Granular computing: Models and applications
暂无分享,去创建一个
[1] T. Allen,et al. Hierarchy Theory: A Vision, Vocabulary, and Epistemology , 1996 .
[2] Z. Pawlak. Granularity of knowledge, indiscernibility and rough sets , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).
[3] Andrzej Skowron,et al. A rough set approach to measuring information granules , 2002, Proceedings 26th Annual International Computer Software and Applications.
[4] A. Skowron,et al. Towards adaptive calculus of granules , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).
[5] Lotfi A. Zadeh,et al. Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems , 1998, Soft Comput..
[6] Tsau Young Lin,et al. Granular Computing: Practices, Theories, and Future Directions , 2009, Encyclopedia of Complexity and Systems Science.
[7] Witold Pedrycz,et al. Granular computing: an introduction , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[8] Andrzej Skowron,et al. Information granules: Towards foundations of granular computing , 2001 .
[9] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[10] Tsau Young Lin,et al. Data Mining and Machine Oriented Modeling: A Granular Computing Approach , 2000, Applied Intelligence.
[11] Bo Zhang,et al. The Quotient Space Theory of Problem Solving , 2003, Fundam. Informaticae.
[12] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[13] Tsau Young Lin,et al. Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[14] T. Y. Lin. Data Mining : Granular Computing Approach , .
[15] Tsau Young Lin,et al. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses , 2003, DBSec.
[16] Tsau Young Lin,et al. A rough logic formalism for fuzzy controllers: A hard and soft computing view , 1996, Int. J. Approx. Reason..
[17] Arun N. Swami,et al. Set-oriented mining for association rules in relational databases , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[18] Heikki Mannila,et al. Finding interesting rules from large sets of discovered association rules , 1994, CIKM '94.
[19] Yiyu Yao,et al. Perspectives of granular computing , 2005, 2005 IEEE International Conference on Granular Computing.
[20] Yiyu Yao,et al. Granular Computing , 2008 .
[21] Tsau Young Lin,et al. Granular computing I: the concept of granulation and its formal model , 2009, Int. J. Granul. Comput. Rough Sets Intell. Syst..
[22] David Kelley. A theory of abstraction. , 1984 .
[23] Tsau Young Lin,et al. Topological and Fuzzy Rough Sets , 1992, Intelligent Decision Support.
[24] Tsau Young Lin,et al. A simplicial complex, a hypergraph, structure in the latent semantic space of document clustering , 2005, Int. J. Approx. Reason..
[25] T. Y. Lin,et al. NEIGHBORHOOD SYSTEMS AND APPROXIMATION IN RELATIONAL DATABASES AND KNOWLEDGE BASES , 1989 .
[26] Shamkant B. Navathe,et al. An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.
[27] Lotfi A. Zadeh,et al. Fuzzy sets and information granularity , 1996 .