An Access Control System with Time-constraint Using Support Vector Machines. Chang, C., Lin, I., & Liao, C. I. J. Network Security (IJNSEC), 2(2):150-159, 2006.
An Access Control System with Time-constraint Using Support Vector Machines [pdf]Paper  bibtex   
@article{ dblp3553735,
  title = {An Access Control System with Time-constraint Using Support Vector Machines},
  author = {Chin-Chen Chang and Iuon-Chang Lin and Chia-Te Liao},
  author_short = {Chang, C. and Lin, I. and Liao, C.},
  bibtype = {article},
  type = {article},
  year = {2006},
  key = {dblp3553735},
  id = {dblp3553735},
  biburl = {http://www.dblp.org/rec/bibtex/journals/ijnsec/ChangLL06},
  url = {http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p150-159.pdf},
  journal = {I. J. Network Security (IJNSEC)},
  pages = {150-159},
  number = {2},
  volume = {2},
  text = {I. J. Network Security (IJNSEC) 2(2):150-159 (2006)}
}
Downloads: 0