Granular computing: Models and applications
暂无分享,去创建一个
[1] Tsau Young Lin,et al. Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[2] Fausto Giunchiglia,et al. A Theory of Abstraction , 1992, Artif. Intell..
[3] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[4] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[5] Heikki Mannila,et al. Finding interesting rules from large sets of discovered association rules , 1994, CIKM '94.
[6] Shamkant B. Navathe,et al. An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.
[7] Arun N. Swami,et al. Set-oriented mining for association rules in relational databases , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[8] Tsau Young Lin,et al. A rough logic formalism for fuzzy controllers: A hard and soft computing view , 1996, Int. J. Approx. Reason..
[9] Lotfi A. Zadeh,et al. Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic , 1997, Fuzzy Sets Syst..
[10] A. Skowron,et al. Towards adaptive calculus of granules , 1998 .
[11] Z. Pawlak. Granularity of knowledge, indiscernibility and rough sets , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).
[12] Lotfi A. Zadeh,et al. Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems , 1998, Soft Comput..
[13] Tsau Young Lin,et al. Data Mining: Granular Computing Approach , 1999, PAKDD.
[14] Andrzej Skowron,et al. Information granules: Towards foundations of granular computing , 2001 .
[15] Andrzej Skowron,et al. A rough set approach to measuring information granules , 2002, Proceedings 26th Annual International Computer Software and Applications.
[16] Tsau Young Lin,et al. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses , 2003, DBSec.
[17] Tsau Young Lin,et al. Data Mining and Machine Oriented Modeling: A Granular Computing Approach , 2000, Applied Intelligence.
[18] Yiyu Yao,et al. Perspectives of granular computing , 2005, 2005 IEEE International Conference on Granular Computing.
[19] Tsau Young Lin,et al. A simplicial complex, a hypergraph, structure in the latent semantic space of document clustering , 2005, Int. J. Approx. Reason..
[20] Tsau Young Lin,et al. Granular computing I: the concept of granulation and its formal model , 2009, Int. J. Granul. Comput. Rough Sets Intell. Syst..