Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Abstract—Positive stable laws have become a standard tool in modelling heavy tailed data in such diverse areas as finance, engineering and survival analysis. Due to the non–ex...
: Discovering interesting patterns or substructures in data streams is an important challenge in data mining. Clustering algorithms are very often applied to identify single substr...
We present a new control design method for perturbed multiple-input systems, which guarantees any desired componentwise ultimate bound on the system state. The method involves eig...
Well-designed interfaces use procedural and sensory cues to increase the salience of appropriate actions and intentions. However, empirical studies suggest that cognitive load can...
Rimvydas Ruksenas, Jonathan Back, Paul Curzon, Ann...