Searched for: subject%3A%22Communication%255C%2B%2526%255C%2BInformation%22
(41 - 60 of 602)

Pages

document
Taal, A. (author), Makkes, M.X. (author), Grosso, P. (author)
Computational and storage tasks can nowadays be offloaded among data centers, in order to optimize costs and or performance. We set out to investigate what are the environmental effects, namely the total CO2 emission, of such offloading. We built models for the various components present in these offloading scenarios, and we incorporated these...
conference paper 2014
document
Awad, G. (author), Over, P. (author), Kraaij, W. (author)
This article presents an overview of the video copy detection benchmarkwhichwas run over a period of 4 years (2008-2011) as part of the TREC Video Retrieval (TRECVID) workshop series. The main contributions of the article include i) an examination of the evolving design of the evaluation framework and its components (system tasks, data, measures...
article 2014
document
Niamut, O.A. (author), Thomas, G.A. (author), Thomas, E.D.R. (author), van Brandenburg, R. (author), D’Acunto, L. (author), Gregory-Clarke, R. (author)
This paper reports on the latest developments around tiled streaming. As an extension of HTTP adaptive streaming, it retains all the benefits of this streaming technology, while adding the possibility of interaction when consuming UHDTV on mobile devices. In particular, we discuss the underlying principles and aspects, such as multi-layer...
other 2014
document
Eckartz, S. (author), Hofman, W.J. (author), van Veenstra, A.F. (author)
Data-driven innovation has great potential for the development of innovative services that not only have economic value, but that help to address societal challenges. Many of these challenges can only be addressed by data sharing of public and privately owned data. These public-private data sharing collaborations require data governance rules....
conference paper 2014
document
Blagojević, M. (author), Geilen, M. (author), Basten, A.A. (author), Nabi, M. (author), Hendriks, T. (author)
Gossip-based Wireless Sensor Networks (GWSNs) are complex systems of inherently random nature. Planning and designing GWSNs requires a fast and adequately accurate mechanism to estimate system performance. As a first contribution, we propose a performance analysis technique that simulates the gossip-based propagation of each single piece of data...
article 2014
document
Verberne, S. (author), Sappelli, M. (author), Kraaij, W. (author)
In this paper, we evaluate query term suggestion in the context of academic professional search. Our overall goal is to support scientists in their information seeking tasks. We set up an interactive search system in which terms are extracted from clicked documents and suggested to the user before every query specification step. We evaluated our...
bookPart 2014
document
Strijkers, R.J. (author)
This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet factory manufactures and deploys Netapps, each with...
doctoral thesis 2014
document
Brown, J.I. (author), Koç, Y. (author), Kooij, R.E. (author)
Given a finite, undirected graph G (possibly with multiple edges), we assume that the vertices are operational, but the edges are each independently operational with probability p. The (all-terminal) reliability, Rel(G,p), of G is the probability that the spanning subgraph of operational edges is connected. It has been conjectured that...
article 2014
document
Aarts, F. (author), Kuppens, H. (author), Tretmans, J. (author), Vaandrager, F. (author), Verwer, S. (author)
Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M R of reference implementation R, which serves...
article 2014
document
Sappelli, M. (author), Verberne, S. (author), Koldijk, S.J. (author), Kraaij, W. (author)
We collected human - computer interaction data (keystrokes, active applications, typed text, etc.) from knowledge workers in the context of writing reports and preparing presentations. This has resulted in an interesting dataset that can be used for different types of information retrieval and information seeking research. The details of the...
conference paper 2014
document
Koldijk, S.J. (author), Koot, G. (author), Neerincx, M.A. (author), Kraaij, W. (author)
Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at work. We address privacy from two perspectives: 1...
bookPart 2014
document
Niamut, O.A. (author), Thomas, G.A. (author), Thomas, E.D.R. (author), van Brandenburg, R. (author), D'Acunto, L. (author), Gregory-Clarke, R. (author)
This paper reports on the latest developments in tiled streaming. As an extension of HTTP adaptive streaming, it retains all the benefits of this streaming technology, while adding the potential of interaction when UHDTV is consumed on mobile devices. In particular, we discuss the underlying principles and aspects, such as multi-layer resolution...
article 2014
document
Kaptein, R. (author), Koot, G. (author), Huis in 't Veld, M.A.A. (author), van den Broek, E.L. (author)
Web search engines are optimized for early precision, which makes it difficult to perform recall-oriented tasks using these search engines. In this article, we present our tool Needle Custom Search. This tool exploits semantic annotations of Web search results and, thereby, increase the efficiency of recall-oriented search tasks. Semantic...
bookPart 2014
document
den Hartog, F.T.H. (author), Daniele, L.M. (author), Roes, J.B.M. (author)
About two thirds of the energy consumed by buildings originates from the residential sectors and thus household appliances. Household appliances or home appliances are electrical/mechanical machines which accomplish some household functions. Nowadays, appliances are not stand-alone systems anymore. They are often highly intelligent (“smart”) and...
report 2014
document
van Rest, J.H.C. (author), Boonstra, D. (author), Everts, M.H. (author), van Rijn, M. (author), van Paassen, R.J.G. (author)
The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these privacy risks. In this vision paper, we...
bookPart 2014
document
Eckartz, S. (author), Emde, F. (author), Spitzer, A.M. (author), Stornebrink, M.H.M. (author)
Dit artikel beschrijft een framework dat organisaties in een keten kan helpen om hun volwassenheid op het gebied van ketensamenwerking te bepalen en verbeteren. Immers, samenwerking in een informatieketen is vaak nog ingewikkelder dan samenwerking in een productieproces dat is gericht op het voortbrengen van fysieke goederen. Het raamwerk is...
conference paper 2014
document
Pournaras, E. (author), Vasirani, M. (author), Kooij, R.E. (author), Aberer, K. (author)
Demand-side energy management improves robustness and efficiency in Smart Grids. Load-adjustment and load-shifting are performed to match demand to available supply. These operations come at a discomfort cost for consumers as their lifestyle is influenced when they adjust or shift in time their demand. Performance of demand-side energy...
conference paper 2014
document
Strijkers, R.J. (author), Norp, A.H.J. (author)
The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway (e.g. PDN-GW) to deliver the service. The...
patent 2014
document
Brandt, P. (author), Basten, A.A. (author), Stuijk, S. (author)
Patient observations in health care, subjective surveys in social research or dyke sensor data in water management are all examples of measurements. Several ontologies already exist to express measurements, W3C's SSN ontology being a prominent example. However, these ontologies address quantities and properties as being equal, and ignore the...
conference paper 2014
document
van Pruissen, O.P. (author), van der Togt, A. (author), Werkman, E. (author)
For the built environment it is envisaged that in the near future the total annual heat demand could be covered by renewable sources generated within the built environment. More and more devices, such as heat pumps and solar collectors will enable a sustainable and distributed generation of heat. Centralized climate management systems are...
article 2014
Searched for: subject%3A%22Communication%255C%2B%2526%255C%2BInformation%22
(41 - 60 of 602)

Pages