{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:54:48Z","timestamp":1747810488855,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/grc.2005.1547232","type":"proceedings-article","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T20:49:09Z","timestamp":1134247749000},"page":"40-44 Vol. 1","source":"Crossref","is-referenced-by-count":30,"title":["Granular computing: examples, intuitions and modeling"],"prefix":"10.1109","author":[{"given":"T.Y.","family":"Lin","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"132","article-title":"Granular computing: A problem solving paradigm","author":"lin","year":"2005","journal-title":"The Proceedings of the 2005 IEEE International Conference on Fuzzy Systems"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(68)90211-8"},{"key":"17","article-title":"A theory of derived attributes and attribute completion","author":"lin","year":"2002","journal-title":"Proceedings of IEEE International Conference on Data Mining"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.5408575"},{"journal-title":"Table Representations of Granulations Revisited Topological Rough Set Theory Will Be in LNAI","year":"2005","author":"lin","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7949-0"},{"key":"15","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-7908-1873-4_9","article-title":"Granular computing: Fuzzy logic and rough sets","author":"lin","year":"1999","journal-title":"Computing with Words in Information\/Intelligent Systems"},{"key":"34","first-page":"199","article-title":"Level construction of decision trees in a partition-based framework for classification","author":"yao","year":"2004","journal-title":"Proceedings of the 16th International Conference on Software Engineering and Knowledge Engineering (SEKE'04)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008384328214"},{"key":"13","first-page":"107","article-title":"Granular computing on binary relations i: Data mining and neighborhood systems","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"key":"14","first-page":"121","article-title":"Granular computing on binary relations ii: Rough set representations and belief functions","author":"lin","year":"1998","journal-title":"Rough Sets in Knowledge Discovery"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1996.551703"},{"key":"11","first-page":"75","article-title":"Neighborhood systems and approximation in database and knowledge base systems","author":"lin","year":"1989","journal-title":"Proceedings of the Fourth International Symposium on Methodologies of Intelligent Systems (Poster Session)"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/s005000050030"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7975-9_18"},{"journal-title":"Post Conference Proceedings of IFIP11 3 Working Conference on Database and Application Security","year":"2003","key":"21"},{"key":"20","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/1-4020-8070-0_20","article-title":"Chinese wall security policy models: Information flows and confining trojan horses","author":"lin","year":"2004","journal-title":"Data and Applications Security XVII Status and Prospects"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1977.1674779"},{"key":"24","first-page":"77","article-title":"Application of fuzzy set theory to control systems","author":"mamdani","year":"1977","journal-title":"Advances in Fuzzy Set Theory and Applications"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1002\/int.20015"},{"key":"26","first-page":"85","article-title":"Supportin gaol queries","author":"motro","year":"1986","journal-title":"Proceeding of the First Internatonal Conference on Expert Database Systems"},{"journal-title":"Rough Sets - Theoretical Aspects of Reasoning About Data","year":"1991","author":"pawlak","key":"27"},{"key":"28","first-page":"69","article-title":"Exploiting upper approximations in the rough set model","author":"raghavan","year":"1995","journal-title":"Proc First Int l Conf Knowledge Discovery and Data Mining (KDD 95)"},{"journal-title":"General Topology","year":"1956","author":"sierpenski","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(83)90084-1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00962924"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1989.81064"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"journal-title":"Algebric Topology","year":"1966","author":"spanier","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18859-6_11"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39205-X_15"},{"year":"2005","key":"32"},{"key":"5","first-page":"432","article-title":"Granularity","author":"hobbs","year":"1985","journal-title":"Proceedings of the Ninth International Joint Conference on Artificial Intelligence"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2004.03.002"},{"key":"4","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/978-3-540-27794-1_3","article-title":"Data with missing attribute values: Generalization of idiscernibility relation and rule induction","volume":"1","author":"grzymala-busse","year":"2004","journal-title":"Transactions on Rough Sets I Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/322609.323183"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1983.tb03470.x"}],"event":{"name":"2005 IEEE International Conference on Granular Computing","start":{"date-parts":[[2005,7,27]]},"location":"Beijing, China","end":{"date-parts":[[2005,7,27]]}},"container-title":["2005 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10381\/33010\/01547232.pdf?arnumber=1547232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T01:37:35Z","timestamp":1497663455000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1547232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/grc.2005.1547232","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}