Searched for: subject%3A%22Algorithms%22
(1 - 20 of 326)

Pages

document
Rasheed, M.B. (author), Rodriguez Moreno, M.D. (author)
This paper considers the time of use (TOU) pricing scheme to propose a consumer aware pricing policy (CAPP), where each customer receives a separate electricity pricing signal. These pricing signals are obtained based on individualized load demand patterns to optimally manage the flexible load demand. The main objective of CAPP is to reduce the...
article 2022
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author)
article 2022
document
Burghouts, G.J. (author), Huizinga, W. (author)
Visual Question Answering (VQA) is a very interesting tech nique to answer natural language questions about an image. Recent methods have focused on incorporating knowledge into an improved VQA model, by augmenting the training set, representing scene graphs, or including reasoning. We also leverage knowledge to make VQA more robust. Yet we take...
conference paper 2022
document
Hayes, P. (author), van de Poel, I. (author), Steen, M. (author)
Algorithms and AI tools are becoming increasingly influential artefacts in commercial and governance contexts. Algorithms and AI tools are not value neutral; to some extent they must be rendered knowable and known as objects, and in their implementation and deployment, to see clearly and understand their implications for moral values, and what...
article 2022
document
Steen, M. (author), van Diggelen, J. (author), Timan, T. (author)
We used two ideas from cybernetics—the sociotechnical system and the feedback loop—to explore ways to deal with some current challenges in the design and application of AI systems, e.g., in Human-Machine Teaming and Algorithmic Decision Making. As thought experiments, we envisioned two ‘cybernetic’ systems. Our goal is to explore the usefulness...
conference paper 2022
document
Doulgerakis, E. (author), Laarhoven, T. (author), de Weger, B. (author)
The main idea behind lattice sieving algorithms is to reduce a sufficiently large number of lattice vectors with each other so that a set of short enough vectors is obtained. It is therefore natural to study vectors which cannot be reduced. In this work we give a concrete definition of an irreducible vector and study the properties of the set of...
article 2022
document
He, Y. (author), Coutino, M. (author), Isufi, E. (author), Leus, G. (author)
In this work, we focus on partitioning dynamic graphs with two types of nodes (bi-colored), though not necessarily bipartite graphs. They commonly appear in communication network applications, e.g., one color being base stations, the other users, and the dynamic process being the varying connection status between base stations and moving users....
conference paper 2022
document
Paardekooper, J.P. (author), Comi, M. (author), Grappiolo, C. (author), Snijders, R. (author), van Vught, W. (author), Beekelaar, R. (author)
An increasing number of tasks is being taken over from the human driver as automated driving technology is developed. Accidents have been reported in situations where the automated driving technology was not able to function according to specifications. As data-driven Artificial Intelligence (AI) systems are becoming more ubiquitous in automated...
conference paper 2021
document
Phillipson, F. (author), Bhatia, H.S. (author)
conference paper 2021
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
Neumann, N.M.P. (author)
conference paper 2021
document
Tirpitz, J.L. (author), Frieß, U. (author), Hendrick, F. (author), Alberti, C. (author), Allaart, M. (author), Apituley, A. (author), Bais, A. (author), Beirle, S. (author), Berkhout, S. (author), Bognar, K. (author), Bösch, T. (author), Bruchkouski, I. (author), Cede, A. (author), Chan, K.L. (author), den Hoed, M. (author), Donner, S. (author), Drosoglou, T. (author), Fayt, C. (author), Friedrich, M.M. (author), Frumau, A. (author), Gast, L. (author), Gielen, C. (author), Gomez-Martín, L. (author), Hao, N. (author), Hensen, A. (author), Henzing, B. (author), Hermans, C. (author), Jin, J. (author), Kreher, K. (author), Kuhn, J. (author), Lampel, J. (author), Li, A. (author), Liu, C. (author), Liu, H. (author), Ma, J. (author), Merlaud, A. (author), Peters, E. (author), Pinardi, G. (author), Piters, A. (author), Platt, U. (author), Puentedura, O. (author), Richter, A. (author), Schmitt, S. (author), Spinei, E. (author), stein Zweers, D. (author), Strong, K. (author), Swart, D. (author), Tack, F. (author), Tiefengraber, M. (author), van der Hoff, R. (author), van Roozendael, M. (author), Vlemmix, T. (author), Vonk, J. (author), Wagner, T. (author), Wang, Y. (author), Wang, Z. (author), Wenig, M. (author), Wiegner, M. (author), Wittrock, F. (author), Xie, P. (author), Xing, C. (author), Xu, J. (author), Yela, M. (author), Zhang, C. (author), Zhao, X. (author)
The second Cabauw Intercomparison of Nitrogen Dioxide measuring Instruments (CINDI-2) took place in Cabauw (the Netherlands) in September 2016 with the aim of assessing the consistency of multi-axis differential optical absorption spectroscopy (MAX-DOAS) measurements of tropospheric species (NO2, HCHO, O3, HONO, CHOCHO and O4). This was achieved...
article 2021
document
Steen, M. (author), Timan, T. (author), van de Poel, I. (author)
The collection and use of personal data on citizens in the design and deployment of algorithms in the domain of justice and security is a sensitive topic. Values like fairness, autonomy, privacy, accuracy, transparency and property are at stake. Negative examples of algorithms that propagate or exacerbate biases, inequalities or injustices have...
article 2021
document
Bornet, A. (author), Doerig, A. (author), Herzog, M.H. (author), Francis, G. (author), van der Burg, E. (author)
In crowding, perception of a target deteriorates in the presence of nearby flankers. Traditionally, it is thought that visual crowding obeys Bouma's law, i.e., all elements within a certain distance interfere with the target, and that adding more elements always leads to stronger crowding. Crowding is predominantly studied using sparse displays ...
article 2021
document
Safari, M. (author), Oortwijn, W. (author), Huisman, M. (author)
Many real-world problems such as internet routing are actually graph problems. To develop efficient solutions to such problems, more and more parallel graph algorithms are proposed. This paper discusses the mechanized verification of a commonly used parallel graph algorithm, namely the Bellman–Ford algorithm, which provides an inherently...
conference paper 2021
document
Burger, F. (author), Neerincx, M.A. (author), Brinkman, W.P. (author)
The cognitive approach to psychotherapy aims to change patients' maladaptive schemas, that is, overly negative views on themselves, the world, or the future. To obtain awareness of these views, they record their thought processes in situations that caused pathogenic emotional responses. The schemas underlying such thought records have, thus far,...
article 2021
document
Wetzels, F. (author), van den Berg, J.L. (author), van der Mei, R. (author)
This paper is motivated by recent developments in SDN and NFV whereby service functions, distributed over a centralised controlled network, are connected to form a service function chain (SFC). Upon arrival of a new service request a decision has to be made to which one of SFCs the request must be routed. This decision is based on (1) actual...
conference paper 2021
document
Nair, V.V. (author), van Staalduinen, M. (author), Oosterman, D.T. (author)
The rapid rise of the Dark Web and supportive technologies has served as the backbone facilitating online illegal activity worldwide. These illegal activities supported by anonymisation technologies such as Tor has made it increasingly elusive to law enforcement agencies. Despite several successful law enforcement operations, illegal activity on...
conference paper 2021
document
de Koning, W.J. (author), Phillipson, F. (author), Chiscop, I. (author)
conference paper 2020
document
Peter, C. (author), Borello, E. Salina (author), Dalman, R.A.F. (author), Karamitopoulos, P. (author), Busschers, F. (author), Sacchi, Q. (author), Verga, F. (author)
Stratigraphic forward modelling (SFM) provides the means to produce geologically coherent and realistic models. In this paper, we demonstrate the possibility of matching lithological variability simulated with a basin-scale advection-diffusion SFM to a data-rich real-world setting, i.e. the Holocene Rhine-Meuse fluvio-deltaic system in the...
article 2020
Searched for: subject%3A%22Algorithms%22
(1 - 20 of 326)

Pages