Computer Science ›› 2015, Vol. 42 ›› Issue (4): 160-165.doi: 10.11896/j.issn.1002-137X.2015.04.032
Previous Articles Next Articles
XU Feng-sheng, YU Xiu-qing and SHI Kai-quan
[1] Shi Kai-quan.S-rough sets and its applications in diagnosis-reco-gnition for disease [J].IEEE Proceedings of the First International Conference on Machine Learning and Cybernetics,IEEE 02EX583:2002,1(4):50-54 [2] 史开泉,崔玉泉.S-粗集和它的生成结构[J].山东大学学报:理学版,2002,37(6):471-474 [3] Shi Kai-quan,Cui Yu-quan.F-decomposition and -reduction of S-rough sets [J].An International Journal Advance in Systerns Science and Applications,2004,4(4):487-499 [4] Shi Kai-quan,Chang Ting-cheng.One direction S-rough sets[J].International Journal of Fuzzy Mathematics,2005,13(2):319-334 [5] Shi Kai-quan.Two direction S-rough sets [J].InternationalJournal of Fuzzy Mathematics,2005,13(2):335-349 [6] 史开泉,崔玉泉.S-粗集与它的分解-还原[J].系统工程与电子技术,2005,27(4):644-651 [7] 史开泉.S-粗集与新材料发现-识别[J].系统工程与电子技术,2006,28(3):383-388 [8] Shi Kai-quan.Function S-rough sets and function transfer [J].An International Journal Advances in Systems Sciences and Applications,2005,5(1):1-8 [9] 史开泉.函数S-粗集 [J].山东大学学报:理学版,2005,40(1):1-10 [10] Zhang Ling,Shi Kai-quan.Security transmission and recognition of F-knowledge[J].Journal of Systems Engineering and Electronics,2009,0(4):877-882 [11] Qiu Jin-ming,Shi Kai-quan.F-rough law and the discovery of rough law[J].Journal of Systems Engineering and Electronics,2009,0(1):81-89 [12] 史开泉,姚炳学.函数S-粗集与规律辨识[J].中国科学:E信息科学,2008,8(4):553-564 [13] 史开泉,赵建立.函数S-粗集与隐藏规律安全-认证[J].中国科学:E信息科学,2008,38(8):1234-1243 [14] Shi Kai-quan,Yao Bing-xue.Function S-rough sets and lawidentification [J].Science in China F:Information Sciences,2008,51(5):499-510 [15] Shi Kai-quan,Zhao Jian-li.Function S-rough sets and securityauthentication of hiding law [J].Science in China F:Information Sciences,2008,51(7):924-935 [16] 史开泉.函数S-粗集,函数粗集与信息系统规律拆分-合成[J].计算机科学,2010,7(10):1-10 [17] 史开泉.S-粗集与数据挖掘单位圆特征[J].计算机科学,2010,7(5):1-8 [18] Fleret F.Fast binary feature selection with condition mutual information[J].Journal of Machine Learning Research,2004,8(5):1531-1555 [19] Mao Ye,Xue Li,Orlowska M E.Projected outlier detection in high-dimensional mixed-attributes data set [J].Expert Systems with Applications,2009,6(3):7104-7113 [20] Tayani H T.Information privacy data mining and the internet[J].Ethics and Information Technology,1999,1(2):137-145 [21] Lindall Y,Pinkas B.Privacy preserving data mining[J].Journal of Cryptology,2002,5(3):177-206 [22] Kantarcioglu M,Clifton C.Privacy-preserving distributed mining of association rules on horizontally partitioned data[J].IEEE Transactions on Knowledge and Data Engineering,2004,6(9):1026-1037 [23] Pawlak Z.Rough sets [J].International Journal of Computer and Information Sciences,1982,6(11):341-356 [24] Pawlak Z.Rough approach to knowledge-based decision support [J].European Journal of Operation Research,1997,7(99):48-57 [25] 史开泉,崔玉泉.S-粗集与粗决策[M].北京:科学出版社,2006:155-165 [26] 史开泉,姚炳学.函数S-粗集与系统规律挖掘[M].北京:科学出版社,2007:10-34 |
No related articles found! |
|