-
1
-
-
0022863851
-
On the design of a key-lock-pair mech-anism in information protection system
-
C. C. Chang, "On the design of a key-lock-pair mech-anism in information protection system," BIT, vol. 26, pp. 410-417, 1986.
-
(1986)
BIT
, vol.26
, pp. 410-417
-
-
Chang, C.C.1
-
2
-
-
0023363075
-
An information protection scheme based upon number theory
-
C. C. Chang, "An information protection scheme based upon number theory," Computer Journal, vol. 30, no. 3, pp. 249-253, 1987.
-
(1987)
Computer Journal
, vol.30
, Issue.3
, pp. 249-253
-
-
Chang, C.C.1
-
3
-
-
0030785019
-
A binary access con-trol method using prime factorization
-
C. C. Chang and D. C. Lou, "A binary access con-trol method using prime factorization," Information Science, vol. 96, no. 1-2, pp. 15-26, 1997.
-
(1997)
Information Science
, vol.96
, Issue.1-2
, pp. 15-26
-
-
Chang, C.C.1
Lou, D.C.2
-
4
-
-
84874861629
-
-
LIBSVM: a library for support vec-tor machines. [Online]. Available
-
C. C. Chang and C. J. Lin. (2001). LIBSVM: a library for support vec-tor machines. [Online]. Available WWW:http://www.csie.ntu.edu.tw/ cjlin/libsvm.
-
(2001)
-
-
Chang, C.C.1
Lin, C.J.2
-
6
-
-
34249753618
-
Support-vector network
-
C. Cortes and V. Vapnik, "Support-vector network," Machine Learning, vol. 20, no. 3, pp. 273-297, 1995,
-
(1995)
Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
7
-
-
0002422823
-
A role based access control model and reference implementation within a corporate
-
Feb
-
D. Ferraiolo, J. Barkley, and R. Kuhn, "A role based access control model and reference implementation within a corporate," ACM Transactions on Information and System Security, vol.2, no.1, pp. 34-64, Feb. 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, R.3
-
8
-
-
84942812332
-
Protection-principles and practices
-
G. S. Graham and P. L. Denning, "Protection-principles and practices," Proceedings of Spring Jt. Computer Conference, vol. 40, no.1, pp. 417-429, 1972.
-
(1972)
Proceedings of Spring Jt. Computer Conference
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.L.2
-
9
-
-
0034240041
-
Design and specification of role based access control policies
-
M. Hitchens and V. Varadharajan, "Design and specification of role based access control policies," IEE Proceedings of Software, vol. 147, no. 4, pp. 117-129, 2000.
-
(2000)
IEE Proceedings of Software
, vol.147
, Issue.4
, pp. 117-129
-
-
Hitchens, M.1
Varadharajan, V.2
-
10
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C. W. Hsu and C. J. Lin, "A comparison of methods for multiclass support vector machines," IEEE Transactions on Neural Networks, vol. 13, no. 2, pp. 415-425, 2002.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.W.1
Lin, C.J.2
-
11
-
-
0024738556
-
On the design of a single-key-lock mechanism based on Newton's interpolating polynomial
-
C. S. Laih, L. Harn, and J. Y. Lee, "On the design of a single-key-lock mechanism based on Newton's interpolating polynomial," IEEE Transactions on Software Engineering, vol. 15, no. 9, pp. 1135-1137, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.9
, pp. 1135-1137
-
-
Laih, C.S.1
Harn, L.2
Lee, J.Y.3
-
12
-
-
0023965320
-
The source of authority for commercial access control
-
J. D. Moffett and M. S. Sloman, "The source of authority for commercial access control," IEEE Computer Journal, vol. 21, no. 2, pp. 59-69, 1988.
-
(1988)
IEEE Computer Journal
, vol.21
, Issue.2
, pp. 59-69
-
-
Moffett, J.D.1
Sloman, M.S.2
-
13
-
-
0033967085
-
How good are support vector machines?
-
S. Raudys, "How good are support vector machines?," Neural Networks, vol. 13, no. 1, pp. 17-19.
-
Neural Networks
, vol.13
, Issue.1
, pp. 17-19
-
-
Raudys, S.1
-
14
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Feb
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
15
-
-
0030086382
-
Role based access control models
-
Feb
-
R. Sandhu, E. J. Coyne, and H. L. Feinstein, "Role based access control models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
-
16
-
-
0034271493
-
Improvements to the SMO algo-rithm for SVM regression
-
S. K. Shevade, S. S. Keerthi, C. Bhattaacharyya, and K. R. K. Murthy, "Improvements to the SMO algo-rithm for SVM regression," IEEE Transactions on Neural Networks, vol. 11, no. 5, pp. 1188-1193, 2000.
-
(2000)
IEEE Transactions on Neural Networks
, vol.11
, Issue.5
, pp. 1188-1193
-
-
Shevade, S.K.1
Keerthi, S.S.2
Bhattaacharyya, C.3
Murthy, K.R.K.4
-
18
-
-
0021386722
-
Access control with single-key-lock
-
M. L. Wu and T. Y. Hwang, "Access control with single-key-lock," IEEE Transactions on Software Engineering , vol. 10, no. 2, pp. 185-191, 1984
-
(1984)
IEEE Transactions on Software Engineering
, vol.10
, Issue.2
, pp. 185-191
-
-
Wu, M.L.1
Hwang, T.Y.2
|