Searched for: mods_originInfo_publisher_s%3A%22Springer%255C%2BScience%255C%2Band%255C%2BBusiness%255C%2BMedia%255C%2BDeutschland%255C%2BGmbH%22
(1 - 20 of 28)

Pages

document
Verdenius, S.A. (author), Bronkhorst, A.J. (author), Geurts, C.P.W. (author)
The new cable-stayed arch bridge Tegenbosch (Eindhoven, the Netherlands) needed an assessment of its dynamic behaviour under wind loading due to its slender design. Because of wind-induced vibration issues on a number of bridges in the Netherlands with similar designs, it was decided to examine if vortex excitation, wind-rain induced vibration,...
conference paper 2023
document
Bronkhorst, A.J. (author), Moretti, D. (author), Geurts, C.P.W. (author)
This paper describes the application of the Frequency Domain Decomposition (FDD) technique on measured acceleration data on the residential tower New Orleans in Rotterdam, the Netherlands. The goal of this study is to determine and analyse multiple natural frequencies and mode shapes of this tower. A measurement campaign was setup on the 158 m...
conference paper 2023
document
Lapperre, R.E. (author), Bense, V.F. (author), Kasse, C. (author), van Balen, R.T. (author)
Faults in the Roer Valley Rift System (Netherlands, Belgium, and Germany) act as barriers to lateral groundwater flow in unconsolidated sedimentary aquifers. This causes a cross-fault groundwater-level step of up to several metres. Using a dataset obtained through 5 years of high-frequency monitoring, the effect of fault-zone permeability,...
article 2022
document
de Bruin, G.J. (author), Pereira Barata, A. (author), van den Herik, H.J. (author), Takes, F.W. (author), Veenman, C.J. (author)
article 2022
document
Bigaj - Van Vliet, A.J. (author), Allaix, D.L. (author), Kohler, D. (author), Scibilia, E. (author)
This contribution is outlining the vision and approach developed in the IM-SAFE project towards the standardisation of monitoring, data-informed safety assessment and predictive maintenance policies of bridges and tunnels considering the integration of digital innovations and reports on the initial activity in the IM-SAFE project [1] that is...
conference paper 2022
document
Oosterman, D.T. (author), Langenkamp, W.H. (author), van Bergen, E.L. (author)
In this paper we describe our initial findings on a method for improving anomaly detection on a dataset with scarcely labeled data, based on an ongoing use-case with the Belgian Customs Administration (BCA). Data on shipping containers is used to predict the level of risk associated with a shipment, as well as the probability that the shipment...
conference paper 2022
document
Burghouts, G.J. (author), Kruithof, M.C. (author), Huizinga, W. (author), Schutte, K. (author)
Learning object detection models with a few labels, is possible due to ingenious few-shot techniques, and due to clever selection of images to be labeled. Few-shot techniques work with as few as 1 to 10 randomized labels per object class. We are curious if performance of randomized label selection can be improved by selecting 1 to 10 labels per...
conference paper 2022
document
Burghouts, G.J. (author), Huizinga, W. (author)
Visual Question Answering (VQA) is a very interesting tech nique to answer natural language questions about an image. Recent methods have focused on incorporating knowledge into an improved VQA model, by augmenting the training set, representing scene graphs, or including reasoning. We also leverage knowledge to make VQA more robust. Yet we take...
conference paper 2022
document
Laveaux, M. (author), Wesselink, W. (author), Willemse, T.A.C. (author)
conference paper 2022
document
Attema, T. (author), Dunning, V.A. (author), Everts, M. (author), Langenkamp, P. (author)
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficient protocols with covert security and public verifiability in the honest majority setting. Our compiler works for protocols with any number of parties > 2 and treats the passively secure protocol in a black-box manner. In multi-party computation ...
conference paper 2022
document
Wezeman, R.S. (author), Chiscop, I. (author), Anitori, L. (author), van Rossum, W.L. (author)
Compressive sensing is a signal processing technique used to acquire and reconstruct sparse signals using significantly fewer measurement samples. Compressive sensing requires finding the most sparse solution to an underdetermined linear system, which is an NP-hard problem and as a consequence in practise is only solved approximately. In our...
conference paper 2022
document
Hendriks, D. (author), van der Meer, A. (author), Oortwijn, W. (author)
Software-intensive systems constantly evolve. To prevent software changes from unintentionally introducing costly system defects, it is important to understand their impact to reduce risk. However, it is in practice nearly impossible to foresee the full impact of software changes when dealing with huge industrial systems with many configurations...
conference paper 2022
document
Hopman, M. (author), Fransen, R. (author), van Meijeren, J. (author), Zubin, I. (author)
Developments on digitalisation and automation in transport and logistics create new possibilities in the organisation of supply chains. New technologies can disrupt existing control structures, establish new forms of control and improve the efficiency and flexibility of operations. This paper provides a framework to analyse the trade-offs and...
conference paper 2022
document
Dams, D. (author), Havelund, K. (author), Kauffman, S. (author)
We present a Python library for trace analysis named PyContract. PyContract is a shallow internal DSL, in contrast to many trace analysis tools that implement external or deep internal DSLs. The library has been used in a project for analysis of logs from NASA’s Europa Clipper mission. We describe our design choices, explain the API via examples...
conference paper 2022
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
Phillipson, F. (author), Chiscop, I. (author)
conference paper 2021
document
Neumann, N.M.P. (author)
conference paper 2021
document
Alvarez, C.M. (author), Ligthart, T. (author)
PurposeThis literature review aims to present the current methodologies that have been developed to perform a social life cycle assessment (sLCA) and to display the main differences among them. In addition to that, to identify the nexus between sLCA and circular economy (CE) and to what extent this life cycle technique has been involved within...
article 2021
document
Wetzels, F. (author), van den Berg, J.L. (author), van der Mei, R. (author)
This paper is motivated by recent developments in SDN and NFV whereby service functions, distributed over a centralised controlled network, are connected to form a service function chain (SFC). Upon arrival of a new service request a decision has to be made to which one of SFCs the request must be routed. This decision is based on (1) actual...
conference paper 2021
document
Kebede, M.G. (author), Sileno, G. (author), van Engers, T. (author)
Rights expression languages (RELs) aim to express and govern legally binding behavior within technological environments. The Open Digital Rights Language (ODRL), used to represent statements about the usage of digital assets, is among the most known RELs today and has become a W3C recommendation to enhance the web’s functionality and...
conference paper 2021
Searched for: mods_originInfo_publisher_s%3A%22Springer%255C%2BScience%255C%2Band%255C%2BBusiness%255C%2BMedia%255C%2BDeutschland%255C%2BGmbH%22
(1 - 20 of 28)

Pages