Dmitri G. Roussinov has over 15 years of experience in research and development in information technology, focusing on search engines, text mining, natural language processing, and business information systems. He has taught IT topics for over 12 years at highly ranked universities. He has 20+ years of hands-on experience in software design, programming languages, and computer graphics. He currently holds a senior lecturer position at the University of Strathclyde in Glasgow, UK.
Managing Confidential Information – Trends and ApproachesMicah Altman
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...Micah Altman
Ophir Frieder, who holds the Robert L. McDevitt, K.S.G., K.C.H.S. and Catherine H. McDevitt L.C.H.S. Chair in Computer Science and Information Processing at Georgetown University, gave this talk on Searching in Harsh Environments as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Ophir rebuts the myth that "google has solved search", and discusses the challenges of searching for complex object, through hidden collections, and in harsh environments For more see: http://informatics.mit.edu/blg
Living in Tech City: 50+ Technology Trends and Innovations Transforming Workp...cjbonk
Abstract: This session is geared toward trainers, managers, instructional designers, educators, learners, practitioners, and government officials who share an interest in contemporary advances in learning technologies that are shaping education for today’s and tomorrow’s learner. In this session, Professor Curt Bonk of Indiana University will discuss dozens of technologies and Web resources that have emerged over the past few years to transform corporate training as well as higher education and most other learning settings. Among these technologies tools are smartphones and smart watches, digital course resources, social books, social media, online talking dictionaries, video walls, virtual assistants, and Web conferencing. Also exploding at this time is enrollment in online or virtual learning, blended learning, massive open online courses (MOOCs), and the use of collaborative tools in such e-learning courses. While these 50+ technology trends and innovation are exciting and highly transformative, each has pros and cons in how they are used in different training and education spaces. To make it more personal, this session will, in part, be a presentation, and, in part, a conversation about learning technology trends and innovations. As such, there will be much opportunity for question and answer as well as personal reflection.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management — cloud storage, “big” data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Webinar: Learning Informatics Lab, University of Minnesota
Replay the talk: https://youtu.be/dcJZeDIMr2I
Learning Informatics
AI • Analytics • Accountability • Agency
Simon Buckingham Shum
Professor of Learning Informatics
Director, Connected Intelligence Centre
University of Technology Sydney
Abstract:
“Health Informatics”. “Urban Informatics”. “Social Informatics”. Informatics offers systemic ways of analyzing and designing the interaction of natural and artificial information processing systems. In the context of education, I will describe some Learning Informatics lenses and practices which we have developed for co-designing analytics and AI with educators and students. We have a particular focus on closing the feedback loop to equip learners with competencies to navigate a complex, uncertain future, such as critical thinking, professional reflection and teamwork. En route, we will touch on how we build educators’ trust in novel tools, our design philosophy of “embracing imperfection” in machine intelligence, and the ways that these infrastructures embody values. Speaking from the perspective of leading an institutional innovation centre in learning analytics, I hope that our experiences spark productive reflection around as the UMN Learning Informatics Lab builds its program.
Biography:
Simon Buckingham Shum is Professor of Learning Informatics at the University of Technology Sydney, where he serves as inaugural director of the Connected Intelligence Centre. CIC is a transdisciplinary innovation centre, using analytics to provide new insights for university teams, with particular expertise in educational data science. Simon’s career-long fascination with software’s ability to make thinking visible has seen him active in communities including Computer-Supported Cooperative Work, Hypertext, Design Rationale, Scholarly Publishing, Semantic Web, Computational Argumentation, Educational Technology and Learning Analytics. The challenge of visualizing contested knowledge has produced several books: Visualizing Argumentation, Knowledge Cartography, and Constructing Knowledge Art. He has been active over the last decade in shaping the field of Learning Analytics, co-founding the Society for Learning Analytics Research, and catalyzing several strands: Social Learning Analytics, Discourse Analytics, Dispositional Analytics and Writing Analytics. http://Simon.BuckinghamShum.net
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
Managing Confidential Information – Trends and ApproachesMicah Altman
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...Micah Altman
Ophir Frieder, who holds the Robert L. McDevitt, K.S.G., K.C.H.S. and Catherine H. McDevitt L.C.H.S. Chair in Computer Science and Information Processing at Georgetown University, gave this talk on Searching in Harsh Environments as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Ophir rebuts the myth that "google has solved search", and discusses the challenges of searching for complex object, through hidden collections, and in harsh environments For more see: http://informatics.mit.edu/blg
Living in Tech City: 50+ Technology Trends and Innovations Transforming Workp...cjbonk
Abstract: This session is geared toward trainers, managers, instructional designers, educators, learners, practitioners, and government officials who share an interest in contemporary advances in learning technologies that are shaping education for today’s and tomorrow’s learner. In this session, Professor Curt Bonk of Indiana University will discuss dozens of technologies and Web resources that have emerged over the past few years to transform corporate training as well as higher education and most other learning settings. Among these technologies tools are smartphones and smart watches, digital course resources, social books, social media, online talking dictionaries, video walls, virtual assistants, and Web conferencing. Also exploding at this time is enrollment in online or virtual learning, blended learning, massive open online courses (MOOCs), and the use of collaborative tools in such e-learning courses. While these 50+ technology trends and innovation are exciting and highly transformative, each has pros and cons in how they are used in different training and education spaces. To make it more personal, this session will, in part, be a presentation, and, in part, a conversation about learning technology trends and innovations. As such, there will be much opportunity for question and answer as well as personal reflection.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management — cloud storage, “big” data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Webinar: Learning Informatics Lab, University of Minnesota
Replay the talk: https://youtu.be/dcJZeDIMr2I
Learning Informatics
AI • Analytics • Accountability • Agency
Simon Buckingham Shum
Professor of Learning Informatics
Director, Connected Intelligence Centre
University of Technology Sydney
Abstract:
“Health Informatics”. “Urban Informatics”. “Social Informatics”. Informatics offers systemic ways of analyzing and designing the interaction of natural and artificial information processing systems. In the context of education, I will describe some Learning Informatics lenses and practices which we have developed for co-designing analytics and AI with educators and students. We have a particular focus on closing the feedback loop to equip learners with competencies to navigate a complex, uncertain future, such as critical thinking, professional reflection and teamwork. En route, we will touch on how we build educators’ trust in novel tools, our design philosophy of “embracing imperfection” in machine intelligence, and the ways that these infrastructures embody values. Speaking from the perspective of leading an institutional innovation centre in learning analytics, I hope that our experiences spark productive reflection around as the UMN Learning Informatics Lab builds its program.
Biography:
Simon Buckingham Shum is Professor of Learning Informatics at the University of Technology Sydney, where he serves as inaugural director of the Connected Intelligence Centre. CIC is a transdisciplinary innovation centre, using analytics to provide new insights for university teams, with particular expertise in educational data science. Simon’s career-long fascination with software’s ability to make thinking visible has seen him active in communities including Computer-Supported Cooperative Work, Hypertext, Design Rationale, Scholarly Publishing, Semantic Web, Computational Argumentation, Educational Technology and Learning Analytics. The challenge of visualizing contested knowledge has produced several books: Visualizing Argumentation, Knowledge Cartography, and Constructing Knowledge Art. He has been active over the last decade in shaping the field of Learning Analytics, co-founding the Society for Learning Analytics Research, and catalyzing several strands: Social Learning Analytics, Discourse Analytics, Dispositional Analytics and Writing Analytics. http://Simon.BuckinghamShum.net
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Resume It Industry Strath Address
1. Dmitri G. Roussinov, Ph.D.
Address: 16 Richmond Street, Glasgow, UK G1 1XQ. Tel.: +441415483706. Email:dmitri.roussinov@cis.strath.ac.uk
EXPERTISE SUMMARY
• 15+ years of R&D in IT, on the topics of search engines, text mining, natural language processing, and business
information systems. Co-authoring publications in the premier journals and conferences with the leading experts in
the fields of interest. Supervising doctoral, master’s and undergraduate students. Managing research teams.
• 12+ years of teaching on a variety of IT topics in several highly acclaimed worldwide academic programs.
• 20+ years of hands-on IT experience: software/systems design and implementation, data structures and algorithms
(including parallel and distributed), object-oriented modeling, C#/C++/C, Java, Pascal, Basic and assembly languages
(80x86 family), machine vision, computer graphics.
EMPLOYMENT
2008 – present, Senior Lecturer (equivalent of Associate Professor), Department of Computer and Information
Sciences, University of Strathclyde, Glasgow, UK
• Attained a leadership role in several research projects studying applications of NLP (automated question answering,
information retrieval, text mining) to the tasks of business intelligence, knowledge management and security
informatics, crafted collaborative funding requests, chaired Master’s and PhD dissertations, facilitated knowledge
transfer through the contacts with industry, presented seminars in other research institutions, served on program
committees of the premier conferences in the related fields. Taught/designed courses in IR and machine learning,.
2001 – 2008, Assistant Tenure-Track Professor, Department of Information Systems, Arizona State University1
• Attained worldwide reputation by presenting at premier conferences (SIGIR, CIKM, TREC, etc.), publishing in the
top ranked journals and through media appearances (“Information Week,” March 28, 2005 issue). Advised in
dissertations on the topics of natural language processing, automated question answering and information retrieval.
Contributed to building a master’s program, its profitability and growth in national rankings by designing curriculum,
recruiting students and establishing contacts with prospective employers, locally and nationwide. Designed and taught
courses on systems integration (middleware) and object oriented programming design using Java, C# and .NET
1999 – 2001, Assistant Tenure-Track Professor, School of Information Studies, Syracuse University2.
• Initiated independent stream of research in the areas of visual interactive Web search, user behavior and the role
of a page genre. Led collaborative projects resulting in funding requests and academic publications. Designed and
taught master’s and undergraduate courses in databases and system design. Advised doctoral and master’s students.
1995 – 1999, Graduate Research Associate, The University of Arizona3.
• Designed/implemented/tested an interactive Web search tool based on clustering and visualization using C,C++
and Java. Designed algorithms for fast and scalable creation of the term co-occurrence space and Kohonen’s maps
which resulted in highly cited publications. Was the first to introduce and explore the concept of collaborative
information retrieval by combining the concepts and tools from GDSS and IR.
1994 – 1996, Senior Software Engineer, Coextant Systems Co., Tucson, AZ, USA.
• Designed and implemented software for online content management using Lotus Notes, Domino, C, C++, Rogue
Wave, and STL. Transferred knowledge to junior software engineers upon completion of the project.
1993 – current, Selected Part Time Consulting:
• Kodak, Rochester NY. Summer 2000 (http://www.kodak.com). Faculty Partner/Consultant. Supervising students
involved in the interface development to launch the Kodak Picture Kiosk service.
• Humanizing Technologies, Indianapolis, IN. Summer, Fall 2001. (http://www.htinc.com/). Advised on text clustering
technologies and hiring software engineers for their implementation.
• Zhivoi Potok, Moscow, Russia (http://www.lsm.org/), 1993. Translating books from English to Russian.
1990 – 1993, Software Engineer, Nuclear Safety Institute, Moscow, Russia.
• Designed and implemented software in the areas of geographical information systems, involving computer graphics,
machine vision and applied artificial intelligence, using Turbo Pascal, C/C++ and 80x86 assembly languages.
1
Program ranked #11 in USA by U.S. News & World Report.
2
Program ranked #1 in USA by U.S. News & World Report.
3
Program ranked #5 in USA by U.S. News & World Report.
2. EDUCATION
Degree/ Major Topics of Focus Academic Institution Its Ranking and Reputation
year (specialty)
Ph. D. in Information NLP, IR, business The University of Arizona, Ranked #9 globally in IT by “Financial
1999 Systems systems Eller College of Times” and #5 in the US by “US News
Management, USA. World Report.”
M. A. in Economics centrally planned Indiana University, Among top 20 programs in US
1995 economies Bloomington, USA. according to US News World Report,
Wall Street Journal, and Business
Week.
B. S. & M. Computer computer Moscow Institute of Physics Unofficially considered “MIT of
S., Science, graphics, machine and Technology, Former Russia.”
in 1991 Physics vision USSR.
Doctoral Dissertation Title: Information Foraging Through Clustering And Summarization: A Self-Organizing Approach.
GPA: 4.0 out of 4.0. Advisor: Dr. Hsinchun Chen. Minors: computer engineering, economics.
IMPACT ON OTHER ACADEMICS AND PRACTITIONERS
• Featured in “Information Week” March 28, 2005 issue: Research on automated question answering on the Web
mentioned as one of the most promising directions in “[Web] Search For Tomorrow.”
• Cited more than 500 times in publications by other academics and practitioners according to Google Scholar as of
01/02/2011.
• Panelist for National Science Foundation (NSF): reviewing research projects proposals, discussing suitability for
funding by US government. (Information Management, Information Technology Research, Cyber Trust, CAREER)
• Regular invited reviewer for the top journals and conferences in the fields of expertise including ACM SIGIR, IEEE
and ACM transactions, etc. Served as Guest Editor of special issues for well known journals (International Journal of
Internet and Enterprise Management, Information Research).
• Served as doctoral dissertation chair (primary advisor) for Jose Robles-Flores (Arizona State University, Topic:
“Web Question Answering Technology: An Empirical Test Of The Task-Technology Fit Model,” the defense scheduled
for summer 2008) and for several master’s and bachelor’s level theses/dissertations/internships.
• Several Seminars Presented by invitation in academic and industry settings.
• Serving on program committees of well known conferences including ACM SIGIR, HICSS, IEEE ISI, AMCIS, etc.:
soliciting submissions, recruiting reviewers and deciding what papers to accept for presentation.
SELECTED PUBLICATIONS
• Roussinov, D., Aspect presence verification conditional on other aspects. ACM SIGIR 2010 (poster).
• Roussinov, D., Verifying the Implicit Presence of Difficult Query Aspects using a Large External Corpus, ACM SIGIR
2010 Web N-gram Workshop.
• Roussinov, D., and Turetken, O., Exploring Models for Semantic Category Verification. Information Systems, 34(8),
2009.
• Ozawa, S., Roy, A. and Roussinov, D., Automated Task Recognition In Multi-Task Learning. IEEE Transactions on
Neural Networks, 20(3), 2009.
• Roussinov, D., Fan, W., and Robles, J., Beyond Keywords: Automated Question Answering on the Web.
Communications of the ACM (CACM)4, 51(9), 2008. [Cited5: 13 times]
• Detecting Word Substitutions in Text, with S.W. Fong and D.B. Skillicorn. IEEE Transactions on Knowledge and Data
6
Engineering (TKDE) , 20(8), 2008.
• Roussinov, D., and Chau, M., Combining Fact Seeking Services on the Web, Journal of Association for Information
7
Systems (JAIS) , 9 (4), 2008.
• Roussinov, D., and O. Turetken, Semantic Verification in an Online Fact Seeking Environment, ACM Conference on
Information and Knowledge Management (CIKM), 2007, pp. 71-78, Lisbon, Portugal.
• Roussinov, D., and Fan, W., Learning Ranking vs. Modeling Relevance, Hawaii International Conference on System
4
Communications of the ACM – a premier journal for all computer related academics and professionals, “Science” of the ACM community, top
ranked in many disciplines. Source: http://www.acm.org/publications/cacm/
5
According to www.scholar.google.com, last checked on 02/15/2011.
6
IEEE Transactions on Knowledge and Data Engineering (TKDE) – a premier (best) computer science journal on the topics of Database and
Information Management. Source: http://www.cs.iit.edu/~xli/CSJournalsRanking.htm
7
Journal of Association for Information Systems (JAIS) – a quickly gaining superior reputation journal. Source: http://jais.aisnet.org/distribution.asp
3. Sciences (HICSS-38). (Nominated for best paper) January 3-6, 2006, Island of Hawaii.
• Roussinov, D., and Fan, W., Discretization Based Learning Approach to Information Retrieval. In proceedings of 2005
Conference on Human Language Technologies. [Cited: 9 times]
• Roussinov, D., Zhao, L., and Fan, W. Mining Context Specific Similarity Relationships Using The World Wide Web. In
proceedings of 2005 Conference on Human Language Technologies.
• Roussinov, D., Chau., M., Filatova, E., Robles, J., Building on Redundancy: Factoid Question Answering, Robust
Retrieval and the “Other.” In proceedings of Text REtrieval Conference (TREC), Nov. 15-18, 2005, National Institute
of Standards and Technology (NIST).
• N.J. Belkin, M. Cole, J. Gwizdka, Y.-L. Li, J.-J. Liu, G. Muresan, D. Roussinov, C.A. Smith, A. Taylor, X.-J. Yuan.
Rutgers Information Interaction Lab at TREC 2005: Trying HARD. In the proceedings of Text REtrieval Conference
(TREC), Nov. 15-18, 2005, National Institute of Standards and Technology (NIST).
• Cao, J., Roussinov, D., Robles, J., Nunamaker, J., Automated Question Answering From Videos: NLP vs. Pattern
Matching, Hawaii International Conference on System Sciences (HICSS-38). January 3-6, 2005, Island of Hawaii.
• Roussinov, D., and Robles, J., Web Question Answering: Technology and Business Applications. In the proceedings
of 2004 American Conference on Information Systems. August 6 – 8, New York, NY.
• Roussinov, D. and Robles, J., Ding, Y., Experiments with Web QA System and TREC2004 Questions. In the
proceedings of Text REtrieval Conference (TREC). November 16-19, 2004, National Institute of Standards and
Technology (NIST).
• Roussinov, D., and Zhao, L., Automatic Discovery of Similarity Relationships through Web Mining, Decision Support
Systems (DSS), 35, 2003, pp. 149-166. [Cited: 73 times]
• Roussinov, D., and Chen, H., Information Navigation on the Web by Clustering and Summarizing Query Results,
Information Processing and Management (IP&M8), 37 (6), 2001, pp. 789-816. [Cited: 65 times]
• Roussinov, D., Crowston, K., Nilan, M., Kwasnik, B., Cai, J. & Liu, X., Genre Based Navigation on the Web,
proceedings of Hawaii International Conference on System Sciences (HICSS-34). January 4-7, 2001, Island of Maui.
[Cited: 77 times]
• Crowston, K., Kwasnik, Liddy, L., B., Nilan, M., & Roussinov, D., Identifying Document Genre to Improve Web Search
Effectiveness, American Society for Information Science and Technology, Annual Conference, November 11 - 16,
2000, Chicago, IL. [Cited: 29 times]
• Roussinov D., and Chen, H., Document Clustering For Electronic Meetings: An Experimental Comparison Of Two
Techniques, Decision Support Systems (DSS), 27 (1-2), 1999, pp. 67-79. [Cited: 94 times]
• Roussinov D. and Chen H., A Scalable Self-organizing Map Algorithm for Textual Classification: A Neural Network
Approach to Thesaurus Generation, Communication and Cognition -- Artificial Intelligence (CCAI), 15 (1-2), 1998, pp.
81-112. [Cited: 62 times]
• Romano N.C., Roussinov D., Nunamaker J., and Chen H., Collaborative Information Retrieval Environment:
Integration of Information Retrieval with Group Support Systems, Thirty-Second Annual Hawaii International
Conference On System Sciences, January 5 - 8, 1999, Island of Maui. [Cited: 53 times]
• Roussinov D. and Ramsey M., Information Forage through Adaptive Visualization, The Third ACM Conference on
Digital Libraries, pp. 303-304, June 23-26, 1998, Pittsburgh. [Cited: 65 times]
REFERENCES
• Available upon request from the current or past employers and mentors.
• Academic opinion letters from the external reviewers (top scholars within the related fields who are familiar with my
accomplishments and commented on them in the past) can be provided by request. The list includes L. Giles, N.
Belkin, R. Larson, A. Spink, G. Marchionini, R. Sprague, A. Winston, S. Madnick, S. March, F. Provost, R. Sharda, M.
Bieber, L. Olfman, L. Giles, V. Vaishnavi, and other world renowned scholars.
OTHER
• Language Proficiency: English fluent in writing and speaking. Native speaker of Russian. Some conversational and
reading knowledge of Spanish, French, Italian and Japanese.
• Passport/Nationality: Citizen of Russian Federation. Currently on a work permit in UK. In the past, was authorized to
live and work in USA as a “foreign scientist with an extraordinary ability.” (O1 visa)
8
Information Processing and Management – a premier (among top 5) journal in Information Science community.