Xiaoyan Zhu

According to our database1, Xiaoyan Zhu
  • authored at least 253 papers between 1996 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Memory-augmented Dialogue Management for Task-oriented Dialogue Systems.
CoRR, 2018

Sentiment Analysis by Capsules.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Learning to Collaborate: Multi-Scenario Ranking via Multi-Agent Reinforcement Learning.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Commonsense Knowledge Aware Conversation Generation with Graph Attention.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

A Weakly Supervised Method for Topic Segmentation and Labeling in Goal-oriented Dialogues via Reinforcement Learning.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Assigning Personality/Profile to a Chatting Machine for Coherent Conversation Generation.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Emotional Chatting Machine: Emotional Conversation Generation with Internal and External Memory.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Reinforcement Learning for Relation Classification From Noisy Data.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins.
IEEE Trans. Vehicular Technology, 2017

Combined Redundancy Allocation and Maintenance Planning Using a Two-Stage Stochastic Programming Model for Multiple Component Systems.
IEEE Trans. Reliability, 2017

Encoding Syntactic Knowledge in Neural Networks for Sentiment Classification.
ACM Trans. Inf. Syst., 2017

Birnbaum importance based heuristics for multi-type component assignment problems.
Rel. Eng. & Sys. Safety, 2017

Reliability and importance measures for m-consecutive-k, l-out-of-n system with non-homogeneous Markov-dependent components.
Rel. Eng. & Sys. Safety, 2017

Emotional Chatting Machine: Emotional Conversation Generation with Internal and External Memory.
CoRR, 2017

Assigning personality/identity to a chatting machine for coherent conversation generation.
CoRR, 2017

SAR: A Semantic Analysis Approach for Recommendation.
CoRR, 2017

Expected Completion Time Aware Message Scheduling for UM-BUS Interconnected System.
IEEE Access, 2017

Predicting Bugs in Software Code Changes Using Isolation Forest.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

Expected Completion Time Aware Message Scheduling for UM-BUS Interconnected System.
Proceedings of the 20th IEEE International Symposium on Real-Time Distributed Computing, 2017

Give me Something Unknown: Incorporate Exploration Preference in Cognition into Recommender System.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Time Distribution of Software Stage Effort.
Proceedings of the 24th Asia-Pacific Software Engineering Conference Workshops, 2017

Linguistically Regularized LSTM for Sentiment Classification.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

SSP: Semantic Space Projection for Knowledge Graph Embedding with Text Descriptions.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Reliability and Joint Reliability Importance in a Consecutive-k-Within-m-out-of-n: F System With Markov-Dependent Components.
IEEE Trans. Reliability, 2016

An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.
IEEE Trans. Intelligent Transportation Systems, 2016

A Bayesian approach to degradation-based burn-in optimization for display products exhibiting two-phase degradation patterns.
Rel. Eng. & Sys. Safety, 2016

A machine learning based software process model recommendation method.
Journal of Systems and Software, 2016

Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
IJGUC, 2016

Linguistically Regularized LSTMs for Sentiment Classification.
CoRR, 2016

Knowledge Semantic Representation: A Generative Model for Interpretable Knowledge Graph Embedding.
CoRR, 2016

SSP: Semantic Space Projection for Knowledge Graph Embedding with Text Descriptions.
CoRR, 2016

Balanced loop retiming to effectively architect STT-RAM-based hybrid cache for VLIW processors.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Knowledge Graph Embedding by Flexible Translation.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, 2016

UM-BUS: An online fault-tolerant bus for embedded systems.
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016

From One Point to a Manifold: Knowledge Graph Embedding for Precise Link Prediction.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Sliding Window Network Coding for Free Viewpoint Multimedia Streaming in MANETs.
Proceedings of the Social Computing, 2016

A Chinese text paraphrase detection method based on dependency tree.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Context-aware location recommendations with tensor factorization.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Personalized Location Recommendations with Local Feature Awareness.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Integrated feature preprocessing for classification based on neural incremental attribute learning.
Proceedings of the 19th International Conference on Information Fusion, 2016

Attention-based LSTM for Aspect-level Sentiment Classification.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

Context-aware Natural Language Generation for Spoken Dialogue Systems.
Proceedings of the COLING 2016, 2016

Product Review Summarization by Exploiting Phrase Properties.
Proceedings of the COLING 2016, 2016

GAKE: Graph Aware Knowledge Embedding.
Proceedings of the COLING 2016, 2016

Single Classifier Selection for Ensemble Learning.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

TransG : A Generative Model for Knowledge Graph Embedding.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Performance Analysis of Sliding Window Network Coding in MANET.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

Semi-Supervised Multinomial Naive Bayes for Text Classification by Leveraging Word-Level Statistical Constraint.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Joint Reliability Importance in a Consecutive-k-out-of-n : F System and an m-Consecutive-k-out-of-n: F System for Markov-Dependent Components.
IEEE Trans. Reliability, 2015

An analysis of programming language statement frequency in C, C++, and Java source code.
Softw., Pract. Exper., 2015

EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015

A novel ensemble method for classifying imbalanced data.
Pattern Recognition, 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Generation Comp. Syst., 2015

Margin-Based Feed-Forward Neural Network Classifiers.
CoRR, 2015

Max-Entropy Feed-Forward Clustering Neural Network.
CoRR, 2015

From One Point to A Manifold: Orbit Models for Knowledge Graph Embedding.
CoRR, 2015

TransA: An Adaptive Approach for Knowledge Graph Embedding.
CoRR, 2015

TransG : A Generative Mixture Model for Knowledge Graph Embedding.
CoRR, 2015

A Selective Detector Ensemble for Concept Drift Detection.
Comput. J., 2015

An improved data characterization method and its application in classification algorithm recommendation.
Appl. Intell., 2015

A Question Answering System Built on Domain Knowledge Base.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Regression based on neural incremental attribute learning with correlation-based feature ordering.
Proceedings of the 7th International Conference on Cybernetics and Intelligent Systems, 2015

Clustering Sentiment Phrases in Product Reviews by Constrained Co-clustering.
Proceedings of the Natural Language Processing and Chinese Computing - 4th CCF Conference, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Tackling Data Sparseness in Recommendation using Social Media based Topic Hierarchy Modeling.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

G2G: Privacy-preserving group matching for proximity-based mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Privacy-preserving use of genomic data on mobile devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Cloud-assisted privacy-preserving genetic paternity test.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Protecting router cache privacy in named data networking.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Efficient private matching based on blind signature for proximity-based mobile social networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Publicly Verifiable Boolean Query over Outsourced Encrypted Data.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Sentiment Extraction by Leveraging Aspect-Opinion Association Structure.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Heterogeneous energy-efficient cache design in warehouse scale computers.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

Optimizing the Bayesian Inference of Phylogeny on Graphic Processors.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Learning Tag Embeddings and Tag-specific Composition Functions in Recursive Neural Network.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wireless Personal Communications, 2014

Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2014

Estimating feature ratings through an effective review selection approach.
Knowl. Inf. Syst., 2014

Exploring the Interactions of Storylines from Informative News Events.
J. Comput. Sci. Technol., 2014

Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014

Importance measures in reliability and mathematical programming.
Annals OR, 2014

A Birnbaum-importance based genetic local search algorithm for component assignment problems.
Annals OR, 2014

Sampling dilemma: towards effective data sampling for click prediction in sponsored search.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

A Chinese Question Answering System for Specific Domain.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Contextual Combinatorial Bandit and its Application on Diversified Online Recommendation.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014

Two-party and multi-party private matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

QOS Performance Analysis for Flexible Workflow Supporting Exception Handling.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Clustering Aspect-related Phrases by Leveraging Sentiment Distribution Consistency.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014

Customized Organization of Social Media Contents using Focused Topic Hierarchy.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

New Word Detection for Sentiment Analysis.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
Automated Identification of Change-Prone Classes in Open Source Software Projects.
JSW, 2013

Implementation of a three-stage approach for the dynamic resource-constrained shortest-path sub-problem in branch-and-price.
Computers & OR, 2013

Information distance between what I said and what it heard.
Commun. ACM, 2013

An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Topic hierarchy construction for the organization of multi-source user generated contents.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Promoting Diversity in Recommendation by Entropy Regularizer.
Proceedings of the IJCAI 2013, 2013

An Introduction to String Re-Writing Kernel.
Proceedings of the IJCAI 2013, 2013

Does bug prediction support human developers? findings from a google case study.
Proceedings of the 35th International Conference on Software Engineering, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Functional dirichlet process.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Exploring weakly supervised latent sentiment explanations for aspect-level review analysis.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.
Wireless Networks, 2012

Using Coding-Based Ensemble Learning to Improve Software Defect Prediction.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

Relations and Generalizations of Importance Measures in Reliability.
IEEE Trans. Reliability, 2012

Some Recent Advances on Importance Measures in Reliability.
IEEE Trans. Reliability, 2012

A Unified Active Learning Framework for Biomedical Relation Extraction.
J. Comput. Sci. Technol., 2012

An Empirical Analysis of Software Changes on Statement Entity in Java Open Source Projects.
IJOSSP, 2012

A three-stage approach for the resource-constrained shortest path as a sub-problem in column generation.
Computers & OR, 2012

Entity Disambiguation with Freebase.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Sentiment Analysis with Multi-source Product Reviews.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

CPTT: A high-throughput coding-aware routing metric for multi-hop wireless networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Finding nuggets in IP portfolios: core patent mining through textual temporal analysis.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Cross-Domain Co-Extraction of Sentiment and Topic Lexicons.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

String Re-writing Kernel.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

QA: from Turing Test to Intelligent Information Service.
Proceedings of the Second CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2012

Using First-Order Logic to Compress Sentences.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Semantic Aspect Retrieval for Encyclopedia.
Polibits, 2011

Covering models and optimization techniques for emergency response facility location and planning: a review.
Math. Meth. of OR, 2011

RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue.
IEEE Journal on Selected Areas in Communications, 2011

Guided Structure-Aware Review Summarization.
J. Comput. Sci. Technol., 2011

A New Multiword Expression Metric and Its Applications.
J. Comput. Sci. Technol., 2011

Minimal-cost network flow problems with variable lower bounds on arc flows.
Computers & OR, 2011

GeneTUKit: a software for document-level gene normalization.
Bioinformatics, 2011

An empirical analysis of the FixCache algorithm.
Proceedings of the 8th International Working Conference on Mining Software Repositories, 2011

Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011

C4: A new paradigm for providing incentives in multi-hop wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

K2Q: Generating Natural Language Questions from Keywords with User Refinements.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011

Quality-biased Ranking of Short Texts in Microblogging Services.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011

Incorporating Reviewer and Product Information for Review Rating Prediction.
Proceedings of the IJCAI 2011, 2011

Learning to Identify Review Spam.
Proceedings of the IJCAI 2011, 2011

Semantic Relationship Discovery with Wikipedia Structure.
Proceedings of the IJCAI 2011, 2011

Generating Breakpoint-based Timeline Overview for News Topic Retrospection.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks.
Proceedings of the Global Communications Conference, 2011

Study for speed management technology of national road.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Concepts of village roads safety facilities construction.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Protein-protein interaction extraction from bio-literature with compact features and data sampling strategy.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
How to secure multi-domain wireless mesh networks.
Wireless Networks, 2010

Privacy and emergency response in e-healthcare leveraging wireless body sensor networks.
IEEE Wireless Commun., 2010

Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs.
IEEE Trans. Wireless Communications, 2010

MABS: Multicast Authentication Based on Batch Signature.
IEEE Trans. Mob. Comput., 2010

Privacy and security for online social networks: challenges and opportunities.
IEEE Network, 2010

A New Approach for Multi-Document Update Summarization.
J. Comput. Sci. Technol., 2010

Discovering breast cancer drug candidates from biomedical literature.
IJDMB, 2010

A Weighted Voting-Based Associative Classification Algorithm.
Comput. J., 2010

The THU Summarization Systems at TAC 2010.
Proceedings of the Third Text Analysis Conference, 2010

Learning to Link Entities with Knowledge Base.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2010

A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Function-Based Question Classification for General QA.
Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, 2010

A Review Selection Approach for Accurate Feature Rating Estimation.
Proceedings of the COLING 2010, 2010

Structure-Aware Review Mining and Summarization.
Proceedings of the COLING 2010, 2010

A Comparative Study on Ranking and Selection Strategies for Multi-Document Summarization.
Proceedings of the COLING 2010, 2010

Measuring the Non-compositionality of Multiword Expressions.
Proceedings of the COLING 2010, 2010

Recognizing Biomedical Named Entities Using Skip-Chain Conditional Random Fields.
Proceedings of the 2010 Workshop on Biomedical Natural Language Processing, 2010

Sentiment Analysis with Global Topics and Local Dependency.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
A batched network coding scheme for wireless networks.
Wireless Networks, 2009

Securing resource-constrained wireless ad hoc networks.
IEEE Wireless Commun., 2009

Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure.
IEEE Trans. Vehicular Technology, 2009

Mining Reviews for Product Comparison and Recommendation.
Polibits, 2009

Building Disease-Specific Drug-Protein Connectivity Maps from Molecular Interaction Networks and PubMed Abstracts.
PLoS Computational Biology, 2009

On the improvement of scaling laws for large-scale MANETs with network coding.
IEEE Journal on Selected Areas in Communications, 2009

Extract interaction detection methods from the biological literature.
BMC Bioinformatics, 2009

Specialized Review Selection for Feature Rating Estimation.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance.
Proceedings of the Second Text Analysis Conference, 2009

THU QUANTA at TAC 2009 KBP and RTE Track.
Proceedings of the Second Text Analysis Conference, 2009

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Multi-document Summarization by Information Distance.
Proceedings of the ICDM 2009, 2009

Rethinking Thresholds-Based Rate Adaptation Algorithms: A Reverse Engineering Perspective.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Towards Automatic Generation of Gene Summary.
Proceedings of the BioNLP Workshop, BioNLP@HLT-NAACL 2009, 2009

Answering Opinion Questions with Random Walks on Graphs.
Proceedings of the ACL 2009, 2009

A query-specific opinion summarization system.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

C and M: A New Network Coding Scheme for Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Comments on "A Hierarchy of Importance Indices".
IEEE Trans. Reliability, 2008

New Information Distance Measure and Its Application in Question Answering System.
J. Comput. Sci. Technol., 2008

Detrended fluctuation analysis of traffic data
CoRR, 2008

Exploiting and integrating rich features for biological literature classification.
BMC Bioinformatics, 2008

THU QUANTA at TAC 2008 QA and RTE Track.
Proceedings of the First Text Analysis Conference, 2008

Tsinghua University at the Summarization Track of TAC 2008.
Proceedings of the First Text Analysis Conference, 2008

Mining disease-specific molecular association profiles from biomedical literature: a case study.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Generative Probabilistic Model for Multi-label Classification.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

A QoS Multicast Routing Protocol with Mobile Prediction Based on MAODV in MANETs.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Classifying What-Type Questions by Head Noun Tagging.
Proceedings of the COLING 2008, 2008

Information shared by many objects.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

Using Conditional Random Fields to Extract Contexts and Answers of Questions from Online Forums.
Proceedings of the ACL 2008, 2008

2007
Three-stage approaches for optimizing some variations of the resource constrained shortest-path sub-problem in a column generation context.
European Journal of Operational Research, 2007

Combining Convolution Kernels Defined on Heterogeneous Sub-structures.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Information distance from a question to an answer.
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007

A Novel Kernel-Based Approach for Predicting Binding Peptides for HLA Class II Molecules.
Proceedings of the Bioinformatics Research and Applications, Third International Symposium, 2007

A New Type of Feature - Loose N-Gram Feature in Text Categorization.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

Semi-supervised Pattern Learning for Extracting Relations from Bioscience Texts.
Proceedings of 5th Asia-Pacific Bioinformatics Conference, 2007

2006
A hybrid method for relation extraction from biomedical literature.
I. J. Medical Informatics, 2006

An Ontology-Based Mining System for Competitive Intelligence in Neuroscience.
Proceedings of the Web Intelligence Meets Brain Informatics, 2006

Automatic Extraction of Genomic Glossary Triggered by Query.
Proceedings of the Data Mining for Biomedical Applications, PAKDD 2006 Workshop, 2006

A Hybrid Handwritten Chinese Address Recognition Approach.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Movie review mining and summarization.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

ONBRIRES: Ontology-Based Biological Relation Extraction System.
Proceedings of 4th Asia-Pacific Bioinformatics Conference. 13-16 February 2006, 2006

2005
Discovering patterns to extract protein-protein interactions from the literature: Part II.
Bioinformatics, 2005

Learning Domain-Specific Knowledge from Context--THUIR at TREC 2005 Genomics Track.
Proceedings of the Fourteenth Text REtrieval Conference, 2005

An OCR Post-processing Approach Based on Multi-knowledge.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Various Features with Integrated Strategies for Protein Name Classification.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Extended Bi-gram Features in Text Categorization.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

A New Algorithm for Pattern Optimization in Protein-Protein Interaction Extraction System.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

An Utterance Verification Algorithm in Keyword Spotting System.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

2004
Discovering patterns to extract protein-protein interactions from full texts.
Bioinformatics, 2004

THUIR at TREC 2004: Genomics Track.
Proceedings of the Thirteenth Text REtrieval Conference, 2004

A Chinese OCR spelling check approach based on statistical language models.
Proceedings of the IEEE International Conference on Systems, 2004

Utterance Verification Based on Support Vector Machine.
Proceedings of the International Conference on Artificial Intelligence, 2004

Discovering Patterns to Extract Protein-Protein Interactions from Full Biomedical Texts.
Proceedings of the International Joint Workshop on Natural Language Processing in Biomedicine and its Applications, 2004

PathwayFinder: Paving the Way Towards Automatic Pathway Extraction.
Proceedings of the Second Asia-Pacific Bioinformatics Conference (APBC 2004), 2004

2003
Continuous speech recognition and verification based on a combination score.
Proceedings of the 8th European Conference on Speech Communication and Technology, EUROSPEECH 2003, 2003

2002
A fast learning algorithm for time-delay neural networks.
Inf. Sci., 2002

Braille to print translations for Chinese.
Information & Software Technology, 2002

A New Textual/Non-Textual Classifier for Document Skew Correction.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
An effective result-feedback neural algorithm for handwritten character recognition.
Neural Parallel & Scientific Comp., 2001

A Chinese spoken dialog system for blind men.
Proceedings of the IEEE International Conference on Systems, 2001

A new algorithm for handwritten character recognition.
Proceedings of the 2001 International Conference on Image Processing, 2001

A Handwritten Character Recognition Method with ANN Feedback.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001

2000
A novel text-independent speaker verification method based on the global speaker model.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2000

A New Speaker Verification Method with Global Speaker Model and Likelihood Score Normalization.
J. Comput. Sci. Technol., 2000

A criterion based on Fourier transform for segmentation of connected digits.
IJDAR, 2000

Semi-continuous segmental probability model for speech signals.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

Reliability evaluation of speech recognition in acoustic modeling.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

1999
Utterance verification using modified segmental probability model.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

A robust learning algorithm for the extended AM neural network.
Proceedings of the International Joint Conference Neural Networks, 1999

A novel fast learning algorithms for time-delay neural networks.
Proceedings of the International Joint Conference Neural Networks, 1999

A New Distinguishing Algorithm of Connected Character Image based on Fourier Transform.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

1998
A novel text-independent speaker verification method using the global speaker model.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

A New Model of Recurrent Neural Networks for Speech Recognition.
Proceedings of the Fifth International Conference on Neural Information Processing, 1998

1996
Multiple experts recognition system based on neural network.
Proceedings of the 13th International Conference on Pattern Recognition, 1996


  Loading...