-
1
-
-
84901496136
-
-
http://www.comap.com/undergraduate/contests/mcm/contests/2012/problems/.
-
-
-
-
2
-
-
84856665372
-
The analytic hierarchy process method for integrate distribution issue of agricultural products logistics
-
2011 International Conference of Information Technology, Computer Engineering and Management Sciences
-
W.J. Bao, Z.Y. Wu, The analytic hierarchy process method for integrate distribution issue of agricultural products logistics, in: 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, 2011, pp. 342-344.
-
(2011)
, pp. 342-344
-
-
Bao, W.J.1
Wu, Z.Y.2
-
3
-
-
78650610618
-
The research and application of vehicle comfortableness based on analytic hierarchy process method
-
2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management
-
G. Cheng, Y. Li, J.Q. Chang, X.F. Sun, The research and application of vehicle comfortableness based on analytic hierarchy process method, in: 2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management, 2010, pp. 1124-1128.
-
(2010)
, pp. 1124-1128
-
-
Cheng, G.1
Li, Y.2
Chang, J.Q.3
Sun, X.F.4
-
4
-
-
84868552057
-
Semantic network analysis of Islamist sources using time slices as Nodes and semantic similarity as link strengths: some Implications for propaganda analysis about Jihad
-
2012 European Intelligence and Security Informatics Conference
-
J.A. Danowski, Semantic network analysis of Islamist sources using time slices as Nodes and semantic similarity as link strengths: some Implications for propaganda analysis about Jihad, in: 2012 European Intelligence and Security Informatics Conference, 2012, pp. 164-171.
-
(2012)
, pp. 164-171
-
-
Danowski, J.A.1
-
5
-
-
84863334760
-
Traditional NLP: a distributed solution for optimizing chat processing automatic chat assessment using tagged latent semantic analysis.
-
2011 10th International Symposium on Parallel and Distributed Computing
-
M. Dascǎlu, C. Dobre, S. Trǎuşan-Matu, V. CristeaBeyond, Traditional NLP: a distributed solution for optimizing chat processing automatic chat assessment using tagged latent semantic analysis. in: 2011 10th International Symposium on Parallel and Distributed Computing, 2011, pp. 133-138.
-
(2011)
, pp. 133-138
-
-
Dascǎlu, M.1
Dobre, C.2
Trǎuşan-Matu, S.3
CristeaBeyond, V.4
-
6
-
-
77957932487
-
Assessing computer network security with fuzzy analytic hierarchy process
-
2010 2nd International Conference on Advanced Computer Control
-
J. Fei, H. Xu, Assessing computer network security with fuzzy analytic hierarchy process, in: 2010 2nd International Conference on Advanced Computer Control, vol. 5, 2010, pp. 204-208.
-
(2010)
, vol.5
, pp. 204-208
-
-
Fei, J.1
Xu, H.2
-
7
-
-
84865084163
-
Dijkstra's shortest path algorithm serial and parallel execution performance analysis
-
2012 Proceedings of the 35th International Convention
-
N. Jasika, N. Alispahic, A. Elma, K. Ilvana, L. Elma, N. Nosovic, Dijkstra's shortest path algorithm serial and parallel execution performance analysis, in: 2012 Proceedings of the 35th International Convention, 2012, pp. 1811-1815.
-
(2012)
, pp. 1811-1815
-
-
Jasika, N.1
Alispahic, N.2
Elma, A.3
Ilvana, K.4
Elma, L.5
Nosovic, N.6
-
8
-
-
78649239015
-
A hybrid-strategy method combining semantic analysis with rule-based MT for patent machine translation
-
2010 International Conference on Natural Language Processing and Knowledge Engineering
-
Y.J. Jin, A hybrid-strategy method combining semantic analysis with rule-based MT for patent machine translation, in: 2010 International Conference on Natural Language Processing and Knowledge Engineering, 2010, pp. 1-4.
-
(2010)
, pp. 1-4
-
-
Jin, Y.J.1
-
9
-
-
42549148785
-
Semantic analysis of web pages using web patterns
-
IEEE/WIC/ACM International Conference on Web Intelligence
-
M. Kudelka, V. Snasel, O. Lehecka, E. El-Qawasmeh, Semantic analysis of web pages using web patterns, in: IEEE/WIC/ACM International Conference on Web Intelligence, 2006, pp. 329-333.
-
(2006)
, pp. 329-333
-
-
Kudelka, M.1
Snasel, V.2
Lehecka, O.3
El-Qawasmeh, E.4
-
10
-
-
80053162152
-
Toward a stability monitoring system of an asset-communications network exposed to malicious attacks
-
2011 American Control Conference
-
N. Léchevin, C.A. Rabbath, P. Maupin, Toward a stability monitoring system of an asset-communications network exposed to malicious attacks, in: 2011 American Control Conference, 2011, pp. 2210-2215.
-
(2011)
, pp. 2210-2215
-
-
Léchevin, N.1
Rabbath, C.A.2
Maupin, P.3
-
11
-
-
57649187240
-
Automatic object classification through semantic analysis
-
2008 20th IEEE International Conference on Tools with Artificial Intelligence
-
X.K. Li, Z.G. Zhu, Automatic object classification through semantic analysis, in: 2008 20th IEEE International Conference on Tools with Artificial Intelligence, 2008, pp. 497-504.
-
(2008)
, pp. 497-504
-
-
Li, X.K.1
Zhu, Z.G.2
-
12
-
-
84864198584
-
-
Finding conspirators in criminal network, 2012 International Conference on Systems and Informatics
-
J.Q. Liang, K. Zhang, F. Gao, Finding conspirators in criminal network, 2012 International Conference on Systems and Informatics, 2012, pp. 161-166.
-
(2012)
, pp. 161-166
-
-
Liang, J.Q.1
Zhang, K.2
Gao, F.3
-
13
-
-
77949845426
-
IDR-SQE: combining semantic and statistical relations to refine documents
-
2009 International Conference on Information and Multimedia Technology
-
Y.L. Liu, Y.X. Ouyang, Z. Xiong, IDR-SQE: combining semantic and statistical relations to refine documents, in: 2009 International Conference on Information and Multimedia Technology, 2009, pp. 139-143.
-
(2009)
, pp. 139-143
-
-
Liu, Y.L.1
Ouyang, Y.X.2
Xiong, Z.3
-
14
-
-
84856872960
-
Computer crime investigation by means of fuzzy semantic maps
-
2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies
-
V. Loia, M. Mattiucci, S. Senatore, M. Veniero, Computer crime investigation by means of fuzzy semantic maps, in: 2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, vol. 3, 2009, pp. 183-186.
-
(2009)
, vol.3
, pp. 183-186
-
-
Loia, V.1
Mattiucci, M.2
Senatore, S.3
Veniero, M.4
-
15
-
-
77955939244
-
Semantic inferentialist analyser: a semantic analyser for natural language sentences
-
2009 Seventh Brazilian Symposium in Information and Human Language Technology
-
V. Pinheiro, T. Pequeno, V. Furtado, D. Nogueira, Semantic inferentialist analyser: a semantic analyser for natural language sentences, in: 2009 Seventh Brazilian Symposium in Information and Human Language Technology, 2009, pp. 89-97.
-
(2009)
, pp. 89-97
-
-
Pinheiro, V.1
Pequeno, T.2
Furtado, V.3
Nogueira, D.4
-
16
-
-
50149099664
-
Analysis of web clustering based on genetic algorithm with latent semantic indexing technology
-
2007 Sixth International Conference on Advanced Language Processing and Web Information Technology
-
W. Song, S.C. Park, Analysis of web clustering based on genetic algorithm with latent semantic indexing technology, in: 2007 Sixth International Conference on Advanced Language Processing and Web Information Technology, 2007, pp. 21-26.
-
(2007)
, pp. 21-26
-
-
Song, W.1
Park, S.C.2
-
17
-
-
51749119301
-
A semantic multimedia analysis approach utilizing a region thesaurus and LSA
-
2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services
-
E. Spyrou, G. Tolias, P. Mylonas, Y. Avrithis, A semantic multimedia analysis approach utilizing a region thesaurus and LSA, in: 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services, 2008, pp. 8-11.
-
(2008)
, pp. 8-11
-
-
Spyrou, E.1
Tolias, G.2
Mylonas, P.3
Avrithis, Y.4
-
18
-
-
84856118960
-
Organized crime structures in co-offending networks
-
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
-
M.A. Tayebi, U. Glasser, Organized crime structures in co-offending networks, in: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011, pp. 846-858.
-
(2011)
, pp. 846-858
-
-
Tayebi, M.A.1
Glasser, U.2
-
19
-
-
73449138756
-
k-PathA: k-shortest path algorithm
-
2009 International Workshop on High Performance Computational Systems Biology
-
A. Ullrich, C.V. Forst, k-PathA: k-shortest path algorithm, in: 2009 International Workshop on High Performance Computational Systems Biology, 2009, pp. 23-30.
-
(2009)
, pp. 23-30
-
-
Ullrich, A.1
Forst, C.V.2
-
20
-
-
84901506262
-
The associative-semantic network for words and pictures: effective connectivity and graph analysis
-
Brain and Language. Available online 18th October
-
R. Vandenberghe, Y. Wang, N. Nelissen, M. Vandenbulcke, T. Dhollander, S. Sunaert, P. Dupont, The associative-semantic network for words and pictures: effective connectivity and graph analysis, in: Brain and Language. Available online 18th October 2012.
-
(2012)
-
-
Vandenberghe, R.1
Wang, Y.2
Nelissen, N.3
Vandenbulcke, M.4
Dhollander, T.5
Sunaert, S.6
Dupont, P.7
-
21
-
-
77954812374
-
Natural language processing based on semantic inferentialism for extracting crime information from text
-
2010 IEEE International Conference on Intelligence and Security Informatics
-
P. Vladia, F. Vasco, P. Tarcisio, N. Douglas, Natural language processing based on semantic inferentialism for extracting crime information from text, in: 2010 IEEE International Conference on Intelligence and Security Informatics, 2010, pp. 19-24.
-
(2010)
, pp. 19-24
-
-
Vladia, P.1
Vasco, F.2
Tarcisio, P.3
Douglas, N.4
-
22
-
-
28844474557
-
Semantic scheme to extract attack strategies for web service network security
-
2004 Proceedings IEEE Workshop on IP Operations and Management
-
W. Yan, F. Liu, Semantic scheme to extract attack strategies for web service network security, in: 2004 Proceedings IEEE Workshop on IP Operations and Management, 2004, pp. 104-111.
-
(2004)
, pp. 104-111
-
-
Yan, W.1
Liu, F.2
-
23
-
-
34548142607
-
Using associate constraint network with forward evaluation to overcome cross-lingual semantic interoperability challenge for crime information extraction
-
2006 IEEE International Conference on Systems, Man, and Cybernetics
-
C.C. Yang, C.P. Wei, K.W. Li, Using associate constraint network with forward evaluation to overcome cross-lingual semantic interoperability challenge for crime information extraction, in: 2006 IEEE International Conference on Systems, Man, and Cybernetics, 2006, pp. 1125-1130.
-
(2006)
, pp. 1125-1130
-
-
Yang, C.C.1
Wei, C.P.2
Li, K.W.3
-
24
-
-
34748814355
-
Terrorism and crime related weblog social network: link, content analysis and information visualization
-
2007 IEEE Intelligence and Security Informatics
-
C.C. Yang, T.D. Ng, Terrorism and crime related weblog social network: link, content analysis and information visualization, in: 2007 IEEE Intelligence and Security Informatics, 2007, pp. 55-58.
-
(2007)
, pp. 55-58
-
-
Yang, C.C.1
Ng, T.D.2
-
25
-
-
76549128510
-
An algorithm of shortest path based on Dijkstra for huge data
-
2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery
-
F.H. Zhang, J.P. Liu, An algorithm of shortest path based on Dijkstra for huge data, in: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 4, 2009, pp. 244-247.
-
(2009)
, vol.4
, pp. 244-247
-
-
Zhang, F.H.1
Liu, J.P.2
-
26
-
-
80053432656
-
Application of analytic hierarchy process for intellectual property rights in high-tech public corporation
-
2011 Seventh International Conference on Natural Computation
-
K. Zhang, Application of analytic hierarchy process for intellectual property rights in high-tech public corporation, in: 2011 Seventh International Conference on Natural Computation, 2011, pp. 1985-1988.
-
(2011)
, pp. 1985-1988
-
-
Zhang, K.1
-
27
-
-
84859596015
-
Design of networked control systems with bounded arbitrary time delays
-
Tang X.M., Ding B.C. Design of networked control systems with bounded arbitrary time delays. Int. J. Autom. Comput. 2012, 9:182-190.
-
(2012)
Int. J. Autom. Comput.
, vol.9
, pp. 182-190
-
-
Tang, X.M.1
Ding, B.C.2
-
29
-
-
0001886332
-
Using the analytic hierarchy process to structure the supplier selection procedure
-
Nydick R.L., Hill R.P. Using the analytic hierarchy process to structure the supplier selection procedure. Int. J. Purch. Mater. Manag. 1992, 33-38.
-
(1992)
Int. J. Purch. Mater. Manag.
, pp. 33-38
-
-
Nydick, R.L.1
Hill, R.P.2
-
30
-
-
84871788798
-
Network-induced constraints in networked control systems survey
-
Zhang L.X., Gao H.j., Kaynak O. Network-induced constraints in networked control systems survey. IEEE Trans. Ind. Informat. 2013, 9:403-416.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, pp. 403-416
-
-
Zhang, L.X.1
Gao, H.2
Kaynak, O.3
-
31
-
-
56649099174
-
∞ Model reduction for switched LPV systems with average dwell time
-
∞ Model reduction for switched LPV systems with average dwell time. IEEE Trans. Autom. Control 2008, 53:2443-2448.
-
(2008)
IEEE Trans. Autom. Control
, vol.53
, pp. 2443-2448
-
-
Zhang, L.X.1
Shi, P.2
|