HTTP/1.1 200 OK Connection: close Date: Thu, 06 Nov 2003 17:59:19 GMT Accept-Ranges: bytes Server: Netscape-Enterprise/3.6 Content-Length: 12289 Content-Type: text/html Last-Modified: Mon, 01 Sep 2003 09:07:14 GMT Client-Date: Thu, 06 Nov 2003 17:59:18 GMT Client-Response-Num: 1 Title: DBLP: T. Y. Lin DBLP: T. Y. Lin dblp.uni-trier.de

T. Y. Lin

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM - CiteSeer - CSB - Google - HomePageSearch
2002
31EEShusaku Tsumoto, T. Y. Lin, James F. Peters: Foundations of Data Mining via Granular and Rough Computing. COMPSAC 2002: 1123-1124
2001
30EET. Y. Lin, Yuke Liu, Wei Luo, Xiuhui Sun, Hongbing Zhou: Building the Infrastructure of E-University. COMPSAC 2001: 344-345
29EEI-Jen Chiang, T. Y. Lin: Index Miner. COMPSAC 2001: 613-614
28EET. Y. Lin: Generating Concept Hierarchies/Networks: Mining Additional Semantics in Relational Data. PAKDD 2001: 174-185
27EET. Y. Lin, C. H. Tseng: Using fuzzy set to model the stability region on the bicycle derailleur system. Fuzzy Sets and Systems 118(1): 89-97 (2001)
2000
26EEI-Jen Chiang, T. Y. Lin: Using Rough Sets to Build-up Web-Based One to One Customer Services. COMPSAC 2000: 463-464
1999
25 T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, T. Y. Lin: Panel on Intrusion Detection. DBSec 1999: 227-234
24EET. Y. Lin: Data Mining: Granular Computing Approach. PAKDD 1999: 24-33
23 Shusaku Tsumoto, T. Y. Lin: Context-Free Fuzzy Sets in Data Mining Context. RSFDGrC 1999: 212-220
22 T. Y. Lin, Qing Liu: First Order Rough Logic-Revisited. RSFDGrC 1999: 276-284
21 T. Y. Lin: Patterns in Numerical Data: Practical Approximations to Kolmogorov Complexity. RSFDGrC 1999: 509-513
1998
20 T. Y. Lin, Shelly Qian: Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA. Chapman & Hall 1998
19EEXie Keming, T. Y. Lin, Jianwei Zhang: The Takagi-Sugeno Fuzzy Model Identification Method of Parameter Varying Systems. Rough Sets and Current Trends in Computing 1998: 155-162
18EET. Y. Lin: Fuzzy Partitions II: Belief Functions. A Probalistic View. Rough Sets and Current Trends in Computing 1998: 381-386
17EET. Y. Lin, Ning Zhong, J. J. Dong, Setsuo Ohsuga: Frameworks for Mining Binary Relations in Data. Rough Sets and Current Trends in Computing 1998: 387-393
16 T. Y. Lin: From Rough Sets of Soft Computing: Introduction. Information Sciences 104(1-2): 1-2 (1998)
1997
15 Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, T. Y. Lin, Sushil Jajodia, Chris Clifton: Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16
14 T. Y. Lin, Xiaoling Zuo: Multilevel Decision Logic: A Formalism for Rules Mining. DBSec 1997: 307-321
1996
13 T. Y. Lin, Qing Liu: First-Order Rough Logic I: Approximate Reasoning via Rough Sets. Fundamenta Informaticae 27(2/3): 137-153 (1996)
1995
12EET. Y. Lin: Workshop on Rough Sets and Database Mining. ACM Conference on Computer Science 1995: 282
11 T. Y. Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham: Security and Data Mining. DBSec 1995: 391-399
1994
10 T. Y. Lin, Y. C. Chen: A Congestion Control Approach for LAN/MAN Interconnection via ATM. INFOCOM 1994: 892-901
9 T. Y. Lin, Qing Liu, Y. Y. Yao: Logics Systems for Approximate Reasoning: Approximation via Rough Sets and Topological Spaces. ISMIS 1994: 65-74
1993
8 T. Y. Lin, Qing Liu: Rough Approximate Operators: Axiomatic Rough Set Theory. RSKD 1993: 256-260
7 T. Y. Lin: Fuzzy Reasoning and Rough Sets. RSKD 1993: 343-348
1992
6 T. Y. Lin: Inference Secure Multilevel Databases. DBSec 1992: 317-332
5 T. Y. Lin: Attribute Based Data Model and Polyinstantiation. IFIP Congress (2) 1992: 472-478
1990
4EET. Y. Lin: Relational Data Models and Category Theory (Abstract). ACM Conference on Computer Science 1990: 424
3 T. Y. Lin: Multilevel Database and Aggregated Security Algebra. DBSec 1990: 325-350
1989
2 T. Y. Lin, Larry Kerschberg, Robert P. Trueblood: Security Algebras and Formal Models: Using Petri Net Theory. DBSec 1989: 75-96
1988
1 T. Y. Lin: A Generalized Information Flow Model and the Role of System Security Officer. DBSec 1988: 85-103

DBLP: [Home | Search: Author, Title | Conferences | Journals]
Michael Ley (ley@uni-trier.de) Mon Sep 1 03:43:46 2003