Searched for: subject%3A%22Computer%255C%2Bprogram%22
(1 - 20 of 51)

Pages

document
Minaeva, A. (author), Roy, D. (author), Akesson, B. (author), Hanzalek, Z. (author), Shakraborty, S. (author)
Automotive software implements different functionalities as multiple control applications sharing common platform resources. Although such applications are often developed independently, the control performance of the resulting system depends on how these applications are integrated. A key integration challenge is to efficiently schedule these...
conference paper 2020
document
van Houte, R. (author), Mulderij, J. (author), Attema, T. (author), Chiscop, I. (author), Phillipson, F. (author)
article 2020
document
Boelhouwer, A. (author), van den Beukel, A.P. (author), van der Voort, M.C. (author), Martens, M.H. (author)
conference paper 2020
document
van der Vecht, B. (author), van Diggelen, J. (author), Peeters, M.M.M. (author), van Staal, W. (author), van der Waa, J. (author)
Human-machine teaming (HMT) is a promising paradigm to approach situations in which humans and autonomous systems must closely collaborate. This paper describes SAIL, a software framework for implementing HMT-concepts. The approach of SAIL is to integrate existing autonomous systems in a framework, that serves as a social layer between...
conference paper 2018
document
van den Berg, F. (author), Hooman, J. (author), Haverkort, B.R. (author)
This tool paper presents iDSL, a language and a fully automated toolchain for evaluating the performance of service-oriented systems. In this work, we emphasize the use of a high-level domain specific language that is tailored to be understood by system designers and domain experts, a transformation into an underlying process algebra which...
conference paper 2018
document
Young, H.J. (author), van Vliet, A.J. (author), van de Ven, J.G.S. (author), Jol, S.C. (author), Broekman, C.C.M.T. (author)
The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing entities’ behavior to inhibit undesirable behavior...
conference paper 2018
document
Fu, X. (author), Rol, M.A. (author), Bultink, C.C. (author), van Someren, J. (author), Khammassi, N. (author), Ashraf, I. (author), Vermeulen, R.F.L. (author), De Sterke, J.C. (author), Vlothuizen, W.J. (author), Schouten, R.N. (author), Almudever, C.G. (author), DiCarlo, L. (author), Bertels, K. (author)
Quantum computers promise to solve certain problems that are intractable for classical computers, such as factoring large numbers and simulating quantum systems. To date, research in quantum computer engineering has focused primarily at opposite ends of the required system stack: devising high-level programming languages and compilers to...
conference paper 2017
document
Hooman, J. (author)
Domain Specific Languages (DSLs) provide a lightweight approach to incorporate formal techniques into the industrial workflow. From DSL instances, formal models and other artefacts can be generated, such as simulation models and code. Having a single source for all artefacts improves maintenance and offers a high return on investment of the...
conference paper 2016
document
Tapaninen, O. (author), Myohanen, P. (author), Majanen, M. (author), Sitomaniemi, A. (author), Olkkonen, J. (author), Hildenbrand, V. (author), Gielen, A.W.J. (author), Mackenzie, F.V. (author), Barink, M. (author), Smilauer, V. (author), Patzak, B. (author)
This paper presents a test case for coupling two physical aspects of an LED, optical and thermal, using specific simulation models coupled through an open source platform for distributed multi-physics modelling. The glue code for coupling is written with Python programming language including routines to interface specific simulation models. This...
conference paper 2016
document
de Marchi, T. (author), Braakman, R.B.H. (author), Stingl, C. (author), van Duijn, M.M. (author), Smid, M. (author), Foekens, J.A. (author), Luider, T.M. (author), Martens, J.W.M. (author), Umar, A. (author)
article 2016
document
Van Den Berg, Freek (author), Hooman, Jozef (author), Hartmanns, Arnd (author), Haverkort, Boudewijn R. (author), Remke, Anne (author)
System designers need to have insight in the response times of service systems to see if they meet performance requirements. We present a high-level evaluation technique to obtain the distribution of services completion times. It is based on a high-level domain-specific language that hides the underlying technicalities from the system designer....
bookPart 2015
document
Schuts, M. (author), Hooman, J. (author)
To improve the design of a power control unit at Philips, two Domain Specific Languages (DSLs) have been used. The first DSL provides a concise and readable notation for the essential state transitions. It is used to generate both configuration files and analysis models. In addition, we also generate instances of a second DSL which represents...
conference paper 2015
document
Paauw, A. (author), Jonker, D. (author), Roeselers, G. (author), Heng, J.M.E. (author), Mars-Groenendijk, R.H. (author), Trip, H. (author), Molhoek, E.M. (author), Jansen, H.J. (author), van der Plas, J. (author), de Jong, A.L. (author), Majchrzykiewicz-Koehorst, J.A. (author), Speksnijder, A.G.C.L. (author)
E. coli-. Shigella species are a cryptic group of bacteria in which the Shigella species are distributed within the phylogenetic tree of E. coli. The nomenclature is historically based and the discrimination of these genera developed as a result of the epidemiological need to identify the cause of shigellosis, a severe disease caused by Shigella...
article 2015
document
van den Berg, F. (author), Haverkort, B.R. (author), Hooman, J. (author)
Service-oriented systems are designed for interconnecting with other systems. The provided services face timing constraints, the so-called latencies. We present a high-level performance evaluation technique that can be used by a system designer to obtain distributions of these latencies. This technique is capable of capturing nondeterministic,...
conference paper 2015
document
Sappelli, M. (author), Verberne, S. (author), Koldijk, S.J. (author), Kraaij, W. (author)
We collected human - computer interaction data (keystrokes, active applications, typed text, etc.) from knowledge workers in the context of writing reports and preparing presentations. This has resulted in an interesting dataset that can be used for different types of information retrieval and information seeking research. The details of the...
conference paper 2014
document
Geraedts, A.S. (author), Kleiboer, A.M. (author), Wiezer, N.M. (author), van Mechelen, W. (author), Cuijpers, P. (author)
Background: Depressive disorders are highly prevalent in the working population and are associated with excessive costs for both society and companies. Effective treatment for employees with depressive symptoms in occupational health care is limited. The purpose of this study is to investigate the effectiveness and cost-effectiveness of an...
article 2013
document
van der Veen, J.S. (author), Lazovik, E. (author), Makkes, M.X. (author), Meijer, R.J. (author)
Cloud computing enables on-demand access to a shared pool of IT resources. In the case of Infrastructure as a Service (IaaS), the cloud user typically acquires Virtual Machines (VMs) from the provider. It is up to the user to decide at what time and for how long they want to use these VMs. Because of the pay-per-use nature of most clouds, there...
conference paper 2013
document
Selimis, G. (author), Huang, L. (author), Massé, F. (author), Tsekoura, I. (author), Ashouei, M. (author), Catthoor, F. (author), Huisken, J. (author), Stuyt, J. (author), Dolmans, G. (author), Penders, J. (author), de Groot, H. (author)
In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor...
article 2011
document
Koch, E.C. (author), Weiser, V. (author), Webb, R. (author), TNO Defensie en Veiligheid (author), DenV (author)
conference paper 2009
document
Tielemans, E. (author), Noy, D. (author), Schinkel, J. (author), Heussen, H. (author), van der Schaaf, D. (author), West, J. (author), Fransman, W. (author), TNO Kwaliteit van Leven (author)
In The Netherlands, the web-based tool called 'Stoffenmanager' was initially developed to assist small- and medium-sized enterprises to prioritize and control risks of handling chemical products in their workplaces. The aim of the present study was to explore the accuracy of the Stoffenmanager exposure algorithm. This was done by comparing its...
article 2008
Searched for: subject%3A%22Computer%255C%2Bprogram%22
(1 - 20 of 51)

Pages