- document
-
Sayyari, Y. (author), Molaei, M. (author), Moghayer, S.M. (author)The category of metric spaces is a subcategory of quasi-metric spaces. In this paper the notion of entropy for the continuous maps of a quasi-metric space is extended via spanning and separated sets. Moreover, two metric spaces that are associated to a given quasi-metric space are introduced and the entropy of a map of a given quasi-metric space...article 2015
- document
-
Phillipson, F. (author), van den Brink, R.F.M. (author)A next step in bringing high bandwidth over an existing copper infrastructure is Fibre to the Curb, using G.Fast, which prevents a huge investment compared to a full fibre roll out. To save additional costs in this roll out, the existing copper can be reused as backhaul for the new active point of G.Fast, where currently mostly a fibre backhaul...conference paper 2015
- document
-
Počta, P. (author), Beerends, J.G. (author)This paper investigates the impact of different telephone channels, represented by impairments as introduced by modern telecommunication networks (e.g. speech coding, bandwidth limitation, packet loss, etc.), on the intelligibility of synthesized speech. Both subjective and objective assessments are used. Two different speech intelligibility...article 2015
- document
- te Brake, G.M. (author), Kranenborg, K. (author) report 2015
- document
-
Phillipson, F. (author), Bastings, I.C.L. (author), Vink, N. (author)In this paper a Bayes model to quantify the effects of a passive CBRN defence system is presented. The model gives insight in the way of the mutual influence of all the elements of passive CBRN defence, by the use of detailed scenario analysis, sensitivity analysis and root cause analysis. This can help in conducting evaluation studies for...conference paper 2015
- document
-
Piscitelli, R. (author), Bhasin, S. (author), Regazzoni, F. (author)Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide the level of details needed to assert the...conference paper 2015
- document
-
Olsthoorn, P. (author)Snoeihard uit journalist Brenno de Winter zijn commentaar op sprekers over privacy tijdens het NLIGF congres 2015. Hij zet Bart Schermer, adviseur van bedrijven en organisaties in de hoek. Die heeft net betoogd dat privacy geen juk (‘korvee’) mag vormen maar inzet moet zijn van innovatie door bedrijven. Snel riposteert hij op Brenno’s aanval: ...article 2015
- document
-
Nguyen, D. (author), van den Broek, T.A. (author), Hauff, C. (author), Hiemstra, D. (author), Ehrenhard, M.L. (author)We consider the task of automatically identifying participants’ motivations in the public health campaign Movember and investigate the impact of the different motivations on the amount of campaign donations raised. Our classification scheme is based on the Social Identity Model of Collective Action (van Zomeren et al., 2008). We find that...conference paper 2015
- document
-
Kempker, P.L. (author), Ran, A.C.M. (author), van Schuppen, J.H. (author)Coordinated linear systems are a special class of hierarchical linear systems, with a strict top-to-bottom information structure. The LQ problem over all structure-preserving static state feedbacks is discussed. The overall control problem separates into conditionally independent subproblems, a numerical approach to their solution is derived,...bookPart 2015
- document
- de Roo, G. (author), van der Weerdt, C.A. (author), Vonder, M. (author) conference paper 2015
- document
- Brandt, P. (author), Rietkerk, O.D. (author), van Bekkum, M.A. (author), Stroetman, K. (author), Rijken, M. (author) conference paper 2015
- document
- Over, P. (author), Fiscus, J. (author), Joy, D. (author), Michel, M. (author), Awad, G. (author), Kraaij, W. (author), Smeaton, A.F. (author), Quénot, G. (author), Ordelman, R. (author) conference paper 2015
- document
-
Verberne, S. (author), Sappelli, M. (author), Järvelin, K. (author), Kraaij, W. (author)In this paper, we address the question “what is the influence of user search behaviour on the effectiveness of personalized query suggestion?”. We implemented a method for query suggestion that generates candidate follow-up queries from the documents clicked by the user. This is a potentially effective method for query suggestion, but it heavily...conference paper 2015
- document
-
Steen, M.G.D. (author)Contemporary design practices, such as participatory design (PD), human-centered design (HCD), and codesign, have inherent ethical qualities, which often remain implicit and unexamined. Three design projects in the high-tech industry were studied using three ethical traditions as lenses. Virtue ethics helped to understand cooperation, curiosity,...article 2015
- document
-
Thomas, E.D.R. (author), van Deventer, M.O. (author), Stockhammer, T. (author), Begen, A.C. (author), Famaey, J. (author)MPEG DASH provides formats that are suitable to stream media content over HTTP. Typically, the DASH client adaptively requests small chunks of media based on the available bandwidth and other resources. This client-pull technology has proven to be more flexible, firewall-friendly and CDN-scalable than server-push technologies. However, service...article 2015
- document
-
Folmer, E.J.A. (author), Krukkert, D. (author)Interoperability is of major importance in B2B environments. Starting with EDI in the ‘80s, currently interoperability relies heavily on XMLbased standards. Although having great impact, still issues remain to be solved for improving B2B interoperability. These issues include lack of dynamics, cost of implementations, adoption and cross-industry...conference paper 2015
- document
-
Schuts, M. (author), Hooman, J. (author)To improve the design of a power control unit at Philips, two Domain Specific Languages (DSLs) have been used. The first DSL provides a concise and readable notation for the essential state transitions. It is used to generate both configuration files and analysis models. In addition, we also generate instances of a second DSL which represents...conference paper 2015
- document
-
Simpson, S. (author), Mu, M. (author), Niamut, O.A. (author), Taal, J. (author), Race, N. (author)Audio-visual narratives are becoming the most popular medium for information sharing and social storytelling around a live event. This paper explores the collective experience of users of an online creative storytelling ecosystem. The system provides an ideal platform to study community-driven story co-authoring helped by social networks and...conference paper 2015
- document
-
Tavakoli, R. (author), Nabi, M. (author), Basten, T. (author), Goossens, K. (author)Cross-technology interference on the license-free ISM bands has a major negative effect on the performance of Wireless Sensor Networks (WSNs). Channel hopping has been adopted in the Time-Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4e to eliminate blocking of wireless links caused by external interference on some frequency channels. This...conference paper 2015
- document
-
NOWADAYS DATA IS EVERYWHERE AND IT IS RAPIDLY BECOMING BUSINESS’ BIGGEST RESOURCE. THROUGH NUMEROUS SYSTEMS AND DEVICES, A HUGE AMOUNT OF DATA CAN BE COLLECTED. JUST THINK OF THE MANY SENSOR SYSTEMS, SUCH AS SURVEILLANCE CAMERAS, LOOPS IN THE ROAD, SMARTPHONES OR THE DIGITAL MARKERS WE CREATE OURSELVES BY POSTING PHOTOS ON FACEBOOK OR COMMENTS...book 2015