Browse Results

Showing 53,226 through 53,250 of 53,539 results

The Secrets of AI Value Creation: A Practical Guide to Business Value Creation with Artificial Intelligence from Strategy to Execution

by Michael Proksch Nisha Paliwal Wilhelm Bielert

Unlock unprecedented levels of value at your firm by implementing artificial intelligence In The Secrets of AI Value Creation: Practical Guide to Business Value Creation with Artificial Intelligence from Strategy to Execution, a team of renowned artificial intelligence leaders and experts delivers an insightful blueprint for unlocking the value of AI in your company. This book presents a comprehensive framework that can be applied to your organisation, exploring the value drivers and challenges you might face throughout your AI journey. You will uncover effective strategies and tactics utilised by successful artificial intelligence (AI) achievers to propel business growth. In the book, you’ll explore critical value drivers and key capabilities that will determine the success or failure of your company’s AI initiatives. The authors examine the subject from multiple perspectives, including business, technology, data, algorithmics, and psychology. Organized into four parts and fourteen insightful chapters, the book includes: Concrete examples and real-world case studies illustrating the practical impact of the ideas discussed within Best practices used and common challenges encountered when first incorporating AI into your company’s operations A comprehensive framework you can use to navigate the complexities of AI implementation and value creation An indispensable blueprint for artificial intelligence implementation at your organisation, The Secrets of AI Value Creation is a can’t-miss resource for managers, executives, directors, entrepreneurs, founders, data analysts, and business- and tech-side professionals looking for ways to unlock new forms of value in their company. The authors, who are industry leaders, assemble the puzzle pieces into a comprehensive framework for AI value creation: Michael Proksch is an expert on the subject of AI strategy and value creation. He worked with various Fortune 2000 organisations and focuses on optimising business operations building customised AI solutions, and driving organisational adoption of AI through the creation of value and trust. Nisha Paliwal is a senior technology executive. She is known for her expertise in various technology services, focusing on the importance of bringing AI technology, computing resources, data, and talent together in a synchronous and organic way. Wilhelm Bielert is a seasoned senior executive with an extensive of experience in digital transformation, program and project management, and corporate restructuring. With a proven track record, he has successfully led transformative initiatives in multinational corporations, specialising in harnessing the power of AI and other cutting-edge technologies to drive substantial value creation.

Secure and Resilient Digital Transformation of Healthcare: First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings (Communications in Computer and Information Science #1884)

by Habtamu Abie Vasileios Gkioulos Sokratis Katsikas Sandeep Pirbhulal

This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full papers together in this volume were carefully reviewed and selected from 9 submissions. The workshop offers a wide range of techniques addressing cybersecurity skills, access control, privacy risks, and resilience in healthcare systems.

Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective

by Xiaolei Li Jiange Wang Xiaoyuan Luo Xinping Guan

As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. As a typical distributed cyber-physical system (DCPS), which is an intelligent system that integrates computing, communication, and control, networked robotic systems can perform higher-level tasks by sharing information and working together. It can provide intelligent control and monitoring of a physical process, such as environment observation, information collection, and search and rescue, etc. Thus, coordination control of networked robotic systems has become the focus of scholars worldwide. However, the sensing, communication, and control integration of networked robotic systems make them face unprecedented network security threats, in which cyber attacks have become a major hidden danger to the reliable operation of autonomous unmanned systems. Although existing control methods can achieve swarm collaborative control of networked robotic systems, the protection of which, especially the security of control systems, is rarely addressed. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks. Additionally, several future research directions are provided for networked robotic systems. This book will be an important reference for scientists, engineers, and graduate students from the field of underwater robotic technologies, maritime science, and control engineering.

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)

by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Yassine Maleh Brij B. Gupta

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).

Secure IT Systems: 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings (Lecture Notes in Computer Science #14324)

by Lothar Fritsch Ismail Hassan Ebenezer Paintsil

This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023. The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.

Secure Software Systems

by Erik Fretheim Marie Deschene

Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on the processes, concepts, and concerns of ensuring that secure practices are followed throughout the secure software systems development life cycle, including the practice of following the life cycle rather than just doing ad hoc development.

Secure Voice Processing Systems against Malicious Voice Attacks (SpringerBriefs in Computer Science)

by Kun Sun Shu Wang

This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones, and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems.This book is intended for security researchers, computer scientists, and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security, and audio security. Advanced-level students who are studying these topics will benefit from this book as well.

Securing Unmanned Aerial Vehicle Networks: Models and Algorithms (SpringerBriefs in Computer Science)

by Bin Duo Xiaojun Yuan Yifan Liu

This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

Security and Privacy in Cyber-Physical Systems and Smart Vehicles: First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #552)

by Yu Chen Chung-Wei Lin Bo Chen Qi Zhu

This book constitutes the refereed proceedings of the First EAI International Conference, SmartSP 2023, held in Chicago, USA, during October 12-13, 2023. The 11 revised full papers were carefully reviewed and selected from 24 submissions. The papers focus on all details all technological aspects that are relevant to Security and privacy in cyber-physical systems.

Security and Risk Analysis for Intelligent Cloud Computing: Methods, Applications, and Preventions

by Ajay Kumar Sangeeta Rani Sarita Rathee Surbhi Bhatia

This edited book is a compilation of scholarly articles on the latest developments in the field of AI, Blockchain, and ML/DL in cloud security. This book is designed for security and risk assessment professionals, and to help undergraduate, postgraduate students, research scholars, academicians, and technology professionals who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of cloud infrastructure and applications and shows how to make cloud infrastructure secure to combat threats and attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies. Readers will gain detailed information on cloud computing security that—until now—has been difficult to access. This book: • Covers topics such as AI, Blockchain, and ML/DL in cloud security. • Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread threats. • Explains the privacy aspects you need to consider in the cloud, including how they compare with aspects considered in traditional computing models. • Examines security delivered as a service—a different facet of cloud security.

Security Breach Files Updated Edition: An AFK Book (Five Nights At Freddy's)

by Scott Cawthon

Crack open this updated edition of the Security Breach Files for a deep dive into the terrifying game!All that you want to know about the first free-roam Five Nights at Freddy's game is presented here in vivid detail, with thirty-two new pages taking you through the free story "Ruin".This comprehensive breakdown covering gameplay, secrets, Easter eggs, and alternate endings for both the main game and DLC will deepen the knowledge of even the most enthusiastic player. All the evidence, along with every detail of the newest entry into the world of Five Nights at Freddy's is laid out for fans to explore in this one-of-a-kind guide.

Security-First Compliance for Small Businesses

by Karen Walsh

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that “with security comes compliance,” this book starts by defining “security-first” and then walking readers through the process of creating a holistic security and compliance program. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances. Woven throughout are practical examples of solutions that enable small and mid-sized businesses to create “cybersustainable” security-focused policies, processes, and controls that protect today’s future for tomorrow’s digital ecosystem.

Security Implementation in Internet of Medical Things

by Luxmi Sapra Varun Sapra Akashdeep Bhardwaj

Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems. This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel architectures in artificial intelligence, machine learning, and data science in the field of healthcare and IoT. IoMT includes a wide range of connected medical devices and systems, such as wearable devices, medical sensors, and electronic health records, that collect, store, and share sensitive medical information. Without proper security measures, this information could be compromised, leading to serious privacy breaches, financial fraud, and even physical harm to patients.

Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science #14412)

by Francesco Regazzoni Bodhisatwa Mazumdar Sri Parameswaran

This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023, held in Roorkee, India, in December 2023.The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering.

Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox (Security, Audit and Leadership Series)

by Jim Seaman Michael Gioia

The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can ‘bounce back’ from or manage to evade impactful occurrences is its security risk management capabilities. In this book, we change the perspective on an organization’s operational resilience capabilities so that it shifts from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book focus on risk profiles and how your business can reduce these profiles using effective mitigation measures. The book is divided into two sections: 1. Security Risk Management (SRM). All the components of security risk management contribute to your organization’s operational resilience capabilities, to help reduce your risks. • Reduce the probability/ likelihood. 2. Survive to Operate. If your SRM capabilities fail your organization, these are the components that are needed to allow you to quickly ‘bounce back.’ • Reduce the severity/ impact. Rather than looking at this from an operational resilience compliance capabilities aspect, we have written these to be agnostic of any specific operational resilience framework (e.g., CERT RMM, ISO 22316, SP 800- 160 Vol. 2 Rev. 1, etc.), with the idea of looking at operational resilience through a risk management lens instead. This book is not intended to replace these numerous operational resilience standards/ frameworks but, rather, has been designed to complement them by getting you to appreciate their value in helping to identify and mitigate your operational resilience risks. Unlike the cybersecurity or information security domains, operational resilience looks at risks from a business-oriented view, so that anything that might disrupt your essential business operations are risk-assessed and appropriate countermeasures identified and applied. Consequently, this book is not limited to cyberattacks or the loss of sensitive data but, instead, looks at things from a holistic business-based perspective.

Security Strategies in Linux Platforms and Applications

by Ric Messier Michael Jang

The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.

Security Strategies in Windows Platforms and Applications

by Robert Shimonski Michael G. Solomon

Revised and updated to keep pace with this ever-changing field, Security Strategies in Windows Platforms and Applications, Fourth Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 11, and Windows Server 2022. The Fourth Edition highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.

Security Without Obscurity: A Guide to PKI Operations

by Jeff Stapleton W. Clay Epstein

Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures). A properly managed PKI requires all of these disparate disciplines to function together – coherently, efficiently, effectually, and successfully. Clearly defined roles and responsibilities, separation of duties, documentation, and communications are critical aspects for a successful operation. PKI is not just about certificates, rather it can be the technical foundation for the elusive "crypto-agility," which is the ability to manage cryptographic transitions. The second quantum revolution has begun, quantum computers are coming, and post-quantum cryptography (PQC) transitions will become PKI operation’s business as usual.

See Yourself in Cyber: Security Careers Beyond Hacking

by Ed Adams

A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent. Using the familiar analogy of the color wheel, the author explains the modern roles and responsibilities of practitioners who operate within each “slice.” He also includes: Real-world examples and case studies that demonstrate the application of the ideas discussed in the book Many interviews with established industry leaders in a variety of disciplines explaining what non-security professionals can do to improve cybersecurity Actionable strategies and specific methodologies for professionals working in several different fields interested in meeting their cybersecurity obligationsPerfect for managers, directors, executives, and other business leaders, See Yourself in Cyber: Security Careers Beyond Hacking is also an ideal resource for policymakers, regulators, and compliance professionals.

Seeing Red: Nintendo's Virtual Boy (Platform Studies)

by Jose P. Zagal Benj Edwards

The curious history, technology, and technocultural context of Nintendo&’s short-lived stereoscopic gaming console, the Virtual Boy.With glowing red stereoscopic 3D graphics, the Virtual Boy cast a prophetic hue: Shortly after its release in 1995, Nintendo's balance sheet for the product was "in the red" as well. Of all the innovative long shots the game industry has witnessed over the years, perhaps the most infamous and least understood was the Virtual Boy. Why the Virtual Boy failed, and where it succeeded, are questions that video game experts José Zagal and Benj Edwards explore in Seeing Red, but even more interesting to the authors is what the platform actually was: what it promised, how it worked, and where it fit into the story of gaming.Nintendo released the Virtual Boy as a standalone table-top device in 1995—and quickly discontinued it after lackluster sales and a lukewarm critical reception. In Seeing Red, Zagal and Edwards examine the device's technical capabilities, its games, and the cultural context in the US in the 1990s when Nintendo developed and released the unusual console. The Virtual Boy, in their account, built upon and extended an often-forgotten historical tradition of immersive layered dioramas going back 100 years that was largely unexplored in video games at the time. The authors also show how the platform's library of games conveyed a distinct visual aesthetic style that has not been significantly explored since the Virtual Boy's release, having been superseded by polygonal 3D graphics. The platform's meaning, they contend, lies as much in its design and technical capabilities and affordances as it does in an audience's perception of those capabilities. Offering rare insight into how we think about video game platforms, Seeing Red illustrates where perception and context come, quite literally, into play.

Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition: First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings (Lecture Notes in Computer Science #14539)

by Antonio Pepe Gian Marco Melito Jan Egger

This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ”container submission” challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.

Selected Areas in Cryptography – SAC 2023: 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14201)

by Claude Carlet Kalikinkar Mandal Vincent Rijmen

This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton, New Brunswick, Canada, in August 2023.The 21full papers presented in these proceedings were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: Cryptanalysis of Lightweight Ciphers; Side-Channel Attacks and Countermeasures; Post-Quantum Constructions; Symmetric cryptography and fault attacks; Post-Quantum Analysis and Implementations; Homomorphic encryption; Public-Key Cryptography; and Differential Cryptanalysis.

Selected Reflections in Language, Logic, and Information: ESSLLI 2019, ESSLLI 2020 and ESSLLI 2021 Student Sessions, Selected Papers (Lecture Notes in Computer Science #14354)

by Alexandra Pavlova Mina Young Pedersen Raffaella Bernardi

The European Summer School in Logic, Language and Information (ESSLLI) is organized every year by the Association for Logic, Language and Information (FoLLI) in different sites around Europe. The papers cover vastly dierent topics, but each fall in the intersection of the three primary topics of ESSLLI: Logic, Language and Computation. The 13 papers presented in this volume have been selected among 81 submitted papers over the years 2019, 2020 and 2021. The ESSLLI Student Session is an excellent venue for students to present their work and receive valuable feedback from renowned experts in their respective fields. The Student Session accepts submissions for three different tracks: Language and Computation (LaCo), Logic and Computation (LoCo), and Logic and Language (LoLa).

Selenium WebDriver Recipes in C#: Practical Testing Solutions for Selenium WebDriver

by Courtney Zhan

Solve your Selenium WebDriver problems with this quick guide to automated testing of web applications with Selenium WebDriver in C#. This third edition contains hundreds of solutions to real-world problems, with clear explanations and ready-to-run Selenium test scripts that you can use in your own projects. Updated to Selenium version 4, this revision includes Visual Studio Code set up, additional recipes, and new chapters on Selenium DevTools and continuous testing. You'll see how to use Selenium WebDriver for select lists, navigation, assertions, frames, file upload and pop-up dialogs. You'll also learn how to locate web elements and test functions for hyperlinks, buttons, TextFields and TextAreas, radio buttons, CheckBoxes, and more. What You'll Learn Debug test scripts and test data Work with Selenium Remote Control Server Manage and deal with browser profiles and capabilities Monitor tests for advanced user interactions and experiences (UX) Who This Book Is For Experienced .NET and C# Windows application programmers/developers.

Semantic AI in Knowledge Graphs

by Sanju Tiwari Fernando Ortíz-Rodriguez Sarra Ben Abbés Patience Usoro Usip Rim Hantach

Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results. Semantic AI in Knowledge Graphs locates itself at the forefront of this novel development, uncovering the role of machine learning to extend the knowledge graphs by graph mapping or corpus-based ontology learning. Securing efficient results via the combination of symbolic AI and statistical AI such as entity extraction based on machine learning, text mining methods, semantic knowledge graphs, and related reasoning power, this book is the first of its kind to explore semantic AI and knowledge graphs. A range of topics are covered, from neuro-symbolic AI, explainable AI and deep learning to knowledge discovery and mining, and knowledge representation and reasoning. A trailblazing exploration of semantic AI in knowledge graphs, this book is a significant contribution to both researchers in the field of AI and data mining as well as beginner academicians.

Refine Search

Showing 53,226 through 53,250 of 53,539 results