


default search action
GrC 2007: San Jose, CA, USA
- 2007 IEEE International Conference on Granular Computing, GrC 2007, San Jose, California, USA, 2-4 November 2007. IEEE Computer Society 2007, ISBN 0-7695-3032-X

Keynote Speakers
- Tzung-Pei Hong:

On Genetic-Fuzzy Data Mining Techniques. 3 - Janusz Kacprzyk:

Linguistic Summaries of Static and Dynamic Data: Computing with Words and Granularity. 4-5 - Tsau Young Lin:

Granular Computing and Web Processing: Representing Documents in Polyhedron. 6 - Ling Liu:

Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges. 7-
Granular Computing: Methodologies
- C. Maria Keet:

Granulation with Indistinguishability, Equivalence, or Similarity. 11-16 - Daowu Pei:

Some Models of Granular Computing. 17-21 - Lin Yan, Qing Liu:

A Logical Method of Formalization for Granular Computing. 22-27 - Wen-Ran Zhang, Justin Zhan:

A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing. 28-31 - Yunhua Chen, Yongquan Yu, Bi Zeng, Minghui Wang:

Application of Granular Computing in Extension Criminal Reconnaissance System. 32-35 - Hong Hu, Zhongzhi Shi:

Granular Computing in the Information Transformation of Pattern Recognition. 36-39 - Trong Wu:

Multitasking is the Primary Choice for Granular Computing. 40-43 - Qing Liu, Huasheng Zhu, Lan Liu:

The Granulations Based on Meaning of Rough Logical Formulas and its Lock Resolution. 44-49 - Xiaosheng Wang:

A Study of Information Granules. 50-
Granular Computing: Strategies
- Tomas B. Co:

Modeling Dynamic Processes Using Granular Runge-Kutta Methods. 55-60 - Taorong Qiu, Xiaoqing Chen, Qing Liu, Houkuan Huang:

A Granular Space Model for Ontology Learning. 61-65 - Jianchao Han, Jing Dong:

Perspectives of Granular Computing in Software Engineering. 66-71 - Yiyu Yao

:
Structured Writing with Granular Computing Strategies. 72-77 - Gaowei Yan, Gang Xie

, Keming Xie, Tsau Young Lin:
Granular Computing Based Sorting Method in Multi-Objective Optimization. 78-
Granular Network Modeling
- Jiali Feng:

Attribute Computing Network Induced by Linear Transformation and Granular Transformation of Qualitative Criterion. 83-88 - Shaobo Deng, Min Li, Sujie Guan, Lian Chen:

The Structure of Granular Network Based on Granular Computing and its Application in Data Reduction. 89-92 - Yong Hu, Juhua Chen, Jiaxing Huang, Mei Liu, Kang Xie:

Analyzing Software System Quality Risk Using Bayesian Belief Network. 93-96 - Lingbo Kong, Zhe Chen, Fuliang Yin:

Optimum Design of a Window Function Based on the Small-World Networks. 97-
Fuzzy Set and Fuzzy Control
- Xinyuan Liang:

Reasoning Algorithm of Multi-Value Fuzzy Causality Diagram Based on Unitizing Coefficient. 101-104 - Ming-Wen Shao, Chang-Xuan Wan:

Multi-level Formal Concepts in Fuzzy Formal Contexts. 105-109 - Chengyi Zhang, Bencheng Wei, Guohui Chen:

On Consistency of Fuzzy Clustering Analysis. 110-113 - Hayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi, Katsuya Kondo, Yutaka Hata:

Fuzzy Detection System of Behavior before Getting Out of Bed by Air Pressure and Ultrasonic Sensors. 114-119 - Byeong Seok Ahn:

An Efficient Elimination of Input Data in the OWA Aggregation. 120-123 - Wei-bin Zhang, Bu-zhou Wu, Wen-jiang Liu:

Anti-Congestion Fuzzy Algorithm for Traffic Control of a Class of Traffic Networks. 124-128 - Yu Qiu, Yanqing Zhang, Yichuan Zhao:

Statistical Genetic Interval-Valued Fuzzy Systems with Prediction in Clinical Trials. 129-132 - Yi Cheng, Duoqian Miao, Qinrong Feng:

A Novel Approach to Generating fuzzy Rules Based on Dynamic Fuzzy Rough Sets. 133-
Type-2 Fuzzy Set
- Hooman Tahayori, Andrea Visconti, Giovanni Degli Antoni:

Email Granulation Based On Augmented Interval Type-2 Fuzzy Set Methodologies. 139-144 - Oscar Castillo, Patricia Melin, Janusz Kacprzyk, Witold Pedrycz:

Type-2 Fuzzy Logic: Theory and Applications. 145-150 - Olivia Mendoza, Patricia Melin, Guillermo Licea:

A New Method for Edge Detection in Image Processing Using Interval Type-2 Fuzzy Logic. 151-156 - Juan R. Castro, Oscar Castillo

, Patricia Melin, Antonio Rodríguez Díaz:
Hybrid Learning Algorithm for Interval Type-2 Fuzzy Neural Networks. 157-162
Rough Computing
- Yuhua Qian, Jiye Liang, Chuangyin Dang:

MGRS in Incomplete Information Systems. 163-168 - Chen Wu, Xiaohua Hu, Zhoujun Li

, Xiaohua Zhou, Palakorn Achananuparp
:
Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules. 169-174 - Chen Wu, Xiaohua Hu, Xiajiong Shen, Xiaodan Zhang, Yi Pan:

An Incremental Algorithm for Mining Default Definite Decision Rules from Incomplete Decision Tables. 175-179 - Guilong Liu, Xiaoli Song, Xiaoxia Zhao:

Rough Sets and Zadeh's Extension Principles. 180-185 - Xiaohong Zhang, Yingcang Ma, Zhanao Xue, Gang Yao:

Implication Operators Based on Rough Set Model over Boolean Algebras. 186-191 - Mehmet Resit Tolun

, Hayri Sever, A. Kadir Gorur:
Production and Retrieval of Rough Classes in Multi Relations. 192-198 - Qinghua Zhang, Guoyin Wang, Jun Hu, Hai-Tao Teng:

Approximation Partition Spaces of Covering Space. 199-204 - Xiaohong Zhang, Gang Yao:

Generalized Rough Set Model on De Morgan Algebras. 205-208 - Hui Sun, Ying Wang, LinLin He, Qing Liu:

Properties of Rough Sets in Normed Linear Space and its Proof. 209-212 - Wei-Zhi Wu:

Rough Set Approximations Based on Random Sets. 213-216 - Jianhua Dai:

Study on the Axis Problem of Rough 3-Valued Algebras. 217-220 - Yangsheng Ji, Lin Shang:

RoughTree A Classifier with Naive-Bayes and Rough Sets Hybrid in Decision Tree Representation. 221-226 - Fei Chen:

Research on Statistical Relational Learning and Rough Set in SRL. 227-
Rough Set Application
- Jianwen Fang, Jerzy W. Grzymala-Busse:

Predicting Penetration Across the Blood-Brain Barrier - A Rough Set Approach. 231-236 - V. Mary Anita Rajam, V. Uma Maheswari, Arul Siromoney:

Extensions in Mobile Ad Hoc Routing Using Variable Precision Rough Sets. 237-240 - Longjun Huang, Minghe Huang, Bin Guo, Zhiming Zhuang:

A New Method for Constructing Decision Tree Based on Rough Set Theory. 241-244 - Qiusheng An, Gaoping Wang, Wenxiu Zhang:

The Study of Normal Form of Relational Database Based on Rough Sets Theory. 245-248 - Jiucheng Xu, Lin Sun:

Knowledge Reduction and its Rough Entropy Representation of Decision Tables in Rough Set. 249-
Concept Learning
- Janardhana Punuru, Jianhua Chen:

Learning for Semantic Classification of Conceptual Terms. 253-258 - Jing Wang, Fanzhang Li:

Autonomic Learning Model and Algorithm Based on DFL. 259-264 - Cheong Hee Park, Hongsuk Shim:

On Detecting an Emerging Class. 265-270 - Huanling Tang, Mingyu Lu, Na Liu:

Co_NBM: A Semi-Supervised Categorization Algorithm Based TEF_WA Technique. 271-274 - Muhammad Abdul Qadir, Muhammad Fahad, Muhammad Wajahaat Noshairwan:

On Conceptualization Mismatches Between Ontologies. 275-278 - Muhammad Abdul Qadir, Muhammad Fahad, Syed Adnan Hussain Shah:

Incompleteness Errors in Ontology. 279-282 - Muhammad Fahad, Muhammad Abdul Qadir, Muhammad Wajahaat Noshairwan:

Semantic Inconsistency Errors in Ontology. 283-286
Data Mining
- Jan Rauch:

Observational Calculi, Classes of Association Rules and F-property. 287-293 - Jiye Li, Nick Cercone, Robin Cohen:

Addressing Missing Attributes during Data Mining Using Frequent Itemsets and Rough Set Based Predictions. 294-300 - Jerzy W. Grzymala-Busse, Witold J. Grzymala-Busse, Zdzislaw S. Hippe, Wojciech Rzasa

:
A Comparison of Three Approximation Strategies for Incomplete Data Sets. 301-306 - Yuefeng Li:

Interpretations of Discovered Knowledge in Multidimensional Databases. 307-312 - Zejin Jason Ding, Jian Yu, Yanqing Zhang:

A New Improved K-Means Algorithm with Penalized Term. 313-317 - Masaaki Kanakubo, Masafumi Hagiwara:

Speed-up Technique for Association Rule Mining Based on an Artificial Life Algorithm. 318-323 - Trevor P. Martin, Yun Shen, Ben Azvine:

Finding Soft Relations in Granular Information Hierarchies. 324-329 - Jiye Li, Nick Cercone, Jianchao Han:

A Method of Finding Representative Sets of Rules. 330-335 - Saeed Reza Ostadzadeh, Mohammad Soleimani

, Majid Tayarani:
Prediction of the Input Impedance of Two Coupled Dipole Antennas in the Echelon Form. 336-340 - Albert Sutojo:

Concept Mining Using Association Rule and Combinatorial Topology. 341-346 - Chunqin Gu, HuiYou Chang, Yang Yi:

Overview of Workflow Mining Technology. 347-350 - Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang

:
Tree Mining Application to Matching of Heterogeneous Knowledge Representations. 351-357 - Chin-Ang Wu, Wen-Yang Lin, Chuan-Chun Wu:

Ontology-Assisted Query Formulation in Multidimensional Association Rule Mining. 358-361 - Uday Seelam, Chien-Chung Chan:

A Study of Data Reduction Using Multiset Decision Tables. 362-367 - Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih:

Generating Attack Scenarios with Causal Relationship. 368-373 - Kilho Shin, Justin Zhan:

A Verification Scheme for Data Aggregation in Data Mining. 374-379 - Rupa Parameswaran, Douglas M. Blough:

Privacy Preserving Collaborative Filtering Using Data Obfuscation. 380-386 - Albert Sutojo:

Concept Mining using Association Rules and Combinatorial Topology. 387-
Clustering and Classification
- Fusheng Yu, Keqiang Dong, Fei Chen, Yongke Jiang, Wenyi Zeng:

Clustering Time Series with Granular Dynamic Time Warping Method. 393-398 - Fusheng Yu, Juan Tang, Ruiqiong Cai:

A Necessary Preprocessing in Horizontal Collaborative Fuzzy Clustering. 399-403 - Yasunori Endo, Yukihiro Hamasuna, Sadaaki Miyamoto:

Agglomerative Hierarchical Clustering for Data with Tolerance. 404-409 - Guido Del Vescovo, Antonello Rizzi:

Automatic Classification of Graphs by Symbolic Histograms. 410-416 - Yan Gao, Shiwen Gu, Jianhua Li, Zhining Liao:

A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings. 417-422 - Tuan-Fang Fan, Churn-Jung Liau

, Tsau Young Lin:
Positional Analysis in Fuzzy Social Networks. 423-428 - Jiuzhen Liang, Guangbin Li:

Hierarchical Clustering Algorithm Based on Granularity. 429-432 - Ehsan Rahimi, Shahriar Baradaran Shokouhi, Ali Sadr

:
A Parallelized and Pipelined Datapath to Implement ISODATA Algorithm for Rosette Scan Images on a Reconfigurable Hardware. 433-436 - Jian Yu, Pengwei Hao:

The Worse Clustering Performance Analysis. 437-441 - Ryo Inokuchi, Sadaaki Miyamoto:

Sparse Possibilistic Clustering with L1 Regularization. 442-
Artificial Intelligence
- Jerry M. Mendel, Dongrui Wu

:
Perceptual Reasoning: A New Computing with Words Engine. 446-451 - Rui Yan, Paul C. Boutros, Igor Jurisica, Linda Z. Penn

:
Comparison of Machine Learning and Pattern Discovery Algorithms for the Prediction of Human Single Nucleotide Polymorphisms. 452-457 - Hidenao Abe

, Shusaku Tsumoto, Miho Ohsaki, Hideto Yokoi, Takahira Yamaguchi:
Evaluation of Learning Costs of Rule Evaluation Models Based on Objective Indices to Predict Human Hypothesis Construction Phases. 458-464 - Shusaku Tsumoto, Shoji Hirano:

Meaning of Pearson Residuals - Linear Algebra View. 465-470 - Changbing Li, Yong Wang, Maokang Du, Changjiang Yue:

Multicast Routing Scheme Based on Chaotic Optimization Adaptive Genetic Algorithm. 471-476 - Xinying Xu, Gaowei Yan, Keming Xie, Tsau Young Lin:

Immune Evolution Algorithm Based Dynamic Path Planning Approach for the Soccer Robot. 477-480 - Xueying Zhang, Yueling Guo, Xuemei Hou:

A Speech Recognition Method of Isolated Words Based on Modified LPC Cepstrum. 481-484 - Sumalee Sonamthiang, Nick Cercone, Kanlaya Naruedomkul:

Discovering Hierarchical Patterns of Students' Learning Behavior in Intelligent Tutoring Systems. 485-489 - Junhee Lee, Sue J. Lee, Yeonchool Park, Sukhan Lee:

Object Recognition Architecture Using Distributed and Parallel Computing with Collaborator. 490-497 - Ziping Zhao, Tingjian Zhao, Yaoting Zhu:

A Maximum Entropy Markov Model for Prediction of Prosodic Phrase Boundaries in Chinese TTS. 498-501 - Hui Wang, Zhiwei Lin:

A Novel Algorithm for Counting All Common Subsequences. 502-
Neural network Computing
- Xueying Zhang, Gaoyun Li, Feng Qiao:

A Speech Endpoint Detection Algorithm Based on Entropy and RBF Neural Network. 506-509 - M. Samer Charifa, Ahmad Suliman, Marwan Bikdash:

Face Recognition Using a Hybrid General Backpropagation Neural Network. 510-515 - Hosein Marzi, Mark Turnbull:

Use of Neural Networks in Forecasting Financial Market. 516-521 - Maryam Esmaeili, Mohamad H. Jabalameli, Zeinab Moghadam:

A New Scheme of EEG Signals Processing in Brain-Computer Interface Systems. 522-527 - Qun Liu, Xiaofeng Liao, Degang Yang, Songtao Guo:

The Research for Hopf Bifurcation in a Single Inertial Neuron Model with External Forcing. 528-533 - HuiYu Jiang, Min Dong, Xiangpeng Li, Feng Yang:

Improved Algorithm of BP Neural Network and its Application to Prediction of K/S Value in Dyeing with Reactive Dyes. 534-537 - Degang Yang, Qun Liu, Yong Wang:

A Novel Delay-Dependent Global Stability Criterion of Delayed Hopfield Neural Networks. 538-541 - Ram Dayal Goyal:

Knowledge Based Neural Network for Text Classification. 542-547 - Jun Xie, Gaowei Yan, Keming Xie, Tsau Young Lin:

Neuro-Fuzzy Model-Based CUSUM Method Application in Fault Detection on an Autonomous Vehicle. 548-551 - Zhiguo Cao, Yang Xiao, Lamei Zou:

The Application of Run-Length Features in Remote Sensing Classification Combined with Neural Network and Rough Set. 552-557 - Min Dong, HuiYu Jiang, Xiangpeng Li, Qing Liu:

An Application of CP Neural Network Based on Rough Set in Image Edge Detection. 558-
Computer/Network/Internet Security
- Xuren Wang, Famei He, Lizhen Liu:

Application of Rough Set Theory to Intrusion Detection System. 562-565 - Dat Tran

, Wanli Ma, Dharmendra Sharma
, Thien Nguyen:
Fuzzy Vector Quantization for Network Intrusion Detection. 566-570 - Dat Tran

, Wanli Ma, Dharmendra Sharma
, Thien Nguyen:
Possibility Theory-Based Approach to Spam Email Detection. 571-575 - Akkapeddi Chandra Sekhar, K. Rama Sudha, P. V. G. D. Prasad Reddy:

Data Encryption Technique Using Random Number Generator. 576-579 - Min Li, Shaobo Deng, ChunHua Zhou:

Research on Adaptive Congestion Control Based on One Way Delay. 580-583 - James Kuodo Huang, Bang-su Chen:

SRML Learning Game Theory with Application to Internet Security and Management Systems. 584-587 - Baixing Chen, Xiufen Fu, Xiayu Zhang, Lei Su, Dan Wu:

Design and Implementation of Intranet Security Audit System Based on Load Balancing. 588-591 - Zhen Liu:

Grid-Based Service Creation for Next-Generation Networks. 592-597 - Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:

Secure Similarity Search. 598-
Biomedical and Bioinformatics
- Min Hu, Weiming Sun:

MHC Regulation Based Immune Formula Discovering Algorithm (IFDA). 605-610 - Shusaku Tsumoto:

Mining Diagnostic Taxonomy and Diagnostic Rules for Multi-Stage Medical Diagnosis from Hospital Clinical Data. 611-616 - Yutaka Hata, Katsuya Kondo, Syoji Kobashi:

Fine Granule Evaluation Model from Coarse Granule in Medical Ultrasonic System. 617-621 - Mitsuhiro Yoneda, Hiroshi Tasaki, Naoki Tsuchiya, Hiroshi Nakajima, Takehiro Hamaguchi, Shojiro Oku, Toshikazu Shiga:

A Study of Bioelectrical Impedance Analysis Methods for Practical Visceral Fat Estimation. 622-627 - James Kuodo Huang:

On Systems Software Engineering with Application to Bioinformatics. 628-631 - Syoji Kobashi, Yuko Fujimoto, Masayo Ogawa, Kumiko Ando, Reiichi Ishikura, Katsuya Kondo, Shozo Hirota, Yutaka Hata:

Fuzzy-ASM Based Automated Skull Stripping Method from Infantile Brain MR Images. 632-635 - Satoshi Yamaguchi, Kouki Nagamune, Keisuke Oe, Syoji Kobashi, Katsuya Kondo, Yutaka Hata:

Fuzzy Logic Approach to Identification of Cellular Quantity by Ultrasonic System. 636-639 - Wei Gao:

New Computational Model from Ant Colony. 640-643 - Dan Li, Jitender S. Deogun, Kefei Wang:

Gene Function Classification Using Fuzzy K-Nearest Neighbor Approach. 644-647 - Jian Wen, Zhoujun Li:

Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification. 648-
Support Vector Machine
- Pawan Lingras, Cory J. Butz:

Precision and Recall in Rough Support Vector Machines. 654-658 - Ying Sai, Zheng Yuan, Kanglin Gao:

Mining Stock Market Tendency by RS-Based Support Vector Machines. 659-664 - Manabu Nii, Shigeru Ando, Yutaka Takahashi, Atsuko Uchinuno, Reiko Sakashita:

Nursing-Care Freestyle Text Classification Using Support Vector Machines. 665-
Web Intelligence
- Xiajiong Shen, Yan Xu, Junyang Yu, Ke Zhang:

Intelligent Search Engine Based on Formal Concept Analysis. 669-674 - Xiayu Zhang, Yongquan Yu, Baixing Chen, Feng Ye, Tan Xingxing:

An Extension-Based Dynamic Load Balancing Model of Heterogeneous Server Cluster. 675-679 - Li Lu, Tsau Young Lin:

Granular Index for XML Database. 680-685 - Guido Del Vescovo, Antonello Rizzi:

Online Handwriting Recognition by the Symbolic Histograms Approach. 686-690 - Zhongda Lin, Kun Deng, Yanfen Hong:

Research of Web Pages Categorization. 691-694 - Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng:

Enhancing Discovery of Web Services through Optimized Algorithms. 695-698 - Youngho Kim, Yuchul Jung

, Sung-Hyon Myaeng:
Identifying Opinion Holders in Opinion Text from Online Newspapers. 699-
Information Retrieval and Text Mining
- Chang Liu, Hui Wang, Sally I. McClean, Jun Liu, Shengli Wu:

Syntactic Information Retrieval. 703-707 - Haiyi Zhang, Di Li:

Naïve Bayes Text Classifier. 708-711 - Ivan S. Radev:

Visual Search of Web Multimedia Information Supported by the XHMG System. 712-
Quotient and Quantum Computing
- Michael Cebulla:

Fuzzy Quotients in Reactive Common Sense Reasoning. 718-723 - Shuping He, Fanzhang Li:

A Symmetrical Linear Transform Learning Algorithm on Quantum Group. 724-727 - Yuejin Lv, Nan-Xing Liu:

Application of Quantum Genetic Algorithm on Finding Minimal Reduct. 728-
Others
- Jingtao Yao:

A Ten-year Review of Granular Computing. 734-739 - Fengbin Zheng, Xiajiong Shen, Qiang Ge:

A Study of the Query Target of the Chinese Query Sentence. 740-744 - Mi-Young Park, Seok Young Kim, Hyuk-Ro Park:

Visualization of Affect-Relations of Message Races for Debugging MPI Programs. 745-750 - Mehdi Hakimi, Seyyed Masoud Moghaddas Tafreshi, M. R. Rajati:

Unit Sizing of a Stand-Alone Hybrid Power System Using Model-Free Optimization. 751-756 - Su-Fen Chen, Hui Sun:

Application of Swarm Intelligence Algorithm to Improve on Multiple Regression. 757-760 - Dilip Gopichand Khairnar, S. N. Merchant, Uday B. Desai:

Nonlinear Target Identification and Tracking Using UKF. 761-764 - Mark B. Moss:

Comparing Centralized and Distributed Approaches for Operational Impact Analysis in Enterprise Systems. 765-769 - Lisa Singh, Justin Zhan:

Measuring Topological Anonymity in Social Networks. 770-774 - Antoni Martínez-Ballesté, Agusti Solanas:

Privacy in the Information and Communications Technologies. 775-780 - Tingting Chen, Sheng Zhong:

Enhancing Privacy of Released Database. 781-786 - Ran Wei, Justin Zhan:

Improved Customers' Privacy Preference Policy. 787-792

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














