{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:38:24Z","timestamp":1729633104925,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fuzzy.2005.1452381","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T21:00:20Z","timestamp":1122498020000},"page":"132-137","source":"Crossref","is-referenced-by-count":3,"title":["Granular Computing: A Problem Solving Paradigm"],"prefix":"10.1109","author":[{"family":"Tsau Young Lin","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"199","article-title":"Level Construction of Decision Trees in a Partition-based Framework for Classification","author":"yao","year":"2004","journal-title":"Proceedings of the 16th International Conference on Software Engineering and Knowledge Engineering (SEKE'04)"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/362663.362735"},{"key":"ref33","first-page":"69","article-title":"Exploiting Upper Approximations in the Rough Set Model","author":"raghavan","year":"1995","journal-title":"Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD'95) Spansored by AAAI in cooperation with nCAI"},{"year":"1991","author":"pawlak","article-title":"Rough Sets-Theoretical Aspects of Reasoning about Data","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/BF01001956"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/354876.354878"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.artmed.2004.03.002"},{"key":"ref36","first-page":"94","article-title":"Fuzzy Algorithms","volume":"19","author":"zadeh","year":"1969","journal-title":"Information Control"},{"year":"2002","author":"szyperski","article-title":"Component Software: Beyond Object-Oriented Programming","key":"ref35"},{"year":"1956","author":"sierpenski","article-title":"General Topology","key":"ref34"},{"key":"ref10","first-page":"135","article-title":"A New Rough Set Model Based on Database Systems","volume":"59","author":"hu","year":"2004","journal-title":"Fundamenta Inform"},{"year":"2004","author":"yao","article-title":"A partition model of granular computing to appear in LNCS Transactions on Rough Sets","key":"ref40"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-642-18859-6_11","article-title":"New Fuzzy Rough Sets Based on Certainty Qualification","author":"inuiguchi","year":"2004","journal-title":"Rough-Neural Computing Techniques for Computing with Words"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1002\/j.1538-7305.1983.tb03470.x"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/322609.323183"},{"key":"ref14","first-page":"286","article-title":"Chinese Wall Security Policy-An Aggressive Model","author":"lin","year":"1989","journal-title":"Proceedings of the Fifth Aerospace Computer Security Application Conference"},{"key":"ref15","first-page":"75","article-title":"Neighborhood systems and approximation in database and knowledge base systems","author":"lin","year":"1989","journal-title":"Proceedings of the Fourth International Symposium on Methodologies of Intelligent Systems (Poster Session)"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-94-015-7975-9_18"},{"key":"ref17","first-page":"404","article-title":"Non-classificatory Generalization in Data Mining","author":"hadjimichael","year":"1996","journal-title":"Proc Fourth Int l Workshop Rough Sets Fuzzy Sets and Machine Discovery"},{"key":"ref18","first-page":"107","article-title":"Granular computing on binary relations i: data mining and neighborhood systems","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"key":"ref19","first-page":"121","article-title":"Granular Computing on Binary Relations ii: Rough set representations and belief functions","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1002\/int.20015"},{"key":"ref4","first-page":"206","article-title":"The Chinese Wall Security Policy","author":"brewer","year":"1988","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref27","first-page":"77","article-title":"Application of fuzzy set theory to control systems","author":"mamdani","year":"1977","journal-title":"Advances in Fuzzy Set Theory and Applications"},{"year":"1977","author":"birkhoff","article-title":"A Survey of Modern Algebra","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/BF00962924"},{"key":"ref29","first-page":"85","article-title":"Supportin Gaol Queries","author":"motro","year":"1986","journal-title":"Proceeding of the First Internatonal Conference on Expert Database Systems"},{"year":"1992","author":"brualdi","article-title":"Introductory Combinatorics","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/362007.362015"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/978-3-540-27794-1_3","article-title":"Data with missing attribute values: Generalization of idiscernibility relation and rule induction","volume":"1","author":"grzymala-busse","year":"2004","journal-title":"Transactions on Rough Sets Lecture Notes in Computer Science Journal Subline"},{"year":"1981","author":"barr","article-title":"The Handbook of Artificial Intelligence","key":"ref2"},{"key":"ref9","first-page":"432","article-title":"Granularity","author":"hobbs","year":"1985","journal-title":"Proceedings of the Ninth International Joint Conference on Artificial Intelligence"},{"year":"1974","author":"aho","article-title":"The Design and Analysis of Computer Algorithms","key":"ref1"},{"year":"1992","author":"zhang","article-title":"Theory and Applications of Problem Solving","key":"ref46"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-7908-1873-4_9","article-title":"Granular computing: Fuzzy logic and rough sets","author":"lin","year":"1999","journal-title":"Computing with Words in Information\/Intelligent Systems"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/978-3-7908-1791-1_1"},{"key":"ref22","article-title":"A Theory of Derived Attributes and Attribute Completion","author":"lin","year":"2002","journal-title":"Proceedings of IEEE International Conference on Data Mining"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1023\/A:1008384328214"},{"key":"ref42","first-page":"3","article-title":"Fuzzy sets and information granularity","author":"zadeh","year":"1979","journal-title":"Advances in Fuzzy Set Theory and Applications"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-540-25929-9_14"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TSMC.1973.5408575"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/1-4020-8070-0_20"},{"key":"ref44","first-page":"23","article-title":"Some reflections on soft computing, granular computing and their roles in the conception","volume":"2","author":"zadeh","year":"1998","journal-title":"design and utilization of information\/intelligent systems Soft Computing"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TC.1977.1674779"},{"key":"ref43","article-title":"The Key Roles of Information Granulation and Fuzzy logic in Human Reasoning","author":"zadeh","year":"1996","journal-title":"1996 IEEE International Conference on Fuzzy Systems"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/S0020-7373(75)80002-2"}],"event":{"name":"The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05.","location":"Reno, Nevada, USA"},"container-title":["The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9859\/31200\/01452381.pdf?arnumber=1452381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:36:42Z","timestamp":1497634602000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1452381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2005.1452381","relation":{},"subject":[]}}