default search action
1. RSKT 2006: Chongqing, China
- Guoyin Wang, James F. Peters, Andrzej Skowron, Yiyu Yao:
Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings. Lecture Notes in Computer Science 4062, Springer 2006, ISBN 3-540-36297-5
Commemorative Paper
- James F. Peters, Andrzej Skowron:
Some Contributions by Zdzislaw Pawlak. 1-11
Keynote Papers
- Zdzislaw Pawlak:
Conflicts and Negotations. 12-27 - Ling Zhang, Bo Zhang:
Hierarchical Machine Learning - A Learning Methodology Inspired by Human Intelligence. 28-30 - Sankar K. Pal:
Rough-Fuzzy Granulation, Rough Entropy and Image Segmentation. 31 - Jiming Liu:
Towards Network Autonomy. 32
Plenary Papers
- Tsau Young Lin:
A Roadmap from Rough Set Theory to Granular Computing. 33-41 - Wojciech Ziarko:
Partition Dependencies in Hierarchies of Probabilistic Decision Tables. 42-49 - Yixin Zhong:
Knowledge Theory and Artificial Intelligence. 50-56 - Andrzej Czyzewski:
Applications of Knowledge Technologies to Sound and Vision Engineering. 57 - Jerzy W. Grzymala-Busse:
A Rough Set Approach to Data with Missing Attribute Values. 58-67 - Jing-Long Wu:
Cognitive Neuroscience and Web Intelligence. 68 - Yingxu Wang:
Cognitive Informatics and Contemporary Mathematics for Knowledge Manipulation. 69-78 - Lech Polkowski:
Rough Mereological Reasoning in Rough Set Theory: Recent Results and Problems. 79-92 - Qing Liu, Hui Sun:
Theoretical Study of Granular Computing. 93-102 - Hung Son Nguyen:
Knowledge Discovery by Relation Approximation: A Rough Set Approach. 103-106
Rough Computing
- Jingyu Jin, Keyun Qin, Zheng Pei:
Reduction-Based Approaches Towards Constructing Galois (Concept) Lattices. 107-113 - Dayong Deng, Houkuan Huang:
A New Discernibility Matrix and Function. 114-121 - Yusheng Cheng, Yousheng Zhang, Xuegang Hu:
The Relationships Between Variable Precision Value and Knowledge Reduction Based on Variable Precision Rough Sets Model. 122-128 - Tongjun Li:
On Axiomatic Characterization of Approximation Operators Based on Atomic Boolean Algebras. 129-134 - Hong-Ru Li, Wen-Xiu Zhang, Ping Xu, Hong Wang:
Rough Set Attribute Reduction in Decision Systems. 135-140 - Xuri Yin, Xiuyi Jia, Lin Shang:
A New Extension Model of Rough Sets Under Incomplete Information. 141-146 - Michinori Nakata, Hiroshi Sakai:
Applying Rough Sets to Data Tables Containing Possibilistic Information. 147-155 - Huanglin Zeng, Hengyou Lan, Xiaohui Zeng:
Redundant Data Processing Based on Rough-Fuzzy Approach. 156-161 - Zaiyue Zhang, Yuefei Sui, Cungen Cao:
Further Study of the Fuzzy Reasoning Based on Propositional Modal Logic. 162-169 - Fan Min, Qihe Liu, Hao Tan, Leiting Chen:
The M-Relative Reduct Problem. 170-175 - Feng Jiang, Yuefei Sui, Cungen Cao:
Rough Contexts and Rough-Valued Contexts. 176-183 - Yuhua Qian, Jiye Liang:
Combination Entropy and Combination Granulation in Incomplete Information System. 184-190 - Jigui Sun, Huawen Liu, Huijie Zhang:
An Extension of Pawlak's Flow Graphs. 191-199 - Jianhua Dai, Weidong Chen, Yunhe Pan:
Rough Sets and Brouwer-Zadeh Lattices. 200-207 - Tao Feng, Ju-Sheng Mi, Wei-Zhi Wu:
Covering-Based Generalized Rough Fuzzy Sets. 208-215 - William Zhu, Fei-Yue Wang:
Axiomatic Systems of Generalized Rough Sets. 216-221 - Gang Xie, Xuebin Liu, Lifei Wang, Keming Xie:
Rough-Sets-Based Combustion Status Diagnosis. 222-226 - Jun Zhao, Guoyin Wang:
Research on System Uncertainty Measures Based on Rough Set Theory. 227-232 - Andrzej Skowron, Sheela Ramanna, James F. Peters:
Conflict Analysis and Information Systems: A Rough Set Approach. 233-240 - Qingxiang Wu, Jianyong Cai, Girijesh Prasad, T. Martin McGinnity, David A. Bell, Jiwen Guan:
A Novel Discretizer for Knowledge Discovery Approaches Based on Rough Sets. 241-246 - Kaiquan Shi, Bingxue Yao:
Function S-Rough Sets and Recognition of Financial Risk Laws. 247-253 - Wei-Zhi Wu, Ju-Sheng Mi:
Knowledge Reduction in Incomplete Information Systems Based on Dempster-Shafer Theory of Evidence. 254-261 - Yuxia Qiu, Keming Xie, Gang Xie:
Decision Rules Extraction Strategy Based on Bit Coded Discernibility Matrix. 262-267 - Pawel Terlecki, Krzysztof Walczak:
Attribute Set Dependence in Apriori-Like Reduct Computation. 268-276 - Gianpiero Cattaneo, Davide Ciucci:
Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part I. 277-283 - Gianpiero Cattaneo, Davide Ciucci:
Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part II. 284-289 - Mikhail Ju. Moshkov, Marcin Piliszczuk, Beata Zielosko:
Lower Bounds on Minimal Weight of Partial Reducts and Partial Decision Rules. 290-296 - Yiyu Yao, Yan Zhao, Jue Wang:
On Reduct Construction Algorithms. 297-304 - Dominik Slezak:
Association Reducts: Boolean Representation. 305-312 - Piero Pagliani:
Notes on Rough Sets and Formal Concepts. 313-320
Evolutionary Computing
- Kaiyou Lei, Yuhui Qiu, Xuefei Wang, Yi He:
High Dimension Complex Functions Optimization Using Adaptive Particle Swarm Optimizer. 321-326 - Zhihua Cui, Jianchao Zeng, Guoji Sun:
Adaptive Velocity Threshold Particle Swarm Optimization. 327-332
Fuzzy Sets
- Wenyi Zeng, Qilei Feng, Hongxing Li:
Relationship Between Inclusion Measure and Entropy of Fuzzy Sets. 333-340 - Yong Liu, Guoyin Wang, Lin Feng:
A General Model for Transforming Vague Sets into Fuzzy Sets. 341-348 - Yun-Zhi Zou, Nan-Jing Huang:
An Iterative Method for Quasi-Variational-Like Inclusions with Fuzzy Mappings. 349-356
Granular Computing
- Lai Wei, Duoqian Miao:
Application of Granular Computing in Knowledge Reduction. 357-362 - Li-Quan Zhao, Ling Zhang:
Advances in the Quotient Space Theory and Its Applications. 363-370 - Qiusheng An, Wenxiu Zhang:
The Measures Relationships Study of Three Soft Rules Based on Granular Computing. 371-376
Neural Computing
- Askin Demirkol:
A Generalized Neural Network Architecture Based on Distributed Signal Processing. 377-382 - Jiuzhen Liang, Xiaohong Wu:
Worm Harm Prediction Based on Segment Procedure Neural Networks. 383-388 - Andrzej Czyzewski, Bozena Kostek, Przemyslaw Maziewski, Lukasz Litwic:
Accidental Wow Defect Evaluation Using Sinusoidal Analysis Enhanced by Artificial Neural Networks. 389-395 - Xianghua Fu, Zhiqiang Wang, Boqin Feng:
A Constructive Algorithm for Training Heterogeneous Neural Network Ensemble. 396-401
Machine Learning and KDD
- Yu Zhang, Zhidong Deng, Hongshan Jiang, Peifa Jia:
Gene Regulatory Network Construction Using Dynamic Bayesian Network (DBN) with Structure Expectation Maximization (SEM). 402-407 - Yuhai Zhao, Ying Yin, Guoren Wang:
Mining Biologically Significant Co-regulation Patterns from Microarray Data. 408-414 - Bo He, Yue Wang, Wu Yang, Yuan Chen:
Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed Database. 415-420 - Shuqin Wang, Jinmao Wei, Junping You, Dayou Liu:
A VPRSM Based Approach for Inducing Decision Trees. 421-429 - Libiao Zhang, Ming Ma, Xiaohua Liu, Caitang Sun, Miao Liu, Chunguang Zhou:
Differential Evolution Fuzzy Clustering Algorithm Based on Kernel Methods. 430-435 - Ziqiang Wang, Xia Sun, Dexian Zhang:
Classification Rule Mining Based on Particle Swarm Optimization. 436-441 - Bing Liu, Zhihui Wang, Xiaoming Yang, Wei Wang, Baile Shi:
A Bottom-Up Distance-Based Index Tree for Metric Space. 442-449 - Bing Liu, Jianjun Xu, Zhihui Wang, Wei Wang, Baile Shi:
Subsequence Similarity Search Under Time Shifting. 450-455 - Hidenao Abe, Shusaku Tsumoto, Miho Ohsaki, Takahira Yamaguchi:
Developing a Rule Evaluation Support Method Based on Objective Indices. 456-461 - Genting Yan, Guangfu Ma, Liangkuan Zhu:
Data Dimension Reduction Using Rough Sets for Support Vector Classifier. 462-467 - Tianming Hu, Weiquan Zhao, Xiaoqiang Wang, Zhixiong Li:
A Comparison of Three Graph Partitioning Based Methods for Consensus Clustering. 468-475 - Tieyun Qian, Yuanzhen Wang, Langgang Xiang, WeiHua Gong:
Feature Selection, Rule Extraction, and Score Model: Making ATC Competitive with SVM. 476-481 - Julio J. Valdés, Alan J. Barton:
Relevant Attribute Discovery in High Dimensional Data: Application to Breast Cancer Gene Expressions. 482-489 - Kin Keung Lai, Lean Yu, Ligang Zhou, Shouyang Wang:
Credit Risk Evaluation with Least Square Support Vector Machine. 490-495 - Xuegang Hu, Haitao Yu:
The Research of Sampling for Mining Frequent Itemsets. 496-501 - Wenbin Li, Ning Zhong, Chunnian Liu:
ECPIA: An Email-Centric Personal Intelligent Assistant. 502-509 - Cui-Xia Li, Jian Yu:
A Novel Fuzzy C-Means Clustering Algorithm. 510-515 - Lifang Xu, Hongwei Mo, Kejun Wang, Na Tang:
Document Clustering Based on Modified Artificial Immune Network. 516-521 - Xia Wang, Jianmin Ma:
A Novel Approach to Attribute Reduction in Concept Lattices. 522-529 - Zheng Zheng, Qing He, Zhongzhi Shi:
Granule Sets Based Bilevel Decision Model. 530-537 - Jingtao Yao, Songlun Zhao, Lisa Fan:
An Enhanced Support Vector Machine Model for Intrusion Detection. 538-543 - Ling Wang, Liefeng Bo, Licheng Jiao:
A Modified K-Means Clustering with a Density-Sensitive Distance Metric. 544-551 - Lei Xie:
Swarm Intelligent Tuning of One-Class nu-SVM Parameters. 552-559 - Zhiwu Lu, Xiaoqing Lu:
A Generalized Competitive Learning Algorithm on Gaussian Mixture with Automatic Model Selection. 560-567 - Bin Zou, Luoqing Li, Jie Xu:
The Generalization Performance of Learning Machine with NA Dependent Sequence. 568-573 - Boyun Zhang, Jianping Yin, Jingbo Hao:
Using RS and SVM to Detect New Malicious Executable Codes. 574-579 - Yongsheng Zhao, Xiaofeng Zhang, Shixiang Jia, Fuzeng Zhang:
Applying PSO in Finding Useful Features. 580-585
Logics and Reasoning
- Zhicheng Chen, Mingyi Mao, Huacan He, Weikang Yang:
Generalized T-norm and Fractional "AND" Operation Model. 586-591 - Xia Wu, Jigui Sun, Shuai Lu, Ying Li, Wei Meng, Minghao Yin:
Improved Propositional Extension Rule. 592-597 - Soo Jin Jun, Sun-Gwan Han, Hae-Young Kim:
Web Services-Based Digital Library as a CSCL Space Using Case-Based Reasoning. 598-603 - Qi Xie, Dayou Liu, Haibo Yu:
Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules. 604-609 - Cungen Cao, Yuefei Sui, Zaiyue Zhang:
The Rough Logic and Roughness of Logical Theories. 610-617
Multiagent Systems and Web Intelligence
- Minwoo Son, Dongkyoo Shin, Dongil Shin:
Research on Multi-Agent Service Bundle Middleware for Smart Space. 618-625 - Xue Xiao, Dan Dai, Yiren Zhou:
A Customized Architecture for Integrating Agent Oriented Methodologies. 626-631 - Na Luo, Wanli Zuo, Fuyu Yuan, Changli Zhang:
A New Method for Focused Crawler Cross Tunnel. 632-637 - Baolin Liu, Bo Hu:
Migration of the Semantic Web Technologies into E-Learning Knowledge Management. 638-642 - Ji Wu, Chaoqun Ye, Shiyao Jin:
Opponent Learning for Multi-agent System Simulation. 643-650
Pattern Recognition
- Xinbo Gao, Jie Li, Yang Shi:
A Video Shot Boundary Detection Algorithm Based on Feature Tracking. 651-658 - Jianping Shi, Zhengjun Zhai:
Curvelet Transform for Image Authentication. 659-664 - Weixing Wang:
An Image Segmentation Algorithm for Densely Packed Rock Fragments of Uneven Illumination. 665-670 - Xiping He, Qingsheng Zhu, Ping Gu:
A New Chaos-Based Encryption Method for Color Image. 671-678 - Liyong Ma, Jiachen Ma, Yi Shen:
Support Vector Machines Based Image Interpolation Correction Scheme. 679-684 - Wangxin Xiao, Xinping Yan, Xue Zhang:
Pavement Distress Image Automatic Classification Based on DENSITY-Based Neural Network. 685-692 - Stefania Bandini, Silvia Calegari, Paolo Radaelli:
Towards Fuzzy Ontology Handling Vagueness of Natural Languages. 693-700 - Jin-an Guan:
Evoked Potentials Estimation in Brain-Computer Interface Using Support Vector Machine. 701-706 - Gexiang Zhang:
Intra-pulse Modulation Recognition of Advanced Radar Emitter Signals Using Intelligent Recognition Method. 707-712 - Yifeng Niu, Lincheng Shen, Yanlong Bu:
Multi-objective Blind Image Fusion. 713-720
System Engineering and Description
- Chunguang Ji, Xiancui Lv, Shiyong Li:
The Design of Biopathway's Modelling and Simulation System Based on Petri Net. 721-726 - Hua Xu, Peifa Jia:
Timed Hierarchical Object-Oriented Petri Net-Part I: Basic Concepts and Reachability Analysis. 727-734 - Yinglong Ma, Kehe Wu, Beihong Jin, Shaohua Liu:
Approximate Semantic Query Based on Multi-agent Systems. 735-741
Real-Life Applications Based on Knowledge Technology
- Lei Xie, Jianming Zhang:
Swarm Intelligent Analysis of Independent Component and Its Application in Fault Detection and Diagnosis. 742-749 - Gang Xie, Jinlong Zhang, K. K. Lai:
Using VPRS to Mine the Significance of Risk Factors in IT Project Management. 750-757 - Jianwen Fang, Jerzy W. Grzymala-Busse:
Mining of MicroRNA Expression Data - A Rough Set Approach. 758-765 - Wenqing Zhao, Yongli Zhu:
Classifying Email Using Variable Precision Rough Set Approach. 766-771 - Peijun Chen, Guoyin Wang, Yong Yang, Jian Zhou:
Facial Expression Recognition Based on Rough Set Theory and SVM. 772-777 - Dingfang Li, Wen Zhang:
Gene Selection Using Rough Set Theory. 778-785 - Mao Ye, Boqin Feng, Li Zhu, Yao Lin:
Attribute Reduction Based Expected Outputs Generation for Statistical Software Testing. 786-791 - Dan Li, Kefei Wang, Jitender S. Deogun:
FADS: A Fuzzy Anomaly Detection System. 792-798 - Yong Mao, Xiaobo Zhou, Zheng Yin, Daoying Pi, Youxian Sun, Stephen T. C. Wong:
Gene Selection Using Gaussian Kernel Support Vector Machine Based Recursive Feature Elimination with Adaptive Kernel Width Strategy. 799-806
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.