Divide and conquer in granular computing topological partitions
暂无分享,去创建一个
[1] Eugene Wong,et al. Canonical structure in attribute based file organization , 1971, CACM.
[2] T. T. Lee. An algebraic theory of relational databases , 1983, The Bell System Technical Journal.
[3] Ian Witten,et al. Data Mining , 2000 .
[4] Lotfi A. Zadeh. Key Roles of Information Granulation and Fuzzy Logic in Human Reasoning, Concept Formulation and Computing with Words , 1996, Proceedings of IEEE 5th International Fuzzy Systems.
[5] Tsau Young Lin,et al. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses , 2003, DBSec.
[6] Lotfi A. Zadeh,et al. Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems , 1998, Soft Comput..
[7] Tsau Young Lin. Attribute Based Data Model and Polyinstantiation , 1992, IFIP Congress.
[8] T. Y. Lin,et al. Granular Computing on Binary Relations II Rough Set Representations and Belief Functions , 1998 .
[9] Qiming Chen,et al. Neighborhood and associative query answering , 2004, Journal of Intelligent Information Systems.
[10] Tsau Young Lin,et al. Data Mining and Machine Oriented Modeling: A Granular Computing Approach , 2000, Applied Intelligence.
[11] Janusz Zalewski,et al. Rough sets: Theoretical aspects of reasoning about data , 1996 .
[12] Tsau Young Lin,et al. Granular Computing: Fuzzy Logic and Rough Sets , 1999 .
[13] T. Y. Lin,et al. Neighborhood systems and relational databases , 1988, CSC '88.
[14] Lotfi A. Zadeh,et al. Fuzzy sets and information granularity , 1996 .
[15] Kenneth P. Bogart,et al. Introductory Combinatorics , 1977 .
[16] Lotfi A. Zadeh,et al. Some reflections on information granulation and its centrality in granular computing, computing with words, the computational theory of perceptions and precisiated natural language , 2002 .
[17] Garrett Birkhoff,et al. A survey of modern algebra , 1942 .
[18] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[19] Frank Harary,et al. A formal system for information retrieval from files , 1970, Commun. ACM.
[20] Tsau Young Lin,et al. Topological and Fuzzy Rough Sets , 1992, Intelligent Decision Support.
[21] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..