ACT Search and rescue robots often use tethers to provide power and communication, but tethers get caught on debris and small robots have difficulty with the added drag of the tet...
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
For the integration of electronic negotiation systems within information systems, it is essential to model both using the same modelling paradigm to avoid frictions. We develop a g...
We propose a new generative model for polyphonic music based on nonlinear Independent Subspace Analysis (ISA) and factorial Hidden Markov Models (HMM). ISA represents chord spectra...
Programming heterogeneous parallel computer systems is notoriously difficult, but MIMD models have proven to be portable across multi-core processors, clusters, and massively paral...