Shay

Results: 289



#Item
111Fair division / Shapley value / Statistical classification / Feature selection / Cooperative game / Random forest / Support vector machine / Gain / Stepwise regression / Statistics / Machine learning / Game theory

LETTER Communicated by James Theiler Feature Selection via Coalitional Game Theory Shay Cohen

Add to Reading List

Source URL: www2.mta.ac.il

Language: English - Date: 2010-06-22 06:48:22
112Privacy / Usability / Law / Internet privacy / P3P / Facebook / Information privacy / Social networking service / Computing / Ethics / Technology

Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy Rebecca Balebako, Richard Shay, Lorrie Faith Cranor Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: www.rebeccahunt.com

Language: English - Date: 2014-04-23 11:16:10
113Cryptography / Password / Dictionary attack / Single sign-on / Password manager / Privileged password management / Security / Computer security / Access control

Published in International Journal of Information Security; Volume 8, Number 4; August 2009 The original publication is available at www.springerlink.com; DOI[removed]s10207[removed]Richard Shay · Elisa Bertino A Co

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
114Mark 12 / Life of Jesus in the New Testament / Gospel of Luke / You shall not steal / Jesus / Eternal life / Eye of a needle / Luke 1 / Christian communism / Religion / Christianity / Belief

Richard Shay Senior Thesis Jesus and Hierarchy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
115Password / John the Ripper / Password manager / Password fatigue / Security / Computer security / Cryptography

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-09-24 21:06:51
116Stochastic processes / Bayesian statistics / Statistical models / Probability theory / Dirichlet process / Formal grammar / Pitman–Yor process / Gibbs sampling / Inside-outside algorithm / Statistics / Probability and statistics / Formal languages

Variational Inference for Adaptor Grammars Noah A. Smith David M. Blei Shay B. Cohen School of Computer Science Computer Science Department School of Computer Science Carnegie Mellon University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2015-03-12 00:16:21
117Internet privacy / Online advertising / HTTP cookie / Network Advertising Initiative / Behavioral targeting / Google Chrome / AdSense / Google / Advertising / Internet / Computing / Software

Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising Rebecca Balebako, Pedro G. Leon, Richard Shay, Blase Ur, Yang Wang, and Lorrie Faith Cranor Carnegie Mellon University {balebako,pedrogln,r

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-04-23 14:01:49
118Cyberwarfare / Crypt / Cryptography / OTPW / Password strength / Security / Computer security / Password

Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-09-26 15:50:05
119Password / Security token / Crypt / Password cracking / OTPW / Security / Computer security / Access control

Encountering Stronger Password Requirements: User Attitudes and Behaviors Richard Shay Saranga Komanduri

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
120Cyberwarfare / Password strength / Password / Password policy / Privileged password management / Security / Cryptography / Computer security

A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek? , William Meli

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-04-07 16:18:05
UPDATE