Search concepts
|
Selected filters
|
- 69,950 - 70,000 out of 76,725 results
Search results
-
Conference contribution
Secure Agents for Supporting Best-Balanced Multilingual Communication
Pituxcoosuvarn, M., Nakaguchi, T., Lin, D. & Ishida, T., 2020, Cross-Cultural Design. Applications in Health, Learning, Communication, and Creativity - 12th International Conference, CCD 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Proceedings. Patrick Rau, P-L. (ed.). Springer, p. 376-388 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12193 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure and efficient mobile agent application reuse using patterns
Tahara, Y., Yoshioka, N., Ohsuga, A. & Honiden, S., 2001, Proceedings of SSR'01 2001 Symposium on Software Reusability. Association for Computing Machinery (ACM), p. 78-85 8 p. (Proceedings of SSR'01 2001 Symposium on Software Reusability).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secure and manageable virtual private networks for end-users
Kourai, K., Hirotsu, T., Sato, K., Akashi, O., Fukuda, K., Sugawara, T. & Chiba, S., 2003, Proceedings - 28th Annual IEEE International Conference on Local Computer Networks, LCN 2003, Held in conjunction with the Workshop on High-Speed Local Networks, HSLN 2003 and Workshop on Wireless Local Networks, WLN 2003. IEEE Computer Society, p. 385-394 10 p. 1243164. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2003-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Citations (Scopus) -
Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption
Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure deduplication in a multiple group signature setting
Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secured information service platforms effective in case of disasters-Using multilayered communications network
Adachi, F., Tokuda, K. & Ohmori, S., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012. IEEE Computer Society, p. 348-349 2 p. 6398813. (International Symposium on Wireless Personal Multimedia Communications, WPMC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., 2019 Mar 8, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing
Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H. & Yamana, H., 2016, Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Proceedings. Springer Verlag, Vol. 9963 LNCS. p. 181-195 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9963 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Secure information flow as a safety problem
Terauchi, T. & Aiken, A., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 352-367 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3672 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
179 Citations (Scopus) -
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE
Cong, R., Liu, Y., Wang, Y., Tago, K., Li, R., Asaeda, H. & Jin, Q., 2022, HCI for Cybersecurity, Privacy and Trust - 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Proceedings. Moallem, A. (ed.). Springer Science and Business Media Deutschland GmbH, p. 30-41 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13333 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure naïve bayes classification protocol over encrypted data using fully homomorphic encryption
Yasumura, Y., Ishimaki, Y. & Yamana, H., 2019 Dec 2, 21st International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2019 - Proceedings. Indrawan-Santiago, M., Pardede, E., Salvadori, I. L., Steinbauer, M., Khalil, I. & Anderst-Kotsis, G. (eds.). Association for Computing Machinery, (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Secure pattern matching using somewhat homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
83 Citations (Scopus) -
Secure scan design using improved random order and its evaluations
Oya, M., Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2015 Feb 5, 2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014. February ed. Institute of Electrical and Electronics Engineers Inc., p. 555-558 4 p. 7032842. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS; vol. 2015-February, no. February).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Secure scan design with dynamically configurable connection
Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2013 Jan 1, Proceedings - 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013. IEEE Computer Society, p. 256-262 7 p. 6820873. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
25 Citations (Scopus) -
Secure SMS transmission based on verifiable hash convergent group signcryption
Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472. (Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Secure statistical analysis using RLWE-based homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
19 Citations (Scopus) -
Secure voting using partially compatible homomorphisms
Sako, K. & Kilian, J., 1994, Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 411-424 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 839 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access94 Citations (Scopus) -
Securing big data and IoT networks in smart cyber-physical environments
Das, S. K. & Yamana, H., 2017 Jul 21, 2017 International Conference on Smart Digital Environment, ICSDE 2017 - Proceedings. Benhaddou, D., Habbani, A., Al-Fuqahaa, A. & El Bouanani, F. (eds.). Association for Computing Machinery, p. 189-194 6 p. (ACM International Conference Proceeding Series; vol. Part F130526).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things
Feng, X., Wu, J., Wang, K., Li, J. & Wang, M., 2018 Mar 29, Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc., p. 326-330 5 p. (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017; vol. 2018-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security and guidance: Two roles for a humanoid robot in an interaction experiment
Trovato, G., Lopez, A., Paredes, R. & Cuellar, F., 2017 Dec 8, RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication. Institute of Electrical and Electronics Engineers Inc., p. 230-235 6 p. (RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication; vol. 2017-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Citations (Scopus) -
Security-aware distributed service composition for wireless sensor networks based smart metering in smart grid using software defined networks
Li, G., Wu, Y., Wu, J., Li, J. & Zhao, C., 2018, Wireless Internet - 9th International Conference, WICON 2016, Proceedings. Huang, M., Jing, W., Mehmood, A. & Zhang, Y. (eds.). Springer Verlag, p. 91-97 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 214).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security enhancement of electric power systems by approximate reasoning
Niimura, T. & Yokoyama, R., 1995, IEEE International Conference on Fuzzy Systems. Anon (ed.). Piscataway, NJ, United States: IEEE, Vol. 1. p. 205-210 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security for IEEE P1451.0-Based IoT Sensor Networks
Zhou, K., Wu, J., Lee, K. B. & Song, E. Y., 2021 Oct 13, IECON 2021 - 47th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society, (IECON Proceedings (Industrial Electronics Conference); vol. 2021-October).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security for mobile agents
Yoshioka, N., Tahara, Y., Ohsuga, A. & Honiden, S., 2001, Agent-Oriented Software Engineering - First International Workshop, AOSE 2000, Revised Papers. p. 223-234 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1957 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Lin, G., Dong, M., Ota, K., Li, J., Yang, W. & Wu, J., 2019 May, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8761217. (IEEE International Conference on Communications; vol. 2019-May).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security patterns: A method for constructing secure and efficient inter-company coordination systems
Yoshioka, N., Honiden, S. & Finkelstein, A., 2004, Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. p. 84-97 14 p. (Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Citations (Scopus) -
Security patterns: Research direction, metamodel, application and verification
Washizaki, H., 2018 Jan 29, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Security Requirement Modeling Support System Using Software Security Knowledge Base
Hazeyama, A., Tanaka, SI., Tanaka, T., Hashiura, H., Munetoh, S., Okubo, T., Kaiya, H., Washizaki, H. & Yoshioka, N., 2018 Jun 8, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 234-239 6 p. 8377863. (Proceedings - International Computer Software and Applications Conference; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Security requirements analysis using knowledge in CAPEC
Kaiya, H., Kono, S., Ogata, S., Okubo, T., Yoshioka, N., Washizaki, H. & Kaijiri, K., 2014, Advanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops, Proceedings. Springer Verlag, p. 343-348 6 p. (Lecture Notes in Business Information Processing; vol. 178 LNBIP).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Security system for power plant with wireless sensor network using WHM-1 wireless module
Yu, T. R., Yamauchi, N. & Shimokado, S., 2008 Nov 28, 2008 7th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT. p. 75-80 6 p. 4653543. (2008 7th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
SEDIMENT TRANSPORT AND BEACH TRANSFORMATION.
Shibayama, T. & Horikawa, K., 1983 Jan 1, Proceedings of the Coastal Engineering Conference. ASCE, p. 1439-1458 20 p. (Proceedings of the Coastal Engineering Conference; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
15 Citations (Scopus) -
SEDIMENT TRANSPORT DUE TO BREAKING WAVES.
Shibayama, T., Higuchi, A. & Horikawa, K., 1987 Jan 1, Proceedings of the Coastal Engineering Conference. ASCE, p. 1509-1522 14 p. (Proceedings of the Coastal Engineering Conference; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Seeing faces in noise: Exploring machine and human face detection processes by the reverse correlation method
Saegusa, C., Yamaoka, M. & Watanabe, K., 2014 Feb 12, 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014. Institute of Electrical and Electronics Engineers Inc., 7041601. (2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seeing objects as face modulates visual search performance
Takahashi, K. & Watanabe, K., 2014 Feb 12, 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014. Institute of Electrical and Electronics Engineers Inc., 7041555Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seeing the sound we hear: Optical technologies for visualizing sound wave
Oikawa, Y., Ishikawa, K., Yatabe, K., Onuma, T. & Niwa, H., 2018, Three-Dimensional Imaging, Visualization, and Display 2018. Javidi, B., Matoba, O., Son, J-Y., Martinez-Corral, M. & Stern, A. (eds.). SPIE, 106660C. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10666).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Citations (Scopus) -
Seeking open-ended evolution in swarm chemistry
Sayama, H., 2011 Aug 18, IEEE SSCI 2011 - Symposium Series on Computational Intelligence - IEEE ALIFE 2011: 2011 IEEE Symposium on Artificial Life. p. 186-193 8 p. 5954667. (IEEE SSCI 2011 - Symposium Series on Computational Intelligence - IEEE ALIFE 2011: 2011 IEEE Symposium on Artificial Life).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
22 Citations (Scopus) -
Segmentation-based Phishing URL Detection
Aung, E. S. & Yamana, H., 2021 Dec 14, Proceedings - 2021 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT 2021. Association for Computing Machinery, p. 550-556 7 p. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Segmentation cracks in plasma sprayed thin thermal barrier coatings
Guo, H., Murakami, H. & Kuroda, S., 2006 Dec 1, Advanced Ceramic Coatings and Interfaces - A Collection of Papers Presented at the 30th International Conference on Advanced Ceramics and Composites. 3 ed. p. 17-27 11 p. (Ceramic Engineering and Science Proceedings; vol. 27, no. 3).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Segmenting acoustic signal with articulatory movement using recurrent neural network for phoneme acquisition
Kanda, H., Ogata, T., Komatani, K. & Okuno, H. G., 2008 Dec 1, 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS. p. 1712-1717 6 p. 4651060. (2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Seismic design method of immersed tunnel and effects of flexible joints
Kiyomiya, O., 2005, Underground Space Use: Analysis of the Past and Lessons for the Future - Proceedings of the 31st ITA-AITES World Tunnel Congress. Vol. 1. p. 635-640 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Seismic design of RC bridge piers to ensure the post-disaster functionality of road network
Nogami, Y., Akiyama, M. & Frangopol, D. M., 2013, Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures - Proceedings of the 11th International Conference on Structural Safety and Reliability, ICOSSAR 2013. p. 3581-3586 6 p. (Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures - Proceedings of the 11th International Conference on Structural Safety and Reliability, ICOSSAR 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Seismic performance evaluation of bridge pier with friction pendulum isolation system
Brito, B., Seto, T., Ichikawa, Y., Ishigaki, N., Suezaki, M. & Akiyama, M., 2018, 11th National Conference on Earthquake Engineering 2018, NCEE 2018: Integrating Science, Engineering, and Policy. Earthquake Engineering Research Institute, p. 5760-5764 5 p. (11th National Conference on Earthquake Engineering 2018, NCEE 2018: Integrating Science, Engineering, and Policy; vol. 9).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seismic response control of wooden house placed on sliding base
Soda, S. & Miyazu, Y., 2010, 9th US National and 10th Canadian Conference on Earthquake Engineering 2010, Including Papers from the 4th International Tsunami Symposium. Vol. 2. p. 1429-1436 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Seismic strengthening effect on an existing bridge abutment by ground anchor
An, T. & Kiyomiya, O., 2016, IABSE Conference, Guangzhou 2016: Bridges and Structures Sustainability - Seeking Intelligent Solutions - Report. International Association for Bridge and Structural Engineering (IABSE), p. 152-159 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Selecting Article Segment Titles Based on Keyphrase Features and Semantic Relatedness
Guo, Y. & Iwaihara, M., 2019 Apr 16, Proceedings - 2018 7th International Congress on Advanced Applied Informatics, IIAI-AAI 2018. Institute of Electrical and Electronics Engineers Inc., p. 129-132 4 p. 8693246. (Proceedings - 2018 7th International Congress on Advanced Applied Informatics, IIAI-AAI 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Selection of FDL slot length in optical packet switching networks with fibre delay lines
Ishikawa, E., Sugang, X., Zhanikeev, M. & Tanaka, Y., 2008, 2008 7th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT. p. 219-224 6 p. 4653568. (2008 7th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Selection of metrics for predicting the appropriate application of design patterns
Hernandez, J., Kubo, A., Washizaki, H. & Yoshiaki, F., 2011 Oct 5, AsianPLoP 2011 - 2nd Asian Conference on Pattern Languages of Programs, Proceedings. Association for Computing Machinery, a3. (ACM International Conference Proceeding Series; vol. 2011-October).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Citations (Scopus) -
Selection of the proper hammer in pile driving and estimation of the total driving time
Afshani Mehrabad, A., Fakher, A. & Palassi, M., 2010, Numerical Methods in Geotechnical Engineering - Proceedings of the 7th European Conference on Numerical Methods in Geotechnical Engineering. p. 667-672 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Selective Combination and Management of Distributed Machine Learning Models
Tsuchiya, T., Mochizuki, R., Hirose, H., Yamada, T., Koyanagi, K. & Minh, Q. T., 2021, Future Data and Security Engineering - 8th International Conference, FDSE 2021, Proceedings. Dang, T. K., Küng, J., Chung, T. M. & Takizawa, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 113-124 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13076 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Selective droplet sampling flow system using minimum number of horizontal pneumatic valves formed by single step PDMS molding
Yoon, D. H., Wakui, D., Sekiguchi, T. & Shoji, S., 2010 Dec 1, 14th International Conference on Miniaturized Systems for Chemistry and Life Sciences 2010, MicroTAS 2010. p. 1085-1087 3 p. (14th International Conference on Miniaturized Systems for Chemistry and Life Sciences 2010, MicroTAS 2010; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus)