Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures. Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to…
This book constitutes the refereed proceedings of the Second CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2013, held in Chongqing, China, during November 2013. The 31 revised full papers presented together with three keynote talks and 13 short papers were carefully reviewed and selected from 203 submissions. The papers are organized in topical sections on fundament…