共检索到15条结果
论文类型
全部
订阅
收起
  • [期刊论文] 《南昌工程学院学报》 - 2006年2期
    Rough set theory is a technique of granular computing. In this paper, we study a type of generalized rough sets based on covering. There are several literatures[ 1,40-43 ] exploring covering-based roug...
    rough setcoveringgranular computingduality
  • [外文会议] William Zhu Clark Thomborson Fei-Yue Wang 2006
    As various computers are connected into a world wide network, software protections becomes a more and more important issue for software users and developers. There are some technical measures for softw...
    Software obfuscationResidue number codingHomomorphic obfuscation
  • [外文会议] William Zhu Fei-Yue Wang 2006
    Rough sets, a technique of granular computing, deal with the vagueness and granularity in information systems. They are based on equivalence relations on a set, or equivalently, on a partition on the s...
    Rough setCoveringGranular computingFuzzy setComputing with word
  • [外文会议] William Zhu Fei-Yue Wang 2006
    Rough sets, a tool for data mining, deal with the vagueness and granularity in information systems. This paper studies a type of covering generalized rough sets. After presenting the their basic proper...
    Rough setCoveringCovering lower approximationCovering upper approximationReductFuzzy setGranular computing
  • [外文会议] William Zhu Clark Thomborson 2006
    Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Software watermarking is such ...
  • [外文会议] William Zhu Feiyue Wang 2006
    Rough set theory was proposed by Pawlak to deal with the vagueness and granularity in information systems that are characterized by insufficient, inconsistent, and incomplete data. Its successful appli...
    Rough setCoveringGranular computingData mining
  • [外文会议] William Zhu Fei-Yue Wang 2006
    Conflicts are widespread in our society owing to the scarcity of physical resources, different cultures and religions. The Chinese Wall security policy is a conflicts model originally proposed by Brewe...
  • [外文会议] William Zhu Clark Thomborson Fei-Yue Wang 2006
    As various computers are connected into a world wide network, software is a target of copyright pirates, attackers, or even terrorists, as a result, software protections become a more and more importan...
  • [外文会议] William Zhu 2006
    In the covering-based generalized rough set setting, lower and upper approximation operations generated by a covering do not satisfy some of common properties of classical lower and upper approximation...
  • [外文会议] William Zhu 2006
    To deal with the vagueness and granularity in information systems, researchers proposed several methods such as fuzzy theory and rough set theory. This paper studies a class of covering-based generaliz...
回到顶部
选择了条数据