We use cookies to improve your experience with our site.

Preface
Zhi-Hua Zhou, Hang Li
2010, 25(4): 651-652. DOI: 10.1007/s11390-010-1050-2
Abstract
Dirichlet Process Gaussian Mixture Models: Choice of the Base Distribution
Dilan Gõrür, Carl Edward Rasmussen
2010, 25(4): 653-664. DOI: 10.1007/s11390-010-1051-1
Abstract
Model Failure and Context Switching Using Logic-Based Stochastic Models
Nikita A. Sakhanenko, George F. Luger
2010, 25(4): 665-680. DOI: 10.1007/s11390-010-1052-0
Abstract
Combining Committee-Based Semi-Supervised Learning and Active Learning
Mohamed Farouk Abdel Hady, Friedhelm Schwenker
2010, 25(4): 681-698. DOI: 10.1007/s11390-010-1053-z
Abstract
Ordinal-Class Core Vector Machine
Bin Gu, Jian-Dong Wang, Tao Li
2010, 25(4): 699-708. DOI: 10.1007/s11390-010-1054-y
Abstract
Learning with Uncertain Kernel Matrix Set
Lei Jia, Shi-Zhong Liao, Li-Zhong Ding
2010, 25(4): 709-727. DOI: 10.1007/s11390-010-1055-x
Abstract
Learning Query Ambiguity Models by Using Search Logs
Ruihua Song, Zhicheng Dou, Hsiao-Wuen Hon, Yong Yu
2010, 25(4): 728-738. DOI: 10.1007/s11390-010-1056-9
Abstract
A New Approach for Multi-Document Update Summarization
Chong Long, Min-Lie Huang, Xiao-Yan Zhu, Ming Li
2010, 25(4): 739-749. DOI: 10.1007/s11390-010-1057-8
Abstract
Multiple Hypergraph Clustering ofWeb Images by MiningWord2Image Correlations
Fei Wu, Ya-Hong Han, Yue-Ting Zhuang
2010, 25(4): 750-760. DOI: 10.1007/s11390-010-1058-7
Abstract
2D Correlative-Chain Conditional Random Fields for Semantic Annotation of Web Objects
Yan-Hui Ding, Qing-Zhong Li, Yong-Quan Dong, Zhao-Hui Peng
2010, 25(4): 761-770. DOI: 10.1007/s11390-010-1059-6
Abstract
Multimodal Biometric Score Fusion Using Gaussian Mixture Model and Monte Carlo Method
R Raghavendra, Rao Ashok, G Hemantha Kumar
2010, 25(4): 771-782. DOI: 10.1007/s11390-010-1060-0
Abstract
Robust Feature Extraction for Speaker Recognition Based on Constrained Nonnegative Tensor Factorization
Qiang Wu, Li-Qing Zhang, Guang-Chuan Shi
2010, 25(4): 783-792. DOI: 10.1007/s11390-010-1061-z
Abstract
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
Jun-Zuo Lai, Wen-Tao Zhu, Robert H. Deng, Sheng-Li Liu, Wei-Dong Kou
2010, 25(4): 793-806. DOI: 10.1007/s11390-010-1062-y
Abstract
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
Qiong Huang, Duncan S. Wong
2010, 25(4): 807-826. DOI: 10.1007/s11390-010-1063-x
Abstract
Certification of Thread Context Switching
Yu Guo, Xin-Yu Jiang, Yi-Yun Chen
2010, 25(4): 827-840. DOI: 10.1007/s11390-010-1064-9
Abstract
Formal Reasoning About Lazy-STM Programs
Yong Li, Yu Zhang, Yi-Yun Chen, Ming Fu
2010, 25(4): 841-852. DOI: 10.1007/s11390-010-1065-8
Abstract
Sorting Unsigned Permutations by Weighted Reversals, Transpositions, and Transreversals
Xiao-Wen Lou, Da-Ming Zhu
2010, 25(4): 853-863. DOI: 10.1007/s11390-010-1066-7
Abstract
Queue Waiting Time Aware Dynamic Workflow Scheduling in Multicluster Environments
Zhi-Feng Yu, Wei-Song Shi
2010, 25(4): 864-873. DOI: 10.1007/s11390-010-1067-6
Abstract
A Unified Co-Processor Architecture for Matrix Decomposition
Yong Dou, Jie Zhou, Gui-Ming Wu, Jing-Fei Jiang, Yuan-Wu Lei, Shi-Ce Ni
2010, 25(4): 874-885. DOI: 10.1007/s11390-010-1068-5
Abstract
Landing Stencil Code on Godson-T
Hui-Min Cui, Lei Wang, Dong-Rui Fan, Xiao-Bing Feng
2010, 25(4): 886-894. DOI: 10.1007/s11390-010-1069-4
Abstract