Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
We must give some form of a command to robots in order to have the robots do a complex task. An initial instruction is required even if they do their tasks autonomously. We theref...
Jun Kato, Daisuke Sakamoto, Masahiko Inami, Takeo ...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Users of traditional tutorials and help systems often have difficulty finding the components described or pictured in the procedural instructions. Users also unintentionally miss ...
Hobby chefs have various ways to learn cooking—paper recipes or cooking shows, for example. However, information in paper recipes may require prior experience to be understood a...
Sarah Mennicken, Thorsten Karrer, Peter Russell, J...