This study investigates interpersonal processes underlying dialog by comparing two approaches, interactive alignment and interpersonal synergy, and assesses how they predict colle...
Collecting (or “sampling”) information that one expects to be useful is a powerful way to facilitate learning. However, relatively little is known about how people decide whic...
We tested whether analogical training could help children learn a key principle of elementary engineering—namely, the use of a diagonal brace to stabilize a structure. The conte...
Dedre Gentner, Susan C. Levine, Raedy M. Ping, Ash...
Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive data such as private or medical information, cares are necessary. In this pape...
Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phon...
Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authenticatio...
John Maheswaran, Daniel Jackowitz, Ennan Zhai, Dav...
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. ...
Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed...
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
Once data is released to the Internet, there is little hope to successfully delete it, as it may have been duplicated, reposted, and archived in multiple places. This poses a sign...
Code randomization is an effective defense against code reuse attacks. It scrambles program code to prevent attackers from locating useful functions or gadgets. The key to secure...