Zobrazeno 1 - 10
of 83
pro vyhledávání: '"Takamichi Saito"'
Autor:
Chieko Miyazaki, Yuki Tochigi, Kumiko Hashimoto, Masato Ogawa, Satoru Ozeki, Makoto Yazawa, Koichiro Oka, Takamichi Saito, Shigeru Obayashi, Takashi Tobinaga
Publikováno v:
Journal of Back and Musculoskeletal Rehabilitation. 34:829-835
BACKGROUND: Some patients with end-stage osteoarthritis of the knee remain unsatisfied after total knee arthroplasty (TKA). We postulated that to increase satisfaction, self-efficacy (SE) for physical activity should receive more attention in rehabil
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030750749
AINA (2)
AINA (2)
With the evolution of mobile technology, advanced features, such as location services and multimedia functions, have been developed for smartphones and tablets. However, the use of these functions consumes a large amount of electric power. A maliciou
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bcd89ccadac43cb58365abd7939fd56c
https://doi.org/10.1007/978-3-030-75075-6_46
https://doi.org/10.1007/978-3-030-75075-6_46
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030578107
NBiS
NBiS
When we use an electronic commerce (EC) web application, the EC website authenticates users for a so-called social login that uses a social media account, e.g., Facebook, Google, or Twitter. In this case, it is mostly implemented using OAuth and Open
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7d7c804d95a5911e4ceda0db844a2020
https://doi.org/10.1007/978-3-030-57811-4_19
https://doi.org/10.1007/978-3-030-57811-4_19
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030335052
BWCCA
BWCCA
When a website authenticates users, it does so for a so-called social login in electronic commerce (EC) site. A social login is used for a social media account, such as Facebook, Google, and Twitter. In such a case, the website uses OAuth and OpenID
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f78fd6018550a8c174e91403fc572187
https://doi.org/10.1007/978-3-030-33506-9_73
https://doi.org/10.1007/978-3-030-33506-9_73
Autor:
Sushmita Mitra, Takamichi Saito, Yoichi Hayashi, Hideaki Iiduka, Yuki Tanaka, Guido Bologna, Hiroaki Kikuchi, Tomohiro Takagi
Publikováno v:
Journal of Artificial Intelligence and Soft Computing Research. 6:35-44
The purpose of this study was to generate more concise rule extraction from the Recursive-Rule Extraction (Re-RX) algorithm by replacing the C4.5 program currently employed in Re-RX with the J48graft algorithm. Experiments were subsequently conducted
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783030026127
BWCCA
BWCCA
Browser fingerprinting is a technique to identify a browser based on device features collected by a web server. Previous studies have been proposed the use of various features; however, to the best of our knowledge, the correlation between features c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1a38740f9d20d6c3a35b1fbafc59b02
https://doi.org/10.1007/978-3-030-02613-4_60
https://doi.org/10.1007/978-3-030-02613-4_60
Publikováno v:
Advances in Network-Based Information Systems ISBN: 9783319985299
NBiS
NBiS
Browser fingerprinting is a technique to identify a device using a combination of information that a server can gather from a browser. In general, the user-agent is known to be one of the most useful features for identification via browser fingerprin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c60cf3966972d85d8371440f7d5c144e
https://doi.org/10.1007/978-3-319-98530-5_34
https://doi.org/10.1007/978-3-319-98530-5_34
Publikováno v:
Advances in Information and Computer Security ISBN: 9783319979151
IWSEC
IWSEC
A variety of countermeasures against memory corruption attacks have been proposed to implement within compilers, linkers, operating systems, and libraries. However, according to our survey, a certain number of executable binaries in Linux distributio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::333fdc4fc505388e34b7d35f089ade21
https://doi.org/10.1007/978-3-319-97916-8_5
https://doi.org/10.1007/978-3-319-97916-8_5
Publikováno v:
Advances on Broad-Band Wireless Computing, Communication and Applications ISBN: 9783319698106
BWCCA
BWCCA
Recently, JavaScript with HTML5 is becoming more popular in Web application design. This technology can also be used to collect Web client information such as Web browser families, OS, GPU, font lists or screen size. This collection is called Web bro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5312253c322e39972dd6d78179781c75
https://doi.org/10.1007/978-3-319-69811-3_36
https://doi.org/10.1007/978-3-319-69811-3_36
Autor:
Hideaki Iiduka, Sayaka Akioka, Takamichi Saito, Yoichi Hayashi, Hiroyuki Mori, Tomohiro Takagi, Hiroaki Kikuchi
Publikováno v:
Journal of Computer Science Technology Updates. 1:26-34