Shay

Results: 289



#Item
221Cultural anthropology / Human communication / Student exchange / Education / AFS Intercultural Programs / Intercultural communication / Bennett scale / Intercultural relations / Cross-cultural communication / Cultural studies / Interculturalism / Culture

Assessment of the Impact of the AFS Study Abroad Experience Executive Summary: Overall Findings Background and Research Design AFS International, under the leadership of Mr. Paul Shay, contracted with Dr. Mitchell

Add to Reading List

Source URL: www.afs.org

Language: English
222Internet privacy / Online advertising / HTTP cookie / Network Advertising Initiative / Behavioral targeting / Google Chrome / AdSense / Google / Advertising / Internet / Computing / Software

Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising Rebecca Balebako, Pedro G. Leon, Richard Shay, Blase Ur, Yang Wang, and Lorrie Faith Cranor Carnegie Mellon University {balebako,pedrogln,r

Add to Reading List

Source URL: lorrie.cranor.org

Language: English - Date: 2012-08-29 21:25:58
223Computing / HTTP cookie / Local shared object / Ghostery / Network Advertising Initiative / Online advertising / P3P / Adblock Plus / Firefox / Internet privacy / Software / Internet

Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising Pedro G. Leon, Blase Ur, Rebecca Balebako, Lorrie Faith Cranor, Richard Shay, and Yang Wang Carnegie Mellon University, P

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2012-08-28 13:19:14
224Matrix theory / Numerical linear algebra / Bioinformatics / Hidden Markov model / Singular value decomposition / Lawrence Rabiner / Spectral method / Symbol / Spectral theorem / Algebra / Mathematics / Linear algebra

Spectral Learning of Refinement HMMs Karl Stratos1 Alexander M. Rush2 Shay B. Cohen1

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2013-06-19 22:20:51
225Password / Security token / Crypt / Password cracking / OTPW / Security / Computer security / Access control

Encountering Stronger Password Requirements: User Attitudes and Behaviors Richard Shay Saranga Komanduri

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:14
226Password / Computer crimes / GrIDsure / Personal identification number / Keystroke logging / Challenge-response authentication / Transaction authentication number / Password cracking / Password strength / Security / Computer security / Access control

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Ch

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-08-04 12:40:39
227Spaceflight / Physical oceanography / Eddy / Vortices / OML / Loop Current / Hurricane Katrina / Sea surface temperature / Mixed layer / Meteorology / Atmospheric sciences / Aquatic ecology

Upper Ocean Observations During Tropical Cyclone Passage Lynn K. “Nick” Shay NOAAs’ AOML (HRD, PhOD), AOC, NHC/TPC, NCEP, NESDIS, NRL

Add to Reading List

Source URL: www.dtcenter.org

Language: English - Date: 2011-07-20 14:33:03
228Password / Passphrase / Dictionary attack / Password manager / OTPW / Cryptography / Security / Computer security

Can Long Passwords Be Secure and Usable? Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor Carne

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2014-06-20 07:50:36
229Healthcare reform in the United States / Federal assistance in the United States / Presidency of Lyndon B. Johnson / Medicaid / Assertive community treatment / Evidence-based practice / Psychiatry / Medicine / Health

State Health Authority Yardstick (SHAY) Report for Georgia ACT Services Angela L. Rollins, PhD September 19, 2013

Add to Reading List

Source URL: dbhdd.georgia.gov

Language: English - Date: 2013-10-04 13:06:54
230Computer security / Randomness / Password / Diceware / Dictionary attack / Cryptography / Security / Passphrase

Correct horse battery staple: Exploring the usability of system-assigned passphrases Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorri

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 09:00:27
UPDATE