Searched for: +
(101 - 120 of 907)

Pages

document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
van der Veen, J.S. (author), van der Waaij, B.D. (author), Lazovik, E. (author), Wijbrandi, W.E. (author), Meijer, R.J. (author)
Stream processing platforms allow applications to analyse incoming data continuously. Several use cases exist that make use of these capabilities, ranging from monitoring of physical infrastructures to pre selecting video surveillance feeds for human inspection. It is difficult to predict how much computing resources are needed for these stream...
conference paper 2015
document
Van Den Berg, Freek (author), Hooman, Jozef (author), Hartmanns, Arnd (author), Haverkort, Boudewijn R. (author), Remke, Anne (author)
System designers need to have insight in the response times of service systems to see if they meet performance requirements. We present a high-level evaluation technique to obtain the distribution of services completion times. It is based on a high-level domain-specific language that hides the underlying technicalities from the system designer....
bookPart 2015
document
Geilen, M. (author), Falk, J. (author), Haubelt, C. (author), Basten, T. (author), Theelen, B. (author), Stuijk, S. (author)
The timed dataflow model of computation is a useful performance analysis tool for Electronic System Level Design automation and embedded software synthesis. Its determinism gives it strong analysability properties. It is expressive enough to cover a large class of applications and platforms. The trend however, in both embedded applications and...
conference paper 2015
document
Hoffmann, H. (author), Ramachandra, P. (author), Kovacs, I.Z. (author), Jorguseski, L. (author), Gunnarsson, F. (author), Kurner, T. (author)
In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic (i.e. the requested traffic from the users)...
article 2015
document
Borth, M. (author)
Smart system of systems adapt to their context, current situation, and configuration. To engineer such systems’ behavior, we need to design and eval-uate system-level control strategies and the intelligent management of key scenarios. We propose a model-based approach called probabilistic system summaries to explore related design choices, e.g.,...
bookPart 2015
document
Voronov, A. (author), Englund, C. (author), Bengtsson, H.H. (author), Chen, L. (author), Ploeg, J. (author), de Jongh, J.F.C.M. (author), van de Sluis, H.J.D. (author)
This paper presents the architecture of an Interactive Test Tool (ITT) for interoperability testing of Cooperative Intelligent Transport Systems (C-ITS). Cooperative systems are developed by different manufacturers at different locations, which makes interoperability testing a tedious task. Up until now, interoperability testing is performed...
conference paper 2015
document
Mooij, A.J. (author), Eggen, G. (author), Hooman, J. (author), van Wezep, H. (author)
Software maintenance consumes a significant and increasing proportion of industrial software engineering budgets, only to maintain the existing product functionality. This hinders the development of new innovative features with added value to customers. To make software development efforts more effective, legacy software needs to be rejuvenated...
conference paper 2015
document
van Erp, J.B.F. (author)
ICT met gevoel. Het lijkt een contradictio in terminis. Gevoel is misschien wel het laatste waar u aan denkt bij ICT. Gevoelens oproepen, dat wel. En dan vooral die van boosheid en frustratie. We noemen dat ook wel technology induced anger en op YouTube kunt u daar vermakelijke maar bovenal zeer herkenbare filmpjes over vinden.
public lecture 2015
document
Mu, M. (author), Simpson, S. (author), Race, N. (author), Niamut, O.A. (author), Koot, G. (author), Kaptein, A.M. (author), Taal, J. (author), Mori, L. (author)
An online multimedia storytelling ecosystem comprised of user applications, a collaborative storyauthoring engine, social context integration, and socially aware media services offers a mdium for inormation sharing and social storytelling about live events. User-generated audio-visual content is becoming the most popular medium for information...
article 2015
document
van Veenstra, A.F.E. (author)
report 2015
document
D’Acunto, L. (author), Redi, J. (author), Niamut, O.A. (author)
This paper reports on the evaluation of the concept of interactive camera-based coaching and training (iCaCoT), which focuses on using interactive video navigation for coaching and training purposes. The iCaCoT concept leverages tiled streaming technology, which allows users to navigate freely through high-resolution video feeds while minimising...
conference paper 2015
document
van Manthena, M.P.V. (author), Adrichem, N.L.M. (author), van den Broek, C. (author), Kuipers, F. (author)
Network-as-a-Service (NaaS) is a cloud-based service model that offers on-demand network connectivity and the provisioning and management of network services. However, the actual orchestration of dynamically allocating underlying resources to customer requirements is not trivial. In this paper, we propose an SDN-based approach to support the...
conference paper 2015
document
Steen, M.G.D. (author)
article 2015
document
Friedewald, M. (author), van Lieshout, M. (author), Rung, S. (author), Ooms, M. (author), Ypma, J. (author)
This paper considers the relationship between privacy and security and, in particular, the traditional “trade-off” paradigm that argues that citizens might be willing to sacrifice some privacy for more security. Academics have long argued against the trade-off paradigm, but these arguments have often fallen on deaf ears. Based on data gathered...
bookPart 2015
document
Harbers, M. (author), Detweiler, C. (author), Neerincx, M.A. (author)
Software has become an integral part of our daily lives and should therefore account for human values such as trust, autonomy and privacy. Human values have received increased attention in the field of Requirements Engineering over the last few years, but existing work offers no systematic way to use elicited values in requirements engineering...
conference paper 2015
document
Adyanthaya, S. (author), Geilen, M. (author), Basten, T. (author), Voeten, J. (author), Schiffelers, R. (author)
General purpose platforms are characterized by unpredictable timing behavior. Real-time schedules of tasks on general purpose platforms need to be robust against variations in task execution times. We define robustness in terms of the expected number of tasks that miss deadlines. We present an iterative robust scheduler that produces robust...
conference paper 2015
document
van der Heijden, M. (author), Velikova, M. (author), Lucas, P.J.F. (author)
We are currently confronted with a trend of increased pressure on health care, with associated increasing financial costs, due to an aging society and the expected increase in the prevalence of disability and chronic disease. Finding measures for cost reduction, without sacrificing quality of care, is a significant healthcare challenge....
bookPart 2015
document
Verhoosel, J.P.C. (author), van Bekkum, M.A. (author), van Evert, F.K. (author)
This paper addresses the use of ontologies for combining different sensor data sources to enable big data analysis in the dairy farming domain. We have made existing data sources accessible via linked data RDF mechanisms using OWL ontologies on Virtuoso and D2RQ triple stores. In addition, we have created a common ontology for the domain and...
conference paper 2015
document
Janssen, M. (author), van der Voort, H. (author), van Veenstra, A.F.E. (author)
Many large transformation projects do not result in the outcomes desired or envisioned by the stakeholders. This type of project is characterised by dynamics which are both caused by and result of uncertainties and unexpected behaviour. In this paper a complex adaptive system (CAS) view was adopted in order to better understand project dynamics...
article 2015
Searched for: +
(101 - 120 of 907)

Pages