Results 221 to 230 of about 139,929 (306)
You, Me, and the AI: The Role of Third‐Party Human Teammates for Trust Formation Toward AI Teammates
ABSTRACT As artificial intelligence (AI) becomes increasingly integrated in teams, understanding the factors that drive trust formation between human and AI teammates becomes crucial. Yet, the emergent literature has overlooked the impact of third parties on human‐AI teaming.
Türkü Erengin +2 more
wiley +1 more source
RTOS-Integrated Time Synchronization for Self-Deployable Wireless Sensor Networks. [PDF]
Goossens S +3 more
europepmc +1 more source
Criação de assinaturas eletrónicas qualificadas a partir de um hardware security module na cloud
José Miguel Fernandes Carvalho
openalex +1 more source
ABSTRACT This article presents a decade of research on Open Data Business Models (ODBM), aiming to identify conceptual gaps, categorize thematic trends, and propose an integrative framework. This paper, based on a systematic literature review (SLR) of 60 peer‐reviewed studies, develops a coherent framework that explains how ODBMs are formed, adapted ...
Saeed Rouhani +3 more
wiley +1 more source
Hardware-enhanced data security for Internet of Things. [PDF]
Xia Y +6 more
europepmc +1 more source
ABSTRACT This study extends absorptive capacity research by showing how corporate venture capital (CVC) investments enable corporate artificial intelligence (AI) adoption through collaboration pathways, delineated in four adoption archetypes that explain how heterogeneous AI knowledge is absorbed.
Louisa A. Müller +2 more
wiley +1 more source
Sensors Fusion in Digital Healthcare Applications. [PDF]
Lee BG.
europepmc +1 more source
Integrating Augmented Reality Into Otologic Cadaveric Surgical Training
This pilot study developed and implemented a specimen‐specific augmented reality (AR) workflow for cadaveric temporal bone dissection, using CT‐derived 3D models registered to each specimen and viewed intermittently through a Microsoft HoloLens 2 headset.
Yuval Mizrakli +8 more
wiley +1 more source
Security of ADS-B and Remote ID Systems: Cyberattacks, Detection Techniques, and Countermeasures. [PDF]
Shi Q, Caleb TD, Shao S, Kaabouch N.
europepmc +1 more source

