Technology-Inspired Smart Learning for Future Education: 29th National Conference on Computer Science Technology and Education, NCCSTE 2019, Kaifeng, China, October 9–11, 2019, Revised Selected Papers
暂无分享,去创建一个
T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Junsong Yuan | R. Prates | Wenxing Hong | Chao Li | Q. Wang
[1] Bert F. Green,et al. Baseball: an automatic question-answerer , 1899, IRE-AIEE-ACM '61 (Western).
[2] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[3] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[4] Alexander J. Smola,et al. Support Vector Regression Machines , 1996, NIPS.
[5] Thorsten Joachims,et al. A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization , 1997, ICML.
[6] Mikel L. Forcada,et al. Asynchronous translations with recurrent neural nets , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[7] Boris Katz,et al. From Sentence Processing to Information Access on the World Wide Web , 1997 .
[8] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[9] Joakim Nivre,et al. Deterministic Dependency Parsing of English Text , 2004, COLING.
[10] Kien A. Hua,et al. Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.
[11] Sarah E Yates. Scaling the tower of babel fish: An analysis of the machine translation of legal information , 2006 .
[12] A M Turing,et al. Computing Machinery and Intelligence A.M. Turing , 2007 .
[13] Hyuncheol Park,et al. Performance Analysis of MIMO System with Linear MMSE Receiver , 2008, IEEE Transactions on Wireless Communications.
[14] C. Kit,et al. Comparative Evaluation of Online Machine Translation Systems with Legal Texts , 2008 .
[15] Hermann Kopetz. The Rationale for Time-Triggered Ethernet , 2008, 2008 Real-Time Systems Symposium.
[16] Yang Bingru. New method for sentence similarity computing and its application in question answering system , 2008 .
[17] Erhan Akin,et al. Rough particle swarm optimization and its applications in data mining , 2008, Soft Comput..
[18] Antonio Fini,et al. The Technological Dimension of a Massive Open Online Course: The Case of the CCK08 Course Tools , 2009 .
[19] B. Alatas,et al. Chaotically encoded particle swarm optimization algorithm and its applications , 2009 .
[20] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[21] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[22] Yoshihiro Kawahara,et al. Prototype implementation of ambient RF energy harvesting wireless sensor networks , 2010, 2010 IEEE Sensors.
[23] Federico Casalegno,et al. The Three Dimensions of Book Evolution in Ubiquitous Computing Age: Digitalization, Augmentation, and Hypermediation , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.
[24] Wanxiang Che,et al. LTP: A Chinese Language Technology Platform , 2010, COLING.
[25] R. J. Kuo,et al. Application of particle swarm optimization to association rule mining , 2011, Appl. Soft Comput..
[26] Lei Zhang,et al. Topology design of industrial ethernet networks using a multi-objective genetic algorithm , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).
[27] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.
[28] Kyu Ho Park,et al. A Cooperative Clustering Protocol for Energy Saving of Mobile Devices with WLAN and Bluetooth Interfaces , 2011, IEEE Transactions on Mobile Computing.
[29] Jeffrey Pennington,et al. Dynamic Pooling and Unfolding Recursive Autoencoders for Paraphrase Detection , 2011, NIPS.
[30] Xiong Hua-gang. Research on Time-Triggerd-Ethernet Synchronization and Scheduling Mechanism , 2011 .
[31] Le Thi Hoai An,et al. Network Intrusion Detection Based on Multi-Class Support Vector Machine , 2012, ICCCI.
[32] Manish Gupta. Application of Weighted Particle Swarm Optimization in Association Rule Mining , 2012 .
[33] Liu Mingzhen. New network intrusion detection algorithm based on support vector machine and particle swarm optimization , 2012 .
[34] Hongming Zhou,et al. Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[35] Alan E Gelfand,et al. Space‐Time Data fusion Under Error in Computer Model Output: An Application to Modeling Air Quality , 2012, Biometrics.
[36] Jing Yang,et al. Energy Cooperation in Energy Harvesting Communications , 2013, IEEE Transactions on Communications.
[37] Jian Guo,et al. Research on Improved A Priori Algorithm Based on Coding and MapReduce , 2013, 2013 10th Web Information System and Application Conference.
[38] Rui Zhang,et al. Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.
[39] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[40] Karen Fasimpaur. Massive and Open. , 2013 .
[41] Hang Li,et al. A Deep Architecture for Matching Short Texts , 2013, NIPS.
[42] Philip G. Schrag. MOOCs and Legal Education: Valuable Innovation or Looming Disaster? , 2013 .
[43] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[44] Phil Blunsom,et al. Recurrent Continuous Translation Models , 2013, EMNLP.
[45] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[46] Vadlamani Ravi,et al. Association rule mining using binary particle swarm optimization , 2013, Eng. Appl. Artif. Intell..
[47] Jin Jin,et al. Power Allocation in Multiuser MIMO Systems for Simultaneous Wireless Information and Power Transfer , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).
[48] Shuguang Cui,et al. Throughput Maximization for the Gaussian Relay Channel with Energy Harvesting Constraints , 2011, IEEE Journal on Selected Areas in Communications.
[49] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[50] Hyungsik Ju,et al. User cooperation in wireless powered communication networks , 2014, 2014 IEEE Global Communications Conference.
[51] Hyungsik Ju,et al. Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.
[52] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[53] Phil Blunsom,et al. A Convolutional Neural Network for Modelling Sentences , 2014, ACL.
[54] Hyungsik Ju,et al. Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..
[55] Kee Chaing Chua,et al. Multi-Antenna Wireless Powered Communication With Energy Beamforming , 2013, IEEE Transactions on Communications.
[56] Michael Paulitsch,et al. Time-Triggered Ethernet , 2014 .
[57] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[58] Rong Gu,et al. YAFIM: A Parallel Frequent Itemset Mining Algorithm with Spark , 2014, 2014 IEEE International Parallel & Distributed Processing Symposium Workshops.
[59] Peilin Hong,et al. RPA-RA: A Resource Preference Aware Routing Algorithm in Software Defined Network , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[60] Kaibin Huang,et al. Energy Harvesting Wireless Communications: A Review of Recent Advances , 2015, IEEE Journal on Selected Areas in Communications.
[61] Vikram Kumar Kamboj,et al. Solution of non-convex economic load dispatch problem for small-scale power systems using ant lion optimizer , 2016, Neural Computing and Applications.
[62] Gao Ye,et al. Application of hybrid ant colony algorithm for mining maximum frequent item sets , 2015, 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).
[63] Christopher D. Manning,et al. Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks , 2015, ACL.
[64] Manohar Kaul,et al. R-Apriori: An Efficient Apriori based Algorithm on Spark , 2015, PIKM@CIKM.
[65] Seyed Mohammad Mirjalili,et al. The Ant Lion Optimizer , 2015, Adv. Eng. Softw..
[66] Hussain Shareef,et al. Lightning search algorithm , 2015, Appl. Soft Comput..
[67] Fei Li,et al. A distributed frequent itemset mining algorithm based on Spark , 2015, 2015 IEEE 19th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[68] Rui Zhang,et al. Optimized Training Design for Wireless Energy Transfer , 2014, IEEE Transactions on Communications.
[69] Paul Pop,et al. Fault-tolerant topology selection for TTEthernet Networks , 2015 .
[70] Hae-Chang Rim,et al. Knowledge-based question answering using the semantic embedding space , 2015, Expert Syst. Appl..
[71] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[72] Wei Luo,et al. Mining Fuzzy Association Rules Based on Parallel Particle Swarm Optimization Algorithm , 2014, Intell. Autom. Soft Comput..
[73] Rui Zhang,et al. Placement Optimization of Energy and Information Access Points in Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.
[74] H. Schmeets,et al. Empirical Legal Research: A Guidance Book for Lawyers, Legislators and Regulators , 2016 .
[75] Bowen Zhou,et al. ABCNN: Attention-Based Convolutional Neural Network for Modeling Sentence Pairs , 2015, TACL.
[76] Luca Cagliero,et al. Modeling Correlations among Air Pollution-Related Data through Generalized Association Rules , 2016, 2016 IEEE International Conference on Smart Computing (SMARTCOMP).
[77] Sanda M. Harabagiu,et al. Medical Question Answering for Clinical Decision Support , 2016, CIKM.
[78] Shueng-Han Gary Chan,et al. Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons , 2016, IEEE Communications Surveys & Tutorials.
[79] F. Karimipour,et al. Mapping the Vulnerability of Asthmatic Allergy Prevalence Based on Environmental Characteristics through Fuzzy Spatial Association Rule Mining , 2016 .
[80] Indrajit N. Trivedi,et al. Optimal power flow with enhancement of voltage stability and reduction of power loss using ant-lion optimizer , 2016 .
[81] Ye Zhang,et al. A Sensitivity Analysis of (and Practitioners’ Guide to) Convolutional Neural Networks for Sentence Classification , 2015, IJCNLP.
[82] Won-Sik Yoon,et al. Full-duplex Distributed Massive MIMO System with Optimal Beamforming and Resource Allocation for WPCN , 2017 .
[83] Yuan Yang,et al. CMU LiveMedQA at TREC 2017 LiveQA: A Consumer Health Question Answering System , 2017, ArXiv.
[84] Mennan Güder,et al. Multi-modal video event recognition based on association rules and decision fusion , 2017, Multimedia Systems.
[85] Howard H. Chang,et al. Daily ambient air pollution metrics for five cities: Evaluation of data-fusion-based estimates and uncertainties , 2017 .
[86] Mykola Beshley,et al. Adaptive flow routing model in SDN , 2017, 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM).
[87] Hongwei Chen,et al. Distributed pruning optimization oriented FP-Growth method based on PSO algorithm , 2017, 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
[88] Tao Zhang,et al. User Cooperation in Wireless Powered Communication Networks With a Pricing Mechanism , 2017, IEEE Access.
[89] Khaled Ben Letaief,et al. Robust Transmit Beamforming With Artificial Redundant Signals for Secure SWIPT System Under Non-Linear EH Model , 2018, IEEE Transactions on Wireless Communications.
[90] Khaled Ben Letaief,et al. Coordinated Beamforming With Artificial Noise for Secure SWIPT Under Non-Linear EH Model: Centralized and Distributed Designs , 2018, IEEE Journal on Selected Areas in Communications.
[91] Haipeng Yao,et al. A novel sentence similarity model with word embedding based on convolutional neural network , 2018, Concurr. Comput. Pract. Exp..
[92] Zhiwei Ye,et al. Network Intrusion Detection Based on Lightning Search Algorithm Optimized Extreme Learning Machine , 2018, 2018 13th International Conference on Computer Science & Education (ICCSE).
[93] Xin Liu,et al. LCQMC:A Large-scale Chinese Question Matching Corpus , 2018, COLING.
[94] Yinghua Ma,et al. Learning Automata Based Feature Selection for Network Traffic Intrusion Detection , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[95] Manuj Mishra,et al. Association Rules Optimization using Particle Swarm Optimization Algor , 2018 .
[96] Yong Deng,et al. Evaluation method based on fuzzy relations between Dempster–Shafer belief structure , 2018, Int. J. Intell. Syst..
[97] Wei Zhou,et al. Research on Multi-Source Data Fusion in the Field of Atmospheric Environmental Monitoring , 2018, 2018 13th International Conference on Computer Science & Education (ICCSE).
[98] Zhi Zhang,et al. Bag of Tricks for Image Classification with Convolutional Neural Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[99] Pin-Chao Liao,et al. Fusion Model for Hazard Association Network Development: A Case in Elevator Installation and Maintenance , 2019 .
[100] Yang Deng,et al. MedTruth: A Semi-supervised Approach to Discovering Knowledge Condition Information from Multi-Source Medical Data , 2019, CIKM.
[101] Iraj Mahdavi,et al. Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..
[102] Wei Zhou,et al. Research on Association Rules Mining of Atmospheric Environment Monitoring Data , 2019 .