Searched for: subject%3A%22Algorithm%22
(1 - 20 of 331)

Pages

document
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)
Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...
conference paper 2022
document
He, Y. (author), Coutino, M. (author), Isufi, E. (author), Leus, G. (author)
In this work, we focus on partitioning dynamic graphs with two types of nodes (bi-colored), though not necessarily bipartite graphs. They commonly appear in communication network applications, e.g., one color being base stations, the other users, and the dynamic process being the varying connection status between base stations and moving users....
conference paper 2022
document
Doulgerakis, E. (author), Laarhoven, T. (author), de Weger, B. (author)
The main idea behind lattice sieving algorithms is to reduce a sufficiently large number of lattice vectors with each other so that a set of short enough vectors is obtained. It is therefore natural to study vectors which cannot be reduced. In this work we give a concrete definition of an irreducible vector and study the properties of the set of...
article 2022
document
Albers, N. (author), Neerincx, M.A. (author), Brinkman, W.P. (author)
Behavior change applications often assign their users activities such as tracking the number of smoked cigarettes or planning a running route. To help a user complete these activities, an application can persuade them in many ways. For example, it may help the user create a plan or mention the experience of peers. Intuitively, the application...
article 2022
document
Rasheed, M.B. (author), Rodriguez Moreno, M.D. (author)
This paper considers the time of use (TOU) pricing scheme to propose a consumer aware pricing policy (CAPP), where each customer receives a separate electricity pricing signal. These pricing signals are obtained based on individualized load demand patterns to optimally manage the flexible load demand. The main objective of CAPP is to reduce the...
article 2022
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author)
article 2022
document
Burghouts, G.J. (author), Huizinga, W. (author)
Visual Question Answering (VQA) is a very interesting tech nique to answer natural language questions about an image. Recent methods have focused on incorporating knowledge into an improved VQA model, by augmenting the training set, representing scene graphs, or including reasoning. We also leverage knowledge to make VQA more robust. Yet we take...
conference paper 2022
document
Hayes, P. (author), van de Poel, I. (author), Steen, M. (author)
Algorithms and AI tools are becoming increasingly influential artefacts in commercial and governance contexts. Algorithms and AI tools are not value neutral; to some extent they must be rendered knowable and known as objects, and in their implementation and deployment, to see clearly and understand their implications for moral values, and what...
article 2022
document
Steen, M. (author), van Diggelen, J. (author), Timan, T. (author)
We used two ideas from cybernetics—the sociotechnical system and the feedback loop—to explore ways to deal with some current challenges in the design and application of AI systems, e.g., in Human-Machine Teaming and Algorithmic Decision Making. As thought experiments, we envisioned two ‘cybernetic’ systems. Our goal is to explore the usefulness...
conference paper 2022
document
Eledlebi, K. (author), Ruta, D. (author), Hildmann, H. (author), Saffre, F. (author), al Hammadi, Y. (author), Isakovic, A.F. (author)
When deploying a wireless sensor network (WSN) identifying optimal locations for the nodes is challenging, especially so if the environment is either (i) unknown or (ii) obstacle-rich. We proposes BISON (Bio-Inspired Self-Organizing Network), a variant of the Voronoi algorithm to address this challenge. Among the features of the approach are the...
article 2022
document
de Gijsel, S.L. (author), Vijn, A.R.P.J. (author), Tan, R.G. (author)
This paper proposes an algorithm to localize a magnetic dipole using a limited number of noisy measurements from magnetic field sensors. The algorithm is based on the theory of compressed sensing, and exploits the sparseness of the magnetic dipole in space. Beforehand, a basis consisting of magnetic dipole fields belonging to individual dipoles...
article 2022
document
Attema, T. (author), Cascudo, I. (author), Cramer, R. (author), Damgård, I. (author), Escudero, D. (author)
Compressed Sigma -Protocol Theory (CRYPTO 2020) presents an “alternative” to Bulletproofs that achieves the same communication complexity while adhering more elegantly to existing Sigma -protocol theory, which enables their techniques to be directly applicable to other widely used settings in the context of “plug & play” algorithmics....
conference paper 2022
document
Fratric, P. (author), Sileno, G. (author), van Engers, T. (author), Klous, S. (author)
The financial sector continues to experience wide digitalization; the resulting transactional activity creates large amounts of data, in principle enabling public and private actors to better understand the social domain they operate on, possibly facilitating the design of interventions to reduce illegal activity. However, the adversarial nature...
conference paper 2022
document
Paardekooper, J.P. (author), Comi, M. (author), Grappiolo, C. (author), Snijders, R. (author), van Vught, W. (author), Beekelaar, R. (author)
An increasing number of tasks is being taken over from the human driver as automated driving technology is developed. Accidents have been reported in situations where the automated driving technology was not able to function according to specifications. As data-driven Artificial Intelligence (AI) systems are becoming more ubiquitous in automated...
conference paper 2021
document
Phillipson, F. (author), Bhatia, H.S. (author)
conference paper 2021
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
Neumann, N.M.P. (author)
conference paper 2021
document
Tirpitz, J.L. (author), Frieß, U. (author), Hendrick, F. (author), Alberti, C. (author), Allaart, M. (author), Apituley, A. (author), Bais, A. (author), Beirle, S. (author), Berkhout, S. (author), Bognar, K. (author), Bösch, T. (author), Bruchkouski, I. (author), Cede, A. (author), Chan, K.L. (author), den Hoed, M. (author), Donner, S. (author), Drosoglou, T. (author), Fayt, C. (author), Friedrich, M.M. (author), Frumau, A. (author), Gast, L. (author), Gielen, C. (author), Gomez-Martín, L. (author), Hao, N. (author), Hensen, A. (author), Henzing, B. (author), Hermans, C. (author), Jin, J. (author), Kreher, K. (author), Kuhn, J. (author), Lampel, J. (author), Li, A. (author), Liu, C. (author), Liu, H. (author), Ma, J. (author), Merlaud, A. (author), Peters, E. (author), Pinardi, G. (author), Piters, A. (author), Platt, U. (author), Puentedura, O. (author), Richter, A. (author), Schmitt, S. (author), Spinei, E. (author), stein Zweers, D. (author), Strong, K. (author), Swart, D. (author), Tack, F. (author), Tiefengraber, M. (author), van der Hoff, R. (author), van Roozendael, M. (author), Vlemmix, T. (author), Vonk, J. (author), Wagner, T. (author), Wang, Y. (author), Wang, Z. (author), Wenig, M. (author), Wiegner, M. (author), Wittrock, F. (author), Xie, P. (author), Xing, C. (author), Xu, J. (author), Yela, M. (author), Zhang, C. (author), Zhao, X. (author)
The second Cabauw Intercomparison of Nitrogen Dioxide measuring Instruments (CINDI-2) took place in Cabauw (the Netherlands) in September 2016 with the aim of assessing the consistency of multi-axis differential optical absorption spectroscopy (MAX-DOAS) measurements of tropospheric species (NO2, HCHO, O3, HONO, CHOCHO and O4). This was achieved...
article 2021
document
Bornet, A. (author), Doerig, A. (author), Herzog, M.H. (author), Francis, G. (author), van der Burg, E. (author)
In crowding, perception of a target deteriorates in the presence of nearby flankers. Traditionally, it is thought that visual crowding obeys Bouma's law, i.e., all elements within a certain distance interfere with the target, and that adding more elements always leads to stronger crowding. Crowding is predominantly studied using sparse displays ...
article 2021
document
Safari, M. (author), Oortwijn, W. (author), Huisman, M. (author)
Many real-world problems such as internet routing are actually graph problems. To develop efficient solutions to such problems, more and more parallel graph algorithms are proposed. This paper discusses the mechanized verification of a commonly used parallel graph algorithm, namely the Bellman–Ford algorithm, which provides an inherently...
conference paper 2021
Searched for: subject%3A%22Algorithm%22
(1 - 20 of 331)

Pages