期刊文献+

The rise of granular computing 被引量:1

The rise of granular computing
下载PDF
导出
摘要 This paper has two purposes.One is to present a critical examination of the rise of granular computing and the other is to suggest a triarchic theory of granular computing.By examining the reasons,justifications,and motivations for the rise of granular computing,we may be able to fully appreciate its scope,goal and potential values.The results enable us to formulate a triarchic theory in the light of research results from many disciplines.The three components of the theory are labeled as the philosophy,the methodology,and the computation.The integration of the three offers a unified view of granular computing as a way of structured thinking,a method of structured problem solving,and a paradigm of structured information processing,focusing on hierarchical granular structures.The triarchic theory is an important effort in synthesizing the various theories and models of granular computing. This paper has two purposes. One is to present a critical examination of the rise of granular computing and the other is to suggest a triarchic theory of granular computing. By examining the reasons, justifications, and motivations for the rise of granular computing, we may be able to fully appreciate its scope, goal and potential values. The results enable us to formulate a triarchic theory in the light of research results from many disciplines. The three components of the theory are labeled as the philosophy, the methodology, and the computation. The integration of the three offers a unified view of granular computing as a way of structured thinking, a method of structured problem solving, and a paradigm of structured information processing, focusing on hierarchical granular structures. The triarchic theory is an important effort in synthesizing the various theories and models of granular computing.
作者 YAO Yi-yu
出处 《重庆邮电大学学报(自然科学版)》 2008年第3期299-308,共10页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 supported by a Discovery grant from NSERC Canada.
关键词 粒度计算 粗糙集 计算方法 数据处理 triarchie theory of granular computing systems theory structured thinking problem solving and information processing
  • 相关文献

参考文献2

二级参考文献69

  • 1Ahl,V. and Allen, T.F.H. Hierarchy Theory, a Vision, Vocabulary and Epistemology. Columbia University Press, 1996. 被引量:1
  • 2Bargiela, A. and Pexirycz, W. The roots of granular computing. Proccedings of the 2006 IEEE Intemational Conference on Granular Computing(GrC'06), 2006, pp. 806-809. 被引量:1
  • 3Bargiela, A. and Pedrycz W. Granular Computing: an Introduction. Kluwer Academic Publishers, Boston, 2002. 被引量:1
  • 4Hawkins, J. (with B1akeslee, S.) On Intelligence.Henry Holt and Company, New York, 2004. 被引量:1
  • 5Hobbs, J.R. Granularity. Proceedings of the Ninth International Joint Conference on Artificial Intelligence, pp. 432-435, 1985. 被引量:1
  • 6Ledgard, H.F., Gueras, J.F. and Nagin, P.A. PASCAL with Style:Programming Proverbs. Hayden Book Company, Inc., Rechelle Park, New Jersey, 1979. 被引量:1
  • 7Lin, T.Y. Granular computing. Announcement of the BISC Special Interest Group on Granular Computing, 1997. 被引量:1
  • 8Lin, T.Y., Yao, Y.Y. and Zadeh, L.A. (Eds.) Data Mining, Rough Sets and Granular Computing.Physica-Verlag, Heidelberg, 2002. 被引量:1
  • 9Liu, Q. and Wang, Q.Y. Granular logic with closeness reltion -λ and its reasoning. Proceedings of RSFDGrC'05, LNAI 3641, pp. 709-717, 2005. 被引量:1
  • 10Mart, D. Vision: A Computational Investigation into Human Representation and Processing of Visual Information. W.H. Freeman and Company, San Francisco, 1982. 被引量:1

共引文献69

同被引文献17

  • 1金博,史彦军,滕弘飞.中文文档复制检测系统研究[J].计算机工程,2005,31(19):79-81. 被引量:9
  • 2李道国,苗夺谦,张东星,张红云.粒度计算研究综述[J].计算机科学,2005,32(9):1-12. 被引量:54
  • 3何娟,高志强,陆青健,瞿裕忠.基于词汇相似度的元素级本体匹配[J].计算机工程,2006,32(16):185-187. 被引量:25
  • 4苗夺谦,王国胤,刘清,等.粒计算:过去、现在与展望[M].北京:科学出版社,2007. 被引量:13
  • 5BRIN S,DAVIS J ,GARCIA-MOLINA H. Copy detection mechanisms for digital documents [C]//Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data. New York :ACM, 1995:398-409. 被引量:1
  • 6SHIVAKUMAR N,GARCIA-MOLINA H. SCAM :a copy detection meachanism for digital documents[C]//Proceedings of Second International Conference in Theory and Practice of Digital Libraries (DL'95). [S. l. ]:Texas, 1995: 151-156. 被引量:1
  • 7GARCIA-MOLINA H,GRAVANO L ,SHIVAKUMAR N. dSCAM:finding document copies across multiple databases [C]//Proceedings of the 4th International Conference on Parallel and Distributed System. New York:IEEE, 1996 [2009-06-20]. http ://ilpubs. stanford. edu:8090/199/1/1996-69. pdf. 被引量:1
  • 8MONOSTORI K,ZASLAVSKY A. MatehDetectReveal:finding overlapping and similar digital doeuments[C]//Proeeeding of the Information Resources Management Association International Conference (IRMA2000). Anchorage, Alaska: [s. n. ], 2000: 955-95712009-12-20]. http ://www. csse. monash. edu. au/projects/MDR/papers/. 被引量:1
  • 9MONOSTORI K, ZASLAVSKY A, VAJK I. Suffix vector : a space efficient suffix tree representation[C]//Lecture Notes in Computer Science, Volume 2223. Berlin Heidelberg : Springer-Verlag, 2001:707-718. 被引量:1
  • 10SI A,LEONG H V,LAU R W H. CHECK:a document plaginrism detection system [C]//Proeeeding of the 12th ACM Symposium on Applied Computing (ACM SAC'97) Special Track on Database Technology. San Jose,California ,USA : ACM, 1997: 70-77. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部