Skip to main content
padlock icon - secure page this page is secure

Publisher: Wiley-Blackwell

Volume 20, Number 5, November 2003

Rough sets: current and future developments
pp. 247-250(4)
Author: Curry, Bruce

Favourites:
ADD

A rough set theory based method for anomaly intrusion detection in computer network systems
pp. 251-259(9)
Authors: Cai, Zhongmin; Guan, Xiaohong; Shao, Ping; Peng, Qingke; Sun, Guoji

Favourites:
ADD

Intuitionistic fuzzy rough sets: at the crossroads of imperfect knowledge
pp. 260-270(11)
Authors: Cornelis, Chris; De Cock, Martine; Kerre, Etienne E.

Favourites:
ADD

Rough sets and maintenance in a production line
pp. 271-279(9)
Authors: Gento, Angel M.; Redondo, Alfonso

Favourites:
ADD

Knowledge acquisition in incomplete fuzzy information systems via the rough set approach
pp. 280-286(7)
Authors: Wu, Wei-Zhi; Zhang, Wen-Xiu; Li, Huai-Zu

Favourites:
ADD

Probabilistic approaches to rough sets
pp. 287-297(11)
Author: Yao, Y. Y.

Favourites:
ADD

A rough set approach to knowledge reduction based on inclusion degree and evidence reasoning theory
pp. 298-304(7)
Authors: Zhang, Mei; Da Xu, Li; Zhang, Wen-Xiu; Li, Huai-Zu

Favourites:
ADD
Favourites:
ADD

News
pp. 311-320(10)

Favourites:
ADD

Diary
pp. 321-323(3)

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more