参考文献
|
-
Ryan N.“ Adobe code signing infrastructure hacked by 'sophisticated threat actors',”Zdnet, September 2012 (available online at http://www.zdnet.com/adobe-code-signing-infrastructure-hacked-by-sophisticated-threat-actors-7000004925/).
-
Gromovyi, M. V.,Romanenko, V. I.,Mieth, S.,Halfmann, T.,Yatsenko, L. P.(2011).Storage and retrieval of coherent optical information in atomic populations.Optics Communications,284(24),5710-5718.
-
Joachims, T.(1999).Transductive inference for text classification using support vector machines.The Sixteenth International Conference on Machine Learning
-
Joachims, Thorsten(1998).Text categorization with support vector machines: Learning with many relevant features.Machine Learning: ECML-98
-
Quinlan, J.R.(1993).C 4. 5: programs for machine learning(Vol. 1).San Francisco:Morgan kaufmann.
-
Quinlan, J.R.(1986).Induction of decision trees.Machine Learning,1(1),81-106.
-
Salton, Gerard,McGill, Michael J.(1986).Introduction to Modern Information Retrieval.New York:McGraw-Hill.
-
Wei, C. P.,Lee, Y. H.(2004).Event detection from Online news documents for supporting environmental scanning.Decision Support Systems,36(4),385-401.
-
Wei, Chih-Ping,Yang, Chin-Sheng,Hsiao, Han-Wei,Cheng, Tsang-Hsiang(2006).Combining preference- and content-based approaches for improving document clustering effectiveness.Information Processing & Management,42(2),350-372.
|