{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:49:40Z","timestamp":1729640980145,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/fuzz-ieee.2013.6622580","type":"proceedings-article","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T22:58:14Z","timestamp":1381532294000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["From topology to anti-reflexive topology"],"prefix":"10.1109","author":[{"given":"Tsau Young","family":"Lin","sequence":"first","affiliation":[]},{"given":"Guilong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mihir K.","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Slezak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"486","DOI":"10.4064\/fm-25-1-486-502","article-title":"Gestufte ra?ume","volume":"25","author":"hausdorff","year":"1935","journal-title":"Fundamenta Mathematicae"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.aml.2010.03.007"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1800-9_89"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7975-9_18"},{"key":"11","volume":"27","author":"pagliani","year":"2010","journal-title":"A Geometry of Approximation"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-552-8.ch001"},{"key":"3","article-title":"Chinese wall security policy-An aggressive model","author":"lin","year":"1989","journal-title":"Proc of ACSAC 1989"},{"key":"2","article-title":"Granular mathematics-Foundation and current state","author":"lin","year":"2011","journal-title":"Proc of IEEE GrC 2011"},{"key":"1","article-title":"Neighborhood systems and approximation in database and knowledge base systems","author":"lin","year":"1989","journal-title":"Proc of ISMIS 1989"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001956"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-62029-4"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.3138\/9781487584894","author":"sierpin?ski","year":"1952","journal-title":"General Topology"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5345955"},{"key":"4","first-page":"275","article-title":"Chinese wall security policy models: Information flows and confining trojan horses","author":"lin","year":"2003","journal-title":"Proc of DBSec 2003"},{"journal-title":"General Topology","year":"1975","author":"kelley","key":"9"},{"journal-title":"Algebraic Topology","year":"1966","author":"spanier","key":"8"}],"event":{"name":"2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2013,7,7]]},"location":"Hyderabad, India","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6612844\/6622297\/06622580.pdf?arnumber=6622580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T17:47:22Z","timestamp":1596649642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6622580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2013.6622580","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}