A better understanding of “human error” is needed to help overcome problems of people assuming they are to blame for their inability to use poorly designed technology. In order...
Hierarchical probabilistic modeling of discrete data has emerged as a powerful tool for text analysis. Posterior inference in such models is intractable, and practitioners rely on...
In constrained clustering it is common to model the pairwise constraints as edges on the graph of observations. Using results from graph theory, we analyze such constraint graphs ...
Fishnet is a web browser that always displays web pages in their entirety, independent of their size. Fishnet accomplishes this by using a fisheye view, i.e. by showing a focus re...
: Companies implementing an IS/IT backsourcing strategy (i.e. bringing IT functions back in-house after they have been outsourced) aiming at increasing operational effectiveness ma...