- document
- Boelhouwer, A. (author), van den Beukel, A.P. (author), van der Voort, M.C. (author), Martens, M.H. (author) conference paper 2020
- document
-
Burakowski, W. (author), Beben, A. (author), van den Ber, J.L. (author), Bosman, J.W. (author), Hasslinger, G. (author), Kertesz, A. (author), Latre, S. (author), van der Mei, R. (author), Pflanzner, T. (author), Poullie, P.G. (author), Sosnowski, M. (author), Spinnewyn, B. (author), Stiller, B. (author)The chapter summarizes activities of COST IC1304 ACROSS European Project corresponding to traffic management for Cloud Federation (CF). In particular, we provide a survey of CF architectures and standardization activities. We present comprehensive multi-level model for traffic management in CF that consists of five levels: Level 5 - Strategies...conference paper 2018
- document
-
Young, H.J. (author), van Vliet, A.J. (author), van de Ven, J.G.S. (author), Jol, S.C. (author), Broekman, C.C.M.T. (author)The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing entities’ behavior to inhibit undesirable behavior...conference paper 2018
- document
- Brouwer, A.M. (author), van Beurden, M. (author), Nijboer, L. (author), Derikx, L. (author), Binsch, O. (author), Gjaltema, C. (author), Noordzij, M. (author) conference paper 2018
- document
-
Trichias, K. (author), D’Acunto, L. (author), Drijver, F.B. (author), Wissingh, B.F. (author)In Information-Centric Networking (ICN), applications request data based on the (exact) name of the data of interest. This poses a challenge for a growing number of applications, which do not know a priori the full name of a data object they seek, or do not necessarily need a specific data object, but are interested in a certain scope (e.g. the...conference paper 2018
- document
-
Brouwer, A.M. (author), van de Water, L. (author), Hogervorst, M.A. (author), Kraaij, W. (author), Schraagen, J.M.C. (author), Hogenelst, K. (author)Monitoring an individual’s mental state using unobtrusively measured signals is regarded as an essential element in symbiotic human-machine systems. However, it is not straightforward to model the relation between mental state and such signals in real life, without resorting to (unnatural) emotion induction. We recorded heart rate, facial...conference paper 2018
- document
-
de Juncker, M.A.M. (author), Huizing, D. (author), del Vecchyo, M.R.O. (author), Phillipson, F. (author), Sangers, A. (author)Problem statements and solution methods in mathematical synchromodal transportation problems depend greatly on a set of model choices for which no rule of thumb exists. In this paper, a framework is introduced with which the model choices in synchromodal transportation problems can be classified, based on literature. This framework should help...conference paper 2017
- document
- Neumann, N. (author), Phillipson, F. (author) conference paper 2017
- document
-
Burger, F. (author), Broekens, J. (author), Neerincx, M.A. (author)A key challenge in developing companion agents for children is keeping them interested after novelty effects wear off. Self Determination Theory posits that motivation is sustained if the human feels related to another human. According to Social Penetration Theory, relatedness can be established through the reciprocal disclosure of information...conference paper 2017
- document
-
Eckartz, S. (author), van den Broek, T. (author), Ooms, M. (author)Innovation based on open data lags behind the high expectations of policy makers. Hence, open data researchers have investigated the barriers of open data publication and adoption. This paper contributes to this literature by taking a capabilities perspective on how successful open data re-users create value out of the available data sources....conference paper 2016
- document
-
Harbers, M. (author), Neerincx, M.A. (author)This paper studies the effects of automated support for workload distribution in traffic control teams on human values such as security, autonomy and privacy. The paper describes a workshop in which the support system's stakeholders, their values, and the effects of the support system on these values were analyzed. The workshop results were used...conference paper 2014
- document
-
Streefkerk, J.W. (author), Eikelboom, A. (author), Paulissen, R. (author), van Bemmel, I.E. (author), Hemmer, A.F. (author), Venrooij, W. (author), den Hollander, C.J. (author)Military intelligence communities need to collect, process and disseminate information as quickly and efficiently as possible, for example in answering requests for information by commanders. Currently, the flow of information between the field and intelligence communities is hampered by disparities in the integration of the various components...conference paper 2014
- document
-
van der Veen, J.S. (author), Lazovik, E. (author), Makkes, M.X. (author), Meijer, R.J. (author)Cloud computing enables on-demand access to a shared pool of IT resources. In the case of Infrastructure as a Service (IaaS), the cloud user typically acquires Virtual Machines (VMs) from the provider. It is up to the user to decide at what time and for how long they want to use these VMs. Because of the pay-per-use nature of most clouds, there...conference paper 2013
- document
- Louisse, J. (author) doctoral thesis 2012