Results 71 to 80 of about 17,056 (206)
Canvas Deceiver - A New Defense Mechanism Against Canvas Fingerprinting [PDF]
Browser fingerprinting refers to a collection of techniques used to gather information about a user's browser attributes. The information gained from a browser fingerprint can be used to partially or fully identify a user without using any other ...
Muath Obaidat +3 more
doaj
The role of generative AI in collaborative problem‐solving of authentic challenges
Abstract This study investigates undergraduate and postgraduate teamwork in a four‐week ‘Generative AI for Social Good’ hackathon, focusing on how students use GAI tools in authentic problem‐solving within their learning ecology. It examines the factors that foster productive collaboration and explores evidence of AI extending human cognition beyond ...
Nancy Law +7 more
wiley +1 more source
Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed.
KyungHyun Han, Seong Oun Hwang
doaj +1 more source
Abstract Attention and vigilance are fundamental cognitive abilities that develop throughout childhood and adolescence and have been associated with cognitively demanding activities such as formal musical training. This cross‐sectional study examined whether individuals engaged in long‐term musical training show superior attention and vigilance ...
Rafael Román‐Caballero +4 more
wiley +1 more source
Background. WebAssembly (Wasm) is a fundamental component for high-performance web applications, valued for strategic integration, not simple JavaScript replacement.
Oleksandr Stepanov, Halyna Klym
doaj +1 more source
Drugst.One DREAM—Drug repurposing through expert annotation and modification
Background and Purpose Complex diseases often lack an actionable understanding of their underlying causal biological mechanisms, which leads to treating symptoms rather than causes. Network and systems medicine define disease mechanisms through disease‐associated genes, their encoded proteins and their protein–protein interactions (PPIs), thus forming ...
Lisa M. Spindler +8 more
wiley +1 more source
Insights for conservation from the Ecological Knowledge Games project
Abstract Environmental conservation research requires robust methods for collecting large‐scale behavioral data and engaging diverse stakeholders in decision‐making processes. We (Y.P., A.B.D., and N.B.) created EcoKnowGames (Ecological Knowledge Games), a transdisciplinary project that develops knowledge games for conservation science and data ...
Yuan Pan +4 more
wiley +1 more source
ABSTRACT Regressive transfer has been a subject that has not been extensively researched in the field of third language acquisition. This study aims to examine the extent to which a highly advanced knowledge of a third language (L3) affects the first language (L1) and the second language (L2) of early bilinguals in light of the Differential Stability ...
Maddi Alkain Arizmendi +2 more
wiley +1 more source
A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A. +4 more
doaj +1 more source
Conversational AI Agents: The Effect of Process and Outcome Variation on Anthropomorphism and Trust
ABSTRACT Organisations increasingly deploy conversational AI agents (CAs) in agentic roles where behavioural variations are inevitable. Prior work often conflates two distinct forms of variation: outcome variation (where success fluctuates) and process variation (where the path to completion varies).
Kambiz Saffarizadeh, Mark Keil
wiley +1 more source

