An Access Control System with Time-constraint Using Support Vector Machines. Chang, C., Lin, I., & Liao, C. I. J. Network Security (IJNSEC), 2(2):150-159, 2006. Paper bibtex @article{ dblp3553735,
title = {An Access Control System with Time-constraint Using Support Vector Machines},
author = {Chin-Chen Chang and Iuon-Chang Lin and Chia-Te Liao},
author_short = {Chang, C. and Lin, I. and Liao, C.},
bibtype = {article},
type = {article},
year = {2006},
key = {dblp3553735},
id = {dblp3553735},
biburl = {http://www.dblp.org/rec/bibtex/journals/ijnsec/ChangLL06},
url = {http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p150-159.pdf},
journal = {I. J. Network Security (IJNSEC)},
pages = {150-159},
number = {2},
volume = {2},
text = {I. J. Network Security (IJNSEC) 2(2):150-159 (2006)}
}
Downloads: 0
{"_id":"qarPM9TBQTAKLgLeZ","bibbaseid":"chang-lin-liao-anaccesscontrolsystemwithtimeconstraintusingsupportvectormachines-2006","downloads":0,"creationDate":"2015-10-07T21:59:23.048Z","title":"An Access Control System with Time-constraint Using Support Vector Machines","author_short":["Chang, C.","Lin, I.","Liao, C."],"year":2006,"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/ijnsec/ChangLL06","bibdata":{"title":"An Access Control System with Time-constraint Using Support Vector Machines","author":["Chin-Chen Chang","Iuon-Chang Lin","Chia-Te Liao"],"author_short":["Chang, C.","Lin, I.","Liao, C."],"bibtype":"article","type":"article","year":"2006","key":"dblp3553735","id":"dblp3553735","biburl":"http://www.dblp.org/rec/bibtex/journals/ijnsec/ChangLL06","url":"http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p150-159.pdf","journal":"I. J. Network Security (IJNSEC)","pages":"150-159","number":"2","volume":"2","text":"I. J. Network Security (IJNSEC) 2(2):150-159 (2006)","bibtex":"@article{ dblp3553735,\n title = {An Access Control System with Time-constraint Using Support Vector Machines},\n author = {Chin-Chen Chang and Iuon-Chang Lin and Chia-Te Liao},\n author_short = {Chang, C. and Lin, I. and Liao, C.},\n bibtype = {article},\n type = {article},\n year = {2006},\n key = {dblp3553735},\n id = {dblp3553735},\n biburl = {http://www.dblp.org/rec/bibtex/journals/ijnsec/ChangLL06},\n url = {http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p150-159.pdf},\n journal = {I. J. Network Security (IJNSEC)},\n pages = {150-159},\n number = {2},\n volume = {2},\n text = {I. J. Network Security (IJNSEC) 2(2):150-159 (2006)}\n}","bibbaseid":"chang-lin-liao-anaccesscontrolsystemwithtimeconstraintusingsupportvectormachines-2006","role":"author","urls":{"Paper":"http://ijns.femto.com.tw/contents/ijns-v2-n2/ijns-2006-v2-n2-p150-159.pdf"},"downloads":0},"search_terms":["access","control","system","time","constraint","using","support","vector","machines","chang","lin","liao"],"keywords":[],"authorIDs":["54768775cb4bf04e390012ee"],"dataSources":["TJnMvpzaqAQRrbuyQ"]}