callback( { "result":{ "query":":facetid:toc:\"db/journals/jzusc/jzusc19.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.84" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"125", "@dc":"125", "@oc":"125", "@id":"43472622", "text":":facetid:toc:db/journals/jzusc/jzusc19.bht" } }, "hits":{ "@total":"125", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"2449489", "info":{"authors":{"author":[{"@pid":"24/1518-23","text":"Xin Chen 0023"},{"@pid":"99/4292-3","text":"Ding Wang 0003"},{"@pid":"206/2890","text":"Rui-rui Liu"},{"@pid":"162/4478","text":"Jie-xin Yin"},{"@pid":"64/5840-2","text":"Ying Wu 0002"}]},"title":"Structural total least squares algorithm for locating multiple disjoint sources based on AOA/TOA/FOA in the presence of system error.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"7","pages":"917-936","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/00230LY018","doi":"10.1631/FITEE.1700735","ee":"https://doi.org/10.1631/FITEE.1700735","url":"https://dblp.org/rec/journals/jzusc/00230LY018"}, "url":"URL#2449489" }, { "@score":"1", "@id":"2449490", "info":{"authors":{"author":[{"@pid":"166/6175","text":"Chaochao Bai"},{"@pid":"14/6202","text":"Weiqiang Wang"},{"@pid":"94/6503-4","text":"Tong Zhao 0004"},{"@pid":"149/7989","text":"Ruxin Wang"},{"@pid":"76/3954","text":"Mingqiang Li"}]},"title":"Deep learning compact binary codes for fingerprint indexing.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"9","pages":"1112-1123","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/BaiWZWL18","doi":"10.1631/FITEE.1700420","ee":"https://doi.org/10.1631/FITEE.1700420","url":"https://dblp.org/rec/journals/jzusc/BaiWZWL18"}, "url":"URL#2449490" }, { "@score":"1", "@id":"2449491", "info":{"authors":{"author":[{"@pid":"17/9580","text":"Zuoning Chen"},{"@pid":"d/JackDongarra","text":"Jack J. Dongarra"},{"@pid":"262/0620-2","text":"Zhiwei Xu 0002"}]},"title":"Post-exascale supercomputing: research opportunities abound.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"10","pages":"1203-1208","year":"2018","type":"Journal Articles","access":"open","key":"journals/jzusc/ChenDX18","doi":"10.1631/FITEE.1830000","ee":"https://doi.org/10.1631/FITEE.1830000","url":"https://dblp.org/rec/journals/jzusc/ChenDX18"}, "url":"URL#2449491" }, { "@score":"1", "@id":"2449492", "info":{"authors":{"author":[{"@pid":"35/1712","text":"Shanzhi Chen"},{"@pid":"17/6036","text":"Shaoli Kang"}]},"title":"A tutorial on 5G and the progress in China.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"3","pages":"309-321","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChenK18","doi":"10.1631/FITEE.1800070","ee":"https://doi.org/10.1631/FITEE.1800070","url":"https://dblp.org/rec/journals/jzusc/ChenK18"}, "url":"URL#2449492" }, { "@score":"1", "@id":"2449493", "info":{"authors":{"author":[{"@pid":"228/0951","text":"Hua-yan Chen"},{"@pid":"89/2278","text":"Meiqin Liu"},{"@pid":"72/1947","text":"Senlin Zhang"}]},"title":"Energy-efficient localization and target tracking via underwater mobile sensor networks.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"8","pages":"999-1012","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChenLZ18","doi":"10.1631/FITEE.1700598","ee":"https://doi.org/10.1631/FITEE.1700598","url":"https://dblp.org/rec/journals/jzusc/ChenLZ18"}, "url":"URL#2449493" }, { "@score":"1", "@id":"2449494", "info":{"authors":{"author":[{"@pid":"48/3161","text":"Chen-Wen Chen"},{"@pid":"138/3917","text":"Heng Nian"},{"@pid":"232/9319","text":"Long-qi Li"}]},"title":"Improved three-vector based dead-beat model predictive direct power control strategy for grid-connected inverters.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"11","pages":"1420-1431","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChenNL18","doi":"10.1631/FITEE.1601874","ee":"https://doi.org/10.1631/FITEE.1601874","url":"https://dblp.org/rec/journals/jzusc/ChenNL18"}, "url":"URL#2449494" }, { "@score":"1", "@id":"2449495", "info":{"authors":{"author":[{"@pid":"69/157","text":"Lu Chen"},{"@pid":"176/2716","text":"Dingzhu Wen"},{"@pid":"14/139","text":"Caijun Zhong"},{"@pid":"83/3855","text":"Guanding Yu"}]},"title":"Hybrid full-/half-duplex cellular networks: user admission and power control.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"3","pages":"379-387","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChenWZY18","doi":"10.1631/FITEE.1700027","ee":"https://doi.org/10.1631/FITEE.1700027","url":"https://dblp.org/rec/journals/jzusc/ChenWZY18"}, "url":"URL#2449495" }, { "@score":"1", "@id":"2449496", "info":{"authors":{"author":[{"@pid":"172/2689","text":"Genlang Chen"},{"@pid":"92/3141-1","text":"Zhiqian Xu 0001"},{"@pid":"15/5983-3","text":"Hai Jiang 0003"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"}]},"title":"Generic user revocation systems for attribute-based encryption in cloud storage.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"11","pages":"1362-1384","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChenXJL18","doi":"10.1631/FITEE.1800405","ee":"https://doi.org/10.1631/FITEE.1800405","url":"https://dblp.org/rec/journals/jzusc/ChenXJL18"}, "url":"URL#2449496" }, { "@score":"1", "@id":"2449497", "info":{"authors":{"author":[{"@pid":"142/2297","text":"Deng Chen"},{"@pid":"89/8077","text":"Yanduo Zhang"},{"@pid":"24/4105","text":"Wei Wei"},{"@pid":"136/7321","text":"Rongcun Wang"},{"@pid":"56/10261","text":"Xiaolin Li"},{"@pid":"49/3283-60","text":"Wei Liu 0060"},{"@pid":"142/2338","text":"Shixun Wang"},{"@pid":"72/1974","text":"Rui Zhu"}]},"title":"An oversampling approach for mining program specifications.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"6","pages":"737-754","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChenZWWLLWZ18","doi":"10.1631/FITEE.1601783","ee":"https://doi.org/10.1631/FITEE.1601783","url":"https://dblp.org/rec/journals/jzusc/ChenZWWLLWZ18"}, "url":"URL#2449497" }, { "@score":"1", "@id":"2449498", "info":{"authors":{"author":[{"@pid":"14/6145-1","text":"Jian Cheng 0001"},{"@pid":"187/5474","text":"Peisong Wang"},{"@pid":"62/2655-15","text":"Gang Li 0015"},{"@pid":"169/3407","text":"Qinghao Hu"},{"@pid":"39/6752","text":"Hanqing Lu"}]},"title":"Recent advances in efficient computation of deep convolutional neural networks.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"1","pages":"64-77","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/ChengWLHL18","doi":"10.1631/FITEE.1700789","ee":"https://doi.org/10.1631/FITEE.1700789","url":"https://dblp.org/rec/journals/jzusc/ChengWLHL18"}, "url":"URL#2449498" }, { "@score":"1", "@id":"2449499", "info":{"authors":{"author":[{"@pid":"195/1281","text":"T. T. Dhivyaprabha"},{"@pid":"124/3829","text":"P. Subashini 0001"},{"@pid":"65/7588","text":"M. Krishnaveni"}]},"title":"Synergistic fibroblast optimization: a novel nature-inspired computing algorithm.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"7","pages":"815-833","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/DhivyaprabhaSK18","doi":"10.1631/FITEE.1601553","ee":"https://doi.org/10.1631/FITEE.1601553","url":"https://dblp.org/rec/journals/jzusc/DhivyaprabhaSK18"}, "url":"URL#2449499" }, { "@score":"1", "@id":"2449500", "info":{"authors":{"author":[{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"20/5353","text":"Mai Xu"},{"@pid":"88/2827-10","text":"Yan Chen 0010"},{"@pid":"75/6927","text":"Mugen Peng"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Embracing non-orthogonalmultiple access in future wireless networks.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"3","pages":"322-339","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/DingXCPP18","doi":"10.1631/FITEE.1800051","ee":"https://doi.org/10.1631/FITEE.1800051","url":"https://dblp.org/rec/journals/jzusc/DingXCPP18"}, "url":"URL#2449500" }, { "@score":"1", "@id":"2449501", "info":{"authors":{"author":[{"@pid":"216/5275","text":"Tianyun Dong"},{"@pid":"74/1890-2","text":"Xiangliang Zhang 0002"},{"@pid":"43/656-6","text":"Tao Liu 0006"}]},"title":"Artificial muscles for wearable assistance and rehabilitation.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"11","pages":"1303-1315","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/DongZL18","doi":"10.1631/FITEE.1800618","ee":"https://doi.org/10.1631/FITEE.1800618","url":"https://dblp.org/rec/journals/jzusc/DongZL18"}, "url":"URL#2449501" }, { "@score":"1", "@id":"2449502", "info":{"authors":{"author":[{"@pid":"31/5936","text":"Xinyu Duan"},{"@pid":"44/5693","text":"Siliang Tang"},{"@pid":"47/3459-1","text":"Shengyu Zhang 0001"},{"@pid":"91/3045-6","text":"Yin Zhang 0006"},{"@pid":"75/7785","text":"Zhou Zhao"},{"@pid":"16/6902","text":"Jianru Xue"},{"@pid":"218/7793","text":"Yueting Zhuang"},{"@pid":"84/3254-1","text":"Fei Wu 0001"}]},"title":"Temporality-enhanced knowledgememory network for factoid question answering.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"1","pages":"104-115","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/DuanTZZZXZW18","doi":"10.1631/FITEE.1700788","ee":"https://doi.org/10.1631/FITEE.1700788","url":"https://dblp.org/rec/journals/jzusc/DuanTZZZXZW18"}, "url":"URL#2449502" }, { "@score":"1", "@id":"2449503", "info":{"authors":{"author":[{"@pid":"74/2770-4","text":"Chao Fang 0004"},{"@pid":"50/2192","text":"Yang Xiang"},{"@pid":"224/2080","text":"Ke-qi Qi"}]},"title":"A general method of designing phase-shifting algorithms for grating lateral shearing interferometry.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"6","pages":"809-814","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/FangXQ18","doi":"10.1631/FITEE.1601692","ee":"https://doi.org/10.1631/FITEE.1601692","url":"https://dblp.org/rec/journals/jzusc/FangXQ18"}, "url":"URL#2449503" }, { "@score":"1", "@id":"2449504", "info":{"authors":{"author":[{"@pid":"189/2539","text":"Ahmad Firdaus"},{"@pid":"94/4385","text":"Nor Badrul Anuar"},{"@pid":"154/0713","text":"Ahmad Karim"},{"@pid":"189/2612","text":"Mohd Faizal Ab Razak"}]},"title":"Discovering optimal features using static analysis and a genetic search based method for Android malware detection.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"6","pages":"712-736","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/FirdausAKR18","doi":"10.1631/FITEE.1601491","ee":"https://doi.org/10.1631/FITEE.1601491","url":"https://dblp.org/rec/journals/jzusc/FirdausAKR18"}, "url":"URL#2449504" }, { "@score":"1", "@id":"2449505", "info":{"authors":{"author":[{"@pid":"230/2105","text":"Meng-zhou Gao 0001"},{"@pid":"357/4550","text":"Dongin Feng"}]},"title":"Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"9","pages":"1098-1111","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/GaoF18","doi":"10.1631/FITEE.1700334","ee":"https://doi.org/10.1631/FITEE.1700334","url":"https://dblp.org/rec/journals/jzusc/GaoF18"}, "url":"URL#2449505" }, { "@score":"1", "@id":"2449506", "info":{"authors":{"author":[{"@pid":"89/10002","text":"Fanglin Gu"},{"@pid":"55/1254-5","text":"Shan Wang 0005"},{"@pid":"61/5537-1","text":"Wenwu Wang 0001"}]},"title":"Standard-independent I/Q imbalance estimation and compensation scheme inOFDM.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"3","pages":"388-397","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/GuWW18","doi":"10.1631/FITEE.1700003","ee":"https://doi.org/10.1631/FITEE.1700003","url":"https://dblp.org/rec/journals/jzusc/GuWW18"}, "url":"URL#2449506" }, { "@score":"1", "@id":"2449507", "info":{"authors":{"author":[{"@pid":"18/374","text":"Ke Guo"},{"@pid":"91/4408","text":"Xiabi Liu"},{"@pid":"152/8055","text":"Lunhao Guo"},{"@pid":"23/11193","text":"Zongjie Li"},{"@pid":"60/7729","text":"Zengmin Geng"}]},"title":"A new constrained maximum margin approach to discriminative learning of Bayesian classifiers.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"5","pages":"639-650","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/GuoLGLG18","doi":"10.1631/FITEE.1700007","ee":"https://doi.org/10.1631/FITEE.1700007","url":"https://dblp.org/rec/journals/jzusc/GuoLGLG18"}, "url":"URL#2449507" }, { "@score":"1", "@id":"2449508", "info":{"authors":{"author":[{"@pid":"181/4866","text":"Wenbing Han"},{"@pid":"64/3168","text":"Xiaogang Chen"},{"@pid":"160/0859","text":"Shunfen Li"},{"@pid":"160/0849","text":"Gezi Li"},{"@pid":"89/5152","text":"Zhitang Song"},{"@pid":"63/5667","text":"Dagang Li"},{"@pid":"227/7255","text":"Shiyan Chen"}]},"title":"A novel non-volatile memory storage system for I/O-intensive applications.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"10","pages":"1291-1302","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HanCLLSLC18","doi":"10.1631/FITEE.1700061","ee":"https://doi.org/10.1631/FITEE.1700061","url":"https://dblp.org/rec/journals/jzusc/HanCLLSLC18"}, "url":"URL#2449508" }, { "@score":"1", "@id":"2449509", "info":{"authors":{"author":{"@pid":"77/8744","text":"Chun-hua He"}},"title":"Tabu search based resource allocation in radiological examination process execution.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"3","pages":"446-458","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/He18","doi":"10.1631/FITEE.1601802","ee":"https://doi.org/10.1631/FITEE.1601802","url":"https://dblp.org/rec/journals/jzusc/He18"}, "url":"URL#2449509" }, { "@score":"1", "@id":"2449510", "info":{"authors":{"author":[{"@pid":"52/173-12","text":"Wei Hu 0012"},{"@pid":"04/1868","text":"Guangming Liu"},{"@pid":"97/7250","text":"Yanhuang Jiang"}]},"title":"FTRP: a new fault tolerance framework using process replication and prefetching for high-performance computing.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"10","pages":"1273-1290","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HuLJ18","doi":"10.1631/FITEE.1601450","ee":"https://doi.org/10.1631/FITEE.1601450","url":"https://dblp.org/rec/journals/jzusc/HuLJ18"}, "url":"URL#2449510" }, { "@score":"1", "@id":"2449511", "info":{"authors":{"author":[{"@pid":"146/0871","text":"Keyong Hu"},{"@pid":"119/3409","text":"Wen-juan Li"},{"@pid":"69/3907","text":"Li-dong Wang"},{"@pid":"142/5248","text":"Shihua Cao"},{"@pid":"59/4593","text":"Fangming Zhu"},{"@pid":"66/7566","text":"Zhou-xiang Shou"}]},"title":"Energy management for multi-microgrid system based on model predictive control.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"11","pages":"1340-1351","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HuLWCZS18","doi":"10.1631/FITEE.1601826","ee":"https://doi.org/10.1631/FITEE.1601826","url":"https://dblp.org/rec/journals/jzusc/HuLWCZS18"}, "url":"URL#2449511" }, { "@score":"1", "@id":"2449512", "info":{"authors":{"author":[{"@pid":"h/XiaoboSharonHu","text":"Xiaobo Sharon Hu"},{"@pid":"62/3778","text":"Michael T. Niemier"}]},"title":"Cross-layer efforts for energy-efficient computing: towards peta operations per second per watt.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"10","pages":"1209-1223","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HuN18","doi":"10.1631/FITEE.1800466","ee":"https://doi.org/10.1631/FITEE.1800466","url":"https://dblp.org/rec/journals/jzusc/HuN18"}, "url":"URL#2449512" }, { "@score":"1", "@id":"2449513", "info":{"authors":{"author":[{"@pid":"230/2317","text":"Jing-lin Hu"},{"@pid":"196/0104","text":"Xiu-xia Sun"},{"@pid":"75/5673","text":"Lei He"},{"@pid":"230/1954","text":"Ri Liu"},{"@pid":"213/4389","text":"Xiong-feng Deng"}]},"title":"Adaptive output feedback formation tracking for a class of multiagent systems with quantized input signals.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"9","pages":"1086-1097","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HuSHLD18","doi":"10.1631/FITEE.1601801","ee":"https://doi.org/10.1631/FITEE.1601801","url":"https://dblp.org/rec/journals/jzusc/HuSHLD18"}, "url":"URL#2449513" }, { "@score":"1", "@id":"2449514", "info":{"authors":{"author":[{"@pid":"150/5119","text":"Fangting Huang"},{"@pid":"48/5939-1","text":"Dan Feng 0001"},{"@pid":"119/2655","text":"Wen Xia"},{"@pid":"87/6026","text":"Wen Zhou"},{"@pid":"87/5445","text":"Yucheng Zhang"},{"@pid":"43/8387-2","text":"Min Fu 0002"},{"@pid":"83/7802","text":"Chuntao Jiang"},{"@pid":"152/1510","text":"Yukun Zhou"}]},"title":"Enhancing security of NVM-based main memory with dynamic Feistel network mapping.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"7","pages":"847-863","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/Huang0XZZ0JZ18","doi":"10.1631/FITEE.1601652","ee":"https://doi.org/10.1631/FITEE.1601652","url":"https://dblp.org/rec/journals/jzusc/Huang0XZZ0JZ18"}, "url":"URL#2449514" }, { "@score":"1", "@id":"2449515", "info":{"authors":{"author":[{"@pid":"91/8039","text":"Yixiang Huang"},{"@pid":"82/1364","text":"Xiao Liu"},{"@pid":"30/5444-1","text":"Chengliang Liu 0001"},{"@pid":"10/2519","text":"Yanming Li"}]},"title":"Intrinsic feature extraction using discriminant diffusion mapping analysis for automated tool wear evaluation.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"11","pages":"1352-1361","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HuangLLL18","doi":"10.1631/FITEE.1601512","ee":"https://doi.org/10.1631/FITEE.1601512","url":"https://dblp.org/rec/journals/jzusc/HuangLLL18"}, "url":"URL#2449515" }, { "@score":"1", "@id":"2449516", "info":{"authors":{"author":[{"@pid":"44/2551","text":"Jianguo Huang"},{"@pid":"67/1771-10","text":"Han Wang 0010"},{"@pid":"23/9934","text":"ChengBing He"},{"@pid":"38/9934","text":"QunFei Zhang"},{"@pid":"199/5925","text":"Lianyou Jing"}]},"title":"Underwater acoustic communication and the general performance evaluation criteria.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"8","pages":"951-971","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/HuangWHZJ18","doi":"10.1631/FITEE.1700775","ee":"https://doi.org/10.1631/FITEE.1700775","url":"https://dblp.org/rec/journals/jzusc/HuangWHZJ18"}, "url":"URL#2449516" }, { "@score":"1", "@id":"2449517", "info":{"authors":{"author":[{"@pid":"55/11346","text":"Rabia Irfan"},{"@pid":"k/SharifullahKhan","text":"Sharifullah Khan"},{"@pid":"13/1952","text":"Kashif Rajpoot"},{"@pid":"20/6697","text":"Ali Mustafa Qamar"}]},"title":"TIE algorithm: a layer over clustering-based taxonomy generation for handling evolving data.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"6","pages":"763-782","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/IrfanKRQ18","doi":"10.1631/FITEE.1700517","ee":"https://doi.org/10.1631/FITEE.1700517","url":"https://dblp.org/rec/journals/jzusc/IrfanKRQ18"}, "url":"URL#2449517" }, { "@score":"1", "@id":"2449518", "info":{"authors":{"author":[{"@pid":"141/0898","text":"Xibin Jia"},{"@pid":"85/618","text":"Ya Jin"},{"@pid":"14/5410","text":"Ning Li"},{"@pid":"76/8056-1","text":"Xing Su 0001"},{"@pid":"182/7346","text":"Barry Cardiff"},{"@pid":"b/BirBhanu","text":"Bir Bhanu"}]},"title":"Words alignment based on association rules for cross-domain sentiment classification.","venue":"Frontiers Inf. Technol. Electron. Eng.","volume":"19","number":"2","pages":"260-272","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jzusc/JiaJLSCB18","doi":"10.1631/FITEE.1601679","ee":"https://doi.org/10.1631/FITEE.1601679","url":"https://dblp.org/rec/journals/jzusc/JiaJLSCB18"}, "url":"URL#2449518" } ] } } } )