Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
This paper describes a dynamic computer-based business learning environment and the results from applying it in a real-world business organization. We argue for using learning too...
We conduct a series of experiments to investigate the desired properties of a tone mapping operator (TMO) and to design such an operator based on subjective data. We propose a nov...
Akiko Yoshida, Rafal Mantiuk, Karol Myszkowski, Ha...