


default search action
Computational Intelligence, Volume 28
Volume 28, Number 1, February 2012
- Dawei Song

, Qiang Huang, Peter Bruza
, Raymond Lau
:
An Aspect Query Language Model Based on Query Decomposition and High-Order Contextual Term Associations. 1-23 - Javier Murillo, Beatriz López

, Víctor Muñoz
, Dídac Busquets
:
Fairness in Recurrent Auctions with Competing Markets and Supply fluctuations. 24-50 - Xudong Luo

, Chunyan Miao
, Nicholas R. Jennings
, Minghua He, Zhiqi Shen, Minjie Zhang
:
Kemnad: a Knowledge Engineering Methodology for Negotiating Agent Development. 51-105 - Dmitri A. Rachkovskij

, Serge V. Slipchenko
:
Similarity-Based Retrieval with Structure-Sensitive Sparse Binary Distributed Representations. 106-129
Volume 28, Number 2, May 2012
- Sergio Nesmachnow

, Enrique Alba
, Héctor Cancela
:
Scheduling in Heterogeneous Computing and Grid Environments Using a Parallel CHC Evolutionary Algorithm. 131-155 - John Atkinson

, Juan Matamala:
Evolutionary Shallow Natural Language Parsing. 156-175 - Spencer K. White, Tony R. Martinez, George L. Rudolph:

Automatic Algorithm Development Using New Reinforcement Programming Techniques. 176-208 - Morteza Haghir Chehreghani, Mostafa Haghir Chehreghani

, Hassan Abolhassani
:
Probabilistic Heuristics for Hierarchical Web Data Clustering. 209-233 - Jose Manuel Marquez Vazquez, Luis González Abril

, Francisco Velasco Morente
, Juan Antonio Ortega
:
Performance Improvement Using Adaptive Learning Itineraries. 234-260 - Yoshua Bengio, Nicolas Chapados, Olivier Delalleau, Hugo Larochelle, Xavier Saint-Mleux, Christian Hudon, Jérôme Louradour:

Detonation Classification from acoustic Signature with the Restricted Boltzmann Machine. 261-288
Volume 28, Number 3, August 2012
- Hongyu Liu, Evangelos E. Milios

:
Probabilistic Models for Focused Web Crawling. 289-328 - Geoffrey Levine, Ugur Kuter, Antons Rebguns, Derek T. Green, Diana F. Spears:

Learning and Verifying Safety Constraints for Planners in a Knowledge-Impoverished System. 329-357 - Forrest Sheng Bao, Yuanlin Zhang:

A Review of Tree Convex Sets Test. 358-372 - Edward Hung, Lurong Xiao, Regant Y. S. Hung:

An Efficient Representation Model of Distance Distribution between uncertain Objects. 373-397 - Danushka Bollegala

, Yutaka Matsuo, Mitsuru Ishizuka:
Automatic Annotation of Ambiguous Personal Names on the Web. 398-425 - Wenliang Chen, Jun'ichi Kazama, Kiyotaka Uchimoto, Kentaro Torisawa:

Exploiting Subtrees in Auto-Parsed Data to Improve Dependency Parsing. 426-451
Volume 28, Number 4, November 2012
- Audun Jøsang

, Simon Pope:
Dempster's Rule as Seen by Little Colored Balls. 453-474 - Yannick Le Bras, Philippe Lenca, Stéphane Lallich:

Optimonotone Measures for Optimal Rule Discovery. 475-504 - David G. Whiting, James V. Hansen, James B. McDonald, Conan C. Albrecht, W. Steve Albrecht:

Machine Learning Methods for Detecting Patterns of Management Fraud. 505-527 - Alejandro Figueroa

, John Atkinson
:
Contextual Language Models for Ranking Answers to Natural Language Definition Questions. 528-548 - Jie Zhang, Robin Cohen, Kate Larson

:
Combining Trust Modeling and Mechanism Design for promoting Honesty in E-Marketplaces. 549-578 - Sanjiang Li

, Anthony G. Cohn:
Reasoning with Topological and Directional Spatial Information. 579-616 - Nicola Dragoni

, Mauro Gaspari
:
Declarative Specification of Fault Tolerant Auction Protocols: the English Auction Case Study. 617-641 - Amirali Salehi-Abari, Tony White:

Dart: a Distributed Analysis of Reputation and Trust Framework. 642-682

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














