abi Significant Contributions Advance the Understanding of Disability Programs and the People They Serve By www.mathematica.org Published On :: Wed, 04 Mar 2020 18:20:00 Z Mathematica’s Center for Studying Disability Policy has provided valuable insights into the Social Security Administration’s (SSA) disability programs during its seven years as a research center for the SSA’s Disability Research Consortium (DRC). Full Article
abi Improving Effect Estimates by Limiting the Variability in Inverse Propensity Score Weights By www.mathematica.org Published On :: Tue, 14 Apr 2020 18:10:35 Z This study describes a novel method to reweight a comparison group used for causal inference, so the group is similar to a treatment group on observable characteristics yet avoids highly variable weights that would limit statistical power. Full Article
abi In Vitro Plant Breeding Towards Novel Agronomic Traits: Biotic and Abiotic Stress Tolerance / Manoj Kumar, Annamalai Muthusamy, Vivek Kumar, Neera Bhalla-Sarin, editors By library.mit.edu Published On :: Sun, 22 Dec 2019 07:46:07 EST Online Resource Full Article
abi Cottage Industry of Biocontrol Agents and Their Applications: Practical Aspects to Deal Biologically with Pests and Stresses Facing Strategic Crops / Nabil El-Wakeil, Mahmoud Saleh, Mohamed Abu-hashim, editors By library.mit.edu Published On :: Sun, 12 Jan 2020 08:09:51 EST Online Resource Full Article
abi Introduction to environmental data analysis and modeling Moses Eterigho Emetere, Esther Titilayo Akinlabi By library.mit.edu Published On :: Sun, 16 Feb 2020 07:32:02 EST Online Resource Full Article
abi Machine learning in aquaculture: hunger classification of Lates Calcarifer / Mohd Azraai Mohd Razman, Anwar P. P. Abdul Majeed, Rabiu Muazu Musa, Zahari Taha, Gian-Antonio Susto, Yukinori Mukai By library.mit.edu Published On :: Sun, 16 Feb 2020 07:32:02 EST Online Resource Full Article
abi Rehabilitating damaged ecosystems / edited by John Cairns, Jr By library.mit.edu Published On :: Sun, 16 Feb 2020 07:32:02 EST Online Resource Full Article
abi Future remains: a cabinet of curiosities for the Anthropocene / edited by Gregg Mitman, Marco Armiero, and Robert S. Emmett By library.mit.edu Published On :: Sun, 23 Feb 2020 09:06:07 EST Barker Library - GF75.F88 2018 Full Article
abi Marine hydrocarbon seeps: microbiology and biogeochemistry of a global marine habitat / Andreas Teske, Verena Carvalho, editors By library.mit.edu Published On :: Sun, 15 Mar 2020 07:45:28 EDT Online Resource Full Article
abi Socio-economic and eco-biological dimensions in resource use and conservation: strategies for sustainability / Niranjan Roy, Shubhadeep Roychoudhury, Sunil Nautiyal, Sunil K. Agarwal, Sangeeta Baksi, editors By library.mit.edu Published On :: Sun, 15 Mar 2020 07:45:28 EDT Online Resource Full Article
abi Reconciling human needs and conserving biodiversity: large landscapes as a new conservation paradigm: The Lake Tumba, Democratic Republic of Congo / Bila-Isia Inogwabini By library.mit.edu Published On :: Sun, 29 Mar 2020 07:25:05 EDT Online Resource Full Article
abi Brassica improvement: molecular, genetics and genomic perspectives / Shabir Hussain Wani, Ajay Kumar Thakur, Yasin Jeshima Khan, editors By library.mit.edu Published On :: Sun, 19 Apr 2020 09:34:46 EDT Online Resource Full Article
abi Mixed plantations of eucalyptus and leguminous trees: soil, microbiology and ecosystem services / Elke Jurandy Bran Nogueira Cardoso, José Leonardo de Moraes Gonçalves, Fabiano de Carvalho Balieiro, Avílio Antônio Franco, editors By library.mit.edu Published On :: Sun, 26 Apr 2020 08:31:05 EDT Online Resource Full Article
abi Viscoelastic interfaces comprising of cellulose nanocrystals and lauroyl ethyl arginate for enhanced foam stability By feeds.rsc.org Published On :: Soft Matter, 2020, 16,3981-3990DOI: 10.1039/C9SM02392E, PaperAgnieszka Czakaj, Aadithya Kannan, Agnieszka Wiśniewska, Gabriela Grześ, Marcel Krzan, Piotr Warszyński, Gerald G. FullerAt submillimolar concentrations of lauroyl ethyl arginate, cellulose nanocrystals aggregate and form elongated fibres. This interfacial assembly efficiently stabilises foams.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
abi Role of molecular bend angle and biaxiality in the stabilization of the twist-bend nematic phase By feeds.rsc.org Published On :: Soft Matter, 2020, Advance ArticleDOI: 10.1039/D0SM00078G, CommunicationWojciech Tomczyk, Lech LongaWithin mean-field theory for V-shaped molecules, we have investigated how the alteration of a molecule's structural features influence the stabilization of modulated and non-modulated nematic phases.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
abi How clay particulates affect flow cessation and the coiling stability of yield stress-matched cementing suspensions By feeds.rsc.org Published On :: Soft Matter, 2020, 16,3929-3940DOI: 10.1039/C9SM02414J, PaperIman Mehdipour, Hakan Atahan, Narayanan Neithalath, Mathieu Bauchy, Edward Garboczi, Gaurav SantTransition from closely-packed to fractally-architected structures with clay addition improves homogeneity and prevents local dewatering, thus enhancing coiling stability of layer-wise extruded cementing suspensions during 3D-printing.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
abi Evaluation of the subtle trade-off between physical stability and thermo-responsiveness in crosslinked methylcellulose hydrogels By feeds.rsc.org Published On :: Soft Matter, 2020, Accepted ManuscriptDOI: 10.1039/D0SM00269K, PaperLorenzo Bonetti, Luigi De Nardo, Fabio Variola, Silvia FareMethylcellulose (MC) hydrogels, undergoing sol-gel reversible transition upon temperature changes, lend themselves to smart system applications. However, their reduced stability in aqueous environment and unsatisfactory mechanical properties limit the breadth...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
abi Systematic approach for wettability prediction using molecular dynamics simulations By feeds.rsc.org Published On :: Soft Matter, 2020, 16,4299-4310DOI: 10.1039/D0SM00197J, Paper Open Access   This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.Ahmed Jarray, Herman Wijshoff, Jurriaan A. Luiken, Wouter K. den OtterAn efficient approach for fast screening of liquids in terms of their wetting properties.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
abi Saddle-curvature instability of lipid bilayer induced by amphipathicpeptides: A molecular model By feeds.rsc.org Published On :: Soft Matter, 2020, Accepted ManuscriptDOI: 10.1039/D0SM00499E, PaperRachel Downing, Guilherme Volpe Bossa, Sylvio MayAmphipathic peptides that partition into lipid bilayers affect the curvature elastic properties oftheir host. Some of these peptides are able to shift the Gaussian modulus to positive values, thustriggering an...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
abi [ASAP] Describing Meta-Atoms Using the Exact Higher-Order Polarizability Tensors By dx.doi.org Published On :: Tue, 07 Apr 2020 04:00:00 GMT ACS PhotonicsDOI: 10.1021/acsphotonics.9b01776 Full Article
abi [ASAP] Strong Optical Feedback Stabilized Quantum Cascade Laser By dx.doi.org Published On :: Fri, 08 May 2020 04:00:00 GMT ACS PhotonicsDOI: 10.1021/acsphotonics.0c00189 Full Article
abi Usability and Security; Better Together By feedproxy.google.com Published On :: Sun, 22 Dec 2019 12:00:00 +0000 Divya Sasidharan calls into question the trade-offs often made between security and usability. Does a secure interface by necessity need to be hard to use? Or is it the choice we make based on years of habit? Snow has fallen, snow on snow. Security is often synonymous with poor usability. We assume that in order for something to be secure, it needs to by default appear impenetrable to disincentivize potential bad actors. While this premise is true in many instances like in the security of a bank, it relies on a fundamental assumption: that there is no room for choice. With the option to choose, a user almost inevitably picks a more usable system or adapts how they interact with it regardless of how insecure it may be. In the context of the web, passwords are a prime example of such behavior. Though passwords were implemented as a way to drastically reduce the risk of attack, they proved to be marginally effective. In the name of convenience, complex, more secure passwords were shirked in favor of easy to remember ones, and passwords were liberally reused across accounts. This example clearly illustrates that usability and security are not mutually exclusive. Rather, security depends on usability, and it is imperative to get user buy-in in order to properly secure our applications. Security and Usability; a tale of broken trust At its core, security is about fostering trust. In addition to protecting user accounts from malicious attacks, security protocols provide users with the peace of mind that their accounts and personal information is safe. Ironically, that peace of mind is incumbent on users using the security protocols in the first place, which further relies on them accepting that security is needed. With the increased frequency of cyber security threats and data breaches over the last couple of years, users have grown to be less trusting of security experts and their measures. Security experts have equally become less trusting of users, and see them as the “the weakest link in the chain”. This has led to more cumbersome security practices such as mandatory 2FA and constant re-login flows which bottlenecks users from accomplishing essential tasks. Because of this break down in trust, there is a natural inclination to shortcut security altogether. Build a culture of trust not fear Building trust among users requires empowering them to believe that their individual actions have a larger impact on the security of the overall organization. If a user understands that their behavior can put critical resources of an organization at risk, they will more likely behave with security in mind. For this to work, nuance is key. Deeming that every resource needs a similarly high number of checks and balances diminishes how users perceive security and adds unnecessary bottlenecks to user workflows. In order to lay the foundation for good security, it’s worth noting that risk analysis is the bedrock of security design. Instead of blindly implementing standard security measures recommended by the experts, a better approach is to tailor security protocols to meet specific use cases and adapt as much as possible to user workflows. Here are some examples of how to do just that: Risk based authentication Risk based authentication is a powerful way to perform a holistic assessment of the threats facing an organization. Risks occur at the intersection of vulnerability and threat. A high risk account is vulnerable and faces the very real threat of a potential breach. Generally, risk based authentication is about calculating a risk score associated with accounts and determining the proper approach to securing it. It takes into account a combination of the likelihood that that risk will materialize and the impact on the organization should the risk come to pass. With this system, an organization can easily adapt access to resources depending on how critical they are to the business; for instance, internal documentation may not warrant 2FA, while accessing business and financial records may. Dynamically adaptive auth Similar to risk based auth, dynamically adaptive auth adjusts to the current situation. Security can be strengthened and slackened as warranted, depending on how risky the access point is. A user accessing an account from a trusted device in a known location may be deemed low risk and therefore not in need of extra security layers. Likewise, a user exhibiting predictive patterns of use should be granted quick and easy access to resources. The ability to adapt authentication based on the most recent security profile of a user significantly improves the experience by reducing unnecessary friction. Conclusion Historically, security failed to take the user experience into account, putting the onus of securing accounts solely on users. Considering the fate of password security, we can neither rely on users nor stringent security mechanisms to keep our accounts safe. Instead, we should aim for security measures that give users the freedom to bypass them as needed while still protecting our accounts from attack. The fate of secure systems lies in the understanding that security is a process that must constantly adapt to face the shifting landscape of user behavior and potential threats. About the author Divya is a web developer who is passionate about open source and the web. She is currently a developer experience engineer at Netlify, and believes that there is a better workflow for building and deploying sites that doesn’t require a server—ask her about the JAMstack. You will most likely find her in the sunniest spot in the room with a cup of tea in hand. More articles by Divya Full Article UX security
abi Cigarette taxes and teen marijuana use [electronic resource] / D. Mark Anderson, Kyutaro Matsuzawa, Joseph J. Sabia By darius.uleth.ca Published On :: Cambridge, Mass. : National Bureau of Economic Research, 2020 Full Article
abi Drug courts [electronic resource] : a new approach to treatment and rehabilitation / James E. Lessenger, Glade F. Roper, editors By darius.uleth.ca Published On :: New York : Springer, [2007] Full Article
abi Italian populism and constitutional law: strategies, conflicts and dilemmas / Giacomo Delledonne, Giuseppe Martinico, Matteo Monti, Fabio Pacini, editors By library.mit.edu Published On :: Sun, 12 Apr 2020 09:49:18 EDT Online Resource Full Article
abi Tyranny comes home: the domestic fate of U.S. militarism / Christopher J. Coyne and Abigail R. Hall By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - UA23.C685 2018 Full Article
abi The end of strategic stability?: Nuclear weapons and the challenge of regional rivalries / Lawrence Rubin and Adam N. Stulberg, editors By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - U263.E557 2018 Full Article
abi Gender equality in politics: implementing party quotas in Germany and Austria / Petra Ahrens, Katja Chmilewski, Sabine Lang, Birgit Sauer By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Online Resource Full Article
abi Sacrificial limbs: masculinity, disability, and political violence in Turkey / Salih Can Açıksöz By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Dewey Library - UB365.T8 A27 2020 Full Article
abi United Andhra leaders call for bandh today as Cabinet clears Telangana formation By archive.indianexpress.com Published On :: Thu, 03 Oct 2013 18:39:26 GMT Congress MPs, MLAs from Seemandhra say Cabinet move was hasty. Full Article
abi Cabinet clears statutory status for UIDAI By archive.indianexpress.com Published On :: Tue, 08 Oct 2013 16:01:49 GMT Besides giving statutory status to UIDAI, the Bill seeks to provide legal backing to Aadhaar. Full Article
abi Controversial MLA Raja Bhaiya back in Akhilesh cabinet By archive.indianexpress.com Published On :: Fri, 11 Oct 2013 08:02:46 GMT Raja Bhaiya resigned after being named by DSP Haq's wife Parveen Azad in a murder case this year. Full Article
abi 3 more babies die in Malda hospital, toll rises to 18 By archive.indianexpress.com Published On :: Sat, 19 Oct 2013 09:42:50 GMT 15 new-born babies, brought to the Malda Hospital in critical condition, have died since Tuesday. Full Article
abi 'Became Buddhist for haircut, shave... mental untouchability persists' By archive.indianexpress.com Published On :: Mon, 21 Oct 2013 16:21:18 GMT The organisers of the event have claimed that a total of 60,000 Dalits converted to Buddhism. Full Article
abi Extending the Scalability of Linkage Learning Genetic Algorithms [electronic resource] / Ying-ping Chen By darius.uleth.ca Published On :: Secaucus : Springer, 2006 Full Article
abi Explicit stability conditions for continuous systems [electronic resource] : a functional analytic approach / by Michael I. Gil’ By darius.uleth.ca Published On :: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005 Full Article
abi Elementi di Probabilità e Statistica [electronic resource] / F. Biagini, M. Campanino By darius.uleth.ca Published On :: Milano : Springer, 2006 Full Article
abi Adaptive food webs : stability and transitions of real and model ecosystems / edited by John C. Moore (Colorado State University, CO, USA), Peter C. de Ruiter (Wageningen Universiteit, The Netherlands), Kevin S. McCann (University of Guelph, ON, Canada), By prospero.murdoch.edu.au Published On :: Full Article
abi Economics and liability for environmental problems / edited by Kathleen Segerson (University of Connecticut, USA) By prospero.murdoch.edu.au Published On :: Full Article
abi Environmental assessment on energy and sustainability by data envelopment analysis / Toshiyuki Sueyoshi (New Mexico Institute of Mining and Technology, New Mexico, USA), Mika Gogo (Tokyo Institute of Technology, Tokyo, Japan) By prospero.murdoch.edu.au Published On :: Sueyoshi, T. (Toshiyuki), 1954- author Full Article
abi Climate change, new security challenges and the United Nations / Dr Sabita Mohapatra By prospero.murdoch.edu.au Published On :: Mohpatra, Sabita, author Full Article
abi The green marble : earth system science and global sustainability / David P. Turner By prospero.murdoch.edu.au Published On :: Turner, David (David P.), 1950- author Full Article
abi Sustainability and peaceful coexistence for the anthropocene / edited by Pasi Heikkurinen By prospero.murdoch.edu.au Published On :: Full Article
abi Global environmental governance and the accountability trap / edited by Susan Park and Teresa Kramarz By prospero.murdoch.edu.au Published On :: Full Article
abi Plant conservation : the role of habitat restoration / Sergei Volis By prospero.murdoch.edu.au Published On :: Volis, Sergei, author Full Article
abi Petition in Calcutta High Court seeking Madan Mitra’s removal from Bengal cabinet By indianexpress.com Published On :: Fri, 16 Jan 2015 11:00:32 +0000 Full Article DO NOT USE West Bengal India
abi The effect of fertiliser application and timing on jarrah and marri growth, density and form in nine-year-old bauxite mine rehabilitation / M.A. Norman, C.D. Grant By prospero.murdoch.edu.au Published On :: Norman, M. A Full Article
abi Germination and viability of seeds of jarrah (Eucalyptus marginata) forest species according to temperature and duration of storage / M.A. Norman, E.L. Cromer, S.K. Taylor By prospero.murdoch.edu.au Published On :: Norman, M. A Full Article
abi Direct transfer of soil in the wet season as a method to establish resprouter species in rehabilitated bauxite mines / M.A. Norman, J.M. Koch By prospero.murdoch.edu.au Published On :: Norman, M. A Full Article
abi On the operability of the Sherritt-Gordon ammonia leach at the Kwinana Nickel Refinery / Travis M. Woodward By prospero.murdoch.edu.au Published On :: Woodward, Travis M., author Full Article