Following the tradition of these acceptance talks, I will be giving my thoughts on where our field is going. Any discussion of the future of information retrieval (IR) research, h...
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the fi...
We demonstrate the evolution of simple embodied Genetic Regulatory Networks (GRNs) as real-time control systems for robotic and software-based embodied Artificial Organisms, and p...
Tom Quick, Chrystopher L. Nehaniv, Kerstin Dautenh...