Searched for:
(1 - 20 of 1,186)

Pages

document
Neumann, N.M.P. (author), Phillipson, F. (author), Versluis, R. (author)
Everyday computers can be used to solve numerous tasks which are often too difficult for humans to do quickly. Whether it is finding the shortest route between your home and your work or automatically finding the solutions to puzzles such as sudoku’s, computers can solve these problems faster and often better than humans can. On the other hand,...
article 2019
document
Verriet, J. (author), Buit, L. (author), Doornbos, R. (author), Huijbrechts, B. (author), Sevo, K. (author), Sleuters, J. (author), Verberkt, M. (author)
IoT applications and other distributed control applications are characterized by the interaction of many hardware and software components. The inherent complexity of the distributed functionality introduces challenges on the detection and correction of issues related to functionality or performance, which are only possible to do after system...
conference paper 2019
document
Yang, N. (author), Aslam, K. (author), Schiffelers, R. (author), Lensink, L. (author), Hendriks, D. (author), Cleophas, L. (author), Serebrenik, A. (author)
Inferring behavioral models (e.g., state machines) of software systems is an important element of re-engineering activities. Model inference techniques can be categorized as active or passive learning, constructing models by (dynamically) interacting with systems or (statically) analyzing traces, respectively. Application of those techniques in...
conference paper 2019
document
de Boer, M.H.T. (author), Verhoosel, J.P.C. (author)
The manual creation of an ontology is a tedious task. In the field of ontology learning, Natural Language Processing (NLP) techniques are used to automatically create ontologies. In this paper, we present a methodology using data-driven techniques to create ontologies from unstructured documents in the agriculture domain. We use state-of-the-art...
conference paper 2019
document
Quantumfysica is voor gewone stervelingen een ongrijpbaar fenomeen. Toch weten knappe koppen het te vertalen naar quantumtechnologie die de belofte van concrete ‘gamechanging’ toepassingen in zich heeft. Het Delftse onderzoeksinstituut QuTech ontwikkelt er demonstrators voor. Zo heeft de toekomstige quantumcomputer een ongelooflijke...
article 2019
document
van Lieshout, M.J. (author), Timan, T. (author), Karanikolova, K. (author), Chen, T.M. (author), Jansen, S.T.H. (author), Snijders, R. (author), Brouwer, R. (author), Tejada Ruiz, A. (author), van Montfort, S. (author), Bolchi, M. (author), Suardi, S. (author), Kirova, M. (author), Castenco, P. (author), Bertolini, A. (author), Episcopo, F. (author), Alberti, S. (author), Palmerini, E. (author)
As part of the ‘Study on Safety of non-embedded software’ TNO, VVA, and SSSA analysed the legal and business landscape and the challenges and opportunities related to new advanced technologies associated with digitisation and AI. The team studied: The safety of non-embedded software by gathering evidence and analysing the key risks, focusing on...
report 2019
document
Grappiolo, C. (author), Verwielen, E. (author), Noorman, N. (author)
Connected high-tech systems allow the gathering of operational data at unprecedented volumes. A direct benefit of this is the possibility to extract usage models, that is, a generic representations of how such systems are used in their field of application. Usage models are extremely important, as they can help in understanding the discrepancies...
conference paper 2019
document
Mack, A. (author), Joshi, H. (author), Belfroid, S.P.C. (author)
The present paper focusses on the numerical rebuilding of different multiphase flow regimes in a medium scale pipe system (6 inch). Principal investigations are performed by CFD to initiate hydro-dynamic instabilities and develop them into the correct flow pattern (slug, stratified, etc.) at a given downwind position without applying artificial...
article 2018
document
Nouwt, B. (author), Verhoosel, J. (author)
conference paper 2018
document
Verriet, J. (author), Sleuters, J. (author), Doornbos, R. (author)
article 2018
document
van Diggelen, J. (author), van den Broek, J. (author), Schraagen, J.M.C. (author), van der Waa, J.S. (author)
This paper proposes a human-centered approach to Dynamic Position-ing systems which combines multiple technologies in an intelligent operator sup-port system (IOSS). IOSS allows the operator to be roaming and do other tasks in quiet conditions. When conditions become more demanding, the IOSS calls the operator to return to his bridge position....
conference paper 2018
document
Vasenev, A. (author)
Partial Networking, as a mechanism for moving-to-sleep and waking-up embedded systems, is beneficial for saving energy within a vehicle (or within other complex distributed systems). Even though a number of models exist which identify benefits of partial networking, they often address rather specific cases. Moreover, these fragmented efforts do...
conference paper 2018
document
van Adrichem, N.L.M. (author), Panneman, J.J. (author), van Deventer, M.O. (author)
Blockchains or blockchain technology (BCT) are technologies based on peer-to-peer cryptographic functions in a fully distributed architecture. The scalability of blockchains is threatened by the suboptimality of its data exchange model, due to the fact that most data is exchanged redundantly many times. Blockchain scalability is a widely...
public lecture 2018
document
Overduin, R. (author), Pais, A.V. (author), Zhang, H. (author)
Om overzicht te bieden in het speelveld van de diverse draadloze technologieën, stelt TNO al een aantal jaar een Monitor Draadloze Technologie samen. Hierin worden de ontwikkelingen in de technologie en de markt gevolgd. Met de Monitor Draadloze Technologie wil TNO een degelijk, actueel en toegankelijk overzicht bieden van de stand van zaken ten...
report 2018
document
Hendriks, M. (author), Basten, A.A. (author)
article 2018
document
van der Kleij, R. (author)
Onlangs is het lectoraat 'Cybersecurity in het mkb' gestart aan de Haagse Hogeschool. De focus van het lectoraat ligt op de human factor in cybersecurity. Het doel van dit lectoraat is om de kennispositie van het mkb op het gebied van cybercrime en cybersecurity te vergoten om zo het slachtofferschap en de impact van cyberaanvallen onder mkb’ers...
article 2018
document
Grappiolo, C. (author), Verhoosel, J. (author), van Gerwen, E. (author), Somers, L. (author)
The booming popularity of data science is also affecting high-tech industries. However, since these usually have different core competencies — building cyber-physical systems rather than e.g. machine learning or data mining algorithms — delving into data science by domain experts such as system engineers or architects might be more cumbersome...
conference paper 2018
document
van Deventer, M.O. (author)
Proefprojecten met blockchains, die minder bureaucratie en een betere dienstverlening beloven, schieten in Nederland als paddenstoelen uit de grond. Daarom is het hoog tijd om werk te maken van een goede onderliggende infrastructuur, zegt TNO-onderzoeker Oskar van Deventer.
article 2018
document
van den Berg, F. (author), Hooman, J. (author), Haverkort, B.R. (author)
This tool paper presents iDSL, a language and a fully automated toolchain for evaluating the performance of service-oriented systems. In this work, we emphasize the use of a high-level domain specific language that is tailored to be understood by system designers and domain experts, a transformation into an underlying process algebra which...
conference paper 2018
document
Raaijmakers, S. (author), Brewster, C. (author)
conference paper 2018
Searched for:
(1 - 20 of 1,186)

Pages