Study of Car Driver's Judgment Affordance on a Narrow Crossing Road | 0 | 0.34 | 2018 |
Cognitive Route Search Technique for Self-Driving Vehicles | 1 | 0.34 | 2018 |
Cognitive Computing: Methodologies for Neural Computing and Semantic Computing in Brain-Inspired Systems. | 0 | 0.34 | 2018 |
Abstract Intelligence: Embodying and Enabling Cognitive Systems by Mathematical Engineering. | 0 | 0.34 | 2017 |
Estimation of Cognitive Distraction from Driver Gazing. | 2 | 0.42 | 2017 |
Meta-Cognition for Inferring Car Driver Cognitive Behavior from Driving Recorder Data | 3 | 0.51 | 2016 |
Extracting rules to detect cognitive distractions through driving simulation. | 1 | 0.37 | 2015 |
Design and Implementation of a Cognitive Tool to Detect Malicious Images Using the Smart Phone | 1 | 0.35 | 2014 |
A new approach to detecting distracted car drivers using eye-movement data | 5 | 0.63 | 2014 |
Extracting tendency and stability from time series and random forest for classifying a car driver's cognitive load | 0 | 0.34 | 2014 |
Incorporating Temporal Discretization into Naïve Bayes Learning for Classifying a Driver's Cognitive Load. | 0 | 0.34 | 2014 |
Design Of A Cognitive Tool To Detect Malicious Images Using The Smart Phone | 1 | 0.43 | 2013 |
Perspectives on Cognitive Computers and Knowledge Processors | 13 | 0.61 | 2013 |
Evaluation Model of Cognitive Distraction State Based on Eye Tracking Data Using Neural Networks | 3 | 0.53 | 2013 |
Design and implementation of a user-support system for finding the other person talking on smart phones | 0 | 0.34 | 2013 |
Design of a cognitive-support system for automatic skin diagnosis using a tablet PC | 0 | 0.34 | 2013 |
Design of a user-support system for vision information using a smart phone | 1 | 0.48 | 2013 |
Design and Implementation of a Cognitive User-Support System for Skin Progress Analysis Using a Smart Phone. | 1 | 0.39 | 2013 |
Identifying Driver's Cognitive Load Using Inductive Logic Programming. | 5 | 0.77 | 2012 |
Perspectives On Ebrain And Cognitive Computing | 7 | 0.45 | 2012 |
Design of a cognitive user-support system for skin progress analysis using a smart phone | 1 | 0.48 | 2012 |
Cognitive support by smart phone - human judgment on cosmetic skin analysis support -. | 5 | 1.04 | 2011 |
Applying qualitative reasoning to a driver's cognitive mental load. | 0 | 0.34 | 2011 |
Qualitative Reasoning Approach to a Driver's Cognitive Mental Load | 14 | 1.25 | 2011 |
ILP for Cosmetic Product Selection. | 0 | 0.34 | 2011 |
Anti-spam mail system | 0 | 0.34 | 2006 |
Secure cooperation in a distributed robot system using active RFIDs | 0 | 0.34 | 2006 |
Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers | 18 | 1.29 | 2004 |
Talk on Activities of Security and Grid Computing Service Project | 0 | 0.34 | 2004 |
Designing an Agent-Based RBAC System for Dynamic Security Policy | 5 | 0.53 | 2004 |
Integrating information visualization and retrieval for WWW information discovery | 0 | 0.34 | 2003 |
A cellular telephone-based application for skin-grading to support cosmetic sales | 6 | 1.40 | 2003 |
The Design of a Secure Distributed Devices System Based on Immunity | 0 | 0.34 | 2003 |
Design and implementation of access control system for smart office environment | 0 | 0.34 | 2002 |
Architectural defects of the secure shell | 1 | 0.39 | 2002 |
Design and implementation of security system based on immune system | 2 | 0.73 | 2002 |
WWW Visualization Tools for Discovering Interesting Web Pages | 1 | 0.38 | 2002 |
Design of collaborative agent system with access control for smart-office environment | 3 | 0.59 | 2001 |
Web Security: Authentication Protocols and Their Analysis | 1 | 0.35 | 2001 |
Design of security system based on immune system | 7 | 0.76 | 2001 |
Design of a visual browser for network intrusion detection | 2 | 0.37 | 2001 |
Web Site Rating and Improvement Based on Hyperlink Structure | 0 | 0.34 | 2001 |
Architecture of the multi-agent system as a collaboration of physical devices | 1 | 0.42 | 2000 |
An Authorization-based Trust Model for Multiagent Systems | 11 | 0.83 | 2000 |
Negotiation protocol for proof of realization of cooperative task in multi-agent robot systems | 3 | 0.44 | 2000 |
Concurrent Execution of Optimal Hypothesis Search for Inverse Entailment | 14 | 0.76 | 2000 |
Map Drawing Based on a Resource-Constrained Search for a Navigation System | 0 | 0.34 | 2000 |
Security of Public Key Certificate Based Authentication Protocols | 3 | 1.08 | 2000 |
Integrating Information Visualization and Retrieval for Discovering Internet Sources | 0 | 0.34 | 2000 |
Design of a Visualization Agent for WWW Information | 2 | 0.42 | 2000 |