Subspace Averaging and Order Determination for Source Enumeration. | 2 | 0.37 | 2019 |
Learning how to learn with Prof. Barbara Oakley | 0 | 0.34 | 2015 |
Privacy concerns in assisted living technologies. | 1 | 0.36 | 2014 |
Studying the effectiveness of android application permissions requests | 12 | 0.67 | 2013 |
Heuristics and Biases: Implications for Security Design | 3 | 0.43 | 2013 |
Cars, Condoms, And Facebook | 3 | 0.38 | 2013 |
Macroeconomic Analysis of Malware. | 2 | 0.37 | 2013 |
Evaluation of reservoir sedimentation using data driven techniques. | 3 | 0.43 | 2013 |
Gandhigiri in cyberspace: a novel approach to information ethics | 0 | 0.34 | 2012 |
End User Perception of Online Risk under Uncertainty | 15 | 0.71 | 2012 |
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. | 1 | 0.36 | 2012 |
Risk communication design: video vs. text | 10 | 0.66 | 2012 |
Pools, clubs and security: designing for a party not a person | 7 | 0.52 | 2012 |
Spiking neuron computation with the time machine. | 2 | 0.46 | 2012 |
The smuggling theory approach to organized digital crime. | 5 | 0.47 | 2011 |
Targeted risk communication for computer security | 7 | 0.55 | 2011 |
The time machine: A novel spike-based computation architecture | 4 | 0.42 | 2011 |
Time-mode circuits for analog computation | 10 | 0.66 | 2009 |
Low Power Integrate And Fire Circuit For Data Conversion | 4 | 0.49 | 2009 |
An asynchronous delta-sigma converter implementation | 5 | 0.59 | 2006 |