Searched for: subject%3A%22Communication%255C%2B%2526%255C%2BInformation%22
(21 - 40 of 602)

Pages

document
Osaiweran, A. (author), Schuts, M. (author), Hooman, J. (author)
We report about experiences at Philips Healthcare with component-based development supported by formal techniques. The formal Analytical Software Design (ASD) approach of the company Verum has been incorporated into the industrial workflow. The commercial tool ASD:Suite supports both compositional verification and code generation for control...
article 2014
document
Adyanthaya, S. (author), Zhang, Z. (author), Geilen, M. (author), Voeten, J. (author), Basten, T. (author), Schiffelers, R. (author)
Tasks executing on general purpose multiprocessor platforms exhibit variations in their execution times. As such, there is a need to explicitly consider robustness, i.e., tolerance to these fluctuations. This work aims to quantify the robustness of schedules of directed acyclic graphs (DAGs) on multiprocessors by defining probabilistic...
conference paper 2014
document
Nooren, P.A. (author), Koers, W.A. (author), Bangma, M.R. (author), Berkers, F.T.H.M. (author), Boertjes, E.M. (author)
The convergence between media, internet and telecoms has brought many new services, devices and distribution models. The availability of multiple routes for delivery of services to end users helps to remove a number of traditional bottlenecks. At the same time, new bottlenecks can appear as the routes bring new technical and business...
report 2014
document
Nabi, M. (author), Geilen, M. (author), Basten, A.A. (author), Blagojevic, M. (author)
Node mobility is a key feature of using Wireless Sensor Networks (WSNs) in many sensory applications, such as healthcare. The Medium Access Control (MAC) protocol should properly support the mobility in the network. In particular, mobility is complicated for contention-free protocols like Time Division Multiple Access (TDMA). An efficient access...
article 2014
document
Ellens, W. (author), Mandjes, M. (author), Worm, D.T.H. (author), van den Berg, J.L. (author)
For effective capacity management in access networks, it is essential to have a good insight in the service quality perceived by the users. As users share the service capacity available, one would want to know how the achieved per-user throughput fluctuates over time. In this paper we present a novel method that assesses the per-user throughput...
conference paper 2014
document
Kempker, P.L. (author)
This chapter serves as an introduction to the concepts of coordinated linear systems, in formal as well as intuitive terms. The concept of a coordinated linear system is introduced and formulated, and some basic properties are derived, providing both a motivaton and a formal basis for the following chapters of this part.
bookPart 2014
document
Luis, J.G. (author), Hernández, J.G. (author), Rodriguez, G.P. (author), Carcel, G.H. (author), Hofman, W. (author)
Nowadays, logistics could make you purchase a book in Amazon and delivering it in 24-hours using a service from a logistics operator or a transport company. In a more complex scenario, an order could be traveling around the globe, passing from hand to hand between unknown actors for months. In most cases the client would not be notified in a...
conference paper 2014
document
Phillipson, F. (author)
Over the past few decades the demand for bandwidth for Internet access has been growing at an unprecedented rate, and this growth is not likely to slow down in the near future. Rolling out Fibre to the Cabinet/Curb networks quickly will be the only way for telecom operators to meet the growing customer demand. This requires a fibre connection to...
conference paper 2014
document
Punter, M. (author)
Het ontbreekt de sector vaak aan mogelijkheden om transportopdrachten, vrachtbrieven en facturen elektronisch uit te wisselen. Samen met onder meer ICTleveranciers heeft TLN standaarden ontwikkeld voor papierloos transport. 'Het moment om in te stappen.'
article 2014
document
Pruksasri, P. (author), van den Berg, J. (author), Hofman, W.J. (author), Tan, Y.H. (author)
Secure and accurate transactions are vital to any large-scale business system in order to guarantee the reliability of the system to stakeholders in both the public and private sectors. In supply chain systems, however, a variety of information security shortcomings is currently occurring in several processes, for example, related to data...
conference paper 2014
document
Verhoosel, J. (author), Rumph, F.J. (author)
conference paper 2014
document
Frijns, R.M.W. (author), Adyanthaya, S. (author), Stuijk, S. (author), Voeten, J.P.M. (author), Geilen, M.C.W. (author), Schiffelers, R.R.H. (author), Corporaal, H. (author)
Analyzing worst-case application timing for systems with shared resources is difficult, especially when non-monotonic arbitration policies like First-Come-First-Served (FCFS) scheduling are used in combination with varying task execution times. Analysis methods that conservatively analyze these systems are often based on state-space exploration,...
conference paper 2014
document
Joosten, H.J.M. (author), Smulders, A.C.M. (author)
Networked Risk Management (NRM) is a methodology aimed at managing dynamic risks. The methodology facilitates the mind shift from risk management to success governance. The result is an accountable prioritisation of risks that could lead to being unsuccessful. NRM is applicable in combination with existing methods for risk assessments and...
report 2014
document
article 2014
document
Litjens, R. (author), Toh, Y. (author), Zhang, H. (author), Blume, O. (author)
We assess the energy efficiency of mobile networks in 2020, and compare it with a 2010 baseline. A comprehensive assessment approach is taken, considering all relevant scenario aspects such as data traffic growth, hardware evolutions, mobile network deployments and operations including network sharing and the dynamic switching on/off of radio...
conference paper 2014
document
Schavemaker, J.G.M. (author), Boertjes, E.M. (author), Koldijk, S.J. (author), Wiertz, L. (author), Verberne, S. (author), Sappelli, M. (author), Kaptein, A.M. (author)
In this contribution1 we present a novel psychological intervention that maps human computer activity to a group feedback device on the basis of a combination of various types of unobtrusive, low-level sensors. The goal is to enable employees to gain insights into their working habits, to reduce stress levels and increase productivity. The...
conference paper 2014
document
Kaptein, R. (author), Boertjes, E. (author), Langley, D. (author)
In this work we analyze the discussions on Twitter around the Human papillomavirus (HPV) vaccinations. We collect a dataset consisting of tweets related to the HPV vaccinations by searching for relevant keywords, by retrieving the conversations on Twitter, and by retrieving tweets from our user group mentioning semi-relevant keywords. We find...
bookPart 2014
document
Daniele, L.M. (author), den Hartog, F.T.H. (author), Roes, J.B.M. (author)
About two thirds of the energy consumed by buildings originates from the residential sectors and thus household appliances. Household appliances or home appliances are electrical/mechanical machines which accomplish some household functions. Nowadays, appliances are not stand-alone systems anymore. They are often highly intelligent (“smart”) and...
report 2014
document
Veugen, P.J.M. (author)
When processing data in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Integer division of encrypted data however requires an additional protocol between the client and the server and will be relatively expensive. We present new solutions for dividing encrypted data in the semi-honest...
article 2014
document
Phillipson, F. (author)
In this paper a total approach is presented for interactive planning of a reliable Fibre to the Cabinet network. Interactive means here that planning of areas with 600 to 1000 cabinets can be planned roughly within minutes. The problem of telecom operators, when planning Fibre to the Cabinet, is to find the minimum number of cabinets that is...
article 2014
Searched for: subject%3A%22Communication%255C%2B%2526%255C%2BInformation%22
(21 - 40 of 602)

Pages