Author of the publication

Chinese Textual Entailment recognition model based on lexical and semantic matching.

, and . NLPKE, page 92-99. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Information Processing, 17 (7): 172 (2018)Filtering design for discrete-time switched state-delay systems under asynchronous switching., and . ICCA, page 907-912. IEEE, (2011)Mobile Phones in Data Collection: A Systematic Review., and . IJCBPL, 3 (3): 67-87 (2013)Online Decision-Making in Receiving Spam Emails Among College Students., and . IJCBPL, 2 (1): 1-12 (2012)Dialog-Creator: A Semi-opened Learning Game for Pupils' Second Language Acquisition., and . CSSE (5), page 953-956. IEEE Computer Society, (2008)978-0-7695-3336-0.Enzymatic Synthesis of beta-D-2', 3'-unsaturated-5-fluorocytidine by Whole Cell of Lactobacillus helveticus., , , and . BMEI (2), page 813-817. IEEE Computer Society, (2008)978-0-7695-3118-2.Data Extraction from Deep Web Pages., , , and . CIS, page 237-241. IEEE Computer Society, (2007)Security Related Data Mining., and . CIT, page 775-782. IEEE Computer Society, (2014)A Research Model for Human-Computer Trust Interaction., , and . TrustCom, page 274-281. IEEE Computer Society, (2011)Unwanted Traffic Control via Global Trust Management., , and . TrustCom, page 647-654. IEEE Computer Society, (2011)