{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T21:04:37Z","timestamp":1761599077705},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Comput. Intell. Mag."],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/mci.2007.9066897","type":"journal-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T21:45:32Z","timestamp":1194990332000},"page":"10-17","source":"Crossref","is-referenced-by-count":145,"title":["Computing with Words: Zadeh, Turing, Popper and Occam"],"prefix":"10.1109","volume":"2","author":[{"given":"Jerry","family":"Mendel","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2001","journal-title":"Computing with Words"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00090-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"ref32","author":"thornton","year":"0","journal-title":"The Stanford Encyclopedia of Philosophy (Summer 2005 Edition"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011288000451"},{"key":"ref30","author":"popper","year":"1963","journal-title":"Conjectures and Refutations The Growth of Scientific Knowledge"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/0165-0114(94)90182-1","article-title":"A fuzzy set preference model for consumer choice","volume":"68","author":"t\ufffdrksen","year":"1994","journal-title":"Fuzzy Sets and Systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(91)90045-R"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-46644-1_13"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-42723-6.50009-X"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(84)90047-2"},{"key":"ref27","first-page":"49","author":"norwich","year":"1982","journal-title":"Fuzzy Sets and Possibility Theory Recent Developments"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1063\/1.3060577"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(86)90024-2"},{"key":"ref1","author":"cornelissen","year":"2003","journal-title":"The Two Faces of Sustainability Fuzzy Evaluation of Sustainable Development"},{"key":"ref20","first-page":"10","article-title":"Type-2 fuzzy sets: some questions and answers","volume":"1","author":"mendel","year":"2003","journal-title":"IEEE Connections"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2007.380672"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.06.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.881441"},{"key":"ref23","first-page":"587","article-title":"Footprint of uncertainty and its importance to type-2 fuzzy sets","author":"mendel","year":"2002","journal-title":"Proc 6th IASTED Int'l Conf on Artificial Intelligence and Soft Computing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.889959"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.881447"},{"key":"ref50","year":"0","journal-title":"Alan Turing The Enigma"},{"key":"ref51","year":"0"},{"key":"ref54","year":"0","journal-title":"What is Occam's Razor"},{"key":"ref53","year":"0","journal-title":"Occam s Razor"},{"key":"ref52","year":"0"},{"key":"ref10","first-page":"813","article-title":"A fuzzy logic based approach to linguistic summaries of databases","volume":"10","author":"kacprzyk","year":"2000","journal-title":"International Journal of Applied Mathematics and Computer Science"},{"key":"ref11","author":"klir","year":"1995","journal-title":"Fuzzy Sets and Fuzzy Logic Theory and Applications"},{"key":"ref40","first-page":"3030","article-title":"The linguistic weighted average","author":"wu","year":"2006","journal-title":"Proc FUZZ-IEEE 2006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000958"},{"key":"ref13","volume":"2873","year":"2003","journal-title":"Lecture Notes in Artificial Intelligence"},{"key":"ref14","article-title":"An interval approach to fuzzistics for interval type-2 fuzzy sets","author":"liu","year":"0","journal-title":"Proc FUZZ-IEEE 2007"},{"key":"ref15","article-title":"Computing with words, when words can mean different things to different People","author":"mendel","year":"1999","journal-title":"Proc of Third International ICSC Symposium on Fuzzy Logic and Applications"},{"key":"ref16","author":"mendel","year":"2001","journal-title":"Uncertain Rule-Based Fuzzy Logic Systems Introduction and New Directions"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2001.1007239"},{"key":"ref18","first-page":"325","article-title":"An architecture for making judgments using computing with words","volume":"12","author":"mendel","year":"2002","journal-title":"Int J Appl Math Comput Sci"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2003.1209334"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.105.3.254"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(86)90266-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/03081070108960702"},{"key":"ref5","author":"hodges","year":"1997","journal-title":"Turing a Natural Philosopher"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-32374-0_16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.03.002"},{"key":"ref49","year":"0","journal-title":"Berkeley Initiative in Soft Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2006.1681789"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/81.739259"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/91.493904"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(87)90134-5"},{"key":"ref47","year":"1999","journal-title":"Computing With Words in Information \/Intelligent Systems 1 & 2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(82)90033-0"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.04.014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90036-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"}],"container-title":["IEEE Computational Intelligence Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10207\/4382928\/04383064.pdf?arnumber=4383064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:08:17Z","timestamp":1642003697000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4383064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mci.2007.9066897","relation":{},"ISSN":["1556-603X"],"issn-type":[{"value":"1556-603X","type":"print"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}