Results 281 to 290 of about 233,719 (314)
Some of the next articles are maybe not open access.

Spontaneous Reward Hacking in Iterative Self-Refinement

arXiv.org
Language models are capable of iteratively improving their outputs based on natural language feedback, thus enabling in-context optimization of user preference.
Jane Pan   +3 more
semanticscholar   +1 more source

Use of a Multitheoretic Model to Understand and Classify Juvenile Computer Hacking Behavior

Criminal Justice and Behavior, 2020
Criminological inquiry has identified a range of risk factors associated with juvenile delinquency. However, little research has assessed juvenile computer hacking, despite the substantial harm and opportunities for delinquent behavior online. Therefore,
B. Fox, T. Holt
semanticscholar   +1 more source

A Proposed Specification Check for p-Hacking

AEA Papers and Proceedings, 2020
We propose a specification check for p-hacking. More specifically, we advocate the reporting of t-curves and mu-curves--the t-statistics and estimated effect sizes derived from regressions using every possible combination of control variables from the ...
A. Brodeur, Nikolai Cook, A. Heyes
semanticscholar   +1 more source

Hacking, disability, and music education

International Journal of Music Education, 2020
The purpose of our study was to examine how hacking – as discussed and displayed by participants of Monthly Music Hackathon NYC – could inform making music education practices more accessible and inclusive, if at all, for people with disabilities.
Adam Bell   +4 more
semanticscholar   +1 more source

Hacking

Routledge Handbook of Digital Media and Communication, 2020
Finn Brunton
semanticscholar   +3 more sources

CUMINCAD Hacks

2004
CUMINCAD - An CUMulative INdex of papers on CAD - was created in 1998 and since then hundreds of users working in the field of CAAD have been taken advantage of this Digital Library. The number of recorded entries is currently over 6.600, from which a substantial part also provide a full paper in PDF-format. The effort is part of a portal solution: for
openaire   +1 more source

Modeling and Predicting Cyber Hacking Breaches

IEEE Transactions on Information Forensics and Security, 2018
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done.
Maochao Xu   +3 more
semanticscholar   +1 more source

Hacking

2012
Hacking is an activity which has long been tied with ethical and legal complications. The term has evolved to have both ethical and unethical connotations, which can be confusing to the uninitiated. Hacker subculture has a myriad of terminology, sometimes with subtle variations, and this chapter identifies the main subcategories of hackers. The methods
Gráinne Kirwan, Andrew Power
openaire   +1 more source

The Societalization of Social Problems: Church Pedophilia, Phone Hacking, and the Financial Crisis

American Sociological Review, 2018
This article develops a theory of “societalization,” demonstrating its plausibility through empirical analyses of church pedophilia, media phone-hacking, and the financial crisis.
Jeffrey Alexander
semanticscholar   +1 more source

Hacking Heats Up

Scientific American, 2015
The article reports that a team of doctoral students developed a method by which information can be obtained from an air-gapped computer (AGC) using signals encoded into the heat given off by its processors. It states AGC is a security method by which secure computers are disconnected from the Internet and other computer networks.
openaire   +2 more sources

Home - About - Disclaimer - Privacy