{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:55:16Z","timestamp":1730271316275,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/isads.2013.6513401","type":"proceedings-article","created":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T21:39:38Z","timestamp":1368221978000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Emotion sense ontology to avoid human error on Autonomous Decentralized Multi-Layered Cache system"],"prefix":"10.1109","author":[{"given":"Hironao","family":"Takahashi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khalid Mahmood","family":"Malik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rikyo","family":"Takahashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kinji","family":"Mori","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"article-title":"Information Security Fortification by Ontological Mapping of the ISO\/IEC 27001 Standard","year":"2008","author":"fenz","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007100101"},{"key":"ref12","article-title":"ANATOMY OF A WEB APPLICATION: Security Considerations","author":"pettit","year":"2001","journal-title":"Sanctum Inc"},{"journal-title":"Jena &#x2013; A Semantic Web Framework for Java","year":"0","key":"ref13"},{"key":"ref14","first-page":"376","article-title":"Luis Castillo Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention Journal of Information Assurance and Security","volume":"5","author":"isaza","year":"2010"},{"journal-title":"GSR","year":"2012","key":"ref15"},{"key":"ref16","first-page":"239","article-title":"Human action recognition using physiological and acceleration data","author":"sato","year":"0","journal-title":"TOSHIBA Corp Research & Development Center IPSJ No65 conference 3T5B?2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2009.5207385"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.42"},{"journal-title":"Ph D","article-title":"BIOFEEDBACK Methods and Procedures in clinical practice (1977) written by George D Fuller","year":"0","key":"ref4"},{"key":"ref3","article-title":"Trend of Autonomous Decntralized System Technologies and Their Application in IC Card Ticket System","volume":"e 92 b","author":"mori","year":"2009","journal-title":"IEICE Transactions"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1995.80.1.211"},{"key":"ref5","article-title":"Experimentelle Ergebnisse ueber die electrische Funktion von Sexualitat und Angst","volume":"3","author":"reich","year":"1969","journal-title":"Translated as &#x2018;Experimental investigation of the electrical function of sexuality and anxiety &#x2019; in J of Orgonomy"},{"journal-title":"Cornell GSR class project Electrodermal activity meter","year":"0","key":"ref8"},{"key":"ref7","first-page":"261","volume":"65","author":"montagu","year":"1966","journal-title":"Mechanism and measurement of the galvanic skin response"},{"key":"ref2","article-title":"Autonomous L3 Cache Technology for High Responsiveness","volume":"20","author":"takahashi","year":"2012","journal-title":"IPSJ Transaction Journal of Information Processing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.42"},{"journal-title":"electrocnic dyagnostic devise","year":"2012","key":"ref9"}],"event":{"name":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)","start":{"date-parts":[[2013,3,6]]},"location":"Mexico City, Mexico","end":{"date-parts":[[2013,3,8]]}},"container-title":["2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6510013\/6513393\/06513401.pdf?arnumber=6513401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T04:52:26Z","timestamp":1490244746000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6513401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isads.2013.6513401","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}