This paper presents a preliminary effort on visualization and analysis of social networks for online marketplaces. We use one of the most popular e-business models, eBay, as a cas...
ACT Search and rescue robots often use tethers to provide power and communication, but tethers get caught on debris and small robots have difficulty with the added drag of the tet...
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
For the integration of electronic negotiation systems within information systems, it is essential to model both using the same modelling paradigm to avoid frictions. We develop a g...
We propose a new generative model for polyphonic music based on nonlinear Independent Subspace Analysis (ISA) and factorial Hidden Markov Models (HMM). ISA represents chord spectra...