1 |
Combating QR-Code-Based Compromised Accounts in Mobile Social Networks
|
|
|
|
BASE
|
|
Show details
|
|
5 |
Employing Morphological Structures and Sememes for Chinese Event Extraction
|
|
|
|
In: http://aclweb.org/anthology/C/C12/C12-1099.pdf
|
|
BASE
|
|
Show details
|
|
6 |
A Grey-Based Approach to Suppliers Selection Problem
|
|
|
|
In: http://iec.cugb.edu.cn/WorldComp2006/PDP8241.pdf
|
|
BASE
|
|
Show details
|
|
7 |
A Unified Framework for Discourse Argument Identification via Shallow Semantic Parsing
|
|
|
|
In: http://aclweb.org/anthology/C/C12/C12-2130.pdf
|
|
BASE
|
|
Show details
|
|
|
|