GrC 2007:
San Jose,
CA,
USA
2007 IEEE International Conference on Granular Computing, GrC 2007, San Jose, California, USA, 2-4 November 2007.
IEEE 2007
Keynote Speakers
- Tzung-Pei Hong:
On Genetic-Fuzzy Data Mining Techniques.
3
- Janusz Kacprzyk:
Linguistic Summaries of Static and Dynamic Data: Computing with Words and Granularity.
4-5
- T. Y. Lin:
Granular Computing and Web Processing: Representing Documents in Polyhedron.
6
- Ling Liu:
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges.
7-
Granular Computing:
Methodologies
- C. Maria Keet:
Granulation with Indistinguishability, Equivalence, or Similarity.
11-16
- Daowu Pei:
Some Models of Granular Computing.
17-21
- Yan Lin, Liu Qing:
A Logical Method of Formalization for Granular Computing.
22-27
- Wen-Ran Zhang, Justin Zhan:
A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing.
28-31
- Yunhua Chen, Yongquan Yu, Bi Zeng, Minghui Wang:
Application of Granular Computing in Extension Criminal Reconnaissance System.
32-35
- Hong Hu, Zhongzhi Shi:
Granular Computing in the Information Transformation of Pattern Recognition.
36-39
- Trong Wu:
Multitasking is the Primary Choice for Granular Computing.
40-43
- Qing Liu, Huasheng Zhu, Lan Liu:
The Granulations Based on Meaning of Rough Logical Formulas and its Lock Resolution.
44-49
- Xiaosheng Wang:
A Study of Information Granules.
50-
Granular Computing:
Strategies
Granular Network Modeling
Fuzzy Set and Fuzzy Control
- Xinyuan Liang:
Reasoning Algorithm of Multi-Value Fuzzy Causality Diagram Based on Unitizing Coefficient.
101-104
- Ming-Wen Shao, Chang-Xuan Wan:
Multi-level Formal Concepts in Fuzzy Formal Contexts.
105-109
- Cheng-yi Zhang, Bencheng Wei, Guohui Chen:
On Consistency of Fuzzy Clustering Analysis.
110-113
- Hayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi, Katsuya Kondo, Yutaka Hata:
Fuzzy Detection System of Behavior before Getting Out of Bed by Air Pressure and Ultrasonic Sensors.
114-119
- Byeong Seok Ahn:
An Efficient Elimination of Input Data in the OWA Aggregation.
120-123
- Wei-bin Zhang, Bu-zhou Wu, Wen-jiang Liu:
Anti-Congestion Fuzzy Algorithm for Traffic Control of a Class of Traffic Networks.
124-128
- Yu Qiu, Yanqing Zhang, Yichuan Zhao:
Statistical Genetic Interval-Valued Fuzzy Systems with Prediction in Clinical Trials.
129-132
- Yi Cheng, Duoqian Miao, Qinrong Feng:
A Novel Approach to Generating fuzzy Rules Based on Dynamic Fuzzy Rough Sets.
133-
Type-2 Fuzzy Set
- Hooman Tahayori, Andrea Visconti, Giovanni Degli Antoni:
Email Granulation Based On Augmented Interval Type-2 Fuzzy Set Methodologies.
139-144
- Oscar Castillo, Patricia Melin, Janusz Kacprzyk, Witold Pedrycz:
Type-2 Fuzzy Logic: Theory and Applications.
145-150
- Olivia Mendoza, Patricia Melin, Guillermo Licea:
A New Method for Edge Detection in Image Processing Using Interval Type-2 Fuzzy Logic.
151-156
- Juan R. Castro, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz:
Hybrid Learning Algorithm for Interval Type-2 Fuzzy Neural Networks.
157-162
Rough Computing
- Yuhua Qian, Jiye Liang, Chuangyin Dang:
MGRS in Incomplete Information Systems.
163-168
- Chen Wu, Xiaohua Hu, Zhoujun Li, Xiaohua Zhou, Palakorn Achananuparp:
Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules.
169-174
- Chen Wu, Xiaohua Hu, Xiajiong Shen, Xiaodan Zhang, Yi Pan:
An Incremental Algorithm for Mining Default Definite Decision Rules from Incomplete Decision Tables.
175-179
- Guilong Liu, Xiaoli Song, Xiaoxia Zhao:
Rough Sets and Zadeh's Extension Principles.
180-185
- Xiaohong Zhang, Yingcang Ma, Zhanao Xue, Gang Yao:
Implication Operators Based on Rough Set Model over Boolean Algebras.
186-191
- Mehmet R. Tolun, Hayri Sever, A. Kadir Gorur:
Production and Retrieval of Rough Classes in Multi Relations.
192-198
- Qinghua Zhang, Guoyin Wang, Jun Hu, Hai-Tao Teng:
Approximation Partition Spaces of Covering Space.
199-204
- Xiaohong Zhang, Gang Yao:
Generalized Rough Set Model on De Morgan Algebras.
205-208
- Hui Sun, Ying Wang, LinLin He, Qing Liu:
Properties of Rough Sets in Normed Linear Space and its Proof.
209-212
- Wei-Zhi Wu:
Rough Set Approximations Based on Random Sets.
213-216
- Jianhua Dai:
Study on the Axis Problem of Rough 3-Valued Algebras.
217-220
- Yangsheng Ji, Lin Shang:
RoughTree A Classifier with Naive-Bayes and Rough Sets Hybrid in Decision Tree Representation.
221-226
- Fei Chen:
Research on Statistical Relational Learning and Rough Set in SRL.
227-
Rough Set Application
Concept Learning
- Janardhana Punuru, Jianhua Chen:
Learning for Semantic Classification of Conceptual Terms.
253-258
- Jing Wang, Fan-zhang Li:
Autonomic Learning Model and Algorithm Based on DFL.
259-264
- Cheong Hee Park, Hongsuk Shim:
On Detecting an Emerging Class.
265-270
- Huanling Tang, Mingyu Lu, Na Liu:
Co_NBM: A Semi-Supervised Categorization Algorithm Based TEF_WA Technique.
271-274
- Muhammad Abdul Qadir, Muhammad Fahad, Muhammad Wajahaat Noshairwan:
On Conceptualization Mismatches Between Ontologies.
275-278
- Muhammad Abdul Qadir, Muhammad Fahad, Syed Adnan Hussain Shah:
Incompleteness Errors in Ontology.
279-282
- Muhammad Fahad, Muhammad Abdul Qadir, Muhammad Wajahaat Noshairwan:
Semantic Inconsistency Errors in Ontology.
283-286
Data Mining
- Jan Rauch:
Observational Calculi, Classes of Association Rules and F-property.
287-293
- Jiye Li, Nick Cercone, Robin Cohen:
Addressing Missing Attributes during Data Mining Using Frequent Itemsets and Rough Set Based Predictions.
294-300
- Jerzy W. Grzymala-Busse, Witold J. Grzymala-Busse, Zdzislaw S. Hippe, Wojciech Rzasa:
A Comparison of Three Approximation Strategies for Incomplete Data Sets.
301-306
- Yuefeng Li:
Interpretations of Discovered Knowledge in Multidimensional Databases.
307-312
- Zejin Jason Ding, Jian Yu, Yanqing Zhang:
A New Improved K-Means Algorithm with Penalized Term.
313-317
- Masaaki Kanakubo, Masafumi Hagiwara:
Speed-up Technique for Association Rule Mining Based on an Artificial Life Algorithm.
318-323
- Trevor P. Martin, Yun Shen, Ben Azvine:
Finding Soft Relations in Granular Information Hierarchies.
324-329
- Jiye Li, Nick Cercone, Jianchao Han:
A Method of Finding Representative Sets of Rules.
330-335
- Saeed Reza Ostadzadeh, Mohammad Soleimani, Majid Tayarani:
Prediction of the Input Impedance of Two Coupled Dipole Antennas in the Echelon Form.
336-340
- Albert Sutojo:
Concept Mining Using Association Rule and Combinatorial Topology.
341-346
- Chunqin Gu, HuiYou Chang, Yang Yi:
Overview of Workflow Mining Technology.
347-350
- Fedja Hadzic, Tharam S. Dillon, Elizabeth Chang:
Tree Mining Application to Matching of Heterogeneous Knowledge Representations.
351-357
- Chin-Ang Wu, Wen-Yang Lin, Chuan-Chun Wu:
Ontology-Assisted Query Formulation in Multidimensional Association Rule Mining.
358-361
- Uday Seelam, Chien-Chung Chan:
A Study of Data Reduction Using Multiset Decision Tables.
362-367
- Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih:
Generating Attack Scenarios with Causal Relationship.
368-373
- Kilho Shin, Justin Zhan:
A Verification Scheme for Data Aggregation in Data Mining.
374-379
- Rupa Parameswaran, Douglas M. Blough:
Privacy Preserving Collaborative Filtering Using Data Obfuscation.
380-386
- Albert Sutojo:
Concept Mining using Association Rules and Combinatorial Topology.
387-
Clustering and Classification
- Fusheng Yu, Keqiang Dong, Fei Chen, Yongke Jiang, Wenyi Zeng:
Clustering Time Series with Granular Dynamic Time Warping Method.
393-398
- Fusheng Yu, Juan Tang, Ruiqiong Cai:
A Necessary Preprocessing in Horizontal Collaborative Fuzzy Clustering.
399-403
- Yasunori Endo, Yukihiro Hamasuna, Sadaaki Miyamoto:
Agglomerative Hierarchical Clustering for Data with Tolerance.
404-409
- Guido Del Vescovo, Antonello Rizzi:
Automatic Classification of Graphs by Symbolic Histograms.
410-416
- Yan Gao, Shiwen Gu, Jianhua Li, Zhining Liao:
A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings.
417-422
- Tuan-Fang Fan, Churn-Jung Liau, Tsau Young Lin:
Positional Analysis in Fuzzy Social Networks.
423-428
- Jiuzhen Liang, Guangbin Li:
Hierarchical Clustering Algorithm Based on Granularity.
429-432
- Ehsan Rahimi, Shahriar Baradaran Shokuhi, Ali Sadr:
A Parallelized and Pipelined Datapath to Implement ISODATA Algorithm for Rosette Scan Images on a Reconfigurable Hardware.
433-436
- Jian Yu, Pengwei Hao:
The Worse Clustering Performance Analysis.
437-441
- Ryo Inokuchi, Sadaaki Miyamoto:
Sparse Possibilistic Clustering with L1 Regularization.
442-
Artificial Intelligence
- Jerry M. Mendel, Dongrui Wu:
Perceptual Reasoning: A New Computing with Words Engine.
446-451
- Rui Yan, Paul C. Boutros, Igor Jurisica, Linda Z. Penn:
Comparison of Machine Learning and Pattern Discovery Algorithms for the Prediction of Human Single Nucleotide Polymorphisms.
452-457
- Hidenao Abe, Shusaku Tsumoto, Miho Ohsaki, Hideto Yokoi, Takahira Yamaguchi:
Evaluation of Learning Costs of Rule Evaluation Models Based on Objective Indices to Predict Human Hypothesis Construction Phases.
458-464
- Shusaku Tsumoto, Shoji Hirano:
Meaning of Pearson Residuals - Linear Algebra View.
465-470
- Changbing Li, Yong Wang, Maokang Du, Changjiang Yue:
Multicast Routing Scheme Based on Chaotic Optimization Adaptive Genetic Algorithm.
471-476
- Xinying Xu, Gaowei Yan, Keming Xie, T. Y. Lin:
Immune Evolution Algorithm Based Dynamic Path Planning Approach for the Soccer Robot.
477-480
- Xueying Zhang, Yueling Guo, Xuemei Hou:
A Speech Recognition Method of Isolated Words Based on Modified LPC Cepstrum.
481-484
- Sumalee Sonamthiang, Nick Cercone, Kanlaya Naruedomkul:
Discovering Hierarchical Patterns of Students' Learning Behavior in Intelligent Tutoring Systems.
485-489
- Junhee Lee, Sue J. Lee, Yeonchool Park, Sukhan Lee:
Object Recognition Architecture Using Distributed and Parallel Computing with Collaborator.
490-497
- Ziping Zhao, Tingjian Zhao, Yaoting Zhu:
A Maximum Entropy Markov Model for Prediction of Prosodic Phrase Boundaries in Chinese TTS.
498-501
- Hui Wang, Zhiwei Lin:
A Novel Algorithm for Counting All Common Subsequences.
502-
Neural network Computing
- Xueying Zhang, Gaoyun Li, Feng Qiao:
A Speech Endpoint Detection Algorithm Based on Entropy and RBF Neural Network.
506-509
- M. Samer Charifa, Ahmad Suliman, Marwan Bikdash:
Face Recognition Using a Hybrid General Backpropagation Neural Network.
510-515
- Hosein Marzi, Mark Turnbull:
Use of Neural Networks in Forecasting Financial Market.
516-521
- Maryam Esmaeili, Mohamad H. Jabalameli, Zeinab Moghadam:
A New Scheme of EEG Signals Processing in Brain-Computer Interface Systems.
522-527
- Qun Liu, Xiaofeng Liao, Degang Yang, Songtao Guo:
The Research for Hopf Bifurcation in a Single Inertial Neuron Model with External Forcing.
528-533
- HuiYu Jiang, Min Dong, XiangPeng Li, Feng Yang:
Improved Algorithm of BP Neural Network and its Application to Prediction of K/S Value in Dyeing with Reactive Dyes.
534-537
- Degang Yang, Qun Liu, Yong Wang:
A Novel Delay-Dependent Global Stability Criterion of Delayed Hopfield Neural Networks.
538-541
- Ram Dayal Goyal:
Knowledge Based Neural Network for Text Classification.
542-547
- Jun Xie, Gaowei Yan, Keming Xie, T. Y. Lin:
Neuro-Fuzzy Model-Based CUSUM Method Application in Fault Detection on an Autonomous Vehicle.
548-551
- Zhiguo Cao, Yang Xiao, Lamei Zou:
The Application of Run-Length Features in Remote Sensing Classification Combined with Neural Network and Rough Set.
552-557
- Min Dong, HuiYu Jiang, XiangPeng Li, Qing Liu:
An Application of CP Neural Network Based on Rough Set in Image Edge Detection.
558-
Computer/Network/Internet Security
- Xuren Wang, Famei He, Lizhen Liu:
Application of Rough Set Theory to Intrusion Detection System.
562-565
- Dat Tran, Wanli Ma, Dharmendra Sharma, Thien Nguyen:
Fuzzy Vector Quantization for Network Intrusion Detection.
566-570
- Dat Tran, Wanli Ma, Dharmendra Sharma, Thien Nguyen:
Possibility Theory-Based Approach to Spam Email Detection.
571-575
- Akkapeddi Chandra Sekhar, K. R. Sudha, P. V. G. D. Prasad Reddy:
Data Encryption Technique Using Random Number Generator.
576-579
- Min Li, Shaobo Deng, ChunHua Zhou:
Research on Adaptive Congestion Control Based on One Way Delay.
580-583
- James Kuodo Huang, Bang-su Chen:
SRML Learning Game Theory with Application to Internet Security and Management Systems.
584-587
- Baixing Chen, Xiufen Fu, Xiayu Zhang, Lei Su, Dan Wu:
Design and Implementation of Intranet Security Audit System Based on Load Balancing.
588-591
- Zhen Liu:
Grid-Based Service Creation for Next-Generation Networks.
592-597
- Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:
Secure Similarity Search.
598-
Biomedical and Bioinformatics
- Min Hu, Weiming Sun:
MHC Regulation Based Immune Formula Discovering Algorithm (IFDA).
605-610
- Shusaku Tsumoto:
Mining Diagnostic Taxonomy and Diagnostic Rules for Multi-Stage Medical Diagnosis from Hospital Clinical Data.
611-616
- Yutaka Hata, Katsuya Kondo, Syoji Kobashi:
Fine Granule Evaluation Model from Coarse Granule in Medical Ultrasonic System.
617-621
- Mitsuhiro Yoneda, Hiroshi Tasaki, Naoki Tsuchiya, Hiroshi Nakajima, Takehiro Hamaguchi, Shojiro Oku, Toshikazu Shiga:
A Study of Bioelectrical Impedance Analysis Methods for Practical Visceral Fat Estimation.
622-627
- James Kuodo Huang:
On Systems Software Engineering with Application to Bioinformatics.
628-631
- Syoji Kobashi, Yuko Fujimoto, Masayo Ogawa, Kumiko Ando, Reiichi Ishikura, Katsuya Kondo, Shozo Hirota, Yutaka Hata:
Fuzzy-ASM Based Automated Skull Stripping Method from Infantile Brain MR Images.
632-635
- Satoshi Yamaguchi, Kouki Nagamune, Keisuke Oe, Syoji Kobashi, Katsuya Kondo, Yutaka Hata:
Fuzzy Logic Approach to Identification of Cellular Quantity by Ultrasonic System.
636-639
- Wei Gao:
New Computational Model from Ant Colony.
640-643
- Dan Li, Jitender S. Deogun, Kefei Wang:
Gene Function Classification Using Fuzzy K-Nearest Neighbor Approach.
644-647
- Jian Wen, Zhoujun Li:
Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification.
648-
Support Vector Machine
Web Intelligence
- Xiajiong Shen, Yan Xu, Junyang Yu, Ke Zhang:
Intelligent Search Engine Based on Formal Concept Analysis.
669-674
- Xiayu Zhang, Yongquan Yu, Baixing Chen, Feng Ye, Tan Xingxing:
An Extension-Based Dynamic Load Balancing Model of Heterogeneous Server Cluster.
675-679
- Li Lu, Tsau Young Lin:
Granular Index for XML Database.
680-685
- Guido Del Vescovo, Antonello Rizzi:
Online Handwriting Recognition by the Symbolic Histograms Approach.
686-690
- Zhongda Lin, Kun Deng, Yanfen Hong:
Research of Web Pages Categorization.
691-694
- Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng:
Enhancing Discovery of Web Services through Optimized Algorithms.
695-698
- Youngho Kim, Yuchul Jung, Sung-Hyon Myaeng:
Identifying Opinion Holders in Opinion Text from Online Newspapers.
699-
Information Retrieval and Text Mining
Quotient and Quantum Computing
Others
- Jingtao Yao:
A Ten-year Review of Granular Computing.
734-739
- Fengbin Zheng, Xiajiong Shen, Qiang Ge:
A Study of the Query Target of the Chinese Query Sentence.
740-744
- Mi-Young Park, Seok Young Kim, Hyuk-Ro Park:
Visualization of Affect-Relations of Message Races for Debugging MPI Programs.
745-750
- Mehdi Hakimi, Seyyed Masoud Moghaddas Tafreshi, M. R. Rajati:
Unit Sizing of a Stand-Alone Hybrid Power System Using Model-Free Optimization.
751-756
- Su-Fen Chen, Hui Sun:
Application of Swarm Intelligence Algorithm to Improve on Multiple Regression.
757-760
- Dilip Gopichand Khairnar, S. N. Merchant, Uday B. Desai:
Nonlinear Target Identification and Tracking Using UKF.
761-764
- Mark B. Moss:
Comparing Centralized and Distributed Approaches for Operational Impact Analysis in Enterprise Systems.
765-769
- Lisa Singh, Justin Zhan:
Measuring Topological Anonymity in Social Networks.
770-774
- Antoni Martínez-Ballesté, Agusti Solanas:
Privacy in the Information and Communications Technologies.
775-780
- Tingting Chen, Sheng Zhong:
Enhancing Privacy of Released Database.
781-786
- Ran Wei, Justin Zhan:
Improved Customers' Privacy Preference Policy.
787-792
Copyright © Fri Mar 12 17:12:06 2010
by Michael Ley (ley@uni-trier.de)