12,277 research outputs found
A comprehensive study of the usability of multiple graphical passwords
Recognition-based graphical authentication systems (RBGSs) using
images as passwords have been proposed as one potential solution to the need
for more usable authentication. The rapid increase in the technologies requiring
user authentication has increased the number of passwords that users have to
remember. But nearly all prior work with RBGSs has studied the usability of a
single password. In this paper, we present the first published comparison of the
usability of multiple graphical passwords with four different image types:
Mikon, doodle, art and everyday objects (food, buildings, sports etc.). A longi-tudinal experiment was performed with 100 participants over a period of 8
weeks, to examine the usability performance of each of the image types. The re-sults of the study demonstrate that object images are most usable in the sense of
being more memorable and less time-consuming to employ, Mikon images are
close behind but doodle and art images are significantly inferior. The results of
our study complement cognitive literature on the picture superiority effect, vis-ual search process and nameability of visually complex images
By How Much Does Conflict Reduce Financial Development?
Financial development, conflict, financial regulation
Grand Challenges of Traceability: The Next Ten Years
In 2007, the software and systems traceability community met at the first
Natural Bridge symposium on the Grand Challenges of Traceability to establish
and address research goals for achieving effective, trustworthy, and ubiquitous
traceability. Ten years later, in 2017, the community came together to evaluate
a decade of progress towards achieving these goals. These proceedings document
some of that progress. They include a series of short position papers,
representing current work in the community organized across four process axes
of traceability practice. The sessions covered topics from Trace Strategizing,
Trace Link Creation and Evolution, Trace Link Usage, real-world applications of
Traceability, and Traceability Datasets and benchmarks. Two breakout groups
focused on the importance of creating and sharing traceability datasets within
the research community, and discussed challenges related to the adoption of
tracing techniques in industrial practice. Members of the research community
are engaged in many active, ongoing, and impactful research projects. Our hope
is that ten years from now we will be able to look back at a productive decade
of research and claim that we have achieved the overarching Grand Challenge of
Traceability, which seeks for traceability to be always present, built into the
engineering process, and for it to have "effectively disappeared without a
trace". We hope that others will see the potential that traceability has for
empowering software and systems engineers to develop higher-quality products at
increasing levels of complexity and scale, and that they will join the active
community of Software and Systems traceability researchers as we move forward
into the next decade of research
Policy Brief: Bridging the Gender Pay Gap
Gender pay gap (GPG) is a complex issue that various forums, including the G20, have attempted to discuss. Mitigating GPG requires large-scale transformative changes, but constraints on financial resources and public spending, along with cultural norms and deep-seated societal beliefs, make it a difficult task. Proposed actions, therefore, must be economically prudent and actionable. This Policy Brief offers five recommendations for the G20 to help bridge the gender pay gap. These include: introducing pay transparency legislation; mandating data-driven gender budgeting; increasing emphasis on parental leave; promoting women in STEM subjects; and engaging with the industry by proposing initiatives such as exclusive women only portals, reporting on gender, facilitating leadership programmes, and ‘de-biasing’ organisations. These proposals can help policymakers move the needle on gender equity, promote social justice, and improve economic outcomes
Flow properties of driven-diffusive lattice gases: theory and computer simulation
We develop n-cluster mean-field theories (0 < n < 5) for calculating the flow
properties of the non-equilibrium steady-states of the Katz-Lebowitz-Spohn
model of the driven diffusive lattice gas, with attractive and repulsive
inter-particle interactions, in both one and two dimensions for arbitrary
particle densities, temperature as well as the driving field. We compare our
theoretical results with the corresponding numerical data we have obtained from
the computer simulations to demonstrate the level of accuracy of our
theoretical predictions. We also compare our results with those for some other
prototype models, notably particle-hopping models of vehicular traffic, to
demonstrate the novel qualitative features we have observed in the
Katz-Lebowitz-Spohn model, emphasizing, in particular, the consequences of
repulsive inter-particle interactions.Comment: 12 RevTex page
Collective traffic-like movement of ants on a trail: dynamical phases and phase transitions
The traffic-like collective movement of ants on a trail can be described by a
stochastic cellular automaton model. We have earlier investigated its unusual
flow-density relation by using various mean field approximations and computer
simulations. In this paper, we study the model following an alternative
approach based on the analogy with the zero range process, which is one of the
few known exactly solvable stochastic dynamical models. We show that our theory
can quantitatively account for the unusual non-monotonic dependence of the
average speed of the ants on their density for finite lattices with periodic
boundary conditions. Moreover, we argue that the model exhibits a continuous
phase transition at the critial density only in a limiting case. Furthermore,
we investigate the phase diagram of the model by replacing the periodic
boundary conditions by open boundary conditions.Comment: 8 pages, 6 figure
Lambda hyperonic effect on the normal driplines
A generalized mass formula is used to calculate the neutron and proton drip
lines of normal and lambda hypernuclei treating non-strange and strange nuclei
on the same footing. Calculations suggest existence of several bound
hypernuclei whose normal cores are unbound. Addition of Lambda or,
Lambda-Lambda hyperon(s) to a normal nucleus is found to cause shifts of the
neutron and proton driplines from their conventional limits.Comment: 6 pages, 4 tables, 0 figur
Tax evasion dynamics and Zaklan model on Opinion-dependent Network
Within the context of agent-based Monte-Carlo simulations, we study the
well-known majority-vote model (MVM) with noise applied to tax evasion on
Stauffer-Hohnisch-Pittnauer (SHP) networks. To control the fluctuations for tax
evasion in the economics model proposed by Zaklan, MVM is applied in the
neighborhood of the critical noise to evolve the Zaklan model. The
Zaklan model had been studied recently using the equilibrium Ising model. Here
we show that the Zaklan model is robust because this can be studied besides
using equilibrium dynamics of Ising model also through the nonequilibrium MVM
and on various topologies giving the same behavior regardless of dynamic or
topology used here.Comment: 14 page, 4 figure
- …