-
3
-
-
0032139426
-
An inquiry into anatomy of conflicts
-
Pawlak, Z.: An inquiry into anatomy of conflicts. Journal of Information Sciences 109 (1998) 65-78
-
(1998)
Journal of Information Sciences
, vol.109
, pp. 65-78
-
-
Pawlak, Z.1
-
5
-
-
32544453950
-
A novel policy and information flow security model for active network
-
ISI 2004
-
Xia, Z., Jiang, Y., Zhong, Y., Zhang, S.: A novel policy and information flow security model for active network. In: ISI 2004, LNCS. Volume 3073. (2004) 42-55
-
(2004)
LNCS
, vol.3073
, pp. 42-55
-
-
Xia, Z.1
Jiang, Y.2
Zhong, Y.3
Zhang, S.4
-
6
-
-
33745889404
-
Policy-based information sharing with semantics
-
ISI 2004
-
Hughes, E., Kazura, A., Rosenthal, A.: Policy-based information sharing with semantics. In: ISI 2004. Volume 3073 of LNCS. (2004) 508-509
-
(2004)
LNCS
, vol.3073
, pp. 508-509
-
-
Hughes, E.1
Kazura, A.2
Rosenthal, A.3
-
7
-
-
24944544435
-
Incident and casualty databases as a tool for understanding low-intensity conflicts
-
ISI 2005
-
Radlauer, D.: Incident and casualty databases as a tool for understanding low-intensity conflicts. In: ISI 2005. Volume 3495 of LNCS. (2005) 153-170
-
(2005)
LNCS
, vol.3495
, pp. 153-170
-
-
Radlauer, D.1
-
8
-
-
24944445620
-
An ontological approach to the document access problem of insider threat
-
ISI 2005
-
Aleman-Meza, B., Eavenson, P.B.M., Palaniswami, D., Sheth, A.: An ontological approach to the document access problem of insider threat. In: ISI 2005. Volume 3495 of LNCS. (2005) 486-491
-
(2005)
LNCS
, vol.3495
, pp. 486-491
-
-
Aleman-Meza, B.1
Eavenson, P.B.M.2
Palaniswami, D.3
Sheth, A.4
-
9
-
-
24944451946
-
CliveGarciaBest: A study of "root causes of conflict" using latent semantic analysis
-
ISI 2005
-
Bobeica, M., Jeral, J.P., CliveGarciaBest: A study of "root causes of conflict" using latent semantic analysis. In: ISI 2005. Volume 3495 of LNCS. (2005) 595-596
-
(2005)
LNCS
, vol.3495
, pp. 595-596
-
-
Bobeica, M.1
Jeral, J.P.2
-
12
-
-
84942855417
-
Granular computing on binary relations-analysis of conflict and Chinese wall security policy
-
Rough Sets and Current Trends in Computing
-
Lin, T.Y.: Granular computing on binary relations-analysis of conflict and Chinese wall security policy. In: Rough Sets and Current Trends in Computing. Volume 2475 of LNAI. (2002) 296-299
-
(2002)
LNAI
, vol.2475
, pp. 296-299
-
-
Lin, T.Y.1
-
14
-
-
8344286314
-
Granular computing - Structures, representations, and applications
-
Lin, T.Y.: Granular computing - structures, representations, and applications. In: LNAI. Volume 2639. (2003) 16-24
-
(2003)
LNAI
, vol.2639
, pp. 16-24
-
-
Lin, T.Y.1
-
16
-
-
0037877961
-
-
Master's thesis, The Universite of Arizona, Tucson, Arizona, USA
-
Zhu, F.: On covering generalized rough sets. Master's thesis, The Universite of Arizona, Tucson, Arizona, USA (2002)
-
(2002)
On Covering Generalized Rough Sets
-
-
Zhu, F.1
-
17
-
-
0037621960
-
Reduction and axiomization of covering generalized rough sets
-
Zhu, W., Wang, F.Y.: Reduction and axiomization of covering generalized rough sets. Information Sciences 152 (2003) 217-230
-
(2003)
Information Sciences
, vol.152
, pp. 217-230
-
-
Zhu, W.1
Wang, F.Y.2
-
18
-
-
33745893901
-
Relationships among three types of covering rough sets
-
to appear
-
Zhu, W., Wang, F.Y.: Relationships among three types of covering rough sets. In: IEEE GrC 2006, to appear. (2006)
-
(2006)
IEEE GrC 2006
-
-
Zhu, W.1
Wang, F.Y.2
|