Searched for: mods_originInfo_publisher_s%3A%22Association%255C%2Bfor%255C%2BComputing%255C%2BMachinery%22
(1 - 20 of 42)

Pages

document
Peysakhovich, V. (author), Ledegang, W. (author), Houben, M. (author), Groen, E. (author)
Eye movements analysis has great potential for understanding operator behaviour in many safety-critical domains, including aviation. In addition to traditional eye-tracking measures on pilots’ visual behavior, it seems promising to incorporate machine learning approaches to classify pilots’ visual scanning patterns. However, given the multitude...
conference paper 2022
document
Adhikari, A. (author), Wenink, E. (author), van der Waa, J.S. (author), Bouter, C.A. (author), Tolios, I. (author), Raaijmakers, S.A. (author)
Several useful taxonomies have been published that survey the eXplainable AI (XAI) research field. However, these taxonomies typically do not show the relation between XAI solutions and several use case aspects, such as the explanation goal or the task context. In order to better connect the field of XAI research with concrete use cases and user...
conference paper 2022
document
Kurchaba, S. (author), van Vliet, J. (author), Meulman, J.J. (author), Verbeek, F.J. (author), Veenman, C.J. (author)
conference paper 2021
document
Abspoel, M. (author), Attema, T. (author), Rambaud, M. (author)
We consider consensus protocols in the model that is most commonly considered for use in state machine replication, as initiated by Dwork-Lynch-Stockmeyer, then by Castro-Liskov in 1999 with “PBFT”. Such protocols guarantee, assuming n players out of which t < n/3 are maliciously corrupted, that the honest players output the same valid value...
conference paper 2021
document
Müller, M. (author), de Jong, J. (author), van Heesch, M.P.P. (author), Overeinder, B. (author), van Rijswijk-Deij, R. (author)
article 2020
document
Riva, G.M. (author), Vasenev, A. (author), Zannone, N. (author)
The processing of personal data is becoming a key business factor, especially for high-tech system industries such as automotive and healthcare service providers. To protect such data, the European Union (EU) has introduced the General Data Protection Regulation (GDPR), with the aim to standardize and strengthen data protection policies across...
conference paper 2020
document
Mohammadi, M. (author), Hofman, W.J. (author), Tan, Y.H. (author)
Ontology alignment is a fundamental task to reconcile the heterogeneity among various information systems using distinct information sources. The evolutionary algorithms (EAs) have been already considered as the primary strategy to develop an ontology alignment system. However, such systems have two significant drawbacks: they either need a...
article 2019
document
Hussain, I. (author), Bletsas, K. (author), Awan, M.A. (author), Akesson, B. (author), Souto, P.F. (author), Tovar, E. (author)
The well-known model of Vestal aims to avoid excessive pessimism in the quantification of the processing requirements of mixed-criticality systems, while still guaranteeing the timeliness of higher-criticality functions. This can bring important savings in system costs, and indirectly help meet size, weight and power constraints. This efficiency...
conference paper 2019
document
Medina, R. (author), Valencia, J. (author), Stuijk, S. (author), Goswami, D. (author), Basten, T. (author)
Pipelined image-based control uses parallel instances of its image-processing algorithm in a pipelined fashion to improve the quality of control. A performance-oriented control design improves the controller settling time with each additional processing resource, which creates a resources-performance trade-off. In real-life applications, it is...
article 2019
document
Awan, M.A. (author), Bletsas, K. (author), Souto, P.F. (author), Akesson, B. (author), Tovar, E. (author)
In mixed-criticality systems, tasks of different criticality share system resources, mainly to reduce cost. Cost is further reduced by using adaptive mode-based scheduling arrangements, such as Vestal's model, to improve resource efficiency, while guaranteeing schedulability of critical functionality. To simplify safety certification, servers...
conference paper 2019
document
Peters, R. (author), Oleari, E. (author), Sardu, F. (author), Neerincx, M.A. (author)
Children will only benefit from educational technologies and e-coaches when they understand the long-term consequences and are (intrinsically) motivated to use these support systems. This paper presents an Objective Dashboard that integrates educational achievements, goals and tasks with gamification features (such as challenges, scores and...
conference paper 2019
document
Janssen, R. (author), Tretmans, J. (author)
A well-known conformance relation for model-based testing is ioco. A conformance relation expresses when an implementation is correct with respect to a specification. Unlike many other conformance and refinement relations, ioco has different domains for implementations and for specifications. Consequently, ioco is neither reflexive nor...
conference paper 2019
document
Masin, M. (author), Palumbo, F. (author), Adriaanse, J. (author), Myrhaug, H. (author), Regazzoni, F. (author), Sanchez, M. (author), Zedda, K. (author)
Technical Requirements (TRs) provide a “black box” conceptualization of the target project results with explicit verification tests. The goal of Technical Requirements Elicitation (TRE) is to ensure that all needs of involved stakeholders are being identified and adequately addressed without prescribing how to achieve them. Whilst TRE...
conference paper 2019
document
Wilschut, E.S. (author), van Rhijn, G.J.W. (author), Konemann, R. (author), Bosch, T. (author), Murphy, M.S. (author)
Augmented Reality (AR) as an assistive technology is a promising tool for novice operators to learn assembly processes. This experiment compared an AR instruction method to display based electronic working instructions (EWI) for product assembly, to assess learning during the first repetitions of the products. In addition, two types of work...
conference paper 2019
document
Rosa, N. (author), Veltkamp, R.C. (author), Hurst, W. (author), Nijboer, T. (author), Gilbers, C. (author), Werkhoven, P. (author)
The classic rubber hand illusion (RHI) experiment studies the sense of embodiment over a fake limb. Distinguished subcomponents of embodiment are ownership (sense of self-attribution of a body), agency (sense of having motor control), and self-location (the spatial experience of being inside a body), and are typically evoked in either reality or...
article 2019
document
Sioutas, S. (author), Stuijk, S. (author), Waeijen, L. (author), Basten, T. (author), Corporaal, H. (author), Somers, L. (author)
Efficient code generation for image processing applications continues to pose a challenge in a domain where high performance is often necessary to meet real-time constraints. The inherently complex structure found in most image-processing pipelines, the plethora of transformations that can be applied to optimize the performance of an...
article 2019
document
Ara, H.A. (author), Behrouzian, A. (author), Hendriks, M. (author), Geilen, M. (author), Goswami, D. (author), Basten, T. (author)
Multi-scale dataflow models have actors acting at multiple granularity levels, e.g., a dataflow model of a video processing application with operations on frame, line, and pixel level. The state of the art timing analysis methods for both static and dynamic dataflow types aggregate the behaviours across all granularity levels into one, often...
article 2018
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
Tavakoli, R. (author), Nabi, M. (author), Basten, T. (author), Goossens, K. (author)
IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) aims to improve communication reliability in Wireless Sensor Networks (WSNs) by reducing the impact of the medium access contention, multipath fading, and blocking of wireless links. While TSCH outperforms single-channel communications, cross-technology interference on the license-free ISM bands...
article 2018
document
Werkhoven, P. (author), Kester, L. (author), Neerincx, M. (author)
Recent progress in Artificial Intelligence, sensing and network technology, robotics, and (cloud) computing has enabled the development of intelligent autonomous machine systems. Telling such autonomous systems "what to do" in a responsible way, is a non-trivial task. For intelligent autonomous machines to function in human society and...
conference paper 2018
Searched for: mods_originInfo_publisher_s%3A%22Association%255C%2Bfor%255C%2BComputing%255C%2BMachinery%22
(1 - 20 of 42)

Pages