{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T07:44:30Z","timestamp":1724485470796},"reference-count":40,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2001,9,1]],"date-time":"2001-09-01T00:00:00Z","timestamp":999302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Fuzzy Sets and Systems"],"published-print":{"date-parts":[[2001,9]]},"DOI":"10.1016\/s0165-0114(00)00086-5","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:27:39Z","timestamp":1027600059000},"page":"409-424","source":"Crossref","is-referenced-by-count":99,"title":["Handling possibilistic labels in pattern classification using evidential reasoning"],"prefix":"10.1016","volume":"122","author":[{"given":"Thierry","family":"Den\u0153ux","sequence":"first","affiliation":[]},{"given":"Lalla Meriem","family":"Zouhal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-0114(00)00086-5_BIB1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0165-0114(86)90004-7","article-title":"Generalized k-nearest neighbor rules","volume":"18","author":"Bezdek","year":"1986","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB2","series-title":"Fuzzy Models for Pattern Recognition","author":"Bezdek","year":"1992"},{"issue":"05","key":"10.1016\/S0165-0114(00)00086-5_BIB3","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/21.376493","article-title":"A k-nearest neighbor classification rule based on Dempster\u2013Shafer theory","volume":"25","author":"Den\u0153ux","year":"1995","journal-title":"IEEE Trans. Systems Man Cybernet."},{"issue":"7","key":"10.1016\/S0165-0114(00)00086-5_BIB4","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1016\/S0031-3203(96)00137-9","article-title":"Analysis of evidence-theoretic decision rules for pattern classification","volume":"30","author":"Den\u0153ux","year":"1997","journal-title":"Pattern Recognition"},{"issue":"5","key":"10.1016\/S0165-0114(00)00086-5_BIB5","first-page":"443","article-title":"Application du mod\u00e8le des croyances transf\u00e9rables en reconnaissance de formes","volume":"14","author":"Den\u0153ux","year":"1998","journal-title":"Traitement du Signal"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB6","series-title":"Fuzzy Information and Decision Processes","first-page":"167","article-title":"On several representations of an uncertainty body of evidence","author":"Dubois","year":"1982"},{"issue":"5","key":"10.1016\/S0165-0114(00)00086-5_BIB7","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/0005-1098(85)90004-4","article-title":"Evidence measures based on fuzzy information","volume":"21","author":"Dubois","year":"1985","journal-title":"Automatica"},{"issue":"1","key":"10.1016\/S0165-0114(00)00086-5_BIB8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/S0165-0114(83)80099-2","article-title":"Unfair coins and necessity measures: towards a possibilistic interpretation of histograms","volume":"10","author":"Dubois","year":"1983","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB9","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0165-0114(87)90122-9","article-title":"An alternative approach to the handling of subnormal possibility distributions","volume":"24","author":"Dubois","year":"1987","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB10","series-title":"Possibility Theory: An Approach to Computerized Processing of Uncertainty","author":"Dubois","year":"1988"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB11","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/TSMC.1976.5408784","article-title":"The distance-weighted k-nearest-neighbor rule","volume":"SMC-6","author":"Dudani","year":"1976","journal-title":"IEEE Trans. System Man Cybernet."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB12","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0020-0255(82)90047-0","article-title":"Inference procedures under uncertainty for the problem-reduction method","volume":"28","author":"Ishizuka","year":"1982","journal-title":"Inform. Sci."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB13","unstructured":"J.-Y. Jaffray, Dynamic decision making using belief functions, in: R.R. Yager, M. Fedrizzi, J. Kacprzyk (Eds.), Advances in the Dempster\u2013Shafer Theory of Evidence, Wiley, New York, 1994,, pp. 331\u2013352."},{"issue":"4","key":"10.1016\/S0165-0114(00)00086-5_BIB14","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TSMC.1985.6313426","article-title":"A fuzzy k-NN neighbor algorithm","volume":"SMC-15","author":"Keller","year":"1985","journal-title":"IEEE Trans. System Man Cybernet."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB15","unstructured":"C. Richard, Une m\u00e9thodologie pour la d\u00e9tection \u00e0 structure impos\u00e9e, Applications au plan temps-fr\u00e9quence, Ph.D. Thesis, Universit\u00e9 de Technologie de Compi\u00e8gne, 1998."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB16","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/S0165-1684(99)00021-3","article-title":"Data driven design and complexity control of time-frequency detectors","volume":"77","author":"Richard","year":"1999","journal-title":"Signal Process."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB17","series-title":"A Mathematical Theory of Evidence","author":"Shafer","year":"1976"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0020-0255(81)90008-6","article-title":"The degree of belief in a fuzzy event","volume":"25","author":"Smets","year":"1981","journal-title":"Inform. Sci."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB19","unstructured":"P. Smets, Possibilistic inference from statistical data, Second World Conference on Mathematics at the Service of Man, Universidad Politecnica de Las Palmas, 1982, pp. 611\u2013613."},{"issue":"5","key":"10.1016\/S0165-0114(00)00086-5_BIB20","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/34.55104","article-title":"The combination of evidence in the Transferable Belief Model","volume":"12","author":"Smets","year":"1990","journal-title":"IEEE Trans. Pattern Anal. Mach. Intelligence"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB21","first-page":"29","article-title":"Constructing the pignistic probability function in a context of uncertainty","volume":"Vol. 5","author":"Smets","year":"1990"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB22","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/0888-613X(92)90028-X","article-title":"Resolving misunderstandings about belief functions","volume":"6","author":"Smets","year":"1990","journal-title":"Internat. J. Approx. Reason."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB23","doi-asserted-by":"crossref","unstructured":"P. Smets, The alpha-junctions: combination operators applicable to belief functions, ECSQARU\u201997, Bad Honnef, Germany, June 1997.","DOI":"10.1007\/BFb0035618"},{"issue":"1\u20132","key":"10.1016\/S0165-0114(00)00086-5_BIB24","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0004-3702(96)00054-9","article-title":"The normative representation of quantified beliefs by belief functions","volume":"92","author":"Smets","year":"1997","journal-title":"Artificial Intelligence"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB25","first-page":"265","article-title":"Numerical representation of uncertainty","volume":"Vol. 3","author":"Smets","year":"1998"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB26","first-page":"267","article-title":"The Transferable Belief Model for quantified belief representation","volume":"Vol. 1","author":"Smets","year":"1998"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB27","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0004-3702(94)90026-4","article-title":"The Transferable Belief Model","volume":"66","author":"Smets","year":"1994","journal-title":"Artificial Intelligence"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB28","series-title":"Advances in the Dempster\u2013Shafer Theory of Evidence","first-page":"275","article-title":"Decision analysis using belief functions","author":"Strat","year":"1994"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB29","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1111\/1467-9868.00205","article-title":"Upper probabilities based on the likelihood function","volume":"161","author":"Walley","year":"1999","journal-title":"J. Roy. Statist. Soc. B"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB30","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/0020-0255(82)90031-7","article-title":"Generalized probabilities of fuzzy events from fuzzy belief structures","volume":"28","author":"Yager","year":"1982","journal-title":"Inform. Sci."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB31","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0020-7373(86)80066-9","article-title":"Arithmetic and other operations on Dempster\u2013Shafer structures","volume":"25","author":"Yager","year":"1986","journal-title":"Internat. J. Man\u2013Mach. Stud."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB32","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/0888-613X(96)00092-8","article-title":"On the normalization of fuzzy belief structure","volume":"14","author":"Yager","year":"1996","journal-title":"Internat. J. Approx. Reason."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB33","series-title":"Advances in the Dempster\u2013Shafer Theory of Evidence","author":"Yager","year":"1994"},{"issue":"8","key":"10.1016\/S0165-0114(00)00086-5_BIB34","doi-asserted-by":"crossref","first-page":"1221","DOI":"10.1109\/21.398683","article-title":"Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster\u2013Shafer theory","volume":"25","author":"Yager","year":"1995","journal-title":"IEEE Trans. Systems Man Cybernet."},{"issue":"3","key":"10.1016\/S0165-0114(00)00086-5_BIB35","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/21.57269","article-title":"Generalizing the Dempster\u2013Shafer theory to fuzzy sets","volume":"20","author":"Yen","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernet."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0888-613X(92)90037-Z","article-title":"Computing generalized belief functions for continuous fuzzy sets","volume":"6","author":"Yen","year":"1992","journal-title":"Internat. J. Approx. Reason."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB37","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/0022-247X(68)90078-4","article-title":"Probability measures of fuzzy events","volume":"10","author":"Zadeh","year":"1968","journal-title":"J. Math. Anal. Appl."},{"key":"10.1016\/S0165-0114(00)00086-5_BIB38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","article-title":"Fuzzy sets as a basis for a theory of possibility","volume":"1","author":"Zadeh","year":"1978","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00086-5_BIB39","series-title":"Advances in Fuzzy Sets Theory and Applications","first-page":"3","article-title":"Fuzzy sets and information granularity","author":"Zadeh","year":"1979"},{"issue":"2","key":"10.1016\/S0165-0114(00)00086-5_BIB40","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/5326.669565","article-title":"An evidence-theoretic k-NN rule with parameter optimization","volume":"28","author":"Zouhal","year":"1998","journal-title":"IEEE Trans. Systems Man Cybernet. \u2013 Part C"}],"container-title":["Fuzzy Sets and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165011400000865?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165011400000865?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T21:28:51Z","timestamp":1556227731000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165011400000865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,9]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2001,9]]}},"alternative-id":["S0165011400000865"],"URL":"https:\/\/doi.org\/10.1016\/s0165-0114(00)00086-5","relation":{},"ISSN":["0165-0114"],"issn-type":[{"value":"0165-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2001,9]]}}}