Granular Computing and Rough Sets - An Incremental Development
暂无分享,去创建一个
[1] Jerzy W. Grzymala-Busse,et al. Data with Missing Attribute Values: Generalization of Indiscernibility Relation and Rule Induction , 2004, Trans. Rough Sets.
[2] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[3] Tsau Young Lin,et al. A New Rough Sets Model Based on Database Systems , 2003, Fundam. Informaticae.
[4] Lotfi A. Zadeh,et al. Fuzzy sets and information granularity , 1996 .
[5] H. Zimmermann,et al. Fuzzy Set Theory and Its Applications , 1993 .
[6] Hans-Jürgen Zimmermann,et al. Fuzzy Set Theory - and Its Applications , 1985 .
[7] S. Miyamoto. Generalizations of multisets and rough approximations , 2004 .
[8] T. Y. Lin,et al. Neighborhood systems and relational databases , 1988, CSC '88.
[9] T. Y. Lin,et al. A set theory for soft computing: a unified view of fuzzy sets via neighborboods , 1996, Proceedings of IEEE 5th International Fuzzy Systems.
[10] Tsau Young Lin,et al. Data Mining: Granular Computing Approach , 1999, PAKDD.
[11] Ning Zhong,et al. Methodologies for Knowledge Discovery and Data Mining , 2002, Lecture Notes in Computer Science.
[12] Yiyu Yao,et al. Relational Interpretations of Neigborhood Operators and Rough Set Approximation Operators , 1998, Inf. Sci..
[13] Qing Liu. Granular Language and Its Applications in Problem Solving , 2004, Rough Sets and Current Trends in Computing.
[14] Tsau Young Lin,et al. Granular Computing: Fuzzy Logic and Rough Sets , 1999 .
[15] Andrzej Skowron,et al. Transactions on Rough Sets V , 2006, Trans. Rough Sets.
[16] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[17] Tsau Young Lin,et al. Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[18] Tsan-sheng Hsu,et al. Medical privacy protection based on granular computing , 2004, Artif. Intell. Medicine.
[19] Lior Rokach,et al. Information Retrieval System for Medical Narrative Reports , 2004, FQAS.
[20] Barr and Feigenbaum Edward A. Avron,et al. The Handbook of Artificial Intelligence , 1981 .
[21] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[22] Qiming Chen,et al. Neighborhood and associative query answering , 2004, Journal of Intelligent Information Systems.
[23] H. Penny Nii,et al. The Handbook of Artificial Intelligence , 1982 .
[24] Tsau Young Lin,et al. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses , 2003, DBSec.
[25] Bo Zhang,et al. Theory and Applications of Problem Solving , 1992 .
[26] Yiyu Yao,et al. Level Construction of Decision Trees in a Partition-based Framework for Classi cation , 2004, SEKE.
[27] G. Birkhoff,et al. A survey of modern algebra , 1942 .
[28] Lotfi A. Zadeh,et al. Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..
[29] Garrett Birkhoff,et al. A survey of modern algebra , 1942 .
[30] Janusz Zalewski,et al. Rough sets: Theoretical aspects of reasoning about data , 1996 .
[31] Tsau Young Lin,et al. Frameworks for Mining Binary Relations in Data , 1998, Rough Sets and Current Trends in Computing.
[32] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[33] T. T. Lee. An algebraic theory of relational databases , 1983, The Bell System Technical Journal.
[34] Clemens A. Szyperski,et al. Component software - beyond object-oriented programming , 2002 .
[35] Yiyu Yao,et al. A Partition Model of Granular Computing , 2004, Trans. Rough Sets.
[36] Tsau Young Lin,et al. Topological and Fuzzy Rough Sets , 1992, Intelligent Decision Support.
[37] Lotfi A. Zadeh,et al. Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems , 1998, Soft Comput..
[38] Lotfi A. Zadeh,et al. Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic , 1997, Fuzzy Sets Syst..
[39] Tsau Young Lin,et al. Data Mining and Machine Oriented Modeling: A Granular Computing Approach , 2000, Applied Intelligence.