Results 11 to 20 of about 8,678,005 (362)
Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security.
Adams, A, Sasse, MA
core +3 more sources
AppAgent: Multimodal Agents as Smartphone Users [PDF]
Recent advancements in large language models (LLMs) have led to the creation of intelligent agents capable of performing complex tasks. This paper introduces a novel LLM-based multimodal agent framework designed to operate smartphone applications.
C. Zhang +8 more
semanticscholar +1 more source
Behavioral adaptation of drivers when driving among automated vehicles [PDF]
Purpose – This paper aims to explore whether drivers would adapt their behavior when they drive among automated vehicles (AVs) compared to driving among manually driven vehicles (MVs).Understanding behavioral adaptation of drivers when they encounter AVs
Maytheewat Aramrattana, Jiali Fu, Selpi
doaj +1 more source
The Manifestation of Incidental Findings in Different Experimental Visual Search Paradigms
Background. Incidental findings are items of visual search that are potentially of significance, but were not the main object of the initial search. They have been previously widely discussed in the field of radiology.
Olga S. Rubtsova, Elena S. Gorbunova
doaj +1 more source
Expasy, the Swiss Bioinformatics Resource Portal, as designed by its users
The SIB Swiss Institute of Bioinformatics (https://www.sib.swiss) creates, maintains and disseminates a portfolio of reliable and state-of-the-art bioinformatics services and resources for the storage, analysis and interpretation of biological data ...
S. Duvaud +5 more
semanticscholar +1 more source
Despite high rates of harm attributable to alcohol use itself and the associated marginalization of illicit drinkers in Vancouver’s Downtown Eastside (DTES), alcohol-specific harm reduction services there are under-resourced and highly disconnected from ...
Aaron Bailey +3 more
doaj +1 more source
CONNECTION TO THE USE OF FREE ANDROID APPS IN KEBBI STATE, NIGERIA [PDF]
In this paper, we studied scamming emanating from the use of free Android apps by conducting an online survey with respondents recruited from four tertiary institutions in Kebbi State, Nigeria.
PAKI, Zauwali Sabitu +2 more
doaj +1 more source
STATISTICAL ESTIMATION OF PRODUCTION FUNCTIONS AND AGRICULTURAL COSTS AND MEASURES OF PRODUCTIVITY EFFICIENCY OF WATER USERS' ASSOCIATIONS OF DIFFERENT IRRIGATION SYSTEMS IN AL-BEHEIRA GOVERNORATE [PDF]
Egypt suffers from future risks due to lack of water especially in the downstream countries, Egypt and Sudan, which depend on the Nile water almost entirely and the upstream countries are moving to raise problems with Egypt and erect dams and pressure on
M. Ibraheim +3 more
doaj +1 more source
Implementing a resilience‐based management system in Mongolia's rangelands
A primary challenge in advancing sustainability in rangelands and drylands is the lack of governance systems that are linked to information about highly variable ecosystem conditions.
Burmaa Dashbal +8 more
doaj +1 more source
The effect of categorical superiority in subsequent search misses
Subsequent search misses (SSM) refer to the decrease in accuracy of second target detection in dual-target visual search. One of the theoretical explanations of SSM errors is similarity bias – the tendency to search for similar targets and to miss the ...
Olga Rubtsova, Elena S. Gorbunova
doaj +1 more source

