Granular computing: Models and applications

[1]  Tsau Young Lin,et al.  Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[2]  Fausto Giunchiglia,et al.  A Theory of Abstraction , 1992, Artif. Intell..

[3]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[4]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[5]  Heikki Mannila,et al.  Finding interesting rules from large sets of discovered association rules , 1994, CIKM '94.

[6]  Shamkant B. Navathe,et al.  An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.

[7]  Arun N. Swami,et al.  Set-oriented mining for association rules in relational databases , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[8]  Tsau Young Lin,et al.  A rough logic formalism for fuzzy controllers: A hard and soft computing view , 1996, Int. J. Approx. Reason..

[9]  Lotfi A. Zadeh,et al.  Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic , 1997, Fuzzy Sets Syst..

[10]  A. Skowron,et al.  Towards adaptive calculus of granules , 1998 .

[11]  Z. Pawlak Granularity of knowledge, indiscernibility and rough sets , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).

[12]  Lotfi A. Zadeh,et al.  Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems , 1998, Soft Comput..

[13]  Tsau Young Lin,et al.  Data Mining: Granular Computing Approach , 1999, PAKDD.

[14]  Andrzej Skowron,et al.  Information granules: Towards foundations of granular computing , 2001 .

[15]  Andrzej Skowron,et al.  A rough set approach to measuring information granules , 2002, Proceedings 26th Annual International Computer Software and Applications.

[16]  Tsau Young Lin,et al.  Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses , 2003, DBSec.

[17]  Tsau Young Lin,et al.  Data Mining and Machine Oriented Modeling: A Granular Computing Approach , 2000, Applied Intelligence.

[18]  Yiyu Yao,et al.  Perspectives of granular computing , 2005, 2005 IEEE International Conference on Granular Computing.

[19]  Tsau Young Lin,et al.  A simplicial complex, a hypergraph, structure in the latent semantic space of document clustering , 2005, Int. J. Approx. Reason..

[20]  Tsau Young Lin,et al.  Granular computing I: the concept of granulation and its formal model , 2009, Int. J. Granul. Comput. Rough Sets Intell. Syst..