Author of the publication

Searching Decision Rules in Very Large Databases Using Rough Set Theory.

, and . Rough Sets and Current Trends in Computing, volume 2005 of Lecture Notes in Computer Science, page 346-353. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Partitions II: Belief Functions. A Probalistic View.. Rough Sets and Current Trends in Computing, volume 1424 of Lecture Notes in Computer Science, page 381-386. Springer, (1998)Searching Decision Rules in Very Large Databases Using Rough Set Theory., and . Rough Sets and Current Trends in Computing, volume 2005 of Lecture Notes in Computer Science, page 346-353. Springer, (2000)Logics Systems for Approximate Reasoning: Approximation via Rough Sets and Topological Spaces., , and . ISMIS, volume 869 of Lecture Notes in Computer Science, page 65-74. Springer, (1994)Value Added Association Rules., , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 328-333. Springer, (2002)An Automata Based Authorship Identification System., and . PAKDD Workshops, volume 5433 of Lecture Notes in Computer Science, page 134-142. Springer, (2008)Attribute Transformations on Numerical Databases. Applications to Stock Market and Economic Data., and . PAKDD, volume 1805 of Lecture Notes in Computer Science, page 181-192. Springer, (2000)Granular Computing and Modeling the Human Thoughts in Web Documents.. IFSA (1), volume 4529 of Lecture Notes in Computer Science, page 263-270. Springer, (2007)Granular computing: A theory of "divide/granulate and conquer".. SMC, page 2747-2752. IEEE, (2008)Panel on Intrusion Detection., , , , and . DBSec, volume 171 of IFIP Conference Proceedings, page 227-234. Kluwer, (1999)A Generalized Information Flow Model and the Role of System Security Officer.. DBSec, page 85-103. North-Holland, (1988)