{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T01:10:03Z","timestamp":1736557803713,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540362975"},{"type":"electronic","value":"9783540362999"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11795131_6","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T15:48:02Z","timestamp":1159285682000},"page":"33-41","source":"Crossref","is-referenced-by-count":20,"title":["A Roadmap from Rough Set Theory to Granular Computing"],"prefix":"10.1007","author":[{"given":"Tsau Young","family":"Lin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1007\/11548669_75","volume-title":"Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing","author":"I.-J. Chiang","year":"2005","unstructured":"Chiang, I.-J., Lin, T.Y., Liu, Y.: Table Representations of Granulations Revisited. In: \u015al\u0119zak, D., Wang, G., Szczuka, M., D\u00fcntsch, I., Yao, Y. (eds.) RSFDGrC 2005. LNCS (LNAI), vol.\u00a03641, pp. 728\u2013737. Springer, Heidelberg (2005)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Halmos, P.: Measure Theory, Van Nostrand (1950)","DOI":"10.1007\/978-1-4684-9440-2"},{"issue":"10","key":"6_CR3","doi-asserted-by":"crossref","first-page":"3159","DOI":"10.1002\/j.1538-7305.1983.tb03470.x","volume":"62","author":"T.T. Lee","year":"1983","unstructured":"Lee, T.T.: Algebraic Theory of Relational Databases. The Bell System Technical Journal\u00a062(10), 3159\u20133204 (1983)","journal-title":"The Bell System Technical Journal"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Lin, T.Y.: Neighborhood Systems and Relational Database. In: Proc. of 1988 ACM Sixteen Annual Computer Science Conference (abstract), February 1988, p. 725 (1988)","DOI":"10.1145\/322609.323183"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Lin, T.Y.: Chinese Wall Security Policy \u2013 An Aggressive Model. In: Proc. of the Fifth Aerospace Computer Security Application Conference, Tuscon, Arizona, USA, pp. 282\u2013289 (1989)","DOI":"10.1109\/CSAC.1989.81064"},{"key":"6_CR6","unstructured":"Lin, T.Y.: Neighborhood Systems and Approximation in Database and Knowledge Base Systems. In: Proceedings of the Fourth International Symposium on Methodologies of Intelligent Systems, Poster Session, October 12-15, 1989, pp. 75\u201386 (1989)"},{"key":"6_CR7","first-page":"287","volume-title":"Decision Support by Experience \u2013 Application of the Rough Sets Theory","author":"T.Y. Lin","year":"1992","unstructured":"Lin, T.Y.: Topological and Fuzzy Rough Sets. In: Slowinski, R. (ed.) Decision Support by Experience \u2013 Application of the Rough Sets Theory, pp. 287\u2013304. Kluwer Academic Publishers, Dordrecht (1992)"},{"key":"6_CR8","first-page":"107","volume-title":"Rough Sets in Knowledge Discovery","author":"T.Y. Lin","year":"1998","unstructured":"Lin, T.Y.: Granular Computing on Binary Relations I: Data Mining and Neighborhood Systems. In: Polkowski, L., Skowron, A. (eds.) Rough Sets in Knowledge Discovery, pp. 107\u2013120. Physica-Verlag, Heidelberg (1998)"},{"key":"6_CR9","first-page":"121","volume-title":"Rough Sets in Knowledge Discovery","author":"T.Y. Lin","year":"1998","unstructured":"Lin, T.Y.: Granular Computing on Binary Relations II: Rough Set Representations and Belief Functions. In: Polkowski, L., Skowron, A. (eds.) Rough Sets in Knowledge Discovery, pp. 121\u2013140. Physica-Verlag, Heidelberg (1998)"},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1023\/A:1008384328214","volume":"13","author":"T.Y. Lin","year":"2000","unstructured":"Lin, T.Y.: Data Mining and Machine Oriented Modeling: A Granular Computing Approach. Journal of Applied Intelligence\u00a013(2), 113\u2013124 (2000)","journal-title":"Journal of Applied Intelligence"},{"key":"6_CR11","first-page":"275","volume-title":"Data and Applications Security XUII: Status and Prospects","author":"T.Y. Lin","year":"2003","unstructured":"Lin, T.Y.: Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses. In: Uimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XUII: Status and Prospects, pp. 275\u2013297. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"6_CR12","unstructured":"Lin, T.Y.: Granular Computing from Rough Set Prospect. IEEE Computational Intelligence Society Newsletter (November 2004)"},{"key":"6_CR13","unstructured":"Lin, T.Y.: Granular Computing: Examples, Intuition, and Modeling. In: The Proceedings of the 2005 IEEE International Conference on Granular Computing Beijing, China, July 25-27, 2005, pp. 40\u201344 (2005)"},{"key":"6_CR14","unstructured":"Lin, T.Y.: Topological Rough Sets and Granular Computing on Symmetric Binary Relations. J. of General Systems (to appear, 2006)"},{"key":"6_CR15","unstructured":"Lin, T.Y.: Granular Computing II: Infrastructures for AI-Engineering. In: Proc. of IEEE GrC 2006, May 10-12, 2006, Atlanta, Georgia, USA (2006)"},{"key":"6_CR16","volume-title":"Topology","author":"J. Munkres","year":"2000","unstructured":"Munkres, J.: Topology, 2nd edn. Prentice-Hall, Englewood Cliffs (2000)","edition":"2"},{"key":"6_CR17","volume-title":"Rough Sets. Theoretical Aspects of Reasoning about Data","author":"Z. Pawlak","year":"1991","unstructured":"Pawlak, Z.: Rough Sets. Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, Dordrecht (1991)"},{"key":"6_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7908-1776-8","volume-title":"Rough Sets: Mathematical Foundations","author":"L. Polkowski","year":"2002","unstructured":"Polkowski, L.: Rough Sets: Mathematical Foundations. Physica-Verlag, Heidelberg (2002)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Sierpi\u0144ski, W., Krieger, C.: General Topology. University of Toronto Press (1952)","DOI":"10.3138\/9781487584894"},{"issue":"1-2","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2005.01.017","volume":"172","author":"L.A. Zadeh","year":"2005","unstructured":"Zadeh, L.A.: Toward a generalized theory of uncertainty (GTU) \u2013 an outline. Inf. Sci.\u00a0172(1-2), 1\u201340 (2005)","journal-title":"Inf. Sci."},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0022-0000(93)90048-2","volume":"46","author":"W. Ziarko","year":"1993","unstructured":"Ziarko, W.: Variable Precision Rough Set Model. J. Comput. Syst. Sci.\u00a046(1), 39\u201359 (1993)","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11795131_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:56:32Z","timestamp":1736556992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11795131_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540362975","9783540362999"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11795131_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}