Mudablue: An automatic categorization system for open source repositories
S Kawaguchi, PK Garg, M Matsushita… - 11th Asia-Pacific …, 2004 - ieeexplore.ieee.org
Open source communities typically use a software repository to archive various software
projects with their source code, mailing list discussions, documentation, bug reports, and so …
projects with their source code, mailing list discussions, documentation, bug reports, and so …
Hilbert-Huang transform based physiological signals analysis for emotion recognition
C Zong, M Chetouani - 2009 IEEE international symposium on …, 2009 - ieeexplore.ieee.org
This paper presents a feature extraction technique based on the Hilbert-Huang Transform
(HHT) method for emotion recognition from physiological signals. Four kinds of physiological …
(HHT) method for emotion recognition from physiological signals. Four kinds of physiological …
Source-location privacy protection based on anonymity cloud in wireless sensor networks
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …
radio traffic distributions and trace back messages to their source nodes. Then, he can …
Advanced techniques for knowledge management and access to strategic information
L Ogiela - International Journal of Information Management, 2015 - Elsevier
This publication discusses advanced knowledge management techniques based on
information splitting and sharing algorithms for secret, strategic information. Information …
information splitting and sharing algorithms for secret, strategic information. Information …
Cognitive systems for intelligent business information management in cognitive economy
This paper will present new theoretical and applied solutions for intelligent data analysis
and information management in the fields of cognitive economics. Intelligent data analysis …
and information management in the fields of cognitive economics. Intelligent data analysis …
Insider threats and cryptographic techniques in secure information management
This publication presents some techniques for insider threats and cryptographic protocols in
secure processes. Those processes are dedicated to the information management of …
secure processes. Those processes are dedicated to the information management of …
Source-location privacy full protection in wireless sensor networks
In many scenarios, the locations of monitored targets need to be reported by source nodes,
but should remain anonymous in wireless sensor networks. Source-location privacy …
but should remain anonymous in wireless sensor networks. Source-location privacy …
Biometric methods for advanced strategic data sharing protocols
This paper will present new ways of using biometric pattern for creation of cryptographic
protocols, dedicated for strategic information sharing and distribution. Such methods allow to …
protocols, dedicated for strategic information sharing and distribution. Such methods allow to …
A brief survey on secure multi-party computing in the presence of rational parties
Intelligent agents (IA) are autonomous entities which observe through sensors and act upon
an environment using actuators to adjust their activities towards achieving certain goals. The …
an environment using actuators to adjust their activities towards achieving certain goals. The …
Cryptographic techniques of strategic data splitting and secure information management
L Ogiela - Pervasive and Mobile Computing, 2016 - Elsevier
This publication presents techniques for classifying strategic information, namely financial
figures which make it possible to determine the standing of an enterprise or an organisation …
figures which make it possible to determine the standing of an enterprise or an organisation …