Abstract is missing.
- Mining Cognitive Skills Levels of Knowledge Units in Text Using Graph Tringluarity MiningFatema Nafa, Javed I. Khan, Salem Othman, Amal Babour. 1-4 [doi]
- Toward Detecting Malicious Links in Online Social Networks through User BehaviorBandar Alghamdi, Jason Watson, Yue Xu. 5-8 [doi]
- Building a Chinese Dependency GraphBankBin Li, Yuan Wen, Cuijuan Xing, Yichu Zhou, Dekuan Xu. 9-12 [doi]
- An Experiment of Computer-aided Translation of Chinese Existential SentencesDekuan Xu. 13-16 [doi]
- Automatic Acquisition of Matching Patterns for Pattern-Based Parsing on Specific Chinese TextJing He, Tianbao Song, Weiming Peng, Qiaoyi Sheng, Jihua Song. 17-20 [doi]
- Simple Interrogative Sentence Analysis Based on CRFZheng Wang, Lijun Zhu, Shuo Xu, Ning Zhang, Yingying Yan, Weifeng Li. 21-24 [doi]
- Graph-Based Ranking on Chinese Product Features with a General Structure for Noun PhrasesGe Xu, Jinglan Wu. 25-28 [doi]
- Feature Representation Models for Cyber Attack Event ExtractionXinYing Qiu, Xiaoxin Lin, Likun Qiu. 29-32 [doi]
- v-Structural Nonparallel Support Vector Machine for Pattern ClassificationDandan Chen, Yingjie Tian. 33-36 [doi]
- Robust Unsupervised Feature Learning from Time-SeriesJianyu Miao, Yong Shi, Lingfeng Niu. 37-40 [doi]
- The Study of Model for Power Grid Diagnosis based on Naive Bayes TheoryWei Song, Geng Wu, Luyao Zhu, Shaojie Chi. 41-44 [doi]
- Aging Cognitive Influence Factors Analysis Based on Propensity ScoreMengyan Feng, Aihua Li, Jianbing Liu, Meihong Zhu. 45-49 [doi]
- Statistical Sparse Independence Rule for High-Dimensional ClassificationLiping Wang, Changtai Ji, Shanggao Xie, Qi Zhang. 50-53 [doi]
- Scale Expansion and Operations Inefficiency in Pure E-commerce FirmsZhuoFan Yang, Yong Shi. 54-57 [doi]
- The Influence of Investor Attention on Return and Volatility of Stock MarketWen Long, Bin Wang, Lingxiao Cui. 58-61 [doi]
- Educational Recommendation with Multiple StakeholdersRobin D. Burke, Himan Abdollahpouri. 62-63 [doi]
- Recommender System to Support Brokering of Youth Learning OpportunitiesTaha Hamid, Denise C. Nacu, Taihua Li, Jonathan Gemmell, Daniela Stan Raicu, Caitlin Kennedy Martin, Michael Schutzenhofer, Nichole Pinkard. 64-65 [doi]
- Collaborative Recommendation of Informal Learning ExperiencesRobin D. Burke, Farzad Eskandanian. 66-67 [doi]
- An Analysis of Norm Processes in Normative Multi-agent SystemsAlana Oliveira, Rosario Girardi. 68-71 [doi]
- Reputation-Based Distributed Coordination for Heterogeneous Autonomous AgentsPredrag T. Tosic. 72-75 [doi]
- Semantic Agent Contracts for Internet of AgentsPablo Pico-Valencia, Juan A. Holgado-Terriza. 76-79 [doi]
- IoT-a, Embedded Agents for Smart Internet of Things. Application on a Display WallFlorent Carlier, Valérie Renault. 80-83 [doi]
- Development and Evaluation of an Operational Service Robot Using Wikipedia-Based and Domain OntologiesHiroshi Asano, Takeshi Morita 0001, Takahira Yamaguti. 84-87 [doi]
- Toward Performance-Oriented Ontology Debugging Support Using Heuristic Approaches and DL ReasoningNaoki Yamada, Naoki Fukuta. 88-91 [doi]
- Toward a Flexible Ability Selection Mechanism for Personal Assistant Agent using Ontology ReasoningSho Oishi, Naoki Fukuta. 92-95 [doi]
- Towards Better Query Coding Support Utilizing Ontology MappingsTakuya Adachi, Naoki Yamada, Naoki Fukuta. 96-99 [doi]
- Implementation and Evaluation of Classroom AI in PRINTEPSChihiro Nishimoto, Shunsuke Akashiba, Takeshi Moritay, Takahira Yamaguchi. 100-103 [doi]
- Deep4MalDroid: A Deep Learning Framework for Android Malware Detection Based on Linux Kernel System Call GraphsShifu Hou, Aaron Saas, Lifei Chen, Yanfang Ye. 104-111 [doi]
- Double-Hypergraph Based Sentence Ranking for Query-Focused Multi-document SummarizatonXiaoyan Cai, Junwei Han, Lei Guo 0002, Libin Yang. 112-118 [doi]
- A Hybrid Recommendation Model Based on Weighted Bipartite Graph and Collaborative FilteringXiaohui Hu, Zichao Mai, Haolan Zhang, Yun Xue, Weixing Zhou, Xin Chen. 119-122 [doi]
- Audio-Visual Speaker Recognition via Multi-modal Correlated Neural NetworksJiajia Geng, Xin Liu, Yiu-ming Cheung. 123-128 [doi]
- A Decomposition-Based Constraint-Handling Technique for Constrained Multi-objective OptimizationChaoda Peng, Hai-lin Liu. 129-134 [doi]
- Automatic Detection of Helmet Uses for Construction SafetyAbu H. M. Rubaiyat, Tanjin T. Toma, Masoumeh Kalantari Khandani, Syed A. Rahman, Lingwei Chen, Yanfang Ye, Christopher S. Pan. 135-142 [doi]