咨询与建议

限定检索结果

文献类型

  • 52 篇 会议
  • 1 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 18 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 信息与通信工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 9 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 3 篇 理学
    • 3 篇 生物学

主题

  • 15 篇 semantics
  • 15 篇 cryptography
  • 13 篇 information mana...
  • 13 篇 protocols
  • 9 篇 pragmatics
  • 7 篇 companies
  • 6 篇 authentication
  • 6 篇 algorithm design...
  • 5 篇 computers
  • 5 篇 data analysis
  • 4 篇 data mining
  • 4 篇 pattern recognit...
  • 4 篇 visualization
  • 4 篇 biometrics (acce...
  • 4 篇 feature extracti...
  • 3 篇 information syst...
  • 3 篇 grammar
  • 3 篇 classification a...
  • 3 篇 encryption
  • 3 篇 encoding

机构

  • 22 篇 agh university o...
  • 13 篇 cryptography and...
  • 7 篇 pedagogical univ...
  • 2 篇 department of cr...
  • 2 篇 cryptography and...
  • 2 篇 agh university o...
  • 2 篇 pedagogical univ...
  • 2 篇 cryptography and...
  • 2 篇 pedagogical univ...
  • 2 篇 faculty of elect...
  • 2 篇 faculty of manag...
  • 2 篇 cryptography and...
  • 2 篇 institute of com...
  • 2 篇 institute of com...
  • 2 篇 cryptography and...
  • 2 篇 pedagogical univ...
  • 1 篇 department of cr...
  • 1 篇 department of cr...
  • 1 篇 department of ad...
  • 1 篇 cryptography and...

作者

  • 38 篇 marek r. ogiela
  • 23 篇 lidia ogiela
  • 11 篇 tomasz hachaj
  • 10 篇 ogiela marek r.
  • 10 篇 ogiela lidia
  • 9 篇 urszula ogiela
  • 4 篇 katarzyna koptyr...
  • 4 篇 marcin piekarczy...
  • 3 篇 ogiela urszula
  • 2 篇 takizawa makoto
  • 2 篇 hachaj tomasz
  • 1 篇 pawel s. hachaj
  • 1 篇 sulkowski piotr
  • 1 篇 marek r.ogiela
  • 1 篇 rados&#x0142
  • 1 篇 hoon ko
  • 1 篇 aw bu&#x0142
  • 1 篇 at
  • 1 篇 koptyra katarzyn...

语言

  • 53 篇 英文
  • 1 篇 中文
检索条件"机构=AGH University of Science and Technology Cryptography and Cognitive Informatics Laboratory"
54 条 记 录,以下是21-30 订阅
排序:
cognitive Keys in Personalized cryptography
Cognitive Keys in Personalized Cryptography
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Marek R. Ogiela Lidia Ogiela Faculty of Electrical Engineering Automatics Computer Science and Biomedical Engineering AGH University of Science and Technology Krakow Poland AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper will be described a new way of using cognitive approaches in personalized cryptography algorithms. Personal information may be used in creation advanced security protocols, as well as personal keys for c... 详细信息
来源: 评论
On Using cognitive Models in cryptography
On Using Cognitive Models in Cryptography
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Marek R. Ogiela Lidia Ogiela Cryptography and Cognitive Informatics Research Group AGH University of Science and Technology Krakow Poland
In this paper will be presented a new computational model connected with application of cognitive cryptography for cryptographic areas. This new cryptographic paradigm is introduced with relation to advanced informati... 详细信息
来源: 评论
Efficiency of Strategic Data Sharing and Management Protocols
Efficiency of Strategic Data Sharing and Management Protocol...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Lidia Ogiela Marek R. Ogiela Urszula Ogiela AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper will be presented some security features of biometric and linguistic threshold schemes, as well as efficiency evaluation features for such protocols. Possible application of presented algorithms will be ... 详细信息
来源: 评论
Bio-Inspired Cryptographic Techniques in Information Management Applications
Bio-Inspired Cryptographic Techniques in Information Managem...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lidia Ogiela Marek R. Ogiela Cryptography and Cognitive Informatics Research Group AGH University of Science and Technology Krakow Poland
This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data clas... 详细信息
来源: 评论
Knowledge Management Approaches for Data Understanding
Knowledge Management Approaches for Data Understanding
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Lidia Ogiela Marek R. Ogiela Faculty of Management AGH University of Science and Technology Krakow Poland AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper will be presented different knowledge management approaches used for semantic data evaluation and understanding tasks. Data understanding processes use the cognitive processes of data description, analys... 详细信息
来源: 评论
Data Understanding Techniques for Management Application and cryptography
Data Understanding Techniques for Management Application and...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Marek R. Ogiela Lidia Ogiela Faculty of Electrical Engineering Automatics Computer Science and Biomedical Engineering AGH University of Science and Technology Krakow Poland AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper will be described the way of using data understanding techniques for semantic information extraction and data meaning evaluation. Extracted information may be then used for performing some management tas... 详细信息
来源: 评论
Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language
Rule-Based Action Recognition: Performance Comparison betwee...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Tomasz Hachaj Marek R. Ogiela Pedagogical University of Krakow Institute of Computer Science Krakow Poland AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
The main novelty of this paper is presenting the implementation of GDL classifier in pure Lua language. We also present the evaluation of this implementation for motion capture data classification in real-time and com... 详细信息
来源: 评论
Clusters of Trends Detection in Microblogging: Simple Natural Language Processing vs Hashtags – Which is More Informative?
Clusters of Trends Detection in Microblogging: Simple Natura...
收藏 引用
International Conference on Complex, Intelligent and Software Intensive Systems, CISIS
作者: Tomasz Hachaj Marek R. Ogiela Pedagogical University of Krakow Institute of Computer Science Krakow Poland AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper we introduce the initial proposition and evaluation of the method that enables detection of clusters of trends among microblogging posts gathered from a given social graph. By the cluster of trends we me... 详细信息
来源: 评论
A Novel Approach to Geocaching Event Prognosis Using Spatiotemporal Data
A Novel Approach to Geocaching Event Prognosis Using Spatiot...
收藏 引用
International Conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Tomasz Hachaj Pawel S. Hachaj Marek R. Ogiela Pedagogical University of Krakow Institute of Computer Science and Computer Methods Krakow Poland Cracow University of Technology Institute of Water Engineering and Water Resources Krakow Poland AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper we present the case study on application of data mining techniques like clustering, regression and scoring with heuristic measures for the largest social event prognosis based on spatiotemporal data. The... 详细信息
来源: 评论
Biometric Extensions for Secret Sharing Protocols
Biometric Extensions for Secret Sharing Protocols
收藏 引用
International Conference on Information science and Security (ICISS)
作者: Lidia Ogiela Marek R. Ogiela AGH University of Science and Technology Cryptography and Cognitive Informatics Research Group Krakow Poland
In this paper authors will present a new idea of application of selected biometric pattern for creation cryptographic protocols, dedicated for secret sharing and data distribution. The selected biometrics features wil... 详细信息
来源: 评论