Searched for: subject:"Information%5C+systems"
(1 - 20 of 126)

Pages

document
Martínez Gordón, R. (author), Morales España, G.A. (author), Sijm, J.P.M. (author), Faaij, A.P.C. (author)
The importance of spatial resolution for energy modelling has increased in the last years. Incorporating more spatial resolution in energy models presents wide benefits, but it is not straightforward, as it might compromise their computational performance. This paper aims to provide a comprehensive review of spatial resolution in energy models,...
article 2021
document
Imants, P. (author), Theeuwes, J. (author), Bronkhorst, A.W. (author), Martens, M.H. (author)
With the arrival of new technologies more en-route traffic information sources have become available, especially in-car information sources. The aim of this study is to gain more insight into the effect of multiple, and possibly conflicting, sources of information on route choice and driver behaviour. In a driving simulator experiment,...
article 2021
document
Lathouwers, S. (author), Everts, M.H. (author), Huisman, M. (author)
String sanitizers are widely used functions for preventing injection attacks such as SQL injections and cross-site scripting (XSS). It is therefore crucial that the implementations of such string sanitizers are correct. We present a novel approach to reason about a sanitizer's correctness by automatically generating a model of the implementation...
conference paper 2020
document
Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Dalmolen, S. (author), van Engers, T.M. (author)
Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a 'hub-model' approach. This...
conference paper 2020
document
Dalmolen, S. (author), Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Punter, M. (author)
Organizations are becoming ever more aware that their data is a valuable asset requiring protection against mis-use. Therefore, being in control over the usage conditions (i.e. data sovereignty) is a prerequisite for sharing sensitive data in (increasingly complex) supply chains. Maintaining sovereignty applies to both the primary shared data...
conference paper 2020
document
Suri, N. (author), Marcus, K.M. (author), van den Broek, C. (author), Bastiaansen, H.J.M. (author), Lubkowski, P. (author), Hauge, M. (author)
The Anglova scenario was developed as part of the NATO IST-124 Research Task Group on Improving Connectivity and Network Efficiency in Heterogeneous Tactical Networks. Since then, it has been successfully used to conduct emulation-based experimentation by multiple groups. This paper describes extensions to the Anglova scenario for the purpose of...
conference paper 2019
document
Bastiaansen, H.J.M. (author), van den Broek, C. (author), Kudla, T. (author), Isenor, A. (author), Webb, S. (author), Suri, N. (author), Masini, A. (author), Bilir, C. (author), Cocelli, M. (author)
Although ever more and powerful information collection, processing, storage, and communication devices are available, disadvantaged battlefield connectivity currently prevents full exploitation of the potentially available information. An infrastructure for adaptive information processing and distribution may improve this situation by providing...
conference paper 2019
document
Hartog, F.D. (author), Dittrich, K. (author), de Nijs, J.M.M. (author)
The overwhelming commercial success of connected things and personal mobile devices is driving the dense and uncontrolled deployment of wireless networks using unlicensed frequency bands. This results in heavy congestion and interference, leading to considerable loss of network performance. The only sustainable solution is some form of...
conference paper 2019
document
Suri, N. (author), Breedy, M.R. (author), Marcus, K.M. (author), Fronteddu, R. (author), Cramer, E.R. (author), Morelli, A. (author), Campioni, L. (author), Provosty, M. (author), Enders, C. (author), Tortonesi, M. (author), Nilsson, J. (author)
Data dissemination is one of the fundamental requirements for any military network. Types of data include Situation Awareness data such as position reports, sensor data, and Commander's Operational Orders and Intelligence Reports. Different data types have different dissemination patterns and requirements. Some data types such as position...
conference paper 2019
document
Vrijlandt, M.A.W. (author), Struijk, E.L.M. (author), Brunner, L.G. (author), Veldkamp, J.G. (author), Witmans, N. (author), Maljers, D. (author), van Wees, J.D. (author)
Geothermal development in aquifer settings can benefit considerably from a wealth of subsurface data acquired over the past decades by oil and gas exploration and production. In the Netherlands, this data has been gathered by the Geological Survey and has been made publicly available (www.nlog.nl). Almost a decade ago this data was used to...
conference paper 2019
document
Schuts, M. (author), Hooman, J.J.M. (author), Kurtev, I. (author), Swagerman, D.J. (author)
Cyber-physical systems consist of many hardware and software components. Over the life-cycle of these systems, components are replaced or updated. To avoid integration problems, good interface descriptions are crucial for component-based development of these systems. For new components, a Domain Specific Language called Component Modeling...
conference paper 2018
document
Moreira, J. (author), Ferreira Pires, L. (author), Sinderen, M.V. (author), Daniele, L. (author)
Recently, a number of ontology-driven healthcare systems have been leveraged by the Internet-of-Things (IoT) technologies, which offer opportunities to improve patient monitoring and abnormal situation detection with support of medical wearables and cloud infrastructure. Usually, these systems rely on IoT ontologies to represent sensor data...
conference paper 2018
document
Ruiz-Armenteros, A.M. (author), Lazecky, M. (author), Ruiz-Constan, A. (author), Bakon, M. (author), Delgado, J. Manuel (author), Sousa, J.J. (author), Galindo-Zaldivar, J. (author), de Galdeano, C.S. (author), Caro-Cuenca, M. (author), Martos-Rosillo, S. (author), Jimenez-Gavilan, P. (author), Perissin, D. (author)
In this paper we analyze the subsidence behavior of a coastal area in the province of Malaga (Costa del Sol), southern Spain, in the period 1992-2018 using C-band SAR interferometry. The area comprises several zones of interest where continuous deformation has happened during the analyzed period. Using SAR data from ESA's ERS-1/2, Envisat, and...
conference paper 2018
document
Ruiz-Armenteros, A.M. (author), Lazecky, M. (author), Hlavacova, I. (author), BakoAaˆ, M. (author), manuel Delgado, J. (author), Sousa, J.J. (author), Lamas-Fernandez, F. (author), Marchamalo, M. (author), Caro-Cuenca, M. (author), Papco, J. (author), Perissin, D. (author)
Dams require continuous security and monitoring programs, integrated with visual inspection and testing in dam surveillance programs. New approaches for dam monitoring focus on multi-sensor integration, taking into account emerging technologies such as GNSS, optic fiber, TLS, InSAR techniques, GBInSAR, GPR, that can be used as complementary data...
conference paper 2018
document
Suri, N. (author), Nilsson, J. (author), Hansson, A. (author), Sterner, U. (author), Marcus, K. (author), Misirlioglu, L. (author), Hauge, M. (author), Peuhkuri, M. (author), Buchin, B. (author), In'T Velt, R. (author), Breedy, M. (author)
The Anglova scenario is designed to support experimentation with tactical networking environments and provides node mobility and network connectivity for a realistic battalion-sized military operation consisting of three vignettes, including the deployment of armored vehicles, surveillance of the maritime domain and an urban operation with a...
conference paper 2018
document
Fu, G. (author), Xiang Lin, H. (author), Heemink, A. (author), Lu, S. (author), Segers, A. (author), van Velzen, N. (author), Lu, T. (author), Xu, S. (author)
In this study, we investigate a strategy to accelerate the data assimilation (DA) algorithm. Based on evaluations of the computational time, the analysis step of the assimilation turns out to be the most expensive part. After a study of the characteristics of the ensemble ash state, we propose a mask-state algorithm which records the sparsity...
article 2017
document
de Koning, L. (author), van Dongen, C.J.G. (author), Thönissen, F.H. (author), Essens, P.J.M.D. (author), de Vries, T. (author)
In complex crises, coordination between organizations is challenging. Knowledge needed to coordinate, like responsibilities, capabilities and interdependencies between tasks are often not known or not communicated systematically. As a result, coordination develops gradually and causes confusion. In this paper we describe an approach and tool...
conference paper 2017
document
van Leeuwen, P. (author), Landman, R. (author), Buning, L. (author), Heffelaar, T. (author), Hogema, J. (author), van Hemert, J.M. (author), de Winter, J. (author), Happee, R. (author)
Driver distraction is a leading cause of crashes. The introduction of in-vehicle technology in the last decades has added support to the driving task. However, in-vehicle technologies and handheld electronic devices may also be a threat to driver safety due to information overload and distraction. Adaptive in-vehicle information systems may be a...
conference paper 2017
document
Langley, D.J. (author), Tel, J.W. (author)
Protests that target firms’ socially irresponsible behavior are increasingly organized via digital media. This study uses two methods to investigate the effects that online protests and mitigating firm responses have on shareholders’ and consumers’ evaluation. The first method is a financial analysis that includes an event study which measures...
conference paper 2017
document
Ruiz-Armenteros, A.M. (author), Bakon, M. (author), Lazecky, M. (author), Delgado, J.M. (author), Sousa, J.J. (author), Perissin, D. (author), Caro-Cuenca, M. (author)
In this paper we compare the results obtained by three different InSAR tool packages, StaMPS, SARPROZ and P-SBAS (CNR-IREA) on G-POD for the processing of a mountainous area with up to 2,000 m high differences. For that we use two dataset ERS-1/2 and Envisat ASAR. The area (Sierra Tejeda, southern Spain) is located close to the coast line in the...
conference paper 2016
Searched for: subject:"Information%5C+systems"
(1 - 20 of 126)

Pages