User Study: Comparison of Picture Passwords and Current Login Approaches
This research conducted a user study to compare different computer system authentication methods, specifically regular password and…
This research conducted a user study to compare different computer system authentication methods, specifically regular password and…
This research explores the role of AI in the process of relationship dissolution. The study involved 21…
The article discusses the WatchShaker project, an experimental API that detects the shake gesture of the Apple…
The study focuses on predicting driver behaviors across different mobilities, including cars, micro-mobilities, pedestrians, and robots. As…
The paper introduces a multimodal Theory of Mind (ToM) question answering benchmark, MMToM-QA, and a new method,…
The paper presents an analysis of contribution functions for quantitative bipolar argumentation graphs. These functions quantify how…
This academic article introduces DeLF (Designing Learning Environments with Foundation Models), a method for designing components of…
The research introduces the Continuous Time Continuous Space Homeostatic Regulated Reinforcement Learning (CTCS-HRRL) framework. This framework extends…
This research evaluates the reasoning ability of Large Language Models (LLMs), which have significantly impacted areas like…
The paper introduces a new inference approach for Knowledge Graph (KG) reasoning named Knowledge Pyramid (KP). This…