Search alternatives:
hackers » trackers (Expand Search)
checker » checked (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
hackers » trackers (Expand Search)
checker » checked (Expand Search)
ceres » cereus (Expand Search), cores (Expand Search), cares (Expand Search)
-
81
Design, User Experience, and Usability : UX Research and Design : 10th International Conference, DUXU 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtua...
Published [202Subjects: “…User-centered system design…”
text -
82
-
83
Fully converged integral cross sections of collision induced dissociation, four-center, and single exchange reactions, and accuracy of the centrifugal sudden approximation in H2 + D2 reaction
Published 2013“…With a full-dimensional model, the first fully converged coupled-channel (CC) cross sections for different competitive processes from the ground rotational state were obtained: collision induced dissociation (CID), four-center (4C) reaction and single exchange (SE) reaction. …”
Get full text
Get full text
Journal Article -
84
Gobo: A System for Exploring User Control of Invisible Algorithms in Social Media
Published 2020Subjects: “…Computing methodologies, Artificial intelligence, Human-centered computing, Field studies, Information systems , Open source software, Human-centered computing, Social media, Algorithmic Transparency, Algorithmic Accountability…”
Get full text
Article -
85
Centering Patient and Clinician Voices in Developing Tools to Address Pain Related School Impairment: A Phase I Study of a Virtual Reality School Simulation for Children and Adolescents with Chronic Pain
Published 2023“…Following guidelines for developing user-centered VR interventions, initial phases of intervention development focus on understanding and incorporating patient and clinician perspectives when designing this digital health tool. …”
Get full text
Article -
86
Loss of dignity : social dangers of a computerized society
Published 2024Subjects: Get full text
Academic theses. -
87
-
88
21A.100 Introduction to Anthropology, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
89
-
90
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
91
Synthesis and testing of asynchronous circuits - micropipeline
Published 2008“…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
Get full text
Thesis -
92
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
93
Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes
Published 2008“…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
Get full text
Thesis -
94
Sowing the seeds of love: Ovid's Sementivae (Fasti 1.655-704)
Published 2024“…Meanwhile, he also modifies and subtly reconfigures the relationship between Ceres and Tellus in a manner not found in either of his dominant poetic influences. …”
Book section -
95
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
96
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
97
-
98
Memory Checking Requires Logarithmic Overhead
Published 2025“…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
Get full text
Article -
99
A Multi-satellite Perspective on “Hot Tower” Characteristics in the Equatorial Trough Zone
Published 2024“…Cloud vertical profiles from CloudSat and CALIPSO measurements supply convective core diameters and proxies for intensity and convective activity, and these proxies are augmented with brightness temperature data from geostationary satellite observations, precipitation information from IMERG, and cloud radiative properties from CERES. Less than 35% of all deep cores are classified as hot towers, and we estimate that 800–1700 hot towers occur at any given time over the course of a day, with the mean maximum core and hot tower frequency occurring at the time of year when peak convective intensity and precipitation occur. …”
Journal article -
100
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP)