The SCEAS System
Navigation Menu

Conferences in DBLP

(rskt)
2006 (conf/rskt/2006)

  1. James F. Peters, Andrzej Skowron
    Some Contributions by Zdzislaw Pawlak. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:1-11 [Conf]
  2. Zdzislaw Pawlak
    Conflicts and Negotations. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:12-27 [Conf]
  3. Ling Zhang, Bo Zhang
    Hierarchical Machine Learning - A Learning Methodology Inspired by Human Intelligence. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:28-30 [Conf]
  4. Sankar K. Pal
    Rough-Fuzzy Granulation, Rough Entropy and Image Segmentation. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:31- [Conf]
  5. Jiming Liu
    Towards Network Autonomy. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:32- [Conf]
  6. Tsau Young Lin
    A Roadmap from Rough Set Theory to Granular Computing. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:33-41 [Conf]
  7. Wojciech Ziarko
    Partition Dependencies in Hierarchies of Probabilistic Decision Tables. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:42-49 [Conf]
  8. Yixin Zhong
    Knowledge Theory and Artificial Intelligence. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:50-56 [Conf]
  9. Andrzej Czyzewski
    Applications of Knowledge Technologies to Sound and Vision Engineering. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:57- [Conf]
  10. Jerzy W. Grzymala-Busse
    A Rough Set Approach to Data with Missing Attribute Values. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:58-67 [Conf]
  11. Jinglong Wu
    Cognitive Neuroscience and Web Intelligence. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:68- [Conf]
  12. Yingxu Wang
    Cognitive Informatics and Contemporary Mathematics for Knowledge Manipulation. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:69-78 [Conf]
  13. Lech Polkowski
    Rough Mereological Reasoning in Rough Set Theory: Recent Results and Problems. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:79-92 [Conf]
  14. Qing Liu, Hui Sun
    Theoretical Study of Granular Computing. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:93-102 [Conf]
  15. Hung Son Nguyen
    Knowledge Discovery by Relation Approximation: A Rough Set Approach. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:103-106 [Conf]
  16. Jingyu Jin, Keyun Qin, Zheng Pei
    Reduction-Based Approaches Towards Constructing Galois (Concept) Lattices. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:107-113 [Conf]
  17. Dayong Deng, Houkuan Huang
    A New Discernibility Matrix and Function. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:114-121 [Conf]
  18. Yusheng Cheng, Yousheng Zhang, Xuegang Hu
    The Relationships Between Variable Precision Value and Knowledge Reduction Based on Variable Precision Rough Sets Model. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:122-128 [Conf]
  19. Tongjun Li
    On Axiomatic Characterization of Approximation Operators Based on Atomic Boolean Algebras. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:129-134 [Conf]
  20. Hongru Li, Wenxiu Zhang, Ping Xu, Hong Wang
    Rough Set Attribute Reduction in Decision Systems. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:135-140 [Conf]
  21. Xuri Yin, Xiuyi Jia, Lin Shang
    A New Extension Model of Rough Sets Under Incomplete Information. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:141-146 [Conf]
  22. Michinori Nakata, Hiroshi Sakai
    Applying Rough Sets to Data Tables Containing Possibilistic Information. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:147-155 [Conf]
  23. Huanglin Zeng, Hengyou Lan, Xiaohui Zeng
    Redundant Data Processing Based on Rough-Fuzzy Approach. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:156-161 [Conf]
  24. Zaiyue Zhang, Yuefei Sui, Cungen Cao
    Further Study of the Fuzzy Reasoning Based on Propositional Modal Logic. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:162-169 [Conf]
  25. Fan Min, Qihe Liu, Hao Tan, Leiting Chen
    The M-Relative Reduct Problem. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:170-175 [Conf]
  26. Feng Jiang, Yuefei Sui, Cungen Cao
    Rough Contexts and Rough-Valued Contexts. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:176-183 [Conf]
  27. Yuhua Qian, Jiye Liang
    Combination Entropy and Combination Granulation in Incomplete Information System. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:184-190 [Conf]
  28. Jigui Sun, Huawen Liu, Huijie Zhang
    An Extension of Pawlak's Flow Graphs. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:191-199 [Conf]
  29. Jianhua Dai, Weidong Chen, Yunhe Pan
    Rough Sets and Brouwer-Zadeh Lattices. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:200-207 [Conf]
  30. Tao Feng, Ju-Sheng Mi, Wei-Zhi Wu
    Covering-Based Generalized Rough Fuzzy Sets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:208-215 [Conf]
  31. William Zhu, Feiyue Wang
    Axiomatic Systems of Generalized Rough Sets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:216-221 [Conf]
  32. Gang Xie, Xuebin Liu, Lifei Wang, Keming Xie
    Rough-Sets-Based Combustion Status Diagnosis. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:222-226 [Conf]
  33. Jun Zhao, Guoyin Wang
    Research on System Uncertainty Measures Based on Rough Set Theory. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:227-232 [Conf]
  34. Andrzej Skowron, Sheela Ramanna, James F. Peters
    Conflict Analysis and Information Systems: A Rough Set Approach. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:233-240 [Conf]
  35. Qingxiang Wu, Jianyong Cai, Girijesh Prasad, T. Martin McGinnity, David A. Bell, Jiwen Guan
    A Novel Discretizer for Knowledge Discovery Approaches Based on Rough Sets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:241-246 [Conf]
  36. Kaiquan Shi, Bingxue Yao
    Function S-Rough Sets and Recognition of Financial Risk Laws. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:247-253 [Conf]
  37. Wei-Zhi Wu, Ju-Sheng Mi
    Knowledge Reduction in Incomplete Information Systems Based on Dempster-Shafer Theory of Evidence. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:254-261 [Conf]
  38. Yuxia Qiu, Keming Xie, Gang Xie
    Decision Rules Extraction Strategy Based on Bit Coded Discernibility Matrix. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:262-267 [Conf]
  39. Pawel Terlecki, Krzysztof Walczak 0002
    Attribute Set Dependence in Apriori-Like Reduct Computation. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:268-276 [Conf]
  40. Gianpiero Cattaneo, Davide Ciucci
    Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part I. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:277-283 [Conf]
  41. Gianpiero Cattaneo, Davide Ciucci
    Some Methodological Remarks About Categorical Equivalences in the Abstract Approach to Roughness - Part II. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:284-289 [Conf]
  42. Mikhail Ju. Moshkov, Marcin Piliszczuk, Beata Zielosko
    Lower Bounds on Minimal Weight of Partial Reducts and Partial Decision Rules. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:290-296 [Conf]
  43. Yiyu Yao, Yan Zhao, Jue Wang
    On Reduct Construction Algorithms. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:297-304 [Conf]
  44. Dominik Slezak
    Association Reducts: Boolean Representation. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:305-312 [Conf]
  45. Piero Pagliani
    Notes on Rough Sets and Formal Concepts. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:313-320 [Conf]
  46. Kaiyou Lei, Yuhui Qiu, Xuefei Wang, Yi He
    High Dimension Complex Functions Optimization Using Adaptive Particle Swarm Optimizer. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:321-326 [Conf]
  47. Zhihua Cui, Jianchao Zeng, Guoji Sun
    Adaptive Velocity Threshold Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:327-332 [Conf]
  48. Wenyi Zeng, Qilei Feng, Hongxing Li
    Relationship Between Inclusion Measure and Entropy of Fuzzy Sets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:333-340 [Conf]
  49. Yong Liu, Guoyin Wang, Lin Feng
    A General Model for Transforming Vague Sets into Fuzzy Sets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:341-348 [Conf]
  50. Yunzhi Zou, Nanjing Huang
    An Iterative Method for Quasi-Variational-Like Inclusions with Fuzzy Mappings. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:349-356 [Conf]
  51. Lai Wei, Duoqian Miao
    Application of Granular Computing in Knowledge Reduction. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:357-362 [Conf]
  52. Li-Quan Zhao, Ling Zhang
    Advances in the Quotient Space Theory and Its Applications. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:363-370 [Conf]
  53. Qiusheng An, Wenxiu Zhang
    The Measures Relationships Study of Three Soft Rules Based on Granular Computing. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:371-376 [Conf]
  54. Askin Demirkol
    A Generalized Neural Network Architecture Based on Distributed Signal Processing. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:377-382 [Conf]
  55. Jiuzhen Liang, Xiaohong Wu
    Worm Harm Prediction Based on Segment Procedure Neural Networks. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:383-388 [Conf]
  56. Andrzej Czyzewski, Bozena Kostek, Przemyslaw Maziewski, Lukasz Litwic
    Accidental Wow Defect Evaluation Using Sinusoidal Analysis Enhanced by Artificial Neural Networks. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:389-395 [Conf]
  57. Xianghua Fu, Zhiqiang Wang, Boqin Feng
    A Constructive Algorithm for Training Heterogeneous Neural Network Ensemble. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:396-401 [Conf]
  58. Yu Zhang, Zhidong Deng, Hongshan Jiang, Peifa Jia
    Gene Regulatory Network Construction Using Dynamic Bayesian Network (DBN) with Structure Expectation Maximization (SEM). [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:402-407 [Conf]
  59. Yuhai Zhao, Ying Yin, Guoren Wang
    Mining Biologically Significant Co-regulation Patterns from Microarray Data. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:408-414 [Conf]
  60. Bo He, Yue Wang, Wu Yang, Yuan Chen
    Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed Database. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:415-420 [Conf]
  61. Shuqin Wang, Jinmao Wei, Junping You, Dayou Liu
    A VPRSM Based Approach for Inducing Decision Trees. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:421-429 [Conf]
  62. Libiao Zhang, Ming Ma, Xiaohua Liu, Caitang Sun, Miao Liu, Chunguang Zhou
    Differential Evolution Fuzzy Clustering Algorithm Based on Kernel Methods. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:430-435 [Conf]
  63. Ziqiang Wang, Xia Sun, Dexian Zhang
    Classification Rule Mining Based on Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:436-441 [Conf]
  64. Bing Liu, Zhihui Wang, Xiaoming Yang, Wei Wang, Baile Shi
    A Bottom-Up Distance-Based Index Tree for Metric Space. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:442-449 [Conf]
  65. Bing Liu, Jianjun Xu, Zhihui Wang, Wei Wang, Baile Shi
    Subsequence Similarity Search Under Time Shifting. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:450-455 [Conf]
  66. Hidenao Abe, Shusaku Tsumoto, Miho Ohsaki, Takahira Yamaguchi
    Developing a Rule Evaluation Support Method Based on Objective Indices. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:456-461 [Conf]
  67. Genting Yan, Guangfu Ma, Liangkuan Zhu
    Data Dimension Reduction Using Rough Sets for Support Vector Classifier. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:462-467 [Conf]
  68. Tianming Hu, Weiquan Zhao, Xiaoqiang Wang, Zhixiong Li
    A Comparison of Three Graph Partitioning Based Methods for Consensus Clustering. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:468-475 [Conf]
  69. Tieyun Qian, Yuanzhen Wang, Langgang Xiang, WeiHua Gong
    Feature Selection, Rule Extraction, and Score Model: Making ATC Competitive with SVM. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:476-481 [Conf]
  70. Julio J. Valdés, Alan J. Barton
    Relevant Attribute Discovery in High Dimensional Data: Application to Breast Cancer Gene Expressions. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:482-489 [Conf]
  71. Kin Keung Lai, Lean Yu, Ligang Zhou, Shouyang Wang
    Credit Risk Evaluation with Least Square Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:490-495 [Conf]
  72. Xuegang Hu, Haitao Yu
    The Research of Sampling for Mining Frequent Itemsets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:496-501 [Conf]
  73. Wenbin Li, Ning Zhong, Chunnian Liu
    ECPIA: An Email-Centric Personal Intelligent Assistant. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:502-509 [Conf]
  74. Cui-Xia Li, Jian Yu
    A Novel Fuzzy C-Means Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:510-515 [Conf]
  75. Lifang Xu, Hongwei Mo, Kejun Wang, Na Tang
    Document Clustering Based on Modified Artificial Immune Network. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:516-521 [Conf]
  76. Xia Wang, Jianmin Ma
    A Novel Approach to Attribute Reduction in Concept Lattices. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:522-529 [Conf]
  77. Zheng Zheng, Qing He, Zhongzhi Shi
    Granule Sets Based Bilevel Decision Model. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:530-537 [Conf]
  78. JingTao Yao, Songlun Zhao, Lisa Fan
    An Enhanced Support Vector Machine Model for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:538-543 [Conf]
  79. Ling Wang, Liefeng Bo, Licheng Jiao
    A Modified K-Means Clustering with a Density-Sensitive Distance Metric. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:544-551 [Conf]
  80. Lei Xie
    Swarm Intelligent Tuning of One-Class nu-SVM Parameters. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:552-559 [Conf]
  81. Zhiwu Lu, Xiaoqing Lu
    A Generalized Competitive Learning Algorithm on Gaussian Mixture with Automatic Model Selection. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:560-567 [Conf]
  82. Bin Zou, Luoqing Li, Jie Xu
    The Generalization Performance of Learning Machine with NA Dependent Sequence. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:568-573 [Conf]
  83. Boyun Zhang, Jianping Yin, Jingbo Hao
    Using RS and SVM to Detect New Malicious Executable Codes. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:574-579 [Conf]
  84. Yongsheng Zhao, Xiaofeng Zhang, Shixiang Jia, Fuzeng Zhang
    Applying PSO in Finding Useful Features. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:580-585 [Conf]
  85. Zhicheng Chen, Mingyi Mao, Huacan He, Weikang Yang
    Generalized T-norm and Fractional "AND" Operation Model. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:586-591 [Conf]
  86. Xia Wu, Jigui Sun, Shuai Lu, Ying Li, Wei Meng, Minghao Yin
    Improved Propositional Extension Rule. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:592-597 [Conf]
  87. Soo-Jin Jun, Sun-Gwan Han, Hae-Young Kim
    Web Services-Based Digital Library as a CSCL Space Using Case-Based Reasoning. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:598-603 [Conf]
  88. Qi Xie, Dayou Liu, Haibo Yu
    Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:604-609 [Conf]
  89. Cungen Cao, Yuefei Sui, Zaiyue Zhang
    The Rough Logic and Roughness of Logical Theories. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:610-617 [Conf]
  90. Minwoo Son, Dongkyoo Shin, Dongil Shin
    Research on Multi-Agent Service Bundle Middleware for Smart Space. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:618-625 [Conf]
  91. Xiao Xue, Dan Dai, Yiren Zhou
    A Customized Architecture for Integrating Agent Oriented Methodologies. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:626-631 [Conf]
  92. Na Luo, Wanli Zuo, Fuyu Yuan, Changli Zhang
    A New Method for Focused Crawler Cross Tunnel. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:632-637 [Conf]
  93. Baolin Liu, Bo Hu
    Migration of the Semantic Web Technologies into E-Learning Knowledge Management. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:638-642 [Conf]
  94. Ji Wu, Chaoqun Ye, Shiyao Jin
    Opponent Learning for Multi-agent System Simulation. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:643-650 [Conf]
  95. Xinbo Gao, Jie Li, Yang Shi
    A Video Shot Boundary Detection Algorithm Based on Feature Tracking. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:651-658 [Conf]
  96. Jianping Shi, Zhengjun Zhai
    Curvelet Transform for Image Authentication. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:659-664 [Conf]
  97. Weixing Wang
    An Image Segmentation Algorithm for Densely Packed Rock Fragments of Uneven Illumination. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:665-670 [Conf]
  98. Xiping He, Qingsheng Zhu, Ping Gu
    A New Chaos-Based Encryption Method for Color Image. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:671-678 [Conf]
  99. Liyong Ma, Jiachen Ma, Yi Shen
    Support Vector Machines Based Image Interpolation Correction Scheme. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:679-684 [Conf]
  100. Wangxin Xiao, Xinping Yan, Xue Zhang
    Pavement Distress Image Automatic Classification Based on DENSITY-Based Neural Network. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:685-692 [Conf]
  101. Stefania Bandini, Silvia Calegari, Paolo Radaelli
    Towards Fuzzy Ontology Handling Vagueness of Natural Languages. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:693-700 [Conf]
  102. Jin-an Guan
    Evoked Potentials Estimation in Brain-Computer Interface Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:701-706 [Conf]
  103. Gexiang Zhang
    Intra-pulse Modulation Recognition of Advanced Radar Emitter Signals Using Intelligent Recognition Method. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:707-712 [Conf]
  104. Yifeng Niu, Lincheng Shen, Yanlong Bu
    Multi-objective Blind Image Fusion. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:713-720 [Conf]
  105. Chunguang Ji, Xiancui Lv, Shiyong Li
    The Design of Biopathway's Modelling and Simulation System Based on Petri Net. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:721-726 [Conf]
  106. Hua Xu, Peifa Jia
    Timed Hierarchical Object-Oriented Petri Net-Part I: Basic Concepts and Reachability Analysis. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:727-734 [Conf]
  107. Yinglong Ma, Kehe Wu, Beihong Jin, Shaohua Liu
    Approximate Semantic Query Based on Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:735-741 [Conf]
  108. Lei Xie, Jianming Zhang
    Swarm Intelligent Analysis of Independent Component and Its Application in Fault Detection and Diagnosis. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:742-749 [Conf]
  109. Gang Xie, Jinlong Zhang, K. K. Lai
    Using VPRS to Mine the Significance of Risk Factors in IT Project Management. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:750-757 [Conf]
  110. Jianwen Fang, Jerzy W. Grzymala-Busse
    Mining of MicroRNA Expression Data - A Rough Set Approach. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:758-765 [Conf]
  111. Wenqing Zhao, Yongli Zhu
    Classifying Email Using Variable Precision Rough Set Approach. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:766-771 [Conf]
  112. Peijun Chen, Guoyin Wang, Yong Yang, Jian Zhou
    Facial Expression Recognition Based on Rough Set Theory and SVM. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:772-777 [Conf]
  113. Dingfang Li, Wen Zhang
    Gene Selection Using Rough Set Theory. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:778-785 [Conf]
  114. Mao Ye, Boqin Feng, Li Zhu, Yao Lin
    Attribute Reduction Based Expected Outputs Generation for Statistical Software Testing. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:786-791 [Conf]
  115. Dan Li, Kefei Wang, Jitender S. Deogun
    FADS: A Fuzzy Anomaly Detection System. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:792-798 [Conf]
  116. Yong Mao, Xiaobo Zhou, Zheng Yin, Daoying Pi, Youxian Sun, Stephen T. C. Wong
    Gene Selection Using Gaussian Kernel Support Vector Machine Based Recursive Feature Elimination with Adaptive Kernel Width Strategy. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:799-806 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002