This paper has surveyed the education evaluation method and technology both at home and abroad, and studied on the question of education evaluation information's mining. In view of the evaluation index system of h...
详细信息
It's very important to help developers design user interface for application in an intelligent user interface. Nowadays, the number of mobile based applications increases greatly, but there are no proper user mode...
详细信息
The Electromagnetism-like (EM) algorithmis a population-based stochastic global optimization algorithm that uses an attraction- repulsion mechanism to move particles toward optimality. A local search is an important f...
详细信息
The situation and questions of basic computer education in characteristics university are discussed firstly. Then the reform and construction of university computer-Based teaching are proposed. The paper has analyzed ...
详细信息
Entity extraction involves multi-factors, and the different factor has an impact on the answer in varying degrees, this paper presents a machine learning approach to parameter learning for entity answer. Firstly, in v...
详细信息
This paper presents an aerial image parsing approach. Firstly, scene categories of aerial image is extracted based on global feature-Spatial Envelope in the top-down step;secondly, the candidate proposals of object ca...
详细信息
This paper is dedicated to the study of Symbolic Execution and improves the core algorithm of it using Heuristic learning, search and Function Abstraction to effectively address the path explosion problem, which will ...
详细信息
This paper presents an entity answer extraction method based on list web table. Firstly, extract table from page using the features of web page table and label, segment the table that includes the potential entity ans...
详细信息
This paper presents two methods for self-adapting the semantic sensitivities in a recently proposed semantics-based crossover: Semantic Similarity based Crossover (SSC) [1]. The first self-adaptation method is inspire...
详细信息
Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK prot...
详细信息
暂无评论