Searched for: subject%3A%22Information%255C%2Bsharing%22
(1 - 18 of 18)
document
Campioni, L. (author), Wissingh, B. (author), Tortonesi, M. (author), Suri, N. (author), Stefanelli, C. (author)
The characteristics of tactical network environments pose a severe challenge to information sharing. In particular, the Distributed, Intermittent, and Limited (DIL) nature of these networks require specifically designed communication protocols capable of efficiently exploiting the scarce network resources to offer reliable communication. While...
conference paper 2022
document
van Engelenburg, S. (author), Rukanova, B. (author), Hofman, W.J. (author), Ubacht, J. (author), Tan, Y.H. (author), Janssen, M. (author)
conference paper 2020
document
Minnens, F. (author), Lucas Luijckx, N.B. (author), Verbeke, W. (author)
One of the biggest challenges facing the food industry is assuring food integrity. Dealing with complex food integrity issues requires a multi-dimensional approach. Preventive actions and early reactive responses are key for the food supply chain. Information sharing could facilitate the detection and prevention of food integrity issues. This...
article 2019
document
Saad, E. (author), Hindriks, K.V. (author), Neerincx, M.A. (author)
Task allocation and management is crucial for human-robot collaboration in Urban Search And Rescue response efforts. The job of a mission team leader in managing tasks becomes complicated when adding multiple and different types of robots to the team. Therefore, to effectively accomplish mission objectives, shared situation awareness and task...
conference paper 2018
document
Noack, B. (author), Sijs, J. (author), Hanebeck, U.D. (author)
Decentralized data fusion is a challenging task. Either it is too difficult to maintain and track the information required to perform fusion optimally, or too much information is discarded to obtain informative fusion results. A well-known solution is Covariance Intersection, which may provide too conservative fusion results. A less conservative...
conference paper 2017
document
van de Kamp, T.R. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)
Information sharing helps to better protect computer sys- tems against digital threats and known attacks. However, since security information is usually considered sensitive, parties are hesitant to share all their information through public channels. Instead, they only exchange this informa- tion with parties with whom they already established...
conference paper 2016
document
Luiijf, H.A.M. (author), Theocharidou, M. (author), Rome, E. (author)
CIPedia© http://www.cipedia.eu is a Wiki-based body of common knowledge for the wide international community of critical infrastructure (CI) protection and resilience stakeholders such as policy makers, researchers, governmental agencies, emergency management organizations, CI operators, and even the public.
article 2015
document
Simpson, S. (author), Mu, M. (author), Niamut, O.A. (author), Taal, J. (author), Race, N. (author)
Audio-visual narratives are becoming the most popular medium for information sharing and social storytelling around a live event. This paper explores the collective experience of users of an online creative storytelling ecosystem. The system provides an ideal platform to study community-driven story co-authoring helped by social networks and...
conference paper 2015
document
Luiijf, H.A.M. (author)
Ter ondersteuning van de internationale cyber security gemeenschap ontwikkelde TNO drie producten voor de vierde Global Conference on Cyber Space: From Awareness to action: bridging the gaps in 10 steps, Sharing Cyber Security Information en Cyber Security of Industrial Control Systems (ICS).
article 2015
document
Fransen, F. (author), Smulders, A.C.M. (author), Kerkdijk, H. (author)
The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to increase their resilience to new attacks and threats....
article 2015
document
Luiijf, H.A.M. (author), Kernkamp, A.C. (author)
The failure of a national critical infrastructure may seriously impact the health and well-being of citizens, the economy, the environment, and the functioning of the government. Moreover, critical infrastructures increasingly depend on information and communication technologies (ICT) or, in short, cyber. Cyber security and resilience are...
book 2015
document
Luiijf, H.A.M. (author)
Nederland heeft drie handreikingen overhandigd aan de deelnemende landen en private partijen die deelnamen aan de Global Conference on GlobalSpace 2015. Hieronder een korte beschrijving en verwijzingen naar de handreikingen
article 2015
document
Harbers, M. (author), Aydogan, R. (author), Jonker, C.M. (author), Neerincx, M.A. (author)
Human teamwork can be supported by agent technology by providing each human team member with an agent that monitors, supports and advices the human. The agent can, for example, monitor the human's workload, and share that information with (agents of) other team members so that work can be distributed effectively. However, though sharing...
conference paper 2014
document
van den Homberg, M.J.C. (author), Pieneman, R.B.J. (author), van de Kuijt, J. (author), van den Berg, P. (author)
In the early phase of the crisis spectrum it is particularly challenging to apply a comprehensive approach. Complexities involve how to reach a shared context and conflict analysis, involve the local perspective, have an explicit Theory of Change and how to deal with political sensitivity. Military and civilian actors usually only start to share...
conference paper 2014
document
Schotanus, H.A. (author), Hartog, T. (author), Hut, D.H. (author), Boonstra, D. (author)
Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication architectures cannot deliver. This paper informs...
conference paper 2011
document
Helmholt, K.A. (author), Broenink, E.G. (author)
Providing warmth, food, housing, and other necessities of life require the use of energy, which causes it to play a pivotal role in society. Changes in the production, distribution and consumption of energy (carriers) impact everyone. Next to well known (expected) changes in the area of renewable energy sources, we foresee the possibility of...
conference paper 2011
document
TNO Defensie en Veiligheid (author), van der Kleij, R. (author), van den Broek, J. (author), Cornelissen, M. (author), Essens, P.J.D.M. (author)
One of the challenges facing networked military organizations is to coordinate and integrate activities of organization components. Several studies have demonstrated the importance of boundary spanning as integrative mechanism, and, more specifically, individual communication holes within organizations. Boundary spanners are considered to be...
conference paper 2010
document
Werkhoven, P.J. (author), Schraagen, J.M.C. (author), Punte, P.A.J. (author), TNO Technische Menskunde (author)
The visual component of conversational media such as videoconferencing systems communicates important non-verbal information such as facial expressions, gestures, posture and gaze. Unlike the other cues, selective gaze depends critically on the configuration of cameras and monitors. Under isotropic videoconferencing conditions people see each...
article 2001
Searched for: subject%3A%22Information%255C%2Bsharing%22
(1 - 18 of 18)