HTTP/1.1 200 OK Connection: close Date: Thu, 06 Nov 2003 17:59:19 GMT Accept-Ranges: bytes Server: Netscape-Enterprise/3.6 Content-Length: 12289 Content-Type: text/html Last-Modified: Mon, 01 Sep 2003 09:07:14 GMT Client-Date: Thu, 06 Nov 2003 17:59:18 GMT Client-Response-Num: 1 Title: DBLP: T. Y. Lin
2002 | ||
---|---|---|
31 | EE | Shusaku Tsumoto, T. Y. Lin, James F. Peters: Foundations of Data Mining via Granular and Rough Computing. COMPSAC 2002: 1123-1124 |
2001 | ||
30 | EE | T. Y. Lin, Yuke Liu, Wei Luo, Xiuhui Sun, Hongbing Zhou: Building the Infrastructure of E-University. COMPSAC 2001: 344-345 |
29 | EE | I-Jen Chiang, T. Y. Lin: Index Miner. COMPSAC 2001: 613-614 |
28 | EE | T. Y. Lin: Generating Concept Hierarchies/Networks: Mining Additional Semantics in Relational Data. PAKDD 2001: 174-185 |
27 | EE | T. Y. Lin, C. H. Tseng: Using fuzzy set to model the stability region on the bicycle derailleur system. Fuzzy Sets and Systems 118(1): 89-97 (2001) |
2000 | ||
26 | EE | I-Jen Chiang, T. Y. Lin: Using Rough Sets to Build-up Web-Based One to One Customer Services. COMPSAC 2000: 463-464 |
1999 | ||
25 | T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, T. Y. Lin: Panel on Intrusion Detection. DBSec 1999: 227-234 | |
24 | EE | T. Y. Lin: Data Mining: Granular Computing Approach. PAKDD 1999: 24-33 |
23 | Shusaku Tsumoto, T. Y. Lin: Context-Free Fuzzy Sets in Data Mining Context. RSFDGrC 1999: 212-220 | |
22 | T. Y. Lin, Qing Liu: First Order Rough Logic-Revisited. RSFDGrC 1999: 276-284 | |
21 | T. Y. Lin: Patterns in Numerical Data: Practical Approximations to Kolmogorov Complexity. RSFDGrC 1999: 509-513 | |
1998 | ||
20 | T. Y. Lin, Shelly Qian: Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA. Chapman & Hall 1998 | |
19 | EE | Xie Keming, T. Y. Lin, Jianwei Zhang: The Takagi-Sugeno Fuzzy Model Identification Method of Parameter Varying Systems. Rough Sets and Current Trends in Computing 1998: 155-162 |
18 | EE | T. Y. Lin: Fuzzy Partitions II: Belief Functions. A Probalistic View. Rough Sets and Current Trends in Computing 1998: 381-386 |
17 | EE | T. Y. Lin, Ning Zhong, J. J. Dong, Setsuo Ohsuga: Frameworks for Mining Binary Relations in Data. Rough Sets and Current Trends in Computing 1998: 387-393 |
16 | T. Y. Lin: From Rough Sets of Soft Computing: Introduction. Information Sciences 104(1-2): 1-2 (1998) | |
1997 | ||
15 | Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, T. Y. Lin, Sushil Jajodia, Chris Clifton: Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 | |
14 | T. Y. Lin, Xiaoling Zuo: Multilevel Decision Logic: A Formalism for Rules Mining. DBSec 1997: 307-321 | |
1996 | ||
13 | T. Y. Lin, Qing Liu: First-Order Rough Logic I: Approximate Reasoning via Rough Sets. Fundamenta Informaticae 27(2/3): 137-153 (1996) | |
1995 | ||
12 | EE | T. Y. Lin: Workshop on Rough Sets and Database Mining. ACM Conference on Computer Science 1995: 282 |
11 | T. Y. Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham: Security and Data Mining. DBSec 1995: 391-399 | |
1994 | ||
10 | T. Y. Lin, Y. C. Chen: A Congestion Control Approach for LAN/MAN Interconnection via ATM. INFOCOM 1994: 892-901 | |
9 | T. Y. Lin, Qing Liu, Y. Y. Yao: Logics Systems for Approximate Reasoning: Approximation via Rough Sets and Topological Spaces. ISMIS 1994: 65-74 | |
1993 | ||
8 | T. Y. Lin, Qing Liu: Rough Approximate Operators: Axiomatic Rough Set Theory. RSKD 1993: 256-260 | |
7 | T. Y. Lin: Fuzzy Reasoning and Rough Sets. RSKD 1993: 343-348 | |
1992 | ||
6 | T. Y. Lin: Inference Secure Multilevel Databases. DBSec 1992: 317-332 | |
5 | T. Y. Lin: Attribute Based Data Model and Polyinstantiation. IFIP Congress (2) 1992: 472-478 | |
1990 | ||
4 | EE | T. Y. Lin: Relational Data Models and Category Theory (Abstract). ACM Conference on Computer Science 1990: 424 |
3 | T. Y. Lin: Multilevel Database and Aggregated Security Algebra. DBSec 1990: 325-350 | |
1989 | ||
2 | T. Y. Lin, Larry Kerschberg, Robert P. Trueblood: Security Algebras and Formal Models: Using Petri Net Theory. DBSec 1989: 75-96 | |
1988 | ||
1 | T. Y. Lin: A Generalized Information Flow Model and the Role of System Security Officer. DBSec 1988: 85-103 |