


default search action
Computational Intelligence, Volume 28
Volume 28, Number 1, February 2012
- Dawei Song
, Qiang Huang, Peter Bruza
, Raymond Lau
:
An Aspect Query Language Model Based on Query Decomposition and High-Order Contextual Term Associations. 1-23 - Javier Murillo, Beatriz López
, Víctor Muñoz
, Dídac Busquets
:
Fairness in Recurrent Auctions with Competing Markets and Supply fluctuations. 24-50 - Xudong Luo
, Chunyan Miao
, Nicholas R. Jennings
, Minghua He, Zhiqi Shen, Minjie Zhang
:
Kemnad: a Knowledge Engineering Methodology for Negotiating Agent Development. 51-105 - Dmitri A. Rachkovskij
, Serge V. Slipchenko
:
Similarity-Based Retrieval with Structure-Sensitive Sparse Binary Distributed Representations. 106-129
Volume 28, Number 2, May 2012
- Sergio Nesmachnow
, Enrique Alba
, Héctor Cancela
:
Scheduling in Heterogeneous Computing and Grid Environments Using a Parallel CHC Evolutionary Algorithm. 131-155 - John Atkinson
, Juan Matamala:
Evolutionary Shallow Natural Language Parsing. 156-175 - Spencer K. White, Tony R. Martinez, George L. Rudolph:
Automatic Algorithm Development Using New Reinforcement Programming Techniques. 176-208 - Morteza Haghir Chehreghani, Mostafa Haghir Chehreghani
, Hassan Abolhassani
:
Probabilistic Heuristics for Hierarchical Web Data Clustering. 209-233 - Jose Manuel Marquez Vazquez, Luis González Abril
, Francisco Velasco Morente
, Juan Antonio Ortega
:
Performance Improvement Using Adaptive Learning Itineraries. 234-260 - Yoshua Bengio, Nicolas Chapados, Olivier Delalleau, Hugo Larochelle, Xavier Saint-Mleux, Christian Hudon, Jérôme Louradour:
Detonation Classification from acoustic Signature with the Restricted Boltzmann Machine. 261-288
Volume 28, Number 3, August 2012
- Hongyu Liu, Evangelos E. Milios
:
Probabilistic Models for Focused Web Crawling. 289-328 - Geoffrey Levine, Ugur Kuter, Antons Rebguns, Derek T. Green, Diana F. Spears:
Learning and Verifying Safety Constraints for Planners in a Knowledge-Impoverished System. 329-357 - Forrest Sheng Bao, Yuanlin Zhang:
A Review of Tree Convex Sets Test. 358-372 - Edward Hung, Lurong Xiao, Regant Y. S. Hung:
An Efficient Representation Model of Distance Distribution between uncertain Objects. 373-397 - Danushka Bollegala
, Yutaka Matsuo, Mitsuru Ishizuka:
Automatic Annotation of Ambiguous Personal Names on the Web. 398-425 - Wenliang Chen, Jun'ichi Kazama, Kiyotaka Uchimoto, Kentaro Torisawa:
Exploiting Subtrees in Auto-Parsed Data to Improve Dependency Parsing. 426-451
Volume 28, Number 4, November 2012
- Audun Jøsang
, Simon Pope:
Dempster's Rule as Seen by Little Colored Balls. 453-474 - Yannick Le Bras, Philippe Lenca, Stéphane Lallich:
Optimonotone Measures for Optimal Rule Discovery. 475-504 - David G. Whiting, James V. Hansen, James B. McDonald, Conan C. Albrecht, W. Steve Albrecht:
Machine Learning Methods for Detecting Patterns of Management Fraud. 505-527 - Alejandro Figueroa
, John Atkinson
:
Contextual Language Models for Ranking Answers to Natural Language Definition Questions. 528-548 - Jie Zhang, Robin Cohen, Kate Larson
:
Combining Trust Modeling and Mechanism Design for promoting Honesty in E-Marketplaces. 549-578 - Sanjiang Li
, Anthony G. Cohn:
Reasoning with Topological and Directional Spatial Information. 579-616 - Nicola Dragoni
, Mauro Gaspari
:
Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study. 617-641 - Amirali Salehi-Abari, Tony White:
Dart: a Distributed Analysis of Reputation and Trust Framework. 642-682

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.