{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:52:29Z","timestamp":1730224349041,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/grc.2006.1635854","type":"proceedings-article","created":{"date-parts":[[2006,6,8]],"date-time":"2006-06-08T09:25:23Z","timestamp":1149758723000},"page":"518-521","source":"Crossref","is-referenced-by-count":1,"title":["Discovering e-action rules from incomplete information systems"],"prefix":"10.1109","author":[{"family":"Li-Shiang Tsay","sequence":"first","affiliation":[]},{"given":"Z.W.","family":"Ras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"186","article-title":"Rough sets and decision tables","volume":"208","author":"pawlak","year":"1985","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(81)90023-5"},{"key":"1","first-page":"31","article-title":"On rule discovery from incomplete information systems","author":"dardzin?ska","year":"2003","journal-title":"Proc ICDM 03 Workshop Foundations and New Directions of Data Mining"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39985-8_53"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78488-3_17"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-36562-4_31"},{"key":"4","first-page":"587","article-title":"Action rules: How to increase profit of a company","volume":"1910","author":"ras?","year":"2000","journal-title":"LNCS\/LNAI"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78488-3_16"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/09528130512331315855"}],"event":{"name":"2006 IEEE International Conference on Granular Computing","location":"Atlanta, GA, USA"},"container-title":["2006 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10898\/34297\/01635854.pdf?arnumber=1635854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T04:18:33Z","timestamp":1489551513000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1635854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/grc.2006.1635854","relation":{},"subject":[]}}