callback( { "result":{ "query":":facetid:toc:\"db/conf/besc/besc2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"224.05" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"35", "@dc":"35", "@oc":"35", "@id":"43368603", "text":":facetid:toc:db/conf/besc/besc2016.bht" } }, "hits":{ "@total":"35", "@computed":"35", "@sent":"35", "@first":"0", "hit":[{ "@score":"1", "@id":"3210287", "info":{"authors":{"author":[{"@pid":"124/2102","text":"Sherif Elmeligy Abdelhamid"},{"@pid":"09/7561","text":"Chris J. Kuhlman"},{"@pid":"52/991","text":"Madhav V. Marathe"},{"@pid":"94/2464","text":"S. S. Ravi"}]},"title":"Interactive exploration and understanding of contagion dynamics in networked populations.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/AbdelhamidKMR16","doi":"10.1109/BESC.2016.7804480","ee":"https://doi.org/10.1109/BESC.2016.7804480","url":"https://dblp.org/rec/conf/besc/AbdelhamidKMR16"}, "url":"URL#3210287" }, { "@score":"1", "@id":"3210288", "info":{"authors":{"author":[{"@pid":"160/1686","text":"Somayyeh Aghababaei"},{"@pid":"74/11211","text":"Eren Gultepe"},{"@pid":"160/1632","text":"Iuliia Chepurna"},{"@pid":"10/5941","text":"Masoud Makrehchi"}]},"title":"Activity-based sampling of Twitter users for temporal prediction models.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/AghababaeiGCM16","doi":"10.1109/BESC.2016.7804474","ee":"https://doi.org/10.1109/BESC.2016.7804474","url":"https://dblp.org/rec/conf/besc/AghababaeiGCM16"}, "url":"URL#3210288" }, { "@score":"1", "@id":"3210289", "info":{"authors":{"author":[{"@pid":"160/1686","text":"Somayyeh Aghababaei"},{"@pid":"10/5941","text":"Masoud Makrehchi"}]},"title":"Interpolative self-training approach for sentiment analysis.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/AghababaeiM16","doi":"10.1109/BESC.2016.7804475","ee":"https://doi.org/10.1109/BESC.2016.7804475","url":"https://dblp.org/rec/conf/besc/AghababaeiM16"}, "url":"URL#3210289" }, { "@score":"1", "@id":"3210290", "info":{"authors":{"author":[{"@pid":"01/10088","text":"Mohd Anwar"},{"@pid":"35/3682","text":"Wu He"},{"@pid":"32/3209","text":"Xiaohong Yuan"}]},"title":"Employment status and cybersecurity behaviors.","venue":"BESC","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/AnwarHY16","doi":"10.1109/BESC.2016.7804493","ee":"https://doi.org/10.1109/BESC.2016.7804493","url":"https://dblp.org/rec/conf/besc/AnwarHY16"}, "url":"URL#3210290" }, { "@score":"1", "@id":"3210291", "info":{"authors":{"author":[{"@pid":"54/7230","text":"Peng Bian"},{"@pid":"38/4674-1","text":"Yi Jin 0001"},{"@pid":"192/9900","text":"Luyue Jiang"},{"@pid":"40/7652","text":"Yidong Li"}]},"title":"Coupled feature spaces learning with joint graph regularization for person re-identification.","venue":"BESC","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/BianJJL16","doi":"10.1109/BESC.2016.7804501","ee":"https://doi.org/10.1109/BESC.2016.7804501","url":"https://dblp.org/rec/conf/besc/BianJJL16"}, "url":"URL#3210291" }, { "@score":"1", "@id":"3210292", "info":{"authors":{"author":[{"@pid":"175/3324","text":"Hao Chen"},{"@pid":"164/4359","text":"Ying-hong Dong"},{"@pid":"175/8626","text":"Kaisheng Lai"}]},"title":"Revisit hemline index theory: Forecasting daily trading of short skirts by stock market in China.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ChenDL16","doi":"10.1109/BESC.2016.7804479","ee":"https://doi.org/10.1109/BESC.2016.7804479","url":"https://dblp.org/rec/conf/besc/ChenDL16"}, "url":"URL#3210292" }, { "@score":"1", "@id":"3210293", "info":{"authors":{"author":[{"@pid":"10/217","text":"Cheng Chen"},{"@pid":"36/2382","text":"Genlin Ji"},{"@pid":"73/4325-2","text":"Bin Zhao 0002"}]},"title":"Learning text to model: A Bayesian network based L-system modeling strategy.","venue":"BESC","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ChenJZ16","doi":"10.1109/BESC.2016.7804496","ee":"https://doi.org/10.1109/BESC.2016.7804496","url":"https://dblp.org/rec/conf/besc/ChenJZ16"}, "url":"URL#3210293" }, { "@score":"1", "@id":"3210294", "info":{"authors":{"author":[{"@pid":"179/9005","text":"Nai Yue Chen"},{"@pid":"50/2482-1","text":"Yun Liu 0001"},{"@pid":"148/9038","text":"Junjun Cheng"},{"@pid":"53/4481","text":"Qing Liu"}]},"title":"Parallelizing label propagation for overlapping community detection.","venue":"BESC","pages":"1-7","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ChenLCL16","doi":"10.1109/BESC.2016.7804476","ee":"https://doi.org/10.1109/BESC.2016.7804476","url":"https://dblp.org/rec/conf/besc/ChenLCL16"}, "url":"URL#3210294" }, { "@score":"1", "@id":"3210295", "info":{"authors":{"author":[{"@pid":"166/2714","text":"Anand Chinchore"},{"@pid":"59/2340","text":"Guandong Xu"},{"@pid":"38/7597","text":"Frank Jiang 0001"}]},"title":"Classifying sybil in MSNs using C4.5.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ChinchoreXJ16","doi":"10.1109/BESC.2016.7804499","ee":"https://doi.org/10.1109/BESC.2016.7804499","url":"https://dblp.org/rec/conf/besc/ChinchoreXJ16"}, "url":"URL#3210295" }, { "@score":"1", "@id":"3210296", "info":{"authors":{"author":[{"@pid":"192/9890","text":"Charles Chu"},{"@pid":"59/2340","text":"Guandong Xu"},{"@pid":"192/9899","text":"James Brownlow"},{"@pid":"61/3229","text":"Bin Fu"}]},"title":"Deployment of churn prediction model in financial services industry.","venue":"BESC","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ChuXBF16","doi":"10.1109/BESC.2016.7804486","ee":"https://doi.org/10.1109/BESC.2016.7804486","url":"https://dblp.org/rec/conf/besc/ChuXBF16"}, "url":"URL#3210296" }, { "@score":"1", "@id":"3210297", "info":{"authors":{"author":{"@pid":"78/3145","text":"Germán Gonzalo Creamer"}},"title":"Trading network and systemic risk in the energy market.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/Creamer16","doi":"10.1109/BESC.2016.7804485","ee":"https://doi.org/10.1109/BESC.2016.7804485","url":"https://dblp.org/rec/conf/besc/Creamer16"}, "url":"URL#3210297" }, { "@score":"1", "@id":"3210298", "info":{"authors":{"author":[{"@pid":"192/9891","text":"Shugeng Ding"},{"@pid":"40/7652","text":"Yidong Li"},{"@pid":"40/4731","text":"Jianhui Zhang"},{"@pid":"01/5394","text":"Liang Chen"},{"@pid":"78/6727","text":"Zhen Wang"},{"@pid":"151/4828","text":"Qunqun Xu"}]},"title":"An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/DingLZCWX16","doi":"10.1109/BESC.2016.7804500","ee":"https://doi.org/10.1109/BESC.2016.7804500","url":"https://dblp.org/rec/conf/besc/DingLZCWX16"}, "url":"URL#3210298" }, { "@score":"1", "@id":"3210299", "info":{"authors":{"author":[{"@pid":"g/JianboGao","text":"Jianbo Gao"},{"@pid":"98/10756","text":"Matthew L. Jockers"},{"@pid":"192/9893","text":"John Laudun"},{"@pid":"116/5208","text":"Timothy R. Tangherlini"}]},"title":"A multiscale theory for the dynamical evolution of sentiment in novels.","venue":"BESC","pages":"1-4","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/GaoJLT16","doi":"10.1109/BESC.2016.7804470","ee":"https://doi.org/10.1109/BESC.2016.7804470","url":"https://dblp.org/rec/conf/besc/GaoJLT16"}, "url":"URL#3210299" }, { "@score":"1", "@id":"3210300", "info":{"authors":{"author":[{"@pid":"22/6142","text":"Koraljka Golub"},{"@pid":"67/6034","text":"Marcelo Milrad"}]},"title":"Digital humanities as a cross-sector and cross-discipline initiative: Prospects in the Linnaeus University region.","venue":"BESC","pages":"1-3","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/GolubM16","doi":"10.1109/BESC.2016.7804497","ee":"https://doi.org/10.1109/BESC.2016.7804497","url":"https://dblp.org/rec/conf/besc/GolubM16"}, "url":"URL#3210300" }, { "@score":"1", "@id":"3210301", "info":{"authors":{"author":[{"@pid":"82/1157","text":"Min Gu"},{"@pid":"71/2791","text":"Feng Zhu"},{"@pid":"25/3038","text":"Qing Guo"},{"@pid":"24/9923","text":"Yanhui Gu"},{"@pid":"14/4912","text":"Junsheng Zhou"},{"@pid":"04/5857","text":"Weiguang Qu"}]},"title":"Towards effective web page classification.","venue":"BESC","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/GuZGGZQ16","doi":"10.1109/BESC.2016.7804494","ee":"https://doi.org/10.1109/BESC.2016.7804494","url":"https://dblp.org/rec/conf/besc/GuZGGZQ16"}, "url":"URL#3210301" }, { "@score":"1", "@id":"3210302", "info":{"authors":{"author":[{"@pid":"192/9895","text":"Yaxin Hou"},{"@pid":"42/10808","text":"Cong Ma"},{"@pid":"40/7652","text":"Yidong Li"}]},"title":"Research on fire risk factors of cotton in railway transportation.","venue":"BESC","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/HouML16","doi":"10.1109/BESC.2016.7804490","ee":"https://doi.org/10.1109/BESC.2016.7804490","url":"https://dblp.org/rec/conf/besc/HouML16"}, "url":"URL#3210302" }, { "@score":"1", "@id":"3210303", "info":{"authors":{"author":[{"@pid":"192/9889","text":"Aihua Jiang"},{"@pid":"g/JianboGao","text":"Jianbo Gao"}]},"title":"Fractal analysis of complex power load variations through adaptive multiscale filtering.","venue":"BESC","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/JiangG16","doi":"10.1109/BESC.2016.7804502","ee":"https://doi.org/10.1109/BESC.2016.7804502","url":"https://dblp.org/rec/conf/besc/JiangG16"}, "url":"URL#3210303" }, { "@score":"1", "@id":"3210304", "info":{"authors":{"author":[{"@pid":"38/7597","text":"Frank Jiang 0001"},{"@pid":"192/9897","text":"Jin Gan"},{"@pid":"87/6559","text":"Yuanyuan Xu"},{"@pid":"59/2340","text":"Guandong Xu"}]},"title":"Coupled behavioral analysis for user preference-based email spamming.","venue":"BESC","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/JiangGXX16","doi":"10.1109/BESC.2016.7804482","ee":"https://doi.org/10.1109/BESC.2016.7804482","url":"https://dblp.org/rec/conf/besc/JiangGXX16"}, "url":"URL#3210304" }, { "@score":"1", "@id":"3210305", "info":{"authors":{"author":[{"@pid":"142/2598","text":"Gizem Korkmaz"},{"@pid":"09/7561","text":"Chris J. Kuhlman"},{"@pid":"21/1147","text":"Fernando Vega-Redondo"}]},"title":"Can social contagion spread without key players?","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/KorkmazKV16","doi":"10.1109/BESC.2016.7804473","ee":"https://doi.org/10.1109/BESC.2016.7804473","url":"https://dblp.org/rec/conf/besc/KorkmazKV16"}, "url":"URL#3210305" }, { "@score":"1", "@id":"3210306", "info":{"authors":{"author":[{"@pid":"69/5902-16","text":"Qian Li 0016"},{"@pid":"43/5146","text":"Zhenglu Yang"},{"@pid":"54/6265","text":"Wei Cao"},{"@pid":"95/671","text":"Kentaro Shimizu"}]},"title":"An effective system for managing biological data.","venue":"BESC","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/LiYCS16","doi":"10.1109/BESC.2016.7804492","ee":"https://doi.org/10.1109/BESC.2016.7804492","url":"https://dblp.org/rec/conf/besc/LiYCS16"}, "url":"URL#3210306" }, { "@score":"1", "@id":"3210307", "info":{"authors":{"author":[{"@pid":"97/2274","text":"Yu Liu"},{"@pid":"98/4432-1","text":"Bin Wu 0001"},{"@pid":"173/9377","text":"Yunlei Zhang"},{"@pid":"03/587-1","text":"Bai Wang 0001"}]},"title":"Overlapping community detection via self-constrained symmetric non-negative matrix factorization.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/LiuWZW16","doi":"10.1109/BESC.2016.7804477","ee":"https://doi.org/10.1109/BESC.2016.7804477","url":"https://dblp.org/rec/conf/besc/LiuWZW16"}, "url":"URL#3210307" }, { "@score":"1", "@id":"3210308", "info":{"authors":{"author":[{"@pid":"53/1020","text":"Zhicheng Liu"},{"@pid":"192/9892","text":"Jinbin Yu"},{"@pid":"192/9894","text":"Weiting Xiong"},{"@pid":"225/6330","text":"Jian Lu"},{"@pid":"52/6890","text":"Junyan Yang"},{"@pid":"25/1593","text":"Qiao Wang"}]},"title":"Using mobile phone data to explore spatial-temporal evolution of home-based daily mobility patterns in Shanghai.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/LiuYXLYW16","doi":"10.1109/BESC.2016.7804481","ee":"https://doi.org/10.1109/BESC.2016.7804481","url":"https://dblp.org/rec/conf/besc/LiuYXLYW16"}, "url":"URL#3210308" }, { "@score":"1", "@id":"3210309", "info":{"authors":{"author":{"@pid":"65/10698","text":"Weilan Luo"}},"title":"Human motion retargeting with trajectory constraints.","venue":"BESC","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/Luo16","doi":"10.1109/BESC.2016.7804483","ee":"https://doi.org/10.1109/BESC.2016.7804483","url":"https://dblp.org/rec/conf/besc/Luo16"}, "url":"URL#3210309" }, { "@score":"1", "@id":"3210310", "info":{"authors":{"author":[{"@pid":"192/9896","text":"Raul Manongdo"},{"@pid":"59/2340","text":"Guandong Xu"}]},"title":"Applying client churn prediction modeling on home-based care services industry.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ManongdoX16","doi":"10.1109/BESC.2016.7804503","ee":"https://doi.org/10.1109/BESC.2016.7804503","url":"https://dblp.org/rec/conf/besc/ManongdoX16"}, "url":"URL#3210310" }, { "@score":"1", "@id":"3210311", "info":{"authors":{"author":[{"@pid":"143/2828","text":"Aastha Nigam"},{"@pid":"48/11052","text":"Salvador Aguiñaga"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Connecting the dots to infer followers' topical interest on Twitter.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/NigamAC16","doi":"10.1109/BESC.2016.7804498","ee":"https://doi.org/10.1109/BESC.2016.7804498","url":"https://dblp.org/rec/conf/besc/NigamAC16"}, "url":"URL#3210311" }, { "@score":"1", "@id":"3210312", "info":{"authors":{"author":[{"@pid":"04/5857","text":"Weiguang Qu"},{"@pid":"176/9127","text":"Rubing Dai"},{"@pid":"190/7959","text":"Taizhong Wu"},{"@pid":"82/1157","text":"Min Gu"},{"@pid":"24/9923","text":"Yanhui Gu"},{"@pid":"14/4912","text":"Junsheng Zhou"}]},"title":"Research on interpretation of nominal compound.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/QuDWGGZ16","doi":"10.1109/BESC.2016.7804478","ee":"https://doi.org/10.1109/BESC.2016.7804478","url":"https://dblp.org/rec/conf/besc/QuDWGGZ16"}, "url":"URL#3210312" }, { "@score":"1", "@id":"3210313", "info":{"authors":{"author":[{"@pid":"51/4912","text":"Shi Shen"},{"@pid":"51/6548","text":"Changxiu Cheng"},{"@pid":"92/8498","text":"Kai Su"},{"@pid":"62/5839","text":"Jing Yang"},{"@pid":"192/9898","text":"Shanli Yang"}]},"title":"Quantitative visualization about differences between scientists concerned nature disasters and historic events.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ShenCSYY16","doi":"10.1109/BESC.2016.7804495","ee":"https://doi.org/10.1109/BESC.2016.7804495","url":"https://dblp.org/rec/conf/besc/ShenCSYY16"}, "url":"URL#3210313" }, { "@score":"1", "@id":"3210314", "info":{"authors":{"author":[{"@pid":"154/9549","text":"Jiancheng Shen"},{"@pid":"62/2555","text":"Feng Dong"},{"@pid":"35/3682","text":"Wu He"}]},"title":"Using media-based emotion to predict commodity price.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ShenDH16","doi":"10.1109/BESC.2016.7804491","ee":"https://doi.org/10.1109/BESC.2016.7804491","url":"https://dblp.org/rec/conf/besc/ShenDH16"}, "url":"URL#3210314" }, { "@score":"1", "@id":"3210315", "info":{"authors":{"author":[{"@pid":"75/5247-6","text":"Yuan Sun 0006"},{"@pid":"00/4039","text":"Shiwei Ye"},{"@pid":"00/471","text":"Guiping Su"},{"@pid":"65/2709","text":"Yi Sun"}]},"title":"Q-matrix learning and DINA model parameter estimation.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/SunYSS16","doi":"10.1109/BESC.2016.7804471","ee":"https://doi.org/10.1109/BESC.2016.7804471","url":"https://dblp.org/rec/conf/besc/SunYSS16"}, "url":"URL#3210315" }, { "@score":"1", "@id":"3210316", "info":{"authors":{"author":[{"@pid":"136/5047","text":"Jiao Xue"},{"@pid":"10/4463","text":"Takao Terano"},{"@pid":"88/3542","text":"Hiroshi Deguchi"},{"@pid":"64/1623","text":"Manabu Ichikawa"}]},"title":"Simulation analysis of immunization policy diffusion in social network with ABM approach.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/XueTDI16","doi":"10.1109/BESC.2016.7804489","ee":"https://doi.org/10.1109/BESC.2016.7804489","url":"https://dblp.org/rec/conf/besc/XueTDI16"}, "url":"URL#3210316" }, { "@score":"1", "@id":"3210317", "info":{"authors":{"author":{"@pid":"119/9936","text":"Hongwei Yin"}},"title":"Research on influence of Chinese urbanization on hotel industry development.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/Yin16","doi":"10.1109/BESC.2016.7804472","ee":"https://doi.org/10.1109/BESC.2016.7804472","url":"https://dblp.org/rec/conf/besc/Yin16"}, "url":"URL#3210317" }, { "@score":"1", "@id":"3210318", "info":{"authors":{"author":[{"@pid":"82/10609-30","text":"Lu Zhang 0030"},{"@pid":"119/3261","text":"Zhan Bu"},{"@pid":"00/4248","text":"Zhiang Wu 0001"},{"@pid":"39/6191-1","text":"Jie Cao 0001"}]},"title":"DGWC: Distributed and generic web crawler for online information extraction.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ZhangBWC16","doi":"10.1109/BESC.2016.7804487","ee":"https://doi.org/10.1109/BESC.2016.7804487","url":"https://dblp.org/rec/conf/besc/ZhangBWC16"}, "url":"URL#3210318" }, { "@score":"1", "@id":"3210319", "info":{"authors":{"author":[{"@pid":"72/1760-3","text":"Zhiyuan Zhang 0003"},{"@pid":"50/2482-1","text":"Yun Liu 0001"},{"@pid":"79/1993","text":"Haiqiang Chen"},{"@pid":"53/4481","text":"Qing Liu"}]},"title":"POI recommendation with geographical and multi-tag influences.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ZhangLCL16","doi":"10.1109/BESC.2016.7804488","ee":"https://doi.org/10.1109/BESC.2016.7804488","url":"https://dblp.org/rec/conf/besc/ZhangLCL16"}, "url":"URL#3210319" }, { "@score":"1", "@id":"3210320", "info":{"authors":{"author":[{"@pid":"84/6889-36","text":"Jie Zhang 0036"},{"@pid":"73/2252-1","text":"Lin Li 0001"},{"@pid":"68/2168","text":"Ge Zhu"},{"@pid":"34/954","text":"Xiangfu Meng"},{"@pid":"98/2931-2","text":"Qing Xie 0002"}]},"title":"A comparison study of semi-supervised SVM algorithms for small business credit prediction.","venue":"BESC","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/besc/ZhangLZMX16","doi":"10.1109/BESC.2016.7804484","ee":"https://doi.org/10.1109/BESC.2016.7804484","url":"https://dblp.org/rec/conf/besc/ZhangLZMX16"}, "url":"URL#3210320" }, { "@score":"1", "@id":"3358684", "info":{"authors":{"author":[{"@pid":"62/2655-1","text":"Gang Li 0001"},{"@pid":"d/YvesDemazeau","text":"Yves Demazeau"},{"@pid":"59/2340","text":"Guandong Xu"},{"@pid":"40/4918","text":"Paul Wang"},{"@pid":"59/5735","text":"Leon S. L. Wang"},{"@pid":"01/1235-1","text":"Guanfeng Liu 0001"}]},"title":"2016 International Conference on Behavioral, Economic and Socio-cultural Computing, BESC 2016, Durham, NC, USA, November 11-13, 2016","venue":"BESC","publisher":"IEEE","year":"2016","type":"Editorship","key":"conf/besc/2016","ee":"https://ieeexplore.ieee.org/xpl/conhome/7792521/proceeding","url":"https://dblp.org/rec/conf/besc/2016"}, "url":"URL#3358684" } ] } } } )