Browse Results

Showing 2,776 through 2,800 of 22,489 results

Close Encounters: Communication in Relationships

by Walid Afifi Dr Peter A. Andersen Dr Laura K. Guerrero

A relational approach to the study of interpersonal communication Close Encounters: Communication in Relationships, Fifth Edition helps students better understand their relationships with romantic partners, friends, and family members. Bestselling authors Laura K. Guerrero, Peter A. Andersen, and Walid A. Afifi offer research-based insights and content illustrated with engaging scenarios to show how state-of-the-art research and theory can be applied to specific issues within relationships—with a focus on issues that are central to describing and understanding close relationships. While maintaining the spotlight on communication, the authors also emphasize the interdisciplinary nature of the study of personal relationships by including research from such disciplines as social psychology and family studies. The book covers issues relevant to developing, maintaining, repairing, and ending relationships. Both the "bright" and "dark" sides of interpersonal communication within relationships are explored.

Close Encounters: Communication in Relationships

by Walid Afifi Dr Peter A. Andersen Dr Laura K. Guerrero

A relational approach to the study of interpersonal communication Close Encounters: Communication in Relationships, Fifth Edition helps students better understand their relationships with romantic partners, friends, and family members. Bestselling authors Laura K. Guerrero, Peter A. Andersen, and Walid A. Afifi offer research-based insights and content illustrated with engaging scenarios to show how state-of-the-art research and theory can be applied to specific issues within relationships—with a focus on issues that are central to describing and understanding close relationships. While maintaining the spotlight on communication, the authors also emphasize the interdisciplinary nature of the study of personal relationships by including research from such disciplines as social psychology and family studies. The book covers issues relevant to developing, maintaining, repairing, and ending relationships. Both the "bright" and "dark" sides of interpersonal communication within relationships are explored.

Close Encounters: Communication in Relationships

by Dr. Laura K. Guerrero Dr. Peter A. Andersen Dr. Walid Afifi

A relational approach to the study of interpersonal communication Close Encounters: Communication in Relationships, Fifth Edition helps students better understand their relationships with romantic partners, friends, and family members. Bestselling authors Laura K. Guerrero, Peter A. Andersen, and Walid A. Afifi offer research-based insights and content illustrated with engaging scenarios to show how state-of-the-art research and theory can be applied to specific issues within relationships—with a focus on issues that are central to describing and understanding close relationships. While maintaining the spotlight on communication, the authors also emphasize the interdisciplinary nature of the study of personal relationships by including research from such disciplines as social psychology and family studies. The book covers issues relevant to developing, maintaining, repairing, and ending relationships. Both the "bright" and "dark" sides of interpersonal communication within relationships are explored.

Close Encounters: Communication in Relationships

by Dr. Laura K. Guerrero Dr. Peter A. Andersen Dr. Walid Afifi

A relational approach to the study of interpersonal communication Close Encounters: Communication in Relationships, Fifth Edition helps students better understand their relationships with romantic partners, friends, and family members. Bestselling authors Laura K. Guerrero, Peter A. Andersen, and Walid A. Afifi offer research-based insights and content illustrated with engaging scenarios to show how state-of-the-art research and theory can be applied to specific issues within relationships—with a focus on issues that are central to describing and understanding close relationships. While maintaining the spotlight on communication, the authors also emphasize the interdisciplinary nature of the study of personal relationships by including research from such disciplines as social psychology and family studies. The book covers issues relevant to developing, maintaining, repairing, and ending relationships. Both the "bright" and "dark" sides of interpersonal communication within relationships are explored.

The Closet: A Coming-of-age Story Of Love, Awakenings And The Clothes That Made (and Saved) Me

by Teo van den Broeke

Throughout his life, clothes have provided an outlet through which journalist Teo van den Broeke understands both himself and the world around him.

Closing the Service Gap

by Benjamin Laker Lebene Soga Yemisi Bolade-Ogunfodun

How connected are your customers, employees and organisation? As technology advances and customer expectations rise, the most sustainable, profitable and realistic way businesses can succeed in the future is by connecting their customers, employees, and organisation. Following in the footsteps of some of the world's largest companies, this book shows you how to transform your business culture using technology to connect the three most important stakeholders – the customers, employees and the organisation – and deliver value to each in turn. This model is best recognised as ‘RenDanHeyi', a Chinese term that means ‘each employee' (Ren), ‘the needs of each customer' (Dan) and ‘the connection between the two' (Heyi). With practical steps, tips and case studies, this book helps you to build and implement a strategy to close the service gap in your organisation: Understand how to use the RenDanHeyi model to connect your employees, customers, and organisation. Use new or existing technology to link customer expectations to employee activities, and craft job roles and workforce planning strategy around customer needs. Create a connected organisation that generates sustainable and scalable revenue for the business. Transform your leadership from one that delegates to one that empowers and enables employees.

Closing Time: A Memoir

by Joe Queenan

By turns hilarious and heartbreaking, Closing Time recounts Joe Queenan’s Irish Catholic upbringing in a family dominated by his erratic father, a violent yet oddly charming emotional terrorist whose alcoholism fuels a limitless torrent of self-pity, railing, destruction, and late-night chats with the Lord Himself. With the help of a series of mentors and surrogate fathers, and armed with his own furious love of books and music, Joe begins the long flight away from the dismal confines of his neighbourhood – with a brief misbegotten stop at a seminary – and into the wider world. Closing Time is an unforgettable account of the damage done to children by parents without futures and of the grace children find to move beyond these experiences. ‘Closing Time is unmistakably a tale of triumph, vindication and revenge . . . [an] enlightening account of the ways in which we are all, to some extent, casualties of our own childhoods.’ Sarah Churchwell, Guardian ‘A brutally executed coming-of-age story’ Esquire ‘Will have readers crying tears of both sorrow and hilarity’ Booklist

Cloud Based 5G Wireless Networks (SpringerBriefs in Computer Science)

by Yin Zhang Min Chen

This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how 5G mobile communication technology (5G) can no longer be defined by a single business model or a typical technical characteristic. The discussed networks functions and services include Network Foundation Virtualization (N-FV), Cloud Radio Access Networks (Cloud-RAN), and Mobile Cloud Networking (MCN). The benefits of cloud platforms are examined, as are definable networking and green wireless networking. Other related and representative projects on 5G are mobile and wireless communications enablers for the Twenty-Twenty Information Society, Multi-hop Cellular Networks, Network Function as-a-Service over Virtualized Infrastructures, iJOIN, and Nuage Virtualized Services Platform. Major applications of 5G range from RAN sharing and Multi-Operator Core Networks to mobile convergence. Enhancing the user experience by providing smart and customized services, 5G will support the explosive growth of big data, mobile internet, digital media, and system efficiency. This SpringerBrief is designed for professionals, researchers, and academics working in networks or system applications. Advanced-level students of computer science or computer engineering will also find the content valuable.

Cloud Computing: Concepts and Practices

by Naresh Kumar Sehgal Pramod Chandra Bhatt

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architecture, with focus on best practices for using a dynamic cloud infrastructure, cloud operations management and cloud security. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book and invaluable introduction to the topic.

Cloud Computing Basics (SpringerBriefs in Electrical and Computer Engineering)

by S. Srinivasan

Cloud Computing Basics covers the main aspects of this fast moving technology so that both practitioners and students will be able to understand cloud computing. The author highlights the key aspects of this technology that a potential user might want to investigate before deciding to adopt this service. This book explains how cloud services can be used to augment existing services such as storage, backup and recovery. Addressing the details on how cloud security works and what the users must be prepared for when they move their data to the cloud. Also this book discusses how businesses could prepare for compliance with the laws as well as industry standards such as the Payment Card Industry.

Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks (Wireless Communications and Networking Technologies)

by Sanjoy Das

This book discusses intelligent computing through Internet of Things (IoT) and Big Data in vehicular environments in a single volume. It covers important topics, such as topology-based routing protocols, heterogeneous wireless networks, security risks, software-defined vehicular ad-hoc networks, vehicular delay tolerant networks, and energy harvesting for WSNs using rectenna. Features Covers applications of IoT in Vehicular Ad-hoc Network (VANETs) Discusses use of machine learning and other computing techniques for enhancing performance of networks Explains game theory-based vertical handoffs in heterogeneous wireless networks Examines monitoring and surveillance of vehicles through the vehicular sensor network Investigates theoretical approaches on software-defined VANET The book is aimed at graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science, and engineering.

Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks (Wireless Communications and Networking Technologies)

by Sanjoy Das Ram Shringar Rao Indrani Das Vishal Jain Nanhay Singh

This book discusses intelligent computing through Internet of Things (IoT) and Big Data in vehicular environments in a single volume. It covers important topics, such as topology-based routing protocols, heterogeneous wireless networks, security risks, software-defined vehicular ad-hoc networks, vehicular delay tolerant networks, and energy harvesting for WSNs using rectenna. Features Covers applications of IoT in Vehicular Ad-hoc Network (VANETs) Discusses use of machine learning and other computing techniques for enhancing performance of networks Explains game theory-based vertical handoffs in heterogeneous wireless networks Examines monitoring and surveillance of vehicles through the vehicular sensor network Investigates theoretical approaches on software-defined VANET The book is aimed at graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science, and engineering.

Cloud Computing with Security: Concepts and Practices

by Naresh Kumar Sehgal Pramod Chandra Bhatt John M. Acken

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.

Cloud Computing with Security and Scalability.: Concepts and Practices

by Naresh Kumar Sehgal Pramod Chandra Bhatt John M. Acken

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastructure, and cloud operations management with cost optimizations. Several new examples and analysis of cloud security have been added, including ARM architecture and https protocol.Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud;Describes for IT managers how to improve their Cloud Computing infrastructures;Includes coverage of security concerns with Cloud operating models;Uses several case studies to illustrate the “why’s and how’s” of using the Cloud;Examples and options to improve Cloud Computing Scalability.

Cloud Management and Security

by Imad M. Abbadi

Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure (e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem – focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning – especially focusing on Cloud security. Key Features • Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security • Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students • Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice • Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages • Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing • Provides a research roadmap to establish next-generation trustworthy Cloud computing • Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Cloud Management and Security

by Imad M. Abbadi

Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure (e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem – focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning – especially focusing on Cloud security. Key Features • Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security • Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students • Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice • Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages • Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing • Provides a research roadmap to establish next-generation trustworthy Cloud computing • Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Cloud Mobile Networks: From RAN to EPC (Wireless Networks)

by Mojtaba Vaezi Ying Zhang

This book explores the challenges and opportunities in exploiting cloud technologies for 5G, ranging from radio access network (RAN) to the evolved packet core (EPC). With a specific focus on cloud RAN and EPC, the text carefully explains the influence of recent network technologies such as software defined networking (SDN), visualization, and cloud technologies in the evolution of architecture for future mobile networks. The book discusses the causes, benefits and challenges of cloud RAN and its interplay with other evolving technologies for future mobile networks.Researchers and professionals involved in mobile technology or cloud computing will find this book a valuable resource. The text is also suitable for advanced-level students studying all types of networking.

Cloud Portability and Interoperability: Issues and Current Trends (SpringerBriefs in Computer Science)

by Beniamino Di Martino Giuseppina Cretella Antonio Esposito

This book offers readers a quick, comprehensive and up-to-date overview of the most important methodologies, technologies, APIs and standards related to the portability and interoperability of cloud applications and services, illustrated by a number of use cases representing a variety of interoperability and portability scenarios.The lack of portability and interoperability between cloud platforms at different service levels is the main issue affecting cloud-based services today. The brokering, negotiation, management, monitoring and reconfiguration of cloud resources are challenging tasks for developers and users of cloud applications due to the different business models associated with resource consumption, and to the variety of services and features offered by different cloud providers.In chapter 1 the concepts of cloud portability and interoperability are introduced, together with the issues and limitations arising when such features are lacking or ignored. Subsequently, chapter 2 provides an overview of the state-of-the-art methodologies and technologies that are currently used or being explored to enable cloud portability and interoperability. Chapter 3 illustrates the main cross-platform cloud APIs and how they can solve interoperability and portability issues. In turn, chapter 4 presents a set of ready-to-use solutions which, either because of their broad-scale use in cloud computing scenarios or because they utilize established or emerging standards, play a fundamental part in providing interoperable and portable solutions. Lastly, chapter 5 presents an overview of emerging standards for cloud Interoperability and portability.Researchers and developers of cloud-based services will find here a brief survey of the relevant methodologies, APIs and standards, illustrated by case studies and complemented by an extensive reference list for more detailed descriptions of every topic covered.

Cloud Security Auditing (Advances in Information Security #76)

by Suryadipta Majumdar Taous Madi Yushun Wang Azadeh Tabiban Momen Oqaily Amir Alimohammadifar Yosr Jarraya Makan Pourzandi Lingyu Wang Mourad Debbabi

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers’ views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime.Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants’ trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP).This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Cloud Services, Networking, and Management (IEEE Press Series on Networks and Service Management)

by Nelson L. S. Da Fonseca Raouf Boutaba

Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content Self-contained chapters for readers with specific interests Includes commercial applications on Cloud (video services and games)

Cloud Services, Networking, and Management (IEEE Press Series on Networks and Service Management)

by Nelson L. S. da Fonseca Raouf Boutaba

Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content Self-contained chapters for readers with specific interests Includes commercial applications on Cloud (video services and games)

Cloud Technologies and Services: Theoretical Concepts and Practical Applications (Textbooks in Telecommunication Engineering)

by M. Scott Kingsley

This textbook provides a thorough yet compact review of cloud technologies. It offers easy to understand explanations of the technical concepts underlying cloud services, platforms, and applications offered by Amazon Web Services (AWS), Microsoft Azure, and the Google Cloud Platform (GCP). It presents cloud concepts at a depth that can be understood and applied by both technical and non-technical readers. Once that is accomplished the learner can then easily move toward more advanced topics. Or, they can use the knowledge gained from this book to obtain industry certifications and be competitive in this exciting industry. Reader learning is enhanced with quizzes and exam questions and hands-on labs throughout the book with PowerPoint slides, instructor guide and additional labs online. All the tools needed for advancement to the level of cloud architect are found in this book. The author has verified the success of this approach in his own academic environment with much success. He teaches Cloud Engineering and Advanced Cloud Engineering at Southern Methodist University. Both courses were developed in partnership with the AWS Academy, the education arm of the Amazon Web Services cloud platform. Using this methodology his students routinely take and pass cloud certification exams and obtain lucrative employment positions in the rapidly expanding cloud industry.

Clown World: Four Years Inside Andrew Tate's Manosphere

by Jamie Tahsin Matt Shea

'This gripping book is destined to become THE book about Andrew Tate' Jon Ronson'A fascinating and disturbing investigation' Ian HislopThe behind-the-scenes story of a four-year investigation into Andrew Tate, exploring how a failed reality TV star turned accused organised criminal managed to become one of the most famous influencers in the world.In 2022, Andrew Tate went from a little-known kickboxer and failed reality TV star to a lifestyle icon for legions of men and boys, and a figure that would define a new era of misogyny. Tate started the year as a fringe internet celebrity, but by August he was the most googled man in the world. In that same month, Matt Shea and Jamie Tahsin gained access to his Bucharest compound and infamous War Room, making a documentary that would result in the first women coming forward to accuse him publicly of sexual and physical violence. Tate would end the year in a Romanian jail, facing charges of human trafficking, rape and being part of an organised crime group. But the investigations wouldn't stop there.Part Gonzo journalism, part masculinity rabbit hole, this book takes you on Shea and Tahsin's journey to reveal the dark secrets of Andrew Tate, the machine that brought him here, and the ideology he has unleashed on a generation of young men.'A sobering, strange and eye-opening look into the toxic manosphere. It should be required reading for anybody worried about the rise of incel culture and Andrew Tate' Zing Tsjeng'Rarely have I read anything so politically important that's also so gripping' Zoe Williams

Cluster-based Localization and Tracking in Ubiquitous Computing Systems (SpringerBriefs in Electrical and Computer Engineering)

by José Ramiro Martínez-de Dios Alberto de Bernabé-Clemente Arturo Torres-González Anibal Ollero

Localization and tracking are key functionalities in ubiquitous computing systems and techniques. In recent years a very high variety of approaches, sensors and techniques for indoor and GPS-denied environments have been developed. This book briefly summarizes the current state of the art in localization and tracking in ubiquitous computing systems focusing on cluster-based schemes. Additionally, existing techniques for measurement integration, node inclusion/exclusion and cluster head selection are also described in this book.

Clustering Methods for Big Data Analytics: Techniques, Toolboxes and Applications (Unsupervised and Semi-Supervised Learning)

by Olfa Nasraoui Chiheb-Eddine Ben N'Cir

This book highlights the state of the art and recent advances in Big Data clustering methods and their innovative applications in contemporary AI-driven systems. The book chapters discuss Deep Learning for Clustering, Blockchain data clustering, Cybersecurity applications such as insider threat detection, scalable distributed clustering methods for massive volumes of data; clustering Big Data Streams such as streams generated by the confluence of Internet of Things, digital and mobile health, human-robot interaction, and social networks; Spark-based Big Data clustering using Particle Swarm Optimization; and Tensor-based clustering for Web graphs, sensor streams, and social networks. The chapters in the book include a balanced coverage of big data clustering theory, methods, tools, frameworks, applications, representation, visualization, and clustering validation.

Refine Search

Showing 2,776 through 2,800 of 22,489 results