- document
- Garufo, A. (author), Sberna, P.M. (author), Carluccio, G. (author), Freeman, J.R. (author), Bacon, D.R. (author), Li, L. (author), Bueno, J. (author), Baselmans, J.J.A. (author), Linfield, E.H. (author), Davies, A.G. (author), Llombart, N. (author), Neto, A. (author) article 2019
- document
-
Sluis, H.J.D. (author), Tejada, R. (author)This article provides a brief introduction to the Cooperative, Connected and Automated Mobility strategy define by the European Commission in 2016. Its main challenges are then summarized, with and emphasis in vehicle communication technology for automated driving. Finally, an overview of several recent European projects that aim to meet these...article 2018
- document
-
Leghissa, G. (author), van den Donker, M.N. (author), Tzikas, C. (author), Verbong, G. (author), Folkerts, W. (author)There is a growing interest in community-owned large-scale solar projects. However, if large amounts of electricity generated by these PV installations are not directly consumed by the local loads, grid congestion can arise, due to constrains in the local electricity network. This paper explores when grid congestion starts to occur and whether...conference paper 2018
- document
-
van Adrichem, N.L.M. (author), Wissingh, B.F. (author), Ravesteijn, D. (author), d' Acunto, L. (author)?e end-to-end connection paradigm of TCP/IP does not work well in situations characterized by intermi?ent (or no) global internet connectivity, as o?en is the case in o?shore Wireless Sensor Networks (WSNs), military networks, rural/remote areas and maritime transport. Delay/Disruption Tolerant Networking (DTN) investigates to address these use...conference paper 2017
- document
-
Parasuraman, R. (author), Caccamo, S. (author), Baberg, F. (author), Ogren, P. (author), Neerincx, M. (author)A reliable wireless connection between the operator and the teleoperated Unmanned Ground Vehicle (UGV) is critical in many Urban Search and Rescue (USAR) missions. Unfortunately, as was seen in e.g. the Fukushima disaster, the networks available in areas where USAR missions take place are often severely limited in range and coverage. Therefore,...conference paper 2017
- document
-
van Adrichem, N.L.M. (author), Wissingh, B. (author), Ravesteijn, D. (author), d' Acunto, L. (author)the end-to-end connection paradigm of TCP/IP does not work well in situations characterized by intermi?ent (or no) global internet connectivity, as o?en is the case in o?shore Wireless Sensor Networks (WSNs), military networks, rural/remote areas and maritime transport. Delay/Disruption Tolerant Networking (DTN) investigates to address these use...conference paper 2017
- document
-
Darlow, M. (author), Paulissen, J.H. (author)As part of an extensive renovation program, Arup Netherlands delivered engineering services for the strengthening and renovation of 8 large steel bridges in the Dutch highway network. Strengthening of the riveted splice connections at the ends of the hangers of a steel arch bridge on the Dutch A2 motorway represented a significant challenge to...conference paper 2016
- document
-
Bolt, R.J. (author), Cavallo, D. (author), Gerini, G. (author), Deurloo, D. (author), Grooters, R. (author), Neto, A. (author), Toso, G. (author)In this paper, we present the characterization of a Ku-band connected-dipole array for mobile Satcom application. The prototype array consists of 2 × 256 dipole radiators arranged in a square grid, to form 16 × 16 dual-polarized cells. It has been designed to operate over a wideband ranging from 10.7 to 14.5 GHz (30%), accommodating in a single...article 2016
- document
-
Neumann, N.M.P. (author), Phillipson, F. (author)Connecting points to the nearest point belonging to a set of lines is an interesting problem that arises in many practical problems, especially Infrastructure Design Problems. In this paper an algorithm is presented for this problem. This algorithm is based on enumeration. To test the performance we define and explain several heuristic...conference paper 2016
- document
-
Sappelli, M. (author), Verberne, S. (author), Kraaij, W. (author)In this article, we propose and implement a new model for context recognition and identification. Our work is motivated by the importance of "working in context" for knowledge workers to stay focused and productive. A computer application that can identify the current context in which the knowledge worker is working can (among other things)...article 2016
- document
-
Wang, X. (author), Kooij, R.E. (author), van Mieghem, P. (author)Various real-world networks interact with and depend on each other. The design of the interconnection between interacting networks is one of the main challenges to achieve a robust interdependent network. Due to cost considerations, network providers are inclined to interconnect nodes that are geographically close. Accordingly, we propose two...article 2016
- document
-
Maljaars, J. (author), De Matteis, G. (author)Many aluminium structures contain welded and bolted connections that are modeled as one or more equivalent T-stubs – also referred to as tension zone components – for the structural assessment. Knowledge on the structural behavior of such T-stubs is thus essential for proper designs. However, this behavior has never been checked for fire...article 2016
- document
-
van Manthena, M.P.V. (author), Adrichem, N.L.M. (author), van den Broek, C. (author), Kuipers, F. (author)Network-as-a-Service (NaaS) is a cloud-based service model that offers on-demand network connectivity and the provisioning and management of network services. However, the actual orchestration of dynamically allocating underlying resources to customer requirements is not trivial. In this paper, we propose an SDN-based approach to support the...conference paper 2015
- document
-
Bortolameotti, R. (author), Peter, A. (author), Everts, M.H. (author), Bolzoni, D. (author)Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the...bookPart 2015
- document
-
Wagner, A. (author), Cohen, N. (author), Kelder, T. (author), Amit, U. (author), Liebman, E. (author), Steinberg, D.M. (author), Radonjic, M. (author), Ruppin, E. (author)High-throughput omics have proven invaluable in studying human disease, and yet day-to-day clinical practice still relies on physiological, non-omic markers. The metabolic syndrome, for example, is diagnosed and monitored by blood and urine indices such as blood cholesterol levels. Nevertheless, the association between the molecular and the...article 2015
- document
-
Brown, J.I. (author), Koç, Y. (author), Kooij, R.E. (author)Given a finite, undirected graph G (possibly with multiple edges), we assume that the vertices are operational, but the edges are each independently operational with probability p. The (all-terminal) reliability, Rel(G,p), of G is the probability that the spanning subgraph of operational edges is connected. It has been conjectured that...article 2014
- document
-
Koç, Y. (author), Warnier, M. (author), van Mieghem, P. (author), Kooij, R.E. (author), Brazier, F.M.T. (author)Cascading failures are one of the main reasons for blackouts in electric power transmission grids. The economic cost of such failures is in the order of tens of billion dollars annually. The loading level of power system is a key aspect to determine the amount of the damage caused by cascading failures. Existing studies show that the blackout...article 2014
- document
-
Makkes, M.X. (author), Oprescu, A.M. (author), Strijkers, R.J. (author), de Laat, C. (author), Meijer, R.J. (author)The current Internet is a loose federation of independent providers (ISPs) That manually manage inter-domain (ASes) route policies To primarily serve Their own interests. The end-user experience may be hindered by Two aspects: The ASes only optimize locally, possibly delivering sub-optimal end-To-end connections; The manual management of routing...conference paper 2014
- document
- Wang, X. (author), Pournaras, E. (author), Kooij, R.E. (author), van Mieghem, P. (author) article 2014
- document
-
Cavallo, D. (author), Gerini, G. (author), Bolt, R.J. (author), Deurloo, D. (author), Grooters, R. (author), Neto, A. (author), Toso, G. (author), Midthassel, R. (author)We present a Ku-band dual-polarized phased array demonstrator for satellite communications. The prototype array is composed by 512 connected-dipole elements, 16x16 for each polarization, arranged in an egg-crate configuration. A loop-shaped feed structure is used to maintain good polarization purity for beam scanning up to 60 degrees in any...conference paper 2013