default search action
Chien-Chung Chan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i1]Arvind Srinivasan, Chien-Chung Chan:
Short Secret Sharing Using Repeatable Random Sequence Generators. CoRR abs/2101.09317 (2021)
2010 – 2019
- 2016
- [j9]Hoang Nguyen, Rachel Richards, Chien-Chung Chan, Kathy J. Liszka:
RedTweet: recommendation engine for reddit. J. Intell. Inf. Syst. 47(2): 247-265 (2016) - 2015
- [c24]Hoang Nguyen, Rachel Richards, Chien-Chung Chan, Kathy J. Liszka:
RedTweet: Recommendation Engine for Reddit. ASONAM 2015: 1381-1388 - 2013
- [c23]Krushikanth R. Apala, Merin Jose, Supreme Motnam, Chien-Chung Chan, Kathy J. Liszka, Federico de Gregorio:
Prediction of movies box office performance using social media. ASONAM 2013: 1209-1214 - [c22]Fengming Michael Chang, Chien-Chung Chan:
Computation of Maximal Characteristic Neighborhoods for Incomplete Information Systems. SMC 2013: 818-822 - [p1]Chien-Chung Chan, Kathy J. Liszka:
Application of Rough Set Theory to Sentiment Analysis of Microblog Data. Rough Sets and Intelligent Systems (2) 2013: 185-202 - 2012
- [c21]Feixiang Huang, Shengyong Wang, Chien-Chung Chan:
Predicting disease by using data mining based on healthcare information system. GrC 2012: 191-194 - [c20]Chien-Chung Chan:
Maximal Characteristic Sets and Neighborhoods Approach to Incomplete Information Systems. RSCTC 2012: 73-82 - 2011
- [j8]James F. Peters, Chien-Chung Chan, Jerzy W. Grzymala-Busse, Wojciech Ziarko:
Preface: A rough set approach to data mining. Int. J. Intell. Syst. 26(6): 497-498 (2011) - [j7]Yu-Ping Ou Yang, How-Ming Shieh, Gwo-Hshiung Tzeng, Leon Yen, Chien-Chung Chan:
Combined rough sets with flow graph and formal concept analysis for business aviation decision-making. J. Intell. Inf. Syst. 36(3): 347-366 (2011) - [j6]Chien-Chung Chan, Gwo-Hshiung Tzeng:
Bit-Vector Representation of Dominance-Based Approximation Space. Trans. Rough Sets 13: 1-16 (2011) - [c19]Ravinder R. Ravula, Chien-Chung Chan, Kathy J. Liszka:
Dynamic Analysis of Malware using Decision Trees. KDIR 2011: 74-83 - [c18]Ravinder R. Ravula, Kathy J. Liszka, Chien-Chung Chan:
Learning Attack Features from Static and Dynamic Analysis of Malware. IC3K 2011: 109-125 - [e2]James F. Peters, Andrzej Skowron, Chien-Chung Chan, Jerzy W. Grzymala-Busse, Wojciech Ziarko:
Transactions on Rough Sets XIII. Lecture Notes in Computer Science 6499, Springer 2011, ISBN 978-3-642-18301-0 [contents] - 2010
- [c17]Chien-Chung Chan, Chen Chen, Varundev Garikapati:
Finding Value Reducts Using Rough Multisets. GrC 2010: 85-89 - [c16]Chandra Shekar, Shruti Wakade, Kathy J. Liszka, Chien-Chung Chan:
Mining pharmaceutical spam from Twitter. ISDA 2010: 813-817 - [c15]Chien-Chung Chan, Natheer Khasawneh, Fengming Michael Chang:
Incremental updates of Dominance-based approximations. SMC 2010: 373-378
2000 – 2009
- 2009
- [j5]Chien-Chung Chan, Gwo-Hshiung Tzeng:
Dominance-Based Rough Sets Using Indexed Blocks as Granules. Fundam. Informaticae 94(2): 133-146 (2009) - [c14]Chien-Chung Chan, Gwo-Hshiung Tzeng:
Representation of second-order Dominance-based approximation space by neighborhood systems. GrC 2009: 33-38 - [c13]Fengming Michael Chang, Chien-Chung Chan:
A Granular Computing Approach to Improve Large Attributes Learning. SMC 2009: 2521-2525 - [c12]Chien-Chung Chan, Fengming Michael Chang:
On Definability of Sets in Dominance-Based Approximation Space. SMC 2009: 2953-2958 - 2008
- [c11]Chien-Chung Chan:
Approximate dominance-based rough sets using equivalence granules. FUZZ-IEEE 2008: 2433-2438 - [c10]Chien-Chung Chan, Gwo-Hshiung Tzeng:
Computing Approximations of Dominance-Based Rough Sets by Bit-Vector Encodings. RSCTC 2008: 131-141 - [c9]Yu-Ping Ou Yang, How-Ming Shieh, Gwo-Hshiung Tzeng, Leon Yen, Chien-Chung Chan:
Business Aviation Decision-Making Using Rough Sets. RSCTC 2008: 329-338 - [c8]Chien-Chung Chan, Gwo-Hshiung Tzeng:
Dominance-Based Rough Sets Using Indexed Blocks as Granules. RSKT 2008: 244-251 - [c7]Fengming Michael Chang, Chien-Chung Chan:
A granular computing approach to data engineering. SMC 2008: 2753-2758 - [e1]Chien-Chung Chan, Jerzy W. Grzymala-Busse, Wojciech Ziarko:
Rough Sets and Current Trends in Computing, 6th International Conference, RSCTC 2008, Akron, OH, USA, October 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5306, Springer 2008, ISBN 978-3-540-88423-1 [contents] - 2007
- [c6]Uday Seelam, Chien-Chung Chan:
A Study of Data Reduction Using Multiset Decision Tables. GrC 2007: 362-367 - [c5]Mihir Sewak, Priyanka Vaidya, Chien-Chung Chan:
SVM Approach to Breast Cancer Classification. IMSCCS 2007: 32-37 - 2006
- [c4]Natheer Khasawneh, Chien-Chung Chan:
Active User-Based and Ontology-Based Web Log Data Preprocessing for Web Usage Mining. Web Intelligence 2006: 325-328 - 2005
- [c3]Chien-Chung Chan, Zhicheng Su:
From Data to Knowledge: an Integrated Rule-Based Data Mining System. SEKE 2005: 508-513 - 2004
- [j4]Chien-Chung Chan:
Learning Rules from Very Large Databases Using Rough Multisets. Trans. Rough Sets 1: 59-77 (2004) - 2003
- [c2]Hua Lei, Chien-Chung Chan, John J. Cheh:
Rule-Based Classifier for Bankruptcy Protection. MAICS 2003: 74-81 - 2002
- [c1]Celal Batur, Ling Zhou, Chien-Chung Chan:
Support vector machines for fault detection. CDC 2002: 1355-1356
1990 – 1999
- 1998
- [j3]Chien-Chung Chan:
A Rough Set Approach to Attribute Generalization in Data Mining. Inf. Sci. 107(1-4): 169-176 (1998) - 1995
- [j2]Celal Batur, Arvind Srinivasan, Chien-Chung Chan:
Fuzzy Model Based Fuzzy Predictive Controllers. J. Intell. Fuzzy Syst. 3(2): 117-130 (1995) - 1991
- [j1]Chien-Chung Chan:
Incremental Learning of Production Rules from Examples under Uncertainty: a Rough Set Approach. Int. J. Softw. Eng. Knowl. Eng. 1(4): 439-461 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint