default search action
Computational Intelligence, Volume 28
Volume 28, Number 1, February 2012
- Dawei Song, Qiang Huang, Peter Bruza, Raymond Lau:
An Aspect Query Language Model Based on Query Decomposition and High-Order Contextual Term Associations. 1-23 - Javier Murillo, Beatriz López, Víctor Muñoz, Dídac Busquets:
Fairness in Recurrent Auctions with Competing Markets and Supply fluctuations. 24-50 - Xudong Luo, Chunyan Miao, Nicholas R. Jennings, Minghua He, Zhiqi Shen, Minjie Zhang:
Kemnad: a Knowledge Engineering Methodology for Negotiating Agent Development. 51-105 - Dmitri A. Rachkovskij, Serge V. Slipchenko:
Similarity-Based Retrieval with Structure-Sensitive Sparse Binary Distributed Representations. 106-129
Volume 28, Number 2, May 2012
- Sergio Nesmachnow, Enrique Alba, Héctor Cancela:
Scheduling in Heterogeneous Computing and Grid Environments Using a Parallel CHC Evolutionary Algorithm. 131-155 - John Atkinson, Juan Matamala:
Evolutionary Shallow Natural Language Parsing. 156-175 - Spencer K. White, Tony R. Martinez, George L. Rudolph:
Automatic Algorithm Development Using New Reinforcement Programming Techniques. 176-208 - Morteza Haghir Chehreghani, Mostafa Haghir Chehreghani, Hassan Abolhassani:
Probabilistic Heuristics for Hierarchical Web Data Clustering. 209-233 - Jose Manuel Marquez Vazquez, Luis González Abril, Francisco Velasco Morente, Juan Antonio Ortega:
Performance Improvement Using Adaptive Learning Itineraries. 234-260 - Yoshua Bengio, Nicolas Chapados, Olivier Delalleau, Hugo Larochelle, Xavier Saint-Mleux, Christian Hudon, Jérôme Louradour:
Detonation Classification from acoustic Signature with the Restricted Boltzmann Machine. 261-288
Volume 28, Number 3, August 2012
- Hongyu Liu, Evangelos E. Milios:
Probabilistic Models for Focused Web Crawling. 289-328 - Geoffrey Levine, Ugur Kuter, Antons Rebguns, Derek T. Green, Diana F. Spears:
Learning and Verifying Safety Constraints for Planners in a Knowledge-Impoverished System. 329-357 - Forrest Sheng Bao, Yuanlin Zhang:
A Review of Tree Convex Sets Test. 358-372 - Edward Hung, Lurong Xiao, Regant Y. S. Hung:
An Efficient Representation Model of Distance Distribution between uncertain Objects. 373-397 - Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuka:
Automatic Annotation of Ambiguous Personal Names on the Web. 398-425 - Wenliang Chen, Jun'ichi Kazama, Kiyotaka Uchimoto, Kentaro Torisawa:
Exploiting Subtrees in Auto-Parsed Data to Improve Dependency Parsing. 426-451
Volume 28, Number 4, November 2012
- Audun Jøsang, Simon Pope:
Dempster's Rule as Seen by Little Colored Balls. 453-474 - Yannick Le Bras, Philippe Lenca, Stéphane Lallich:
Optimonotone Measures for Optimal Rule Discovery. 475-504 - David G. Whiting, James V. Hansen, James B. McDonald, Conan C. Albrecht, W. Steve Albrecht:
Machine Learning Methods for Detecting Patterns of Management Fraud. 505-527 - Alejandro Figueroa, John Atkinson:
Contextual Language Models for Ranking Answers to Natural Language Definition Questions. 528-548 - Jie Zhang, Robin Cohen, Kate Larson:
Combining Trust Modeling and Mechanism Design for promoting Honesty in E-Marketplaces. 549-578 - Sanjiang Li, Anthony G. Cohn:
Reasoning with Topological and Directional Spatial Information. 579-616 - Nicola Dragoni, Mauro Gaspari:
Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study. 617-641 - Amirali Salehi-Abari, Tony White:
Dart: a Distributed Analysis of Reputation and Trust Framework. 642-682
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.