Mudablue: An automatic categorization system for open source repositories

S Kawaguchi, PK Garg, M Matsushita… - 11th Asia-Pacific …, 2004 - ieeexplore.ieee.org
Open source communities typically use a software repository to archive various software
projects with their source code, mailing list discussions, documentation, bug reports, and so …

Hilbert-Huang transform based physiological signals analysis for emotion recognition

C Zong, M Chetouani - 2009 IEEE international symposium on …, 2009 - ieeexplore.ieee.org
This paper presents a feature extraction technique based on the Hilbert-Huang Transform
(HHT) method for emotion recognition from physiological signals. Four kinds of physiological …

Source-location privacy protection based on anonymity cloud in wireless sensor networks

N Wang, J Fu, J Li, BK Bhargava - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …

Advanced techniques for knowledge management and access to strategic information

L Ogiela - International Journal of Information Management, 2015 - Elsevier
This publication discusses advanced knowledge management techniques based on
information splitting and sharing algorithms for secret, strategic information. Information …

Cognitive systems for intelligent business information management in cognitive economy

L Ogiela, MR Ogiela - International Journal of Information Management, 2014 - Elsevier
This paper will present new theoretical and applied solutions for intelligent data analysis
and information management in the fields of cognitive economics. Intelligent data analysis …

Insider threats and cryptographic techniques in secure information management

L Ogiela, MR Ogiela - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
This publication presents some techniques for insider threats and cryptographic protocols in
secure processes. Those processes are dedicated to the information management of …

Source-location privacy full protection in wireless sensor networks

N Wang, J Fu, J Zeng, BK Bhargava - Information Sciences, 2018 - Elsevier
In many scenarios, the locations of monitored targets need to be reported by source nodes,
but should remain anonymous in wireless sensor networks. Source-location privacy …

Biometric methods for advanced strategic data sharing protocols

MR Ogiela, L Ogiela, U Ogiela - 2015 9th International …, 2015 - ieeexplore.ieee.org
This paper will present new ways of using biometric pattern for creation of cryptographic
protocols, dedicated for strategic information sharing and distribution. Such methods allow to …

A brief survey on secure multi-party computing in the presence of rational parties

Y Wang, T Li, H Qin, J Li, W Gao, Z Liu, Q Xu - Journal of Ambient …, 2015 - Springer
Intelligent agents (IA) are autonomous entities which observe through sensors and act upon
an environment using actuators to adjust their activities towards achieving certain goals. The …

Cryptographic techniques of strategic data splitting and secure information management

L Ogiela - Pervasive and Mobile Computing, 2016 - Elsevier
This publication presents techniques for classifying strategic information, namely financial
figures which make it possible to determine the standing of an enterprise or an organisation …