Author of the publication

Knowledge Operations in Neighborhood System.

, and . GrC, page 822-825. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chinese wall security policy-an aggressive model.. ACSAC, page 282-289. IEEE, (1989)Attribute Based Data Model and Polyinstantiation.. IFIP Congress (2), volume A-13 of IFIP Transactions, page 472-478. North-Holland, (1992)Sampling in association rule mining.. Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5433 of SPIE Proceedings, page 161-167. SPIE, (2004)Formal Models for Granular Computing Highlights and Fallacies.. GrC, page 5-10. IEEE, (2008)Patterns in Numerical Data: Practical Approximations to Kolmogorov Complexity.. RSFDGrC, volume 1711 of Lecture Notes in Computer Science, page 509-513. Springer, (1999)Some Remarks on the Concept of Approximations from the View of Knowledge Engineering., , and . Int. J. Cogn. Informatics Nat. Intell., 4 (2): 1-11 (2010)Granular Computing, Computer Security andWeb Intelligence.. COMPSAC (1), page 22-23. IEEE Computer Society, (2006)The construction of general type-2 fuzzy sets., , and . GrC, page 141-146. IEEE Computer Society, (2013)Generalized infinitive rough sets based on reflexive relations., , and . GrC, page 453-458. IEEE Computer Society, (2012)Neighborhood system of parameterized binary relations., and . GrC, page 573-578. IEEE Computer Society, (2012)