Author of the publication

Tree Kernel-Based Semantic Relation Extraction Using Unified Dynamic Relation Tree.

, , , , and . ALPIT, page 64-69. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel ACO Approach Based on One Pheromone Matrix., , and . ANTS Workshop, volume 4150 of Lecture Notes in Computer Science, page 332-339. Springer, (2006)IPv6-Based Dynamic Quality of Service Control Strategy for Wireless Network., , , and . J. Networks, 5 (9): 1098-1105 (2010)A Practical Dynamic Frequency Scaling Solution to DPM in Embedded Linux Systems., , , , and . J. Comput., 4 (8): 787-793 (2009)Using Semantic Roles for Coreference Resolution., , , , and . ALPIT, page 150-155. IEEE Computer Society, (2008)AntSeg: An ant approach to disambiguation of chinese word segmentation., , , and . IRI, page 420-425. IEEE Systems, Man, and Cybernetics Society, (2006)The Pretreatment of Chinese Character Database Based on ISO10646., , , and . CIT, page 1134-1140. IEEE Computer Society, (2004)A Dynamic Frequency Scaling Solution to DPM in Embedded Linux Systems., , , , and . IRI, page 256-261. IEEE Systems, Man, and Cybernetics Society, (2009)Constructing a Large Scale Text Corpus Based on the Grid and Trustworthiness., , , and . TSD, volume 4629 of Lecture Notes in Computer Science, page 56-65. Springer, (2007)A Role-based PMI Authentication Model and its Application., , and . SNPD, page 407-412. IEEE Computer Society, (2006)Leakage-resilient identity-based encryption scheme., , , and . NCM, page 324-329. IEEE Computer Society, (2010)