12,277 research outputs found

    A comprehensive study of the usability of multiple graphical passwords

    Get PDF
    Recognition-based graphical authentication systems (RBGSs) using images as passwords have been proposed as one potential solution to the need for more usable authentication. The rapid increase in the technologies requiring user authentication has increased the number of passwords that users have to remember. But nearly all prior work with RBGSs has studied the usability of a single password. In this paper, we present the first published comparison of the usability of multiple graphical passwords with four different image types: Mikon, doodle, art and everyday objects (food, buildings, sports etc.). A longi-tudinal experiment was performed with 100 participants over a period of 8 weeks, to examine the usability performance of each of the image types. The re-sults of the study demonstrate that object images are most usable in the sense of being more memorable and less time-consuming to employ, Mikon images are close behind but doodle and art images are significantly inferior. The results of our study complement cognitive literature on the picture superiority effect, vis-ual search process and nameability of visually complex images

    By How Much Does Conflict Reduce Financial Development?

    Get PDF
    Financial development, conflict, financial regulation

    Grand Challenges of Traceability: The Next Ten Years

    Full text link
    In 2007, the software and systems traceability community met at the first Natural Bridge symposium on the Grand Challenges of Traceability to establish and address research goals for achieving effective, trustworthy, and ubiquitous traceability. Ten years later, in 2017, the community came together to evaluate a decade of progress towards achieving these goals. These proceedings document some of that progress. They include a series of short position papers, representing current work in the community organized across four process axes of traceability practice. The sessions covered topics from Trace Strategizing, Trace Link Creation and Evolution, Trace Link Usage, real-world applications of Traceability, and Traceability Datasets and benchmarks. Two breakout groups focused on the importance of creating and sharing traceability datasets within the research community, and discussed challenges related to the adoption of tracing techniques in industrial practice. Members of the research community are engaged in many active, ongoing, and impactful research projects. Our hope is that ten years from now we will be able to look back at a productive decade of research and claim that we have achieved the overarching Grand Challenge of Traceability, which seeks for traceability to be always present, built into the engineering process, and for it to have "effectively disappeared without a trace". We hope that others will see the potential that traceability has for empowering software and systems engineers to develop higher-quality products at increasing levels of complexity and scale, and that they will join the active community of Software and Systems traceability researchers as we move forward into the next decade of research

    Policy Brief: Bridging the Gender Pay Gap

    Get PDF
    Gender pay gap (GPG) is a complex issue that various forums, including the G20, have attempted to discuss. Mitigating GPG requires large-scale transformative changes, but constraints on financial resources and public spending, along with cultural norms and deep-seated societal beliefs, make it a difficult task. Proposed actions, therefore, must be economically prudent and actionable. This Policy Brief offers five recommendations for the G20 to help bridge the gender pay gap. These include: introducing pay transparency legislation; mandating data-driven gender budgeting; increasing emphasis on parental leave; promoting women in STEM subjects; and engaging with the industry by proposing initiatives such as exclusive women only portals, reporting on gender, facilitating leadership programmes, and ‘de-biasing’ organisations. These proposals can help policymakers move the needle on gender equity, promote social justice, and improve economic outcomes

    Flow properties of driven-diffusive lattice gases: theory and computer simulation

    Get PDF
    We develop n-cluster mean-field theories (0 < n < 5) for calculating the flow properties of the non-equilibrium steady-states of the Katz-Lebowitz-Spohn model of the driven diffusive lattice gas, with attractive and repulsive inter-particle interactions, in both one and two dimensions for arbitrary particle densities, temperature as well as the driving field. We compare our theoretical results with the corresponding numerical data we have obtained from the computer simulations to demonstrate the level of accuracy of our theoretical predictions. We also compare our results with those for some other prototype models, notably particle-hopping models of vehicular traffic, to demonstrate the novel qualitative features we have observed in the Katz-Lebowitz-Spohn model, emphasizing, in particular, the consequences of repulsive inter-particle interactions.Comment: 12 RevTex page

    Collective traffic-like movement of ants on a trail: dynamical phases and phase transitions

    Full text link
    The traffic-like collective movement of ants on a trail can be described by a stochastic cellular automaton model. We have earlier investigated its unusual flow-density relation by using various mean field approximations and computer simulations. In this paper, we study the model following an alternative approach based on the analogy with the zero range process, which is one of the few known exactly solvable stochastic dynamical models. We show that our theory can quantitatively account for the unusual non-monotonic dependence of the average speed of the ants on their density for finite lattices with periodic boundary conditions. Moreover, we argue that the model exhibits a continuous phase transition at the critial density only in a limiting case. Furthermore, we investigate the phase diagram of the model by replacing the periodic boundary conditions by open boundary conditions.Comment: 8 pages, 6 figure

    Lambda hyperonic effect on the normal driplines

    Full text link
    A generalized mass formula is used to calculate the neutron and proton drip lines of normal and lambda hypernuclei treating non-strange and strange nuclei on the same footing. Calculations suggest existence of several bound hypernuclei whose normal cores are unbound. Addition of Lambda or, Lambda-Lambda hyperon(s) to a normal nucleus is found to cause shifts of the neutron and proton driplines from their conventional limits.Comment: 6 pages, 4 tables, 0 figur

    Tax evasion dynamics and Zaklan model on Opinion-dependent Network

    Full text link
    Within the context of agent-based Monte-Carlo simulations, we study the well-known majority-vote model (MVM) with noise applied to tax evasion on Stauffer-Hohnisch-Pittnauer (SHP) networks. To control the fluctuations for tax evasion in the economics model proposed by Zaklan, MVM is applied in the neighborhood of the critical noise qcq_{c} to evolve the Zaklan model. The Zaklan model had been studied recently using the equilibrium Ising model. Here we show that the Zaklan model is robust because this can be studied besides using equilibrium dynamics of Ising model also through the nonequilibrium MVM and on various topologies giving the same behavior regardless of dynamic or topology used here.Comment: 14 page, 4 figure
    corecore