


default search action
1st RSKT 2006: Chongqing, China
- Guoyin Wang, James F. Peters, Andrzej Skowron, Yiyu Yao:

Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings. Lecture Notes in Computer Science 4062, Springer 2006, ISBN 3-540-36297-5
Commemorative Paper
- James F. Peters, Andrzej Skowron:

Some Contributions by Zdzislaw Pawlak. 1-11
Keynote Papers
- Zdzislaw Pawlak:

Conflicts and Negotations. 12-27 - Ling Zhang, Bo Zhang:

Hierarchical Machine Learning - A Learning Methodology Inspired by Human Intelligence. 28-30 - Sankar K. Pal:

Rough-Fuzzy Granulation, Rough Entropy and Image Segmentation. 31 - Jiming Liu:

Towards Network Autonomy. 32
Plenary Papers
- Tsau Young Lin:

A Roadmap from Rough Set Theory to Granular Computing. 33-41 - Wojciech Ziarko:

Partition Dependencies in Hierarchies of Probabilistic Decision Tables. 42-49 - Yixin Zhong:

Knowledge Theory and Artificial Intelligence. 50-56 - Andrzej Czyzewski:

Applications of Knowledge Technologies to Sound and Vision Engineering. 57 - Jerzy W. Grzymala-Busse:

A Rough Set Approach to Data with Missing Attribute Values. 58-67 - Jing-Long Wu:

Cognitive Neuroscience and Web Intelligence. 68 - Yingxu Wang

:
Cognitive Informatics and Contemporary Mathematics for Knowledge Manipulation. 69-78 - Lech Polkowski:

Rough Mereological Reasoning in Rough Set Theory: Recent Results and Problems. 79-92 - Qing Liu, Hui Sun:

Theoretical Study of Granular Computing. 93-102 - Hung Son Nguyen

:
Knowledge Discovery by Relation Approximation: A Rough Set Approach. 103-106
Rough Computing
- Jingyu Jin, Keyun Qin, Zheng Pei:

Reduction-Based Approaches Towards Constructing Galois (Concept) Lattices. 107-113 - Dayong Deng, Houkuan Huang:

A New Discernibility Matrix and Function. 114-121 - Yusheng Cheng, Yousheng Zhang, Xuegang Hu:

The Relationships Between Variable Precision Value and Knowledge Reduction Based on Variable Precision Rough Sets Model. 122-128 - Tongjun Li:

On Axiomatic Characterization of Approximation Operators Based on Atomic Boolean Algebras. 129-134 - Hong-Ru Li, Wen-Xiu Zhang, Ping Xu, Hong Wang:

Rough Set Attribute Reduction in Decision Systems. 135-140 - Xuri Yin, Xiuyi Jia, Lin Shang:

A New Extension Model of Rough Sets Under Incomplete Information. 141-146 - Michinori Nakata, Hiroshi Sakai:

Applying Rough Sets to Data Tables Containing Possibilistic Information. 147-155 - Huanglin Zeng, Hengyou Lan, Xiaohui Zeng:

Redundant Data Processing Based on Rough-Fuzzy Approach. 156-161 - Zaiyue Zhang, Yuefei Sui, Cungen Cao:

Further Study of the Fuzzy Reasoning Based on Propositional Modal Logic. 162-169 - Fan Min

, Qihe Liu, Hao Tan, Leiting Chen:
The M-Relative Reduct Problem. 170-175 - Feng Jiang, Yuefei Sui, Cungen Cao:

Rough Contexts and Rough-Valued Contexts. 176-183 - Yuhua Qian, Jiye Liang

:
Combination Entropy and Combination Granulation in Incomplete Information System. 184-190 - Jigui Sun, Huawen Liu, Huijie Zhang:

An Extension of Pawlak's Flow Graphs. 191-199 - Jianhua Dai, Weidong Chen, Yunhe Pan:

Rough Sets and Brouwer-Zadeh Lattices. 200-207 - Tao Feng, Ju-Sheng Mi, Wei-Zhi Wu:

Covering-Based Generalized Rough Fuzzy Sets. 208-215 - William Zhu, Fei-Yue Wang:

Axiomatic Systems of Generalized Rough Sets. 216-221 - Gang Xie

, Xuebin Liu, Lifei Wang, Keming Xie:
Rough-Sets-Based Combustion Status Diagnosis. 222-226 - Jun Zhao, Guoyin Wang:

Research on System Uncertainty Measures Based on Rough Set Theory. 227-232 - Andrzej Skowron, Sheela Ramanna, James F. Peters:

Conflict Analysis and Information Systems: A Rough Set Approach. 233-240 - Qingxiang Wu, Jianyong Cai, Girijesh Prasad

, T. Martin McGinnity, David A. Bell, Jiwen Guan:
A Novel Discretizer for Knowledge Discovery Approaches Based on Rough Sets. 241-246 - Kaiquan Shi, Bingxue Yao:

Function S-Rough Sets and Recognition of Financial Risk Laws. 247-253 - Wei-Zhi Wu, Ju-Sheng Mi:

Knowledge Reduction in Incomplete Information Systems Based on Dempster-Shafer Theory of Evidence. 254-261 - Yuxia Qiu, Keming Xie, Gang Xie:

Decision Rules Extraction Strategy Based on Bit Coded Discernibility Matrix. 262-267 - Pawel Terlecki, Krzysztof Walczak:

Attribute Set Dependence in Apriori-Like Reduct Computation. 268-276 - Gianpiero Cattaneo, Davide Ciucci:

Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part I. 277-283 - Gianpiero Cattaneo, Davide Ciucci:

Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part II. 284-289 - Mikhail Ju. Moshkov, Marcin Piliszczuk, Beata Zielosko:

Lower Bounds on Minimal Weight of Partial Reducts and Partial Decision Rules. 290-296 - Yiyu Yao, Yan Zhao, Jue Wang:

On Reduct Construction Algorithms. 297-304 - Dominik Slezak:

Association Reducts: Boolean Representation. 305-312 - Piero Pagliani:

Notes on Rough Sets and Formal Concepts. 313-320
Evolutionary Computing
- Kaiyou Lei, Yuhui Qiu, Xuefei Wang, Yi He:

High Dimension Complex Functions Optimization Using Adaptive Particle Swarm Optimizer. 321-326 - Zhihua Cui, Jianchao Zeng, Guoji Sun:

Adaptive Velocity Threshold Particle Swarm Optimization. 327-332
Fuzzy Sets
- Wenyi Zeng, Qilei Feng, Hongxing Li:

Relationship Between Inclusion Measure and Entropy of Fuzzy Sets. 333-340 - Yong Liu, Guoyin Wang, Lin Feng:

A General Model for Transforming Vague Sets into Fuzzy Sets. 341-348 - Yun-Zhi Zou, Nan-Jing Huang:

An Iterative Method for Quasi-Variational-Like Inclusions with Fuzzy Mappings. 349-356
Granular Computing
- Lai Wei, Duoqian Miao:

Application of Granular Computing in Knowledge Reduction. 357-362 - Li-Quan Zhao, Ling Zhang:

Advances in the Quotient Space Theory and Its Applications. 363-370 - Qiusheng An, Wenxiu Zhang:

The Measures Relationships Study of Three Soft Rules Based on Granular Computing. 371-376
Neural Computing
- Askin Demirkol:

A Generalized Neural Network Architecture Based on Distributed Signal Processing. 377-382 - Jiuzhen Liang

, Xiaohong Wu:
Worm Harm Prediction Based on Segment Procedure Neural Networks. 383-388 - Andrzej Czyzewski, Bozena Kostek, Przemyslaw Maziewski, Lukasz Litwic:

Accidental Wow Defect Evaluation Using Sinusoidal Analysis Enhanced by Artificial Neural Networks. 389-395 - Xianghua Fu

, Zhiqiang Wang, Boqin Feng:
A Constructive Algorithm for Training Heterogeneous Neural Network Ensemble. 396-401
Machine Learning and KDD
- Yu Zhang, Zhidong Deng, Hongshan Jiang, Peifa Jia:

Gene Regulatory Network Construction Using Dynamic Bayesian Network (DBN) with Structure Expectation Maximization (SEM). 402-407 - Yuhai Zhao, Ying Yin, Guoren Wang:

Mining Biologically Significant Co-regulation Patterns from Microarray Data. 408-414 - Bo He, Yue Wang, Wu Yang, Yuan Chen:

Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed Database. 415-420 - Shuqin Wang, Jinmao Wei, Junping You, Dayou Liu:

A VPRSM Based Approach for Inducing Decision Trees. 421-429 - Libiao Zhang, Ming Ma, Xiaohua Liu, Caitang Sun, Miao Liu, Chunguang Zhou:

Differential Evolution Fuzzy Clustering Algorithm Based on Kernel Methods. 430-435 - Ziqiang Wang, Xia Sun, Dexian Zhang:

Classification Rule Mining Based on Particle Swarm Optimization. 436-441 - Bing Liu, Zhihui Wang, Xiaoming Yang, Wei Wang, Baile Shi:

A Bottom-Up Distance-Based Index Tree for Metric Space. 442-449 - Bing Liu, Jianjun Xu, Zhihui Wang, Wei Wang, Baile Shi:

Subsequence Similarity Search Under Time Shifting. 450-455 - Hidenao Abe

, Shusaku Tsumoto, Miho Ohsaki, Takahira Yamaguchi:
Developing a Rule Evaluation Support Method Based on Objective Indices. 456-461 - Genting Yan, Guangfu Ma, Liangkuan Zhu:

Data Dimension Reduction Using Rough Sets for Support Vector Classifier. 462-467 - Tianming Hu, Weiquan Zhao, Xiaoqiang Wang, Zhixiong Li:

A Comparison of Three Graph Partitioning Based Methods for Consensus Clustering. 468-475 - Tieyun Qian

, Yuanzhen Wang, Langgang Xiang, WeiHua Gong:
Feature Selection, Rule Extraction, and Score Model: Making ATC Competitive with SVM. 476-481 - Julio J. Valdés, Alan J. Barton:

Relevant Attribute Discovery in High Dimensional Data: Application to Breast Cancer Gene Expressions. 482-489 - Kin Keung Lai, Lean Yu, Ligang Zhou, Shouyang Wang:

Credit Risk Evaluation with Least Square Support Vector Machine. 490-495 - Xuegang Hu, Haitao Yu:

The Research of Sampling for Mining Frequent Itemsets. 496-501 - Wenbin Li, Ning Zhong, Chunnian Liu:

ECPIA: An Email-Centric Personal Intelligent Assistant. 502-509 - Cui-Xia Li, Jian Yu:

A Novel Fuzzy C-Means Clustering Algorithm. 510-515 - Lifang Xu, Hongwei Mo, Kejun Wang, Na Tang:

Document Clustering Based on Modified Artificial Immune Network. 516-521 - Xia Wang, Jianmin Ma:

A Novel Approach to Attribute Reduction in Concept Lattices. 522-529 - Zheng Zheng, Qing He, Zhongzhi Shi:

Granule Sets Based Bilevel Decision Model. 530-537 - Jingtao Yao, Songlun Zhao, Lisa Fan:

An Enhanced Support Vector Machine Model for Intrusion Detection. 538-543 - Ling Wang, Liefeng Bo, Licheng Jiao:

A Modified K-Means Clustering with a Density-Sensitive Distance Metric. 544-551 - Lei Xie:

Swarm Intelligent Tuning of One-Class nu-SVM Parameters. 552-559 - Zhiwu Lu

, Xiaoqing Lu:
A Generalized Competitive Learning Algorithm on Gaussian Mixture with Automatic Model Selection. 560-567 - Bin Zou, Luoqing Li, Jie Xu:

The Generalization Performance of Learning Machine with NA Dependent Sequence. 568-573 - Boyun Zhang, Jianping Yin, Jingbo Hao:

Using RS and SVM to Detect New Malicious Executable Codes. 574-579 - Yongsheng Zhao, Xiaofeng Zhang, Shixiang Jia, Fuzeng Zhang:

Applying PSO in Finding Useful Features. 580-585
Logics and Reasoning
- Zhicheng Chen, Mingyi Mao, Huacan He, Weikang Yang:

Generalized T-norm and Fractional "AND" Operation Model. 586-591 - Xia Wu, Jigui Sun, Shuai Lu, Ying Li, Wei Meng, Minghao Yin

:
Improved Propositional Extension Rule. 592-597 - Soo Jin Jun, Sun-Gwan Han, Hae-Young Kim:

Web Services-Based Digital Library as a CSCL Space Using Case-Based Reasoning. 598-603 - Qi Xie, Dayou Liu, Haibo Yu:

Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules. 604-609 - Cungen Cao, Yuefei Sui, Zaiyue Zhang:

The Rough Logic and Roughness of Logical Theories. 610-617
Multiagent Systems and Web Intelligence
- Minwoo Son, Dongkyoo Shin, Dongil Shin:

Research on Multi-Agent Service Bundle Middleware for Smart Space. 618-625 - Xue Xiao, Dan Dai, Yiren Zhou:

A Customized Architecture for Integrating Agent Oriented Methodologies. 626-631 - Na Luo, Wanli Zuo, Fuyu Yuan, Changli Zhang:

A New Method for Focused Crawler Cross Tunnel. 632-637 - Baolin Liu, Bo Hu:

Migration of the Semantic Web Technologies into E-Learning Knowledge Management. 638-642 - Ji Wu, Chaoqun Ye, Shiyao Jin:

Opponent Learning for Multi-agent System Simulation. 643-650
Pattern Recognition
- Xinbo Gao, Jie Li, Yang Shi:

A Video Shot Boundary Detection Algorithm Based on Feature Tracking. 651-658 - Jianping Shi, Zhengjun Zhai:

Curvelet Transform for Image Authentication. 659-664 - Weixing Wang:

An Image Segmentation Algorithm for Densely Packed Rock Fragments of Uneven Illumination. 665-670 - Xiping He, Qingsheng Zhu, Ping Gu:

A New Chaos-Based Encryption Method for Color Image. 671-678 - Liyong Ma

, Jiachen Ma, Yi Shen:
Support Vector Machines Based Image Interpolation Correction Scheme. 679-684 - Wangxin Xiao, Xinping Yan, Xue Zhang:

Pavement Distress Image Automatic Classification Based on DENSITY-Based Neural Network. 685-692 - Stefania Bandini

, Silvia Calegari, Paolo Radaelli
:
Towards Fuzzy Ontology Handling Vagueness of Natural Languages. 693-700 - Jin-an Guan:

Evoked Potentials Estimation in Brain-Computer Interface Using Support Vector Machine. 701-706 - Gexiang Zhang:

Intra-pulse Modulation Recognition of Advanced Radar Emitter Signals Using Intelligent Recognition Method. 707-712 - Yifeng Niu, Lincheng Shen, Yanlong Bu:

Multi-objective Blind Image Fusion. 713-720
System Engineering and Description
- Chunguang Ji, Xiancui Lv, Shiyong Li:

The Design of Biopathway's Modelling and Simulation System Based on Petri Net. 721-726 - Hua Xu, Peifa Jia:

Timed Hierarchical Object-Oriented Petri Net-Part I: Basic Concepts and Reachability Analysis. 727-734 - Yinglong Ma

, Kehe Wu, Beihong Jin, Shaohua Liu:
Approximate Semantic Query Based on Multi-agent Systems. 735-741
Real-Life Applications Based on Knowledge Technology
- Lei Xie, Jianming Zhang:

Swarm Intelligent Analysis of Independent Component and Its Application in Fault Detection and Diagnosis. 742-749 - Gang Xie, Jinlong Zhang, K. K. Lai:

Using VPRS to Mine the Significance of Risk Factors in IT Project Management. 750-757 - Jianwen Fang, Jerzy W. Grzymala-Busse:

Mining of MicroRNA Expression Data - A Rough Set Approach. 758-765 - Wenqing Zhao, Yongli Zhu:

Classifying Email Using Variable Precision Rough Set Approach. 766-771 - Peijun Chen, Guoyin Wang, Yong Yang, Jian Zhou:

Facial Expression Recognition Based on Rough Set Theory and SVM. 772-777 - Dingfang Li, Wen Zhang

:
Gene Selection Using Rough Set Theory. 778-785 - Mao Ye, Boqin Feng, Li Zhu, Yao Lin:

Attribute Reduction Based Expected Outputs Generation for Statistical Software Testing. 786-791 - Dan Li, Kefei Wang, Jitender S. Deogun:

FADS: A Fuzzy Anomaly Detection System. 792-798 - Yong Mao, Xiaobo Zhou, Zheng Yin, Daoying Pi, Youxian Sun, Stephen T. C. Wong:

Gene Selection Using Gaussian Kernel Support Vector Machine Based Recursive Feature Elimination with Adaptive Kernel Width Strategy. 799-806

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














