-problem in branch-and-price.
Computers & OR, 2013
Information distance between what I said and what it heard.
Commun. ACM, 2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Topic hierarchy construction for the organization of multi-source user generated contents.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013
P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Promoting Diversity in Recommendation by Entropy Regularizer.
Proceedings of the IJCAI 2013, 2013
An Introduction to String Re-Writing Kernel.
Proceedings of the IJCAI 2013, 2013
Does bug prediction support human developers? findings from a google case study.
Proceedings of the 35th International Conference on Software Engineering, 2013
MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Functional dirichlet process.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Exploring weakly supervised latent sentiment explanations for aspect-level review analysis.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.
Wireless Networks, 2012
Using Coding-Based Ensemble Learning to Improve Software Defect Prediction.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012
Relations and Generalizations of Importance Measures in Reliability.
IEEE Trans. Reliability, 2012
Some Recent Advances on Importance Measures in Reliability.
IEEE Trans. Reliability, 2012
A Unified Active Learning Framework for Biomedical Relation Extraction.
J. Comput. Sci. Technol., 2012
An Empirical Analysis of Software Changes on Statement Entity in Java Open Source Projects.
IJOSSP, 2012
A three-stage approach for the resource-constrained shortest path as a sub-problem in column generation.
Computers & OR, 2012
Entity Disambiguation with Freebase.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Sentiment Analysis with Multi-source Product Reviews.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012
CPTT: A high-throughput coding-aware routing metric for multi-hop wireless networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Finding nuggets in IP portfolios: core patent mining through textual temporal analysis.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Cross-Domain Co-Extraction of Sentiment and Topic Lexicons.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012
String Re-writing Kernel.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012
QA: from Turing Test to Intelligent Information Service.
Proceedings of the Second CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2012
Using First-Order Logic to Compress Sentences.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
2011
Semantic Aspect Retrieval for Encyclopedia.
Polibits, 2011
Covering models and optimization techniques for emergency response facility location and planning: a review.
Math. Meth. of OR, 2011
RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue.
IEEE Journal on Selected Areas in Communications, 2011
Guided Structure-Aware Review Summarization.
J. Comput. Sci. Technol., 2011
A New Multiword Expression Metric and Its Applications.
J. Comput. Sci. Technol., 2011
Minimal-cost network flow problems with variable lower bounds on arc flows.
Computers & OR, 2011
GeneTUKit: a software for document-level gene normalization.
Bioinformatics, 2011
An empirical analysis of the FixCache algorithm.
Proceedings of the 8th International Working Conference on Mining Software Repositories, 2011
Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011
C4: A new paradigm for providing incentives in multi-hop wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
K2Q: Generating Natural Language Questions from Keywords with User Refinements.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011
Quality-biased Ranking of Short Texts in Microblogging Services.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011
Incorporating Reviewer and Product Information for Review Rating Prediction.
Proceedings of the IJCAI 2011, 2011
Learning to Identify Review Spam.
Proceedings of the IJCAI 2011, 2011
Semantic Relationship Discovery with Wikipedia Structure.
Proceedings of the IJCAI 2011, 2011
Generating Breakpoint-based Timeline Overview for News Topic Retrospection.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks.
Proceedings of the Global Communications Conference, 2011
Study for speed management technology of national road.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Concepts of village roads safety facilities construction.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Protein-protein interaction extraction from bio-literature with compact features and data sampling strategy.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011
2010
How to secure multi-domain wireless mesh networks.
Wireless Networks, 2010
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks.
IEEE Wireless Commun., 2010
Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs.
IEEE Trans. Wireless Communications, 2010
MABS: Multicast Authentication Based on Batch Signature.
IEEE Trans. Mob. Comput., 2010
Privacy and security for online social networks: challenges and opportunities.
IEEE Network, 2010
A New Approach for Multi-Document Update Summarization.
J. Comput. Sci. Technol., 2010
Discovering breast cancer drug candidates from biomedical literature.
IJDMB, 2010
A Weighted Voting-Based Associative Classification Algorithm.
Comput. J., 2010
The THU Summarization Systems at TAC 2010.
Proceedings of the Third Text Analysis Conference, 2010
Learning to Link Entities with Knowledge Base.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2010
A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks.
Proceedings of the Global Communications Conference, 2010
Function-Based Question Classification for General QA.
Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, 2010
A Review Selection Approach for Accurate Feature Rating Estimation.
Proceedings of the COLING 2010, 2010
Structure-Aware Review Mining and Summarization.
Proceedings of the COLING 2010, 2010
A Comparative Study on Ranking and Selection Strategies for Multi-Document Summarization.
Proceedings of the COLING 2010, 2010
Measuring the Non-compositionality of Multiword Expressions.
Proceedings of the COLING 2010, 2010
Recognizing Biomedical Named Entities Using Skip-Chain Conditional Random Fields.
Proceedings of the 2010 Workshop on Biomedical Natural Language Processing, 2010
Sentiment Analysis with Global Topics and Local Dependency.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
2009
A batched network coding scheme for wireless networks.
Wireless Networks, 2009
Securing resource-constrained wireless ad hoc networks.
IEEE Wireless Commun., 2009
Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure.
IEEE Trans. Vehicular Technology, 2009
Mining Reviews for Product Comparison and Recommendation.
Polibits, 2009
Building Disease-Specific Drug-Protein Connectivity Maps from Molecular Interaction Networks and PubMed Abstracts.
PLoS Computational Biology, 2009
On the improvement of scaling laws for large-scale MANETs with network coding.
IEEE Journal on Selected Areas in Communications, 2009
Extract interaction detection methods from the biological literature.
BMC Bioinformatics, 2009
Specialized Review Selection for Feature Rating Estimation.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance.
Proceedings of the Second Text Analysis Conference, 2009
THU QUANTA at TAC 2009 KBP and RTE Track.
Proceedings of the Second Text Analysis Conference, 2009
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Multi-document Summarization by Information Distance.
Proceedings of the ICDM 2009, 2009
Rethinking Thresholds-Based Rate Adaptation Algorithms: A Reverse Engineering Perspective.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Towards Automatic Generation of Gene Summary.
Proceedings of the BioNLP Workshop, BioNLP@HLT-NAACL 2009, 2009
Answering Opinion Questions with Random Walks on Graphs.
Proceedings of the ACL 2009, 2009
A query-specific opinion summarization system.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009
C and M: A New Network Coding Scheme for Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Comments on "A Hierarchy of Importance Indices".
IEEE Trans. Reliability, 2008
New Information Distance Measure and Its Application in Question Answering System.
J. Comput. Sci. Technol., 2008
Detrended fluctuation analysis of traffic data
CoRR, 2008
Exploiting and integrating rich features for biological literature classification.
BMC Bioinformatics, 2008
THU QUANTA at TAC 2008 QA and RTE Track.
Proceedings of the First Text Analysis Conference, 2008
Tsinghua University at the Summarization Track of TAC 2008.
Proceedings of the First Text Analysis Conference, 2008
Mining disease-specific molecular association profiles from biomedical literature: a case study.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
A Generative Probabilistic Model for Multi-label Classification.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETs.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Classifying What-Type Questions by Head Noun Tagging.
Proceedings of the COLING 2008, 2008
Information shared by many objects.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008
Using Conditional Random Fields to Extract Contexts and Answers of Questions from Online Forums.
Proceedings of the ACL 2008, 2008
2007
Three-stage approaches for optimizing some variations of the resource constrained shortest-path sub-problem in a column generation context.
European Journal of Operational Research, 2007
Combining Convolution Kernels Defined on Heterogeneous Sub-structures.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Information distance from a question to an answer.
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007
A Novel Kernel-Based Approach for Predicting Binding Peptides for HLA Class II Molecules.
Proceedings of the Bioinformatics Research and Applications, Third International Symposium, 2007
A New Type of Feature - Loose N-Gram Feature in Text Categorization.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007
Semi-supervised Pattern Learning for Extracting Relations from Bioscience Texts.
Proceedings of 5th Asia-Pacific Bioinformatics Conference, 2007
2006
A hybrid method for relation extraction from biomedical literature.
I. J. Medical Informatics, 2006
An Ontology-Based Mining System for Competitive Intelligence in Neuroscience.
Proceedings of the Web Intelligence Meets Brain Informatics, 2006
Automatic Extraction of Genomic Glossary Triggered by Query.
Proceedings of the Data Mining for Biomedical Applications, PAKDD 2006 Workshop, 2006
A Hybrid Handwritten Chinese Address Recognition Approach.
Proceedings of the Neural Information Processing, 13th International Conference, 2006
Movie review mining and summarization.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006
ONBRIRES: Ontology-Based Biological Relation Extraction System.
Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February 2006, 2006
2005
Discovering patterns to extract protein-protein interactions from the literature: Part II.
Bioinformatics, 2005
Learning Domain-Specific Knowledge from Context--THUIR at TREC 2005 Genomics Track.
Proceedings of the Fourteenth Text REtrieval Conference, 2005
An OCR Post-processing Approach Based on Multi-knowledge.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Various Features with Integrated Strategies for Protein Name Classification.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Extended Bi-gram Features in Text Categorization.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005
A New Algorithm for Pattern Optimization in Protein-Protein Interaction Extraction System.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005
An Utterance Verification Algorithm in Keyword Spotting System.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005
2004
Discovering patterns to extract protein-protein interactions from full texts.
Bioinformatics, 2004
THUIR at TREC 2004: Genomics Track.
Proceedings of the Thirteenth Text REtrieval Conference, 2004
A Chinese OCR spelling check approach based on statistical language models.
Proceedings of the IEEE International Conference on Systems, 2004
Utterance Verification Based on Support Vector Machine.
Proceedings of the International Conference on Artificial Intelligence, 2004
Discovering Patterns to Extract Protein-Protein Interactions from Full Biomedical Texts.
Proceedings of the International Joint Workshop on Natural Language Processing in Biomedicine and its Applications, 2004
PathwayFinder: Paving the Way Towards Automatic Pathway Extraction.
Proceedings of the Second Asia-Pacific Bioinformatics Conference (APBC 2004), 2004
2003
Continuous speech recognition and verification based on a combination score.
Proceedings of the 8th European Conference on Speech Communication and Technology, EUROSPEECH 2003, 2003
2002
A fast learning algorithm for time-delay neural networks.
Inf. Sci., 2002
Braille to print translations for Chinese.
Information & Software Technology, 2002
A New Textual/Non-Textual Classifier for Document Skew Correction.
Proceedings of the 16th International Conference on Pattern Recognition, 2002
2001
An effective result-feedback neural algorithm for handwritten character recognition.
Neural Parallel & Scientific Comp., 2001
A new algorithm for handwritten character recognition.
Proceedings of the 2001 International Conference on Image Processing, 2001
A Handwritten Character Recognition Method with ANN Feedback.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001
2000
A novel text-independent speaker verification method based on the global speaker model.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2000
A New Speaker Verification Method with Global Speaker Model and Likelihood Score Normalization.
J. Comput. Sci. Technol., 2000
A criterion based on Fourier transform for segmentation of connected digits.
IJDAR, 2000
Semi-continuous segmental probability model for speech signals.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000
Reliability evaluation of speech recognition in acoustic modeling.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000
1999
Utterance verification using modified segmental probability model.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999
A robust learning algorithm for the extended AM neural network.
Proceedings of the International Joint Conference Neural Networks, 1999
A novel fast learning algorithms for time-delay neural networks.
Proceedings of the International Joint Conference Neural Networks, 1999
A New Distinguishing Algorithm of Connected Character Image based on Fourier Transform.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999
1998
A novel text-independent speaker verification method using the global speaker model.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998
A New Model of Recurrent Neural Networks for Speech Recognition.
Proceedings of the Fifth International Conference on Neural Information Processing, 1998
1996
Multiple experts recognition system based on neural network.
Proceedings of the 13th International Conference on Pattern Recognition, 1996