- document
-
Dams, D. (author), Havelund, K. (author), Kauffman, S. (author)We present a Python library for trace analysis named PyContract. PyContract is a shallow internal DSL, in contrast to many trace analysis tools that implement external or deep internal DSLs. The library has been used in a project for analysis of logs from NASA’s Europa Clipper mission. We describe our design choices, explain the API via examples...conference paper 2022
- document
- de Boer, M.H.T. (author), Vethman, S. (author), Bakker, R.M. (author), Adhikari, A. (author), Marcus, M.J.H. (author), de Greeff, J. (author), van der Waa1, J. (author), Schoonderwoerd, T.A.J. (author), Tolios, I. (author), van Zoelen, E.M. (author), Hillerström, F.H.J. (author), Kamphorst, B.J. (author) conference paper 2022
- document
-
Luo, J. (author), Moncada, J. (author), Ramirez, A. (author)Incorporating (operational) flexibility into process design has been a key approach to cope with uncertainties. The increasing penetration of renewables and the need for developing new low-carbon technologies will increase the demand for flexibility in chemical processes. This paper presents a state-of the-art review focusing on the origin,...article 2022
- document
-
Abspoel, M. (author), Attema, T. (author), Rambaud, M. (author)We consider consensus protocols in the model that is most commonly considered for use in state machine replication, as initiated by Dwork-Lynch-Stockmeyer, then by Castro-Liskov in 1999 with “PBFT”. Such protocols guarantee, assuming n players out of which t < n/3 are maliciously corrupted, that the honest players output the same valid value...conference paper 2021
- document
-
Sberna, P.M. (author), Bernardis, A.F. (author), Garufo, A. (author), Bueno, J. (author), Llombart, N. (author), Neto, A. (author)Photo-conductive lens antennas (PCAs) exploit the ultra-short photoconductivity phenomenon of specific semiconductors in order to generate pulsed radiation in the THz regime. State of the art PCAs suffer from high dispersion and low radiation efficiency over the large generated bandwidth due to the poor coupling between the antenna and the...conference paper 2021
- document
-
Gijsen, B. (author), Montalto, R. (author), Panneman, J. (author), Falconieri, F. (author), Wiper, P. (author), Zuraniewski, P. (author)autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding...conference paper 2021
- document
- Dong, D. (author), Espinoza, L.A.T. (author), Loibl, A. (author), Pfaff, M. (author), Tukker, A. (author), van der Voet, E. (author) article 2020
- document
-
Poort, J.P. (author), Shoeibi Omrani, P.S. (author), Vecchia, A.L. (author), Visser, G. (author), Janzen, M. (author), Koenes, J. (author)Detection of production and well events is crucial for planning of production and operational strategies. Event detection is especially challenging in mature fields in which various off-normal events might occur simultaneously. Manual detection of these events by an engineer is a tedious task and prone to errors. On the other hand, abundance of...conference paper 2020
- document
-
Cherrie, J.W. (author), Fransman, W. (author), Heussen, G.A.H. (author), Koppisch, D. (author), Jensen, K.A. (author)Model tools for estimating hazardous substance exposure are an accepted part of regulatory risk assessments in Europe, and models underpin control banding tools used to help manage chemicals in workplaces. Of necessity the models are simplified abstractions of real-life working situations that aim to capture the essence of the scenario to give...article 2020
- document
-
van Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)Person re-identification (re-id) is the task of identifying a person of interest across disjoint camera views in a multi-camera system. This is a challenging problem due to the different poses, viewpoints and lighting conditions. Deeply learned systems have become prevalent in the person re-identification field as they are capable to deal with...conference paper 2019
- document
- Mohammadi, M. (author), Atashin, A.A. (author), Hofman, W. (author), Tan, Y.H. (author) conference paper 2019
- document
-
Adhikari, A. (author), Tax, D.M.J. (author), Satta, R. (author), Faeth, M. (author)Explainable Artificial Intelligence (XAI) is an emergent research field which tries to cope with the lack of transparency of AI systems, by providing human understandable explanations for the underlying Machine Learning models. This work presents a new explanation extraction method called LEAFAGE. Explanations are provided both in terms of...conference paper 2019
- document
-
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...conference paper 2018
- document
-
Guo, Y. (author), Liu, Y. (author), de Boer, M.H.T. (author), Liu, L. (author), Lew, M.S. (author)General captioning practice involves a single forward prediction, with the aim of predicting the word in the next timestep given the word in the current timestep. In this paper, we present a novel captioning framework, namely Dual Prediction Network (DPN), which is end-to-end trainable and addresses the captioning problem with dual predictions....conference paper 2018
- document
-
Trichias, K. (author), D’Acunto, L. (author), Drijver, F.B. (author), Wissingh, B.F. (author)In Information-Centric Networking (ICN), applications request data based on the (exact) name of the data of interest. This poses a challenge for a growing number of applications, which do not know a priori the full name of a data object they seek, or do not necessarily need a specific data object, but are interested in a certain scope (e.g. the...conference paper 2018
- document
-
Mohammadi, M. (author), Hofman, W. (author), Tan, Y.H. (author)Simulated annealing-based ontology matching (SANOM) participates for the second time at the ontology alignment evaluation initiative (OAEI) 2018. This paper contains the configuration of SANOM and its results on the anatomy and conference tracks. In comparison to the OAEI 2017, SANOM has improved significantly, and its results are competitive...conference paper 2018
- document
-
Nieuwenhuizen, R.P.J. (author), Kruithof, M. (author), Schutte, K. (author)High resolution imagery is of crucial importance for the performance on visual recognition tasks. Super-resolution (SR) reconstruction algorithms aim to enhance the image resolution beyond the capability of the image sensor being used. Traditional SR algorithms approach this inverse problem using physical models for the image formation combined...conference paper 2017
- document
-
Ligthart, M. (author), Henkemans, O.B. (author), Hindriks, K. (author), Neerincx, M.A. (author)Children are eager to anthropomorphize (ascribe human attributes to) social robots. As a consequence they expect a more unconstrained, substantive and useful interaction with the robot than is possible with the current state-of-the art. In this paper we reflect on several of our user studies and investigate the form and role of expectations in...conference paper 2017
- document
-
Bortolameotti, R. (author), van Ede, T. (author), Caselli, M. (author), Everts, M.H. (author), Hartel, P. (author), Hofstede, R. (author), Jonker, W. (author), Peter, A. (author)We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype...conference paper 2017
- document
-
Courage, W.M.G. (author), Nicoreac, M.P. (author), Kempker, P.L. (author)For offshore wind turbines (OWT’s) environmental and accessibility conditions make inspection and maintenance costly. Hence the potential of cost reduction when the planning of these actions can be optimized. Taking uncertainties into account, a risk based concept is adopted in which probabilities of failure and its consequences are balanced...conference paper 2017