default search action
GrC 2007: San Jose, CA, USA
- 2007 IEEE International Conference on Granular Computing, GrC 2007, San Jose, California, USA, 2-4 November 2007. IEEE Computer Society 2007, ISBN 0-7695-3032-X
Keynote Speakers
- Tzung-Pei Hong:
On Genetic-Fuzzy Data Mining Techniques. 3 - Janusz Kacprzyk:
Linguistic Summaries of Static and Dynamic Data: Computing with Words and Granularity. 4-5 - Tsau Young Lin:
Granular Computing and Web Processing: Representing Documents in Polyhedron. 6 - Ling Liu:
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges. 7-
Granular Computing: Methodologies
- C. Maria Keet:
Granulation with Indistinguishability, Equivalence, or Similarity. 11-16 - Daowu Pei:
Some Models of Granular Computing. 17-21 - Lin Yan, Qing Liu:
A Logical Method of Formalization for Granular Computing. 22-27 - Wen-Ran Zhang, Justin Zhan:
A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing. 28-31 - Yunhua Chen, Yongquan Yu, Bi Zeng, Minghui Wang:
Application of Granular Computing in Extension Criminal Reconnaissance System. 32-35 - Hong Hu, Zhongzhi Shi:
Granular Computing in the Information Transformation of Pattern Recognition. 36-39 - Trong Wu:
Multitasking is the Primary Choice for Granular Computing. 40-43 - Qing Liu, Huasheng Zhu, Lan Liu:
The Granulations Based on Meaning of Rough Logical Formulas and its Lock Resolution. 44-49 - Xiaosheng Wang:
A Study of Information Granules. 50-
Granular Computing: Strategies
- Tomas B. Co:
Modeling Dynamic Processes Using Granular Runge-Kutta Methods. 55-60 - Taorong Qiu, Xiaoqing Chen, Qing Liu, Houkuan Huang:
A Granular Space Model for Ontology Learning. 61-65 - Jianchao Han, Jing Dong:
Perspectives of Granular Computing in Software Engineering. 66-71 - Yiyu Yao:
Structured Writing with Granular Computing Strategies. 72-77 - Gaowei Yan, Gang Xie, Keming Xie, Tsau Young Lin:
Granular Computing Based Sorting Method in Multi-Objective Optimization. 78-
Granular Network Modeling
- Jiali Feng:
Attribute Computing Network Induced by Linear Transformation and Granular Transformation of Qualitative Criterion. 83-88 - Shaobo Deng, Min Li, Sujie Guan, Lian Chen:
The Structure of Granular Network Based on Granular Computing and its Application in Data Reduction. 89-92 - Yong Hu, Juhua Chen, Jiaxing Huang, Mei Liu, Kang Xie:
Analyzing Software System Quality Risk Using Bayesian Belief Network. 93-96 - Lingbo Kong, Zhe Chen, Fuliang Yin:
Optimum Design of a Window Function Based on the Small-World Networks. 97-
Fuzzy Set and Fuzzy Control
- Xinyuan Liang:
Reasoning Algorithm of Multi-Value Fuzzy Causality Diagram Based on Unitizing Coefficient. 101-104 - Ming-Wen Shao, Chang-Xuan Wan:
Multi-level Formal Concepts in Fuzzy Formal Contexts. 105-109 - Chengyi Zhang, Bencheng Wei, Guohui Chen:
On Consistency of Fuzzy Clustering Analysis. 110-113 - Hayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi, Katsuya Kondo, Yutaka Hata:
Fuzzy Detection System of Behavior before Getting Out of Bed by Air Pressure and Ultrasonic Sensors. 114-119 - Byeong Seok Ahn:
An Efficient Elimination of Input Data in the OWA Aggregation. 120-123 - Wei-bin Zhang, Bu-zhou Wu, Wen-jiang Liu:
Anti-Congestion Fuzzy Algorithm for Traffic Control of a Class of Traffic Networks. 124-128 - Yu Qiu, Yanqing Zhang, Yichuan Zhao:
Statistical Genetic Interval-Valued Fuzzy Systems with Prediction in Clinical Trials. 129-132 - Yi Cheng, Duoqian Miao, Qinrong Feng:
A Novel Approach to Generating fuzzy Rules Based on Dynamic Fuzzy Rough Sets. 133-
Type-2 Fuzzy Set
- Hooman Tahayori, Andrea Visconti, Giovanni Degli Antoni:
Email Granulation Based On Augmented Interval Type-2 Fuzzy Set Methodologies. 139-144 - Oscar Castillo, Patricia Melin, Janusz Kacprzyk, Witold Pedrycz:
Type-2 Fuzzy Logic: Theory and Applications. 145-150 - Olivia Mendoza, Patricia Melin, Guillermo Licea:
A New Method for Edge Detection in Image Processing Using Interval Type-2 Fuzzy Logic. 151-156 - Juan R. Castro, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz:
Hybrid Learning Algorithm for Interval Type-2 Fuzzy Neural Networks. 157-162
Rough Computing
- Yuhua Qian, Jiye Liang, Chuangyin Dang:
MGRS in Incomplete Information Systems. 163-168 - Chen Wu, Xiaohua Hu, Zhoujun Li, Xiaohua Zhou, Palakorn Achananuparp:
Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules. 169-174 - Chen Wu, Xiaohua Hu, Xiajiong Shen, Xiaodan Zhang, Yi Pan:
An Incremental Algorithm for Mining Default Definite Decision Rules from Incomplete Decision Tables. 175-179 - Guilong Liu, Xiaoli Song, Xiaoxia Zhao:
Rough Sets and Zadeh's Extension Principles. 180-185 - Xiaohong Zhang, Yingcang Ma, Zhanao Xue, Gang Yao:
Implication Operators Based on Rough Set Model over Boolean Algebras. 186-191 - Mehmet R. Tolun, Hayri Sever, A. Kadir Gorur:
Production and Retrieval of Rough Classes in Multi Relations. 192-198 - Qinghua Zhang, Guoyin Wang, Jun Hu, Hai-Tao Teng:
Approximation Partition Spaces of Covering Space. 199-204 - Xiaohong Zhang, Gang Yao:
Generalized Rough Set Model on De Morgan Algebras. 205-208 - Hui Sun, Ying Wang, LinLin He, Qing Liu:
Properties of Rough Sets in Normed Linear Space and its Proof. 209-212 - Wei-Zhi Wu:
Rough Set Approximations Based on Random Sets. 213-216 - Jianhua Dai:
Study on the Axis Problem of Rough 3-Valued Algebras. 217-220 - Yangsheng Ji, Lin Shang:
RoughTree A Classifier with Naive-Bayes and Rough Sets Hybrid in Decision Tree Representation. 221-226 - Fei Chen:
Research on Statistical Relational Learning and Rough Set in SRL. 227-
Rough Set Application
- Jianwen Fang, Jerzy W. Grzymala-Busse:
Predicting Penetration Across the Blood-Brain Barrier - A Rough Set Approach. 231-236 - V. Mary Anita Rajam, V. Uma Maheswari, Arul Siromoney:
Extensions in Mobile Ad Hoc Routing Using Variable Precision Rough Sets. 237-240 - Longjun Huang, Minghe Huang, Bin Guo, Zhiming Zhuang:
A New Method for Constructing Decision Tree Based on Rough Set Theory. 241-244 - Qiusheng An, Gaoping Wang, Wenxiu Zhang:
The Study of Normal Form of Relational Database Based on Rough Sets Theory. 245-248 - Jiucheng Xu, Lin Sun:
Knowledge Reduction and its Rough Entropy Representation of Decision Tables in Rough Set. 249-
Concept Learning
- Janardhana Punuru, Jianhua Chen:
Learning for Semantic Classification of Conceptual Terms. 253-258 - Jing Wang, Fanzhang Li:
Autonomic Learning Model and Algorithm Based on DFL. 259-264 - Cheong Hee Park, Hongsuk Shim:
On Detecting an Emerging Class. 265-270 - Huanling Tang, Mingyu Lu, Na Liu:
Co_NBM: A Semi-Supervised Categorization Algorithm Based TEF_WA Technique. 271-274 - Muhammad Abdul Qadir, Muhammad Fahad, Muhammad Wajahaat Noshairwan:
On Conceptualization Mismatches Between Ontologies. 275-278 - Muhammad Abdul Qadir, Muhammad Fahad, Syed Adnan Hussain Shah:
Incompleteness Errors in Ontology. 279-282 - Muhammad Fahad, Muhammad Abdul Qadir, Muhammad Wajahaat Noshairwan:
Semantic Inconsistency Errors in Ontology. 283-286
Data Mining
- Jan Rauch:
Observational Calculi, Classes of Association Rules and F-property. 287-293 - Jiye Li, Nick Cercone, Robin Cohen:
Addressing Missing Attributes during Data Mining Using Frequent Itemsets and Rough Set Based Predictions. 294-300 - Jerzy W. Grzymala-Busse, Witold J. Grzymala-Busse, Zdzislaw S. Hippe, Wojciech Rzasa:
A Comparison of Three Approximation Strategies for Incomplete Data Sets. 301-306 - Yuefeng Li:
Interpretations of Discovered Knowledge in Multidimensional Databases. 307-312 - Zejin Jason Ding, Jian Yu, Yanqing Zhang:
A New Improved K-Means Algorithm with Penalized Term. 313-317 - Masaaki Kanakubo, Masafumi Hagiwara:
Speed-up Technique for Association Rule Mining Based on an Artificial Life Algorithm. 318-323 - Trevor P. Martin, Yun Shen, Ben Azvine:
Finding Soft Relations in Granular Information Hierarchies. 324-329 - Jiye Li, Nick Cercone, Jianchao Han:
A Method of Finding Representative Sets of Rules. 330-335 - Saeed Reza Ostadzadeh, Mohammad Soleimani, Majid Tayarani:
Prediction of the Input Impedance of Two Coupled Dipole Antennas in the Echelon Form. 336-340 - Albert Sutojo:
Concept Mining Using Association Rule and Combinatorial Topology. 341-346 - Chunqin Gu, HuiYou Chang, Yang Yi:
Overview of Workflow Mining Technology. 347-350 - Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
Tree Mining Application to Matching of Heterogeneous Knowledge Representations. 351-357 - Chin-Ang Wu, Wen-Yang Lin, Chuan-Chun Wu:
Ontology-Assisted Query Formulation in Multidimensional Association Rule Mining. 358-361 - Uday Seelam, Chien-Chung Chan:
A Study of Data Reduction Using Multiset Decision Tables. 362-367 - Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih:
Generating Attack Scenarios with Causal Relationship. 368-373 - Kilho Shin, Justin Zhan:
A Verification Scheme for Data Aggregation in Data Mining. 374-379 - Rupa Parameswaran, Douglas M. Blough:
Privacy Preserving Collaborative Filtering Using Data Obfuscation. 380-386 - Albert Sutojo:
Concept Mining using Association Rules and Combinatorial Topology. 387-
Clustering and Classification
- Fusheng Yu, Keqiang Dong, Fei Chen, Yongke Jiang, Wenyi Zeng:
Clustering Time Series with Granular Dynamic Time Warping Method. 393-398 - Fusheng Yu, Juan Tang, Ruiqiong Cai:
A Necessary Preprocessing in Horizontal Collaborative Fuzzy Clustering. 399-403 - Yasunori Endo, Yukihiro Hamasuna, Sadaaki Miyamoto:
Agglomerative Hierarchical Clustering for Data with Tolerance. 404-409 - Guido Del Vescovo, Antonello Rizzi:
Automatic Classification of Graphs by Symbolic Histograms. 410-416 - Yan Gao, Shiwen Gu, Jianhua Li, Zhining Liao:
A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings. 417-422 - Tuan-Fang Fan, Churn-Jung Liau, Tsau Young Lin:
Positional Analysis in Fuzzy Social Networks. 423-428 - Jiuzhen Liang, Guangbin Li:
Hierarchical Clustering Algorithm Based on Granularity. 429-432 - Ehsan Rahimi, Shahriar Baradaran Shokouhi, Ali Sadr:
A Parallelized and Pipelined Datapath to Implement ISODATA Algorithm for Rosette Scan Images on a Reconfigurable Hardware. 433-436 - Jian Yu, Pengwei Hao:
The Worse Clustering Performance Analysis. 437-441 - Ryo Inokuchi, Sadaaki Miyamoto:
Sparse Possibilistic Clustering with L1 Regularization. 442-
Artificial Intelligence
- Jerry M. Mendel, Dongrui Wu:
Perceptual Reasoning: A New Computing with Words Engine. 446-451 - Rui Yan, Paul C. Boutros, Igor Jurisica, Linda Z. Penn:
Comparison of Machine Learning and Pattern Discovery Algorithms for the Prediction of Human Single Nucleotide Polymorphisms. 452-457 - Hidenao Abe, Shusaku Tsumoto, Miho Ohsaki, Hideto Yokoi, Takahira Yamaguchi:
Evaluation of Learning Costs of Rule Evaluation Models Based on Objective Indices to Predict Human Hypothesis Construction Phases. 458-464 - Shusaku Tsumoto, Shoji Hirano:
Meaning of Pearson Residuals - Linear Algebra View. 465-470 - Changbing Li, Yong Wang, Maokang Du, Changjiang Yue:
Multicast Routing Scheme Based on Chaotic Optimization Adaptive Genetic Algorithm. 471-476 - Xinying Xu, Gaowei Yan, Keming Xie, Tsau Young Lin:
Immune Evolution Algorithm Based Dynamic Path Planning Approach for the Soccer Robot. 477-480 - Xueying Zhang, Yueling Guo, Xuemei Hou:
A Speech Recognition Method of Isolated Words Based on Modified LPC Cepstrum. 481-484 - Sumalee Sonamthiang, Nick Cercone, Kanlaya Naruedomkul:
Discovering Hierarchical Patterns of Students' Learning Behavior in Intelligent Tutoring Systems. 485-489 - Junhee Lee, Sue J. Lee, Yeonchool Park, Sukhan Lee:
Object Recognition Architecture Using Distributed and Parallel Computing with Collaborator. 490-497 - Ziping Zhao, Tingjian Zhao, Yaoting Zhu:
A Maximum Entropy Markov Model for Prediction of Prosodic Phrase Boundaries in Chinese TTS. 498-501 - Hui Wang, Zhiwei Lin:
A Novel Algorithm for Counting All Common Subsequences. 502-
Neural network Computing
- Xueying Zhang, Gaoyun Li, Feng Qiao:
A Speech Endpoint Detection Algorithm Based on Entropy and RBF Neural Network. 506-509 - M. Samer Charifa, Ahmad Suliman, Marwan Bikdash:
Face Recognition Using a Hybrid General Backpropagation Neural Network. 510-515 - Hosein Marzi, Mark Turnbull:
Use of Neural Networks in Forecasting Financial Market. 516-521 - Maryam Esmaeili, Mohamad H. Jabalameli, Zeinab Moghadam:
A New Scheme of EEG Signals Processing in Brain-Computer Interface Systems. 522-527 - Qun Liu, Xiaofeng Liao, Degang Yang, Songtao Guo:
The Research for Hopf Bifurcation in a Single Inertial Neuron Model with External Forcing. 528-533 - HuiYu Jiang, Min Dong, Xiangpeng Li, Feng Yang:
Improved Algorithm of BP Neural Network and its Application to Prediction of K/S Value in Dyeing with Reactive Dyes. 534-537 - Degang Yang, Qun Liu, Yong Wang:
A Novel Delay-Dependent Global Stability Criterion of Delayed Hopfield Neural Networks. 538-541 - Ram Dayal Goyal:
Knowledge Based Neural Network for Text Classification. 542-547 - Jun Xie, Gaowei Yan, Keming Xie, Tsau Young Lin:
Neuro-Fuzzy Model-Based CUSUM Method Application in Fault Detection on an Autonomous Vehicle. 548-551 - Zhiguo Cao, Yang Xiao, Lamei Zou:
The Application of Run-Length Features in Remote Sensing Classification Combined with Neural Network and Rough Set. 552-557 - Min Dong, HuiYu Jiang, Xiangpeng Li, Qing Liu:
An Application of CP Neural Network Based on Rough Set in Image Edge Detection. 558-
Computer/Network/Internet Security
- Xuren Wang, Famei He, Lizhen Liu:
Application of Rough Set Theory to Intrusion Detection System. 562-565 - Dat Tran, Wanli Ma, Dharmendra Sharma, Thien Nguyen:
Fuzzy Vector Quantization for Network Intrusion Detection. 566-570 - Dat Tran, Wanli Ma, Dharmendra Sharma, Thien Nguyen:
Possibility Theory-Based Approach to Spam Email Detection. 571-575 - Akkapeddi Chandra Sekhar, K. Rama Sudha, P. V. G. D. Prasad Reddy:
Data Encryption Technique Using Random Number Generator. 576-579 - Min Li, Shaobo Deng, ChunHua Zhou:
Research on Adaptive Congestion Control Based on One Way Delay. 580-583 - James Kuodo Huang, Bang-su Chen:
SRML Learning Game Theory with Application to Internet Security and Management Systems. 584-587 - Baixing Chen, Xiufen Fu, Xiayu Zhang, Lei Su, Dan Wu:
Design and Implementation of Intranet Security Audit System Based on Load Balancing. 588-591 - Zhen Liu:
Grid-Based Service Creation for Next-Generation Networks. 592-597 - Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:
Secure Similarity Search. 598-
Biomedical and Bioinformatics
- Min Hu, Weiming Sun:
MHC Regulation Based Immune Formula Discovering Algorithm (IFDA). 605-610 - Shusaku Tsumoto:
Mining Diagnostic Taxonomy and Diagnostic Rules for Multi-Stage Medical Diagnosis from Hospital Clinical Data. 611-616 - Yutaka Hata, Katsuya Kondo, Syoji Kobashi:
Fine Granule Evaluation Model from Coarse Granule in Medical Ultrasonic System. 617-621 - Mitsuhiro Yoneda, Hiroshi Tasaki, Naoki Tsuchiya, Hiroshi Nakajima, Takehiro Hamaguchi, Shojiro Oku, Toshikazu Shiga:
A Study of Bioelectrical Impedance Analysis Methods for Practical Visceral Fat Estimation. 622-627 - James Kuodo Huang:
On Systems Software Engineering with Application to Bioinformatics. 628-631 - Syoji Kobashi, Yuko Fujimoto, Masayo Ogawa, Kumiko Ando, Reiichi Ishikura, Katsuya Kondo, Shozo Hirota, Yutaka Hata:
Fuzzy-ASM Based Automated Skull Stripping Method from Infantile Brain MR Images. 632-635 - Satoshi Yamaguchi, Kouki Nagamune, Keisuke Oe, Syoji Kobashi, Katsuya Kondo, Yutaka Hata:
Fuzzy Logic Approach to Identification of Cellular Quantity by Ultrasonic System. 636-639 - Wei Gao:
New Computational Model from Ant Colony. 640-643 - Dan Li, Jitender S. Deogun, Kefei Wang:
Gene Function Classification Using Fuzzy K-Nearest Neighbor Approach. 644-647 - Jian Wen, Zhoujun Li:
Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification. 648-
Support Vector Machine
- Pawan Lingras, Cory J. Butz:
Precision and Recall in Rough Support Vector Machines. 654-658 - Ying Sai, Zheng Yuan, Kanglin Gao:
Mining Stock Market Tendency by RS-Based Support Vector Machines. 659-664 - Manabu Nii, Shigeru Ando, Yutaka Takahashi, Atsuko Uchinuno, Reiko Sakashita:
Nursing-Care Freestyle Text Classification Using Support Vector Machines. 665-
Web Intelligence
- Xiajiong Shen, Yan Xu, Junyang Yu, Ke Zhang:
Intelligent Search Engine Based on Formal Concept Analysis. 669-674 - Xiayu Zhang, Yongquan Yu, Baixing Chen, Feng Ye, Tan Xingxing:
An Extension-Based Dynamic Load Balancing Model of Heterogeneous Server Cluster. 675-679 - Li Lu, Tsau Young Lin:
Granular Index for XML Database. 680-685 - Guido Del Vescovo, Antonello Rizzi:
Online Handwriting Recognition by the Symbolic Histograms Approach. 686-690 - Zhongda Lin, Kun Deng, Yanfen Hong:
Research of Web Pages Categorization. 691-694 - Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng:
Enhancing Discovery of Web Services through Optimized Algorithms. 695-698 - Youngho Kim, Yuchul Jung, Sung-Hyon Myaeng:
Identifying Opinion Holders in Opinion Text from Online Newspapers. 699-
Information Retrieval and Text Mining
- Chang Liu, Hui Wang, Sally I. McClean, Jun Liu, Shengli Wu:
Syntactic Information Retrieval. 703-707 - Haiyi Zhang, Di Li:
Naïve Bayes Text Classifier. 708-711 - Ivan S. Radev:
Visual Search of Web Multimedia Information Supported by the XHMG System. 712-
Quotient and Quantum Computing
- Michael Cebulla:
Fuzzy Quotients in Reactive Common Sense Reasoning. 718-723 - Shuping He, Fanzhang Li:
A Symmetrical Linear Transform Learning Algorithm on Quantum Group. 724-727 - Yuejin Lv, Nan-Xing Liu:
Application of Quantum Genetic Algorithm on Finding Minimal Reduct. 728-
Others
- Jingtao Yao:
A Ten-year Review of Granular Computing. 734-739 - Fengbin Zheng, Xiajiong Shen, Qiang Ge:
A Study of the Query Target of the Chinese Query Sentence. 740-744 - Mi-Young Park, Seok Young Kim, Hyuk-Ro Park:
Visualization of Affect-Relations of Message Races for Debugging MPI Programs. 745-750 - Mehdi Hakimi, Seyyed Masoud Moghaddas Tafreshi, M. R. Rajati:
Unit Sizing of a Stand-Alone Hybrid Power System Using Model-Free Optimization. 751-756 - Su-Fen Chen, Hui Sun:
Application of Swarm Intelligence Algorithm to Improve on Multiple Regression. 757-760 - Dilip Gopichand Khairnar, S. N. Merchant, Uday B. Desai:
Nonlinear Target Identification and Tracking Using UKF. 761-764 - Mark B. Moss:
Comparing Centralized and Distributed Approaches for Operational Impact Analysis in Enterprise Systems. 765-769 - Lisa Singh, Justin Zhan:
Measuring Topological Anonymity in Social Networks. 770-774 - Antoni Martínez-Ballesté, Agusti Solanas:
Privacy in the Information and Communications Technologies. 775-780 - Tingting Chen, Sheng Zhong:
Enhancing Privacy of Released Database. 781-786 - Ran Wei, Justin Zhan:
Improved Customers' Privacy Preference Policy. 787-792
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.