{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:21:47Z","timestamp":1729614107055,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/grc.2011.6122704","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:03:07Z","timestamp":1326319387000},"page":"817-824","source":"Crossref","is-referenced-by-count":4,"title":["Rough matroid"],"prefix":"10.1109","author":[{"given":"William","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Shiping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.10.010"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2004.08.017"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.11.032"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.4018\/jhcitp.2012040102"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.04.002"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.01.006"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.09.015"},{"key":"34","first-page":"7","article-title":"Topological methods on the theory of covering generalized rough sets","volume":"17","author":"li","year":"2004","journal-title":"Pattern Recognition and Artificial Intelligence (in Chinese)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(03)00056-2"},{"journal-title":"Some Researches on Fuzzy Matroids","year":"2007","author":"li","key":"39"},{"key":"13","first-page":"77","article-title":"Entropies and co-entropies of coverings with application to incomplete information systems","volume":"75","author":"bianucci","year":"2007","journal-title":"Fundamenta Informaticae"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.02.013"},{"journal-title":"Discrete Mathematics in Computer Science","year":"1992","author":"rajagopal","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-011-0027-y"},{"journal-title":"Matroid Theory","year":"2001","author":"lai","key":"38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2003.12.002"},{"journal-title":"Foundations of Entropy Based Bayesian Networks Theoretical Results and Rough Set Based Extraction from Data","year":"0","author":"slezak","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.07.002"},{"key":"22","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.ijar.2004.11.004","article-title":"The investigation of the bayesian rough set model","volume":"40","author":"slezak","year":"2006","journal-title":"International Journal of Approximate Reasoning"},{"key":"23","first-page":"73","article-title":"Probabilistic inference and bayesian theorem on rough sets","volume":"2005","author":"yamauchi","year":"2000","journal-title":"LNCS"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.09.021"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1080\/03081079008935107"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.005"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.96"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.09.006"},{"key":"29","article-title":"Quantitative analysis for covering-based rough sets on boolean algebra","author":"wang","year":"2011","journal-title":"Information Sciences"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.08.031"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2003.08.005"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.06.009"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.02.001"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1504\/IJGCRSIS.2011.043369"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1108\/03684920810876945"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/69.842271"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.08.002"},{"key":"5","doi-asserted-by":"crossref","first-page":"245","DOI":"10.3233\/FI-1996-272311","article-title":"Tolerance approximation spaces","volume":"27","author":"skowron","year":"1996","journal-title":"Fundamenta Informaticae"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.11.013"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1044"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.033"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.05.037"}],"event":{"name":"2011 IEEE International Conference on Granular Computing (GrC-2011)","start":{"date-parts":[[2011,11,8]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112290\/6122548\/06122704.pdf?arnumber=6122704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T17:17:41Z","timestamp":1593537461000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/grc.2011.6122704","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}