|
|
|
|
|
|
Advances in Artificial Intelligence for Privacy Protection and Security
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,... | | | | The Open Source Alternative: Understanding Risks and Leveraging OpportunitiesIn the late 1990s, working as a lawyer in a technology licensing practice, I found more and more of my clients using software provided under a very unusual license. My colleagues at the time advised clients to avoid this kind of software, because although this software was free of charge, it was likely to infringe intellectual property rights and... |
|
|
|
Result Page: 7 6 5 4 3 2 1 |