Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 306-312.doi: 10.11896/jsjkx.200500077
• Intelligent Computing • Previous Articles Next Articles
CHEN Yan, CHEN Jia-qing, CHEN Xing
CLC Number:
[1] ARANGO G,PRIET O-DIAZ R.Domain analysis concepts and research directions[C]//Domain Analysis and Software S ystem Modeling.Los Alamitos,California:IEEE Computer Society Press,1991. [2] PRIET O D R.Domain analysis for reu sability[C]//Procee-dings of COMPSAC'87.Tokyo,Japan,1987:23-29. [3] MILI H,MILI F,MILI A.Reusing software:Issues and re-search directions[J].IEEE Transactions on Software Engineering,1995,21(6):528-562. [4] SONG Y,QIU B,FAROOQ U.Hierarchical tag visualizationand applicationn for tag recommendations[C]//Proceedings of the 20th ACM Conference on Information and Knowledge Management.New York:ACM,2011:1331-1340. [5] CANDAN K S,CARO L D,SAPINO M L.Creating tag hierarchies for effective navigation in social media[C]//Proceeding of the 2008 ACM Workshop on Search in Social Media.New York,ACM,2008.75-82. [6] TRATTNER C,KORNER C,HELIC D.Enhancing the navigability of social tagging systems with tag taxonomies[C]//Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies.New Work:ACM,2011. [7] SUN Y,QIU H P,WANG Q X.A method to generate hashtag vector and build hierarchy architecture of network users' self-describing hashtag [J].Information Technology and Network Security,2018,37(11):44-49. [8] LIU S Q,BAI G W,SHEN H.A hierarchical classification system based on user self description label [J].Computer Science,2016,43(7):224-229,239. [9] SOLSKINNSBAKK G,GULLA J.A hybrid approach to con-structing tag hierachies[C]//Proceedings of the 2010 Confe-rence on the Move to Meaningful Internet Systems.Berlin:Springer,2010:975-982. [10] LIU K P,FANG B X.Ontology learning method based on social annotation [J].Journal of Computer Science,2010,33(10):1823-1834. [11] HELIC D,STROHMAIER M.Building directories for socailtagging systems[C]//Proceedings of the 20th ACM Conference on Information and Knowledge Management.New York:ACM,2011:525-534. [12] ZHANG M Q,BAI L,WANG J B.Label propagation algorithm based on weighted clustering ensemble [J].Journal of Intelligent Systems,2018,13(6):134-138. [13] ZHAO J F,XIE B,ZHANG L,et al.A web service assembly method supporting domain features [J].Journal of Computer Science,2005(4):731-738. |
[1] | JIANG Chong, ZHANG Zong-zhang, CHEN Zi-xuan, ZHU Jia-cheng, JIANG Jun-peng. Data Efficient Third-person Imitation Learning Method [J]. Computer Science, 2021, 48(2): 238-244. |
[2] | FENG Xue. Natural Language Querying with External Semantic Enrichment [J]. Computer Science, 2019, 46(8): 272-276. |
[3] | LIU Yuan, WANG XinGAN Ying, YANG Chao-zhouLI Wei-xi. BioPW+:Biological Pathway Data Visualization System Based on Linked Data [J]. Computer Science, 2019, 46(2): 18-23. |
[4] | ZHENG Jing-hua, GUO Shi-ze, GAO Liang and ZHONG Xiao-feng. Survey on Cognitive Domain Feature Prediction of Social Network Users [J]. Computer Science, 2018, 45(3): 16-22. |
[5] | MA Li, QIU Zhi-yang, CHEN Yan-ping and ZHAO Jing. Semantic Web Service Selection Based on QoS [J]. Computer Science, 2017, 44(3): 226-230. |
[6] | KE Chang-bo, HUANG Zhi-qiu and XIAO Fu. Software Component Retrieval Method Based on Ontology Concept Similarity [J]. Computer Science, 2017, 44(12): 144-149. |
[7] | SHEN Hua, HE Yan-xiang and ZHANG Ming-wu. Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model [J]. Computer Science, 2015, 42(9): 107-117. |
[8] | NI Chuan, HUANG Zhi-qiu, WANG Shan-shan and HUANG Chuan-lin. Attribute-based Access Control Method Supporting Policies Ontology Reasoning [J]. Computer Science, 2015, 42(3): 96-101. |
[9] | WANG Shi-qi, LI Yi-xiao, SHEN Li-wei and ZHAO Wen-yun. Display Process and Technique Implementation of Ontology Conceptual Diagram [J]. Computer Science, 2015, 42(12): 87-91. |
[10] | KE Ye-qing, MA Zhi-rou, WU Hai-jiang and LIU Jie. SmartHR:A Resume Query and Management System Based on Semantic Web [J]. Computer Science, 2015, 42(12): 56-59. |
[11] | YANG Nan,WU Ling and WANG Qian-xiang. POP-PHP:Online Integrated Development Environment for PHP Applications [J]. Computer Science, 2014, 41(9): 38-44. |
[12] | SHANG Chao-wang,LIU Qing-tang,ZHAO Gang and TONG Ming-wen. Study on Activity-oriented Dynamic Access Authorization Model for BPEL4WS [J]. Computer Science, 2014, 41(7): 102-104. |
[13] | WANG Lei,ZENG Xian-ting and SU Jin-yang. Steganalysis Based on Multi-domain Features for JPEG Images [J]. Computer Science, 2014, 41(6): 94-98. |
[14] | WANG Ting,DI Rui-hua and LI Wei-ming. Tongyici Cilin-based Mapping Approach for Large-scale Chinese Ontology [J]. Computer Science, 2014, 41(5): 120-123. |
[15] | ZHOU Wen-jian and MA Rui-zhe. RDF Approximate Query Approach Based on Semantics [J]. Computer Science, 2013, 40(9): 169-173. |
|