Approximation of Sets Based on Partial Covering
暂无分享,去创建一个
[1] Andrzej Skowron,et al. Rudiments of rough sets , 2007, Inf. Sci..
[2] Robert A. Meyers,et al. Encyclopedia of Complexity and Systems Science , 2009 .
[3] Yiyu Yao,et al. On Generalizing Rough Set Theory , 2003, RSFDGrC.
[4] A. T.. Dictionary of Philosophy and Psychology , 1901, Nature.
[5] Kenneth Revett,et al. Machine learning in electrocardiogram diagnosis , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[6] Zdzisław Pawlak,et al. Rough sets: a new approach to vagueness , 1992 .
[7] Tsau Young Lin. Approximation Theories: Granular Computing vs Rough Sets , 2008, RSCTC.
[8] Andrzej Bargiela,et al. The roots of granular computing , 2006, 2006 IEEE International Conference on Granular Computing.
[9] Ferenc Horváth,et al. Fact sheet of the MÉTA database 1.2 , 2008 .
[10] Jorge Horacio Doorn,et al. Encyclopedia of Database Technologies and Applications , 2005 .
[11] Yiyu Yao,et al. On Generalizing Pawlak Approximation Operators , 1998, Rough Sets and Current Trends in Computing.
[12] Andrzej Skowron,et al. Information granules: Towards foundations of granular computing , 2001 .
[13] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[14] Yiyu Yao,et al. Constructive and Algebraic Methods of the Theory of Rough Sets , 1998, Inf. Sci..
[15] Guoyin Wang,et al. Rough Set Based Solutions for Network Security , 2004, MSRAS.
[16] William Zhu,et al. Topological approaches to covering rough sets , 2007, Inf. Sci..
[17] Jouni Järvinen,et al. Rough Sets Determined by Quasiorders , 2008, Order.
[18] Jari Kortelainen,et al. A unifying study between modal-like operators, topologies and fuzzy sets , 2007, Fuzzy Sets Syst..
[19] A. Miné. Weakly Relational Numerical Abstract Domains , 2004 .
[20] Jouni Järvinen,et al. Lattice Theory for Rough Sets , 2007, Trans. Rough Sets.
[21] Jc Beall,et al. Liars and heaps : new essays on paradox , 2003 .
[22] Urszula Wybraniec-Skardowska,et al. Extensions and Intentions in the Ruogh Set Theory , 1998, Inf. Sci..
[23] Hung Son Nguyen,et al. Approximate Boolean Reasoning: Foundations and Applications in Data Mining , 2006, Trans. Rough Sets.
[24] Zoltán Csajbók,et al. Partial approximative set theory: A generalization of the rough set theory , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.
[25] Zdzisław Pawlak,et al. Rough Sets : An Approach to Vagueness , 2006 .
[26] Yiyu Yao,et al. Generalization of Rough Sets using Modal Logics , 1996, Intell. Autom. Soft Comput..
[27] Zoltán Botta-Dukát,et al. A grid-based, satellite-image supported, multi-attributed vegetation mapping method (MÉTA) , 2007, Folia Geobotanica.
[28] Klaus Denecke,et al. Galois connections and applications , 2004 .
[29] Kenneth Revett,et al. Feature selection in Parkinson's disease: A rough sets approach , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[30] Lotfi A. Zadeh. Granular Computing and Rough Set Theory , 2007, RSEISP.
[31] Jouni Järvinen. Pawlak's Information Systems in Terms of Galois Connections and Functional Dependencies , 2007, Fundam. Informaticae.
[32] K. Hofmann,et al. Continuous Lattices and Domains , 2003 .
[33] Tsau Young Lin,et al. Granular Computing: Practices, Theories, and Future Directions , 2009, Encyclopedia of Complexity and Systems Science.
[34] Zdzislaw Pawlak,et al. Vagueness - a Rough Set View , 1997, Structures in Logic and Computer Science.
[35] Ping Zhu,et al. Covering rough sets based on neighborhoods: An approach without using neighborhoods , 2009, Int. J. Approx. Reason..
[36] Zoltán Ernő Csajbók. On the partial approximation of sets , 2011 .
[37] Zoltán Ernő Csajbók,et al. Partial Approximative Set Theory: A View from Galois Connections , 2010 .
[38] Davide Ciucci,et al. Approximation Algebra and Framework , 2009, Fundam. Informaticae.
[39] Yiyu Yao,et al. Two views of the theory of rough sets in finite universes , 1996, Int. J. Approx. Reason..
[40] Mihir K. Chakraborty,et al. A Geometry of Approximation: Rough Set Theory: Logic, Algebra and Topology of Conceptual Patterns , 2008 .
[41] Zoltán Csajbók,et al. A security model for personal information security management based on partial approximative set theory , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.
[42] Grzegorz Rozenberg,et al. The many facets of natural computing , 2008, Commun. ACM.
[43] Hung Son Nguyen,et al. A View on Rough Set Concept Approximations , 2003, Fundam. Informaticae.
[44] John M. D. Hunter. An Information Security Handbook , 2001, Computer Communications and Networks.
[45] Jarred Adam Ligatti,et al. More Enforceable Security Policies , 2002 .
[46] Achille C. Varzi. Cut-offs and their Neighbors , 2003 .
[47] Zoltán Csajbók,et al. Simultaneous Anomaly and Misuse Intrusion Detections Based on Partial Approximative Set Theory , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.
[48] Xiangliang Zhang,et al. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..
[49] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[50] Andrzej Skowron,et al. Approximation Spaces and Information Granulation , 2004, Trans. Rough Sets.
[51] Z. Molnár,et al. Threatening factors encountered: Actual endangerment of the Hungarian (semi-)natural habitats , 2008 .
[52] W. Zakowski. APPROXIMATIONS IN THE SPACE (U,π) , 1983 .
[53] Tsau Young Lin. Update and Illustration on Granular Computing: Practices, Theory and Future Directions , 2010, 2010 IEEE International Conference on Granular Computing.
[54] Peter G. Hinman. Review: Piergiorgio Odifreddi, Classical Recursion Theory. The Theory of Functions and Sets of Natural Numbers , 1990 .
[55] Andrzej Skowron,et al. Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing) , 2005 .
[56] W. J. Thron,et al. Encyclopedia of Mathematics and its Applications. , 1982 .
[57] Tamás Mihálydeák,et al. General Tool-Based Approximation Framework Based on Partial Approximation of Sets , 2011, RSFDGrC.
[58] Marcel Erné,et al. A Primer on Galois Connections , 1993 .
[59] Ivo Düntsch,et al. Approximation Operators in Qualitative Data Analysis , 2003, Theory and Applications of Relational Structures as Knowledge Instruments.
[60] Saso Dzeroski,et al. Inductive Logic Programming: Techniques and Applications , 1993 .
[61] William Zhu,et al. Relationship between generalized rough sets based on binary relation and covering , 2009, Inf. Sci..
[62] Peter F. Stadler,et al. Genotype-Phenotype Maps , 2006 .
[63] Zoltán Csajbók. On the mappings of elliptic curves defined over into . , 2007 .
[64] J. A. Pomykala. SOME REMARKS ON APPROXIMATION , 1991 .
[65] Eszter Illyés,et al. A NEW HABITAT CLASSIFICATION AND MANUAL FOR STANDARDIZED HABITAT MAPPING , 2007 .
[66] Rachid Beghdad. Modelling and solving the intrusion detection problem in computer networks , 2004, Comput. Secur..
[67] Jouni Järvinen. Properties of Rough Approximations , 2005, J. Adv. Comput. Intell. Intell. Informatics.
[68] Yiyu Yao,et al. Rough Set Approximations in Formal Concept Analysis and Knowledge Spaces , 2008, ISMIS.
[69] Janusz Zalewski,et al. Rough sets: Theoretical aspects of reasoning about data , 1996 .
[70] Yiyu Yao,et al. Rough set approximations in formal concept analysis , 2004, IEEE Annual Meeting of the Fuzzy Information, 2004. Processing NAFIPS '04..
[71] Andrzej Skowron,et al. Vague Concepts : A Rough Set Approach , 2004 .
[72] Z.. INFORMATION SYSTEMS THEORETICAL FOUNDATIONS , 2022 .
[73] Brian A. Davey,et al. An Introduction to Lattices and Order , 1989 .
[74] A. Skowron,et al. On topology in information systems , 1988 .
[75] Zdzislaw Pawlak,et al. Some Issues on Rough Sets , 2004, Trans. Rough Sets.
[76] Zoltán Csajbók. Approximation of Sets Based on Partial Covering , 2013, Trans. Rough Sets.
[77] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[78] Peter F. Smith,et al. Vagueness: A Reader , 1999 .
[79] Yiyu Yao,et al. Information granulation and rough set approximation , 2001, Int. J. Intell. Syst..
[80] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[81] Jari Kortelainen,et al. Modal-Like Operators in Boolean Lattices, Galois Connections and Fixed Points , 2007, Fundam. Informaticae.