Abstract is missing.
- Some Contributions by Zdzislaw PawlakJames F. Peters, Andrzej Skowron. 1-11 [doi]
- Conflicts and NegotationsZdzislaw Pawlak. 12-27 [doi]
- Hierarchical Machine Learning - A Learning Methodology Inspired by Human IntelligenceLing Zhang, Bo Zhang. 28-30 [doi]
- Rough-Fuzzy Granulation, Rough Entropy and Image SegmentationSankar K. Pal. 31 [doi]
- Towards Network AutonomyJiming Liu. 32 [doi]
- A Roadmap from Rough Set Theory to Granular ComputingTsau Young Lin. 33-41 [doi]
- Partition Dependencies in Hierarchies of Probabilistic Decision TablesWojciech Ziarko. 42-49 [doi]
- Knowledge Theory and Artificial IntelligenceYixin Zhong. 50-56 [doi]
- Applications of Knowledge Technologies to Sound and Vision EngineeringAndrzej Czyzewski. 57 [doi]
- A Rough Set Approach to Data with Missing Attribute ValuesJerzy W. Grzymala-Busse. 58-67 [doi]
- Cognitive Neuroscience and Web IntelligenceJing-Long Wu. 68 [doi]
- Cognitive Informatics and Contemporary Mathematics for Knowledge ManipulationYingxu Wang. 69-78 [doi]
- Rough Mereological Reasoning in Rough Set Theory: Recent Results and ProblemsLech Polkowski. 79-92 [doi]
- Theoretical Study of Granular ComputingQing Liu, Hui Sun. 93-102 [doi]
- Knowledge Discovery by Relation Approximation: A Rough Set ApproachHung Son Nguyen. 103-106 [doi]
- Reduction-Based Approaches Towards Constructing Galois (Concept) LatticesJingyu Jin, Keyun Qin, Zheng Pei. 107-113 [doi]
- A New Discernibility Matrix and FunctionDayong Deng, Houkuan Huang. 114-121 [doi]
- The Relationships Between Variable Precision Value and Knowledge Reduction Based on Variable Precision Rough Sets ModelYusheng Cheng, Yousheng Zhang, Xuegang Hu. 122-128 [doi]
- On Axiomatic Characterization of Approximation Operators Based on Atomic Boolean AlgebrasTongjun Li. 129-134 [doi]
- Rough Set Attribute Reduction in Decision SystemsHongru Li, Wenxiu Zhang, Ping Xu, Hong Wang. 135-140 [doi]
- A New Extension Model of Rough Sets Under Incomplete InformationXuri Yin, Xiuyi Jia, Lin Shang. 141-146 [doi]
- Applying Rough Sets to Data Tables Containing Possibilistic InformationMichinori Nakata, Hiroshi Sakai. 147-155 [doi]
- Redundant Data Processing Based on Rough-Fuzzy ApproachHuanglin Zeng, Hengyou Lan, Xiaohui Zeng. 156-161 [doi]
- Further Study of the Fuzzy Reasoning Based on Propositional Modal LogicZaiyue Zhang, Yuefei Sui, Cungen Cao. 162-169 [doi]
- The ::::M::::-Relative Reduct ProblemFan Min, Qihe Liu, Hao Tan, Leiting Chen. 170-175 [doi]
- Rough Contexts and Rough-Valued ContextsFeng Jiang, Yuefei Sui, Cungen Cao. 176-183 [doi]
- Combination Entropy and Combination Granulation in Incomplete Information SystemYuhua Qian, Jiye Liang. 184-190 [doi]
- An Extension of Pawlak s Flow GraphsJigui Sun, Huawen Liu, Huijie Zhang. 191-199 [doi]
- Rough Sets and Brouwer-Zadeh LatticesJianhua Dai, Weidong Chen, Yunhe Pan. 200-207 [doi]
- Covering-Based Generalized Rough Fuzzy SetsTao Feng, Ju-Sheng Mi, Wei-Zhi Wu. 208-215 [doi]
- Axiomatic Systems of Generalized Rough SetsWilliam Zhu, Fei-Yue Wang. 216-221 [doi]
- Rough-Sets-Based Combustion Status DiagnosisGang Xie, Xuebin Liu, Lifei Wang, Keming Xie. 222-226 [doi]
- Research on System Uncertainty Measures Based on Rough Set TheoryJun Zhao, Guoyin Wang. 227-232 [doi]
- Conflict Analysis and Information Systems: A Rough Set ApproachAndrzej Skowron, Sheela Ramanna, James F. Peters. 233-240 [doi]
- A Novel Discretizer for Knowledge Discovery Approaches Based on Rough SetsQingxiang Wu, Jianyong Cai, Girijesh Prasad, T. Martin McGinnity, David A. Bell, Jiwen Guan. 241-246 [doi]
- Function S-Rough Sets and Recognition of Financial Risk LawsKaiquan Shi, Bingxue Yao. 247-253 [doi]
- Knowledge Reduction in Incomplete Information Systems Based on Dempster-Shafer Theory of EvidenceWei-Zhi Wu, Ju-Sheng Mi. 254-261 [doi]
- Decision Rules Extraction Strategy Based on Bit Coded Discernibility MatrixYuxia Qiu, Keming Xie, Gang Xie. 262-267 [doi]
- Attribute Set Dependence in Apriori-Like Reduct ComputationPawel Terlecki, Krzysztof Walczak 0002. 268-276 [doi]
- Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part IGianpiero Cattaneo, Davide Ciucci. 277-283 [doi]
- Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part IIGianpiero Cattaneo, Davide Ciucci. 284-289 [doi]
- Lower Bounds on Minimal Weight of Partial Reducts and Partial Decision RulesMikhail Ju. Moshkov, Marcin Piliszczuk, Beata Zielosko. 290-296 [doi]
- On Reduct Construction AlgorithmsYiyu Yao, Yan Zhao, Jue Wang. 297-304 [doi]
- Association Reducts: Boolean RepresentationDominik Slezak. 305-312 [doi]
- Notes on Rough Sets and Formal ConceptsPiero Pagliani. 313-320 [doi]
- High Dimension Complex Functions Optimization Using Adaptive Particle Swarm OptimizerKaiyou Lei, Yuhui Qiu, Xuefei Wang, Yi He. 321-326 [doi]
- Adaptive Velocity Threshold Particle Swarm OptimizationZhihua Cui, Jianchao Zeng, Guoji Sun. 327-332 [doi]
- Relationship Between Inclusion Measure and Entropy of Fuzzy SetsWenyi Zeng, Qilei Feng, Hongxing Li. 333-340 [doi]
- A General Model for Transforming Vague Sets into Fuzzy SetsYong Liu, Guoyin Wang, Lin Feng. 341-348 [doi]
- An Iterative Method for Quasi-Variational-Like Inclusions with Fuzzy MappingsYunzhi Zou, Nanjing Huang. 349-356 [doi]
- Application of Granular Computing in Knowledge ReductionLai Wei, Duoqian Miao. 357-362 [doi]
- Advances in the Quotient Space Theory and Its ApplicationsLi-Quan Zhao, Ling Zhang. 363-370 [doi]
- The Measures Relationships Study of Three Soft Rules Based on Granular ComputingQiusheng An, Wenxiu Zhang. 371-376 [doi]
- A Generalized Neural Network Architecture Based on Distributed Signal ProcessingAskin Demirkol. 377-382 [doi]
- Worm Harm Prediction Based on Segment Procedure Neural NetworksJiuzhen Liang, Xiaohong Wu. 383-388 [doi]
- Accidental Wow Defect Evaluation Using Sinusoidal Analysis Enhanced by Artificial Neural NetworksAndrzej Czyzewski, Bozena Kostek, Przemyslaw Maziewski, Lukasz Litwic. 389-395 [doi]
- A Constructive Algorithm for Training Heterogeneous Neural Network EnsembleXianghua Fu, Zhiqiang Wang, Boqin Feng. 396-401 [doi]
- Gene Regulatory Network Construction Using Dynamic Bayesian Network (DBN) with Structure Expectation Maximization (SEM)Yu Zhang, Zhidong Deng, Hongshan Jiang, Peifa Jia. 402-407 [doi]
- Mining Biologically Significant Co-regulation Patterns from Microarray DataYuhai Zhao, Ying Yin, Guoren Wang. 408-414 [doi]
- Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed DatabaseBo He, Yue Wang, Wu Yang, Yuan Chen. 415-420 [doi]
- A VPRSM Based Approach for Inducing Decision TreesShuqin Wang, Jinmao Wei, Junping You, Dayou Liu. 421-429 [doi]
- Differential Evolution Fuzzy Clustering Algorithm Based on Kernel MethodsLibiao Zhang, Ming Ma, Xiaohua Liu, Caitang Sun, Miao Liu, Chunguang Zhou. 430-435 [doi]
- Classification Rule Mining Based on Particle Swarm OptimizationZiqiang Wang, Xia Sun, Dexian Zhang. 436-441 [doi]
- A Bottom-Up Distance-Based Index Tree for Metric SpaceBing Liu, Zhihui Wang, Xiaoming Yang, Wei Wang, Baile Shi. 442-449 [doi]
- Subsequence Similarity Search Under Time ShiftingBing Liu, Jianjun Xu, Zhihui Wang, Wei Wang, Baile Shi. 450-455 [doi]
- Developing a Rule Evaluation Support Method Based on Objective IndicesHidenao Abe, Shusaku Tsumoto, Miho Ohsaki, Takahira Yamaguchi. 456-461 [doi]
- Data Dimension Reduction Using Rough Sets for Support Vector ClassifierGenting Yan, Guangfu Ma, Liangkuan Zhu. 462-467 [doi]
- A Comparison of Three Graph Partitioning Based Methods for Consensus ClusteringTianming Hu, Weiquan Zhao, Xiaoqiang Wang, Zhixiong Li. 468-475 [doi]
- Feature Selection, Rule Extraction, and Score Model: Making ATC Competitive with SVMTieyun Qian, Yuanzhen Wang, Langgang Xiang, Weihua Gong. 476-481 [doi]
- Relevant Attribute Discovery in High Dimensional Data: Application to Breast Cancer Gene ExpressionsJulio J. Valdés, Alan J. Barton. 482-489 [doi]
- Credit Risk Evaluation with Least Square Support Vector MachineKin Keung Lai, Lean Yu, Ligang Zhou, Shouyang Wang. 490-495 [doi]
- The Research of Sampling for Mining Frequent ItemsetsXuegang Hu, Haitao Yu. 496-501 [doi]
- ECPIA: An Email-Centric Personal Intelligent AssistantWenbin Li, Ning Zhong, Chunnian Liu. 502-509 [doi]
- A Novel Fuzzy C-Means Clustering AlgorithmCui-Xia Li, Jian Yu. 510-515 [doi]
- Document Clustering Based on Modified Artificial Immune NetworkLifang Xu, Hongwei Mo, Kejun Wang, Na Tang. 516-521 [doi]
- A Novel Approach to Attribute Reduction in Concept LatticesXia Wang, Jianmin Ma. 522-529 [doi]
- Granule Sets Based Bilevel Decision ModelZheng Zheng, Qing He, Zhongzhi Shi. 530-537 [doi]
- An Enhanced Support Vector Machine Model for Intrusion DetectionJingtao Yao, Songlun Zhao, Lisa Fan. 538-543 [doi]
- A Modified K-Means Clustering with a Density-Sensitive Distance MetricLing Wang, Liefeng Bo, Licheng Jiao. 544-551 [doi]
- Swarm Intelligent Tuning of One-Class ::::nu::::-SVM ParametersLei Xie. 552-559 [doi]
- A Generalized Competitive Learning Algorithm on Gaussian Mixture with Automatic Model SelectionZhiwu Lu, Xiaoqing Lu. 560-567 [doi]
- The Generalization Performance of Learning Machine with NA Dependent SequenceBin Zou, Luoqing Li, Jie Xu. 568-573 [doi]
- Using RS and SVM to Detect New Malicious Executable CodesBoyun Zhang, Jianping Yin, Jingbo Hao. 574-579 [doi]
- Applying PSO in Finding Useful FeaturesYongsheng Zhao, Xiaofeng Zhang, Shixiang Jia, Fuzeng Zhang. 580-585 [doi]
- Generalized T-norm and Fractional AND Operation ModelZhicheng Chen, Mingyi Mao, Huacan He, Weikang Yang. 586-591 [doi]
- Improved Propositional Extension RuleXia Wu, Jigui Sun, Shuai Lu, Ying Li, Wei Meng, Minghao Yin. 592-597 [doi]
- Web Services-Based Digital Library as a CSCL Space Using Case-Based ReasoningSoo Jin Jun, Sun-Gwan Han, Hae Young Kim. 598-603 [doi]
- Using Description Logic to Determine Seniority Among RB-RBAC Authorization RulesQi Xie, Dayou Liu, Haibo Yu 0002. 604-609 [doi]
- The Rough Logic and Roughness of Logical TheoriesCungen Cao, Yuefei Sui, Zaiyue Zhang. 610-617 [doi]
- Research on Multi-Agent Service Bundle Middleware for Smart SpaceMinwoo Son, Dongkyoo Shin, Dongil Shin. 618-625 [doi]
- A Customized Architecture for Integrating Agent Oriented MethodologiesXiao Xue, Dan Dai, Yiren Zhou. 626-631 [doi]
- A New Method for Focused Crawler Cross TunnelNa Luo, WanLi Zuo, Fuyu Yuan, Changli Zhang. 632-637 [doi]
- Migration of the Semantic Web Technologies into E-Learning Knowledge ManagementBaolin Liu, Bo Hu. 638-642 [doi]
- Opponent Learning for Multi-agent System SimulationJi Wu, Chaoqun Ye, Shiyao Jin. 643-650 [doi]
- A Video Shot Boundary Detection Algorithm Based on Feature TrackingXinbo Gao, Jie Li, Yang Shi. 651-658 [doi]
- Curvelet Transform for Image AuthenticationJianping Shi, Zhengjun Zhai. 659-664 [doi]
- An Image Segmentation Algorithm for Densely Packed Rock Fragments of Uneven IlluminationWeixing Wang. 665-670 [doi]
- A New Chaos-Based Encryption Method for Color ImageXiping He, Qingsheng Zhu, Ping Gu. 671-678 [doi]
- Support Vector Machines Based Image Interpolation Correction SchemeLiyong Ma, Jiachen Ma, Yi Shen. 679-684 [doi]
- Pavement Distress Image Automatic Classification Based on DENSITY-Based Neural NetworkWangxin Xiao, Xinping Yan, Xue Zhang. 685-692 [doi]
- Towards Fuzzy Ontology Handling Vagueness of Natural LanguagesStefania Bandini, Silvia Calegari, Paolo Radaelli. 693-700 [doi]
- Evoked Potentials Estimation in Brain-Computer Interface Using Support Vector MachineJin-an Guan. 701-706 [doi]
- Intra-pulse Modulation Recognition of Advanced Radar Emitter Signals Using Intelligent Recognition MethodGexiang Zhang. 707-712 [doi]
- Multi-objective Blind Image FusionYifeng Niu, Lincheng Shen, Yanlong Bu. 713-720 [doi]
- The Design of Biopathway s Modelling and Simulation System Based on Petri NetChunguang Ji, Xiancui Lv, Shiyong Li. 721-726 [doi]
- Timed Hierarchical Object-Oriented Petri Net-Part I: Basic Concepts and Reachability AnalysisHua Xu, Peifa Jia. 727-734 [doi]
- Approximate Semantic Query Based on Multi-agent SystemsYinglong Ma, Kehe Wu, Beihong Jin, Shaohua Liu. 735-741 [doi]
- Swarm Intelligent Analysis of Independent Component and Its Application in Fault Detection and DiagnosisLei Xie, Jianming Zhang. 742-749 [doi]
- Using VPRS to Mine the Significance of Risk Factors in IT Project ManagementGang Xie, Jinlong Zhang, K. K. Lai. 750-757 [doi]
- Mining of MicroRNA Expression Data - A Rough Set ApproachJianwen Fang, Jerzy W. Grzymala-Busse. 758-765 [doi]
- Classifying Email Using Variable Precision Rough Set ApproachWenqing Zhao, Yongli Zhu. 766-771 [doi]
- Facial Expression Recognition Based on Rough Set Theory and SVMPeijun Chen, Guoyin Wang, Yong Yang, Jian Zhou. 772-777 [doi]
- Gene Selection Using Rough Set TheoryDingfang Li, Wen Zhang. 778-785 [doi]
- Attribute Reduction Based Expected Outputs Generation for Statistical Software TestingMao Ye, Boqin Feng, Li Zhu, Yao Lin. 786-791 [doi]
- FADS: A Fuzzy Anomaly Detection SystemDan Li, Kefei Wang, Jitender S. Deogun. 792-798 [doi]
- Gene Selection Using Gaussian Kernel Support Vector Machine Based Recursive Feature Elimination with Adaptive Kernel Width StrategyYong Mao, Xiaobo Zhou, Zheng Yin, Daoying Pi, Youxian Sun, Stephen T. C. Wong. 799-806 [doi]