Skip to main content

Associated-Conflict Analysis Using Covering Based on Granular Computing

  • Conference paper
Life System Modeling and Intelligent Computing (ICSEE 2010, LSMS 2010)

Abstract

Conflicts are ubiquitous phenomena in our society, and the research on them is very important both practically and theoretically. Many mathematical models and methods of conflict have been studied and proposed. In this paper, associated-conflict is introduced, and a reasonable and comprehensive approach to its analysis, using covering based on granular computing, is outlined. The model of associated-conflict analysis, given by the example of service-resource, will provide more profound insight for the conflict resolution in different fields.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Roberts, F.: Discrete mathematical models with application to social, biological and environmental problems. Prince-Hall, Englewood Cliffs (1976)

    Google Scholar 

  2. Coombs, C.H., Avruin, G.S.: The structure of conflicts. Lawrence Erlbaum, London (1988)

    Google Scholar 

  3. Casti, J.L.: Alternative realities-mathematical models of nature and man. Wiley, New York (1989)

    Google Scholar 

  4. Pawlak, Z.: An inquiry into anatomy of conflicts. Journal of Information Sciences 109, 65–68 (1998)

    Article  MathSciNet  Google Scholar 

  5. Maeda, Y., Senoo, K., Tanaka, H.: Interval density function in conflict analysis. In: Zhong, N., Skowron, A., Ohsuga, S. (eds.) New Directions in Rough Sets, Data Mining and Granular-Soft Computing, pp. 382–389. Springer, New York (1999)

    Chapter  Google Scholar 

  6. Nakamura, A.: Conflict logic with degrees. In: Pal, S.K., Skowron, A. (eds.) Rough Fuzzy Hybridization-A New Trend in Decision-making, pp. 136–150. Springer, New York (1999)

    Google Scholar 

  7. Deja, R.: Conflict analysis. rough set methods and applications. In: Polkowski, L., Tsumoto, S., Lin, T.Y. (eds.) Studies in Fuzzyness and Soft Computing, Physica-Verlag, pp. 491–520. A Springer-Verlag Company, Wien (2000)

    Google Scholar 

  8. Pawlak, Z.: On conflicts. International Journal of Man Machine Studies 21, 127–134 (1984)

    Article  MATH  Google Scholar 

  9. Pawlak, Z.: Some remarks on conflict analysis. European Journal of Operational Research 166, 649–654 (2005)

    Article  MATH  Google Scholar 

  10. Yao, Y.Y.: The art of granular computing. In: Kryszkiewicz, M., Peters, J.F., Rybiński, H., Skowron, A. (eds.) RSEISP 2007. LNCS (LNAI), vol. 4585, pp. 101–112. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Bargiela, A., Pedrycz, W.: Granular computing: an introduction. Kluwer Acamedic Publishers, Boston (2002)

    Google Scholar 

  12. Yao, Y.Y.: Granular computing: basic issues and possible solutions. In: The 5th Joint Conference on Information Sciences, New Jersey, USA, vol. 1, pp. 186–189 (2000)

    Google Scholar 

  13. Zhu, W., Wang, F.Y.: Covering based granular computing for conflict analysis. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 566–571. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Skowron, A., Rauszer, C.: The discernibility matrices and functions in information system. In: Slowinski, R. (ed.) Intelligent Decision Support. Handbook of Applications and Advances of the Rough Set Theory, pp. 331–362. Kluwer Academic Publishers, Dordrecht (1991)

    Google Scholar 

  15. Lin, T.Y.: Granular computing on binary relations-analysis of conflict and chinese wall security policy. In: Alpigini, J.J., Peters, J.F., Skowron, A., Zhong, N. (eds.) RSCTC 2002. LNCS (LNAI), vol. 2475, pp. 296–299. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Brewer, D., Nash, M.: The chinese wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206–214 (1989)

    Google Scholar 

  17. Seymour, M.L.: Consensus and conflict. New Brunswick, New Jersey (1983)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, S., Wang, J., Lin, H. (2010). Associated-Conflict Analysis Using Covering Based on Granular Computing. In: Li, K., Fei, M., Jia, L., Irwin, G.W. (eds) Life System Modeling and Intelligent Computing. ICSEE LSMS 2010 2010. Lecture Notes in Computer Science, vol 6328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15621-2_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15621-2_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15620-5

  • Online ISBN: 978-3-642-15621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics