Searched for: subject%3A%22Information%255C%2Buse%22
(1 - 20 of 20)
document
Coopmans, T. (author), Knegjens, R. (author), Dahlberg, A. (author), Maier, D. (author), Nijsten, L. (author), de Oliveira Filho, J. (author), Papendrecht, M. (author), Rabbie, J. (author), Rozp?dek, F. (author), Skrzypczyk, M. (author), Wubben, L. (author), de Jong, W. (author), Podareanu, D. (author), Torres-Knoop, A. (author), Elkouss, D. (author), Wehner, S. (author)
article 2021
document
Lathouwers, S. (author), Everts, M.H. (author), Huisman, M. (author)
String sanitizers are widely used functions for preventing injection attacks such as SQL injections and cross-site scripting (XSS). It is therefore crucial that the implementations of such string sanitizers are correct. We present a novel approach to reason about a sanitizer's correctness by automatically generating a model of the implementation...
conference paper 2020
document
Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Dalmolen, S. (author), van Engers, T.M. (author)
Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a 'hub-model' approach. This...
conference paper 2020
document
Dalmolen, S. (author), Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Punter, M. (author)
Organizations are becoming ever more aware that their data is a valuable asset requiring protection against mis-use. Therefore, being in control over the usage conditions (i.e. data sovereignty) is a prerequisite for sharing sensitive data in (increasingly complex) supply chains. Maintaining sovereignty applies to both the primary shared data...
conference paper 2020
document
Hauge, M. (author), Mjelde, T.M. (author), Holtzer, A. (author), Drijver, F. (author), in't Velt, R. (author), Hegland, A.M. (author), Orbekk, E. (author), Barz, C. (author), Kirchhoff, J. (author), Rogge, H. (author)
Combining several mobile networks in order to build a federated network at the tactical edge is a challenge because of the high degree of mobility and limited data capacity available in these networks. Providing the different partners in a coalition with direct connectivity at the tactical edge can be beneficial since it allows for better...
conference paper 2020
document
Liu, L.C. (author), Sileno, G. (author), van Engers, T. (author)
The combination of smart contracts with blockchain technology enables the authentication of the contract and limits the risks of non-compliance. In principle, smart contracts can be processed more efficiently compared to traditional paper-based contracts. However, current smart contracts have very limited capabilities with respect to normative...
conference paper 2020
document
Suri, N. (author), Marcus, K.M. (author), van den Broek, C. (author), Bastiaansen, H.J.M. (author), Lubkowski, P. (author), Hauge, M. (author)
The Anglova scenario was developed as part of the NATO IST-124 Research Task Group on Improving Connectivity and Network Efficiency in Heterogeneous Tactical Networks. Since then, it has been successfully used to conduct emulation-based experimentation by multiple groups. This paper describes extensions to the Anglova scenario for the purpose of...
conference paper 2019
document
Bastiaansen, H.J.M. (author), van den Broek, C. (author), Kudla, T. (author), Isenor, A. (author), Webb, S. (author), Suri, N. (author), Masini, A. (author), Bilir, C. (author), Cocelli, M. (author)
Although ever more and powerful information collection, processing, storage, and communication devices are available, disadvantaged battlefield connectivity currently prevents full exploitation of the potentially available information. An infrastructure for adaptive information processing and distribution may improve this situation by providing...
conference paper 2019
document
Suri, N. (author), Breedy, M.R. (author), Marcus, K.M. (author), Fronteddu, R. (author), Cramer, E.R. (author), Morelli, A. (author), Campioni, L. (author), Provosty, M. (author), Enders, C. (author), Tortonesi, M. (author), Nilsson, J. (author)
Data dissemination is one of the fundamental requirements for any military network. Types of data include Situation Awareness data such as position reports, sensor data, and Commander's Operational Orders and Intelligence Reports. Different data types have different dissemination patterns and requirements. Some data types such as position...
conference paper 2019
document
Astudillo, R. (author), de Gier, J.M. (author), van Gijzen, M.B. (author)
The Induced Dimension Reduction method (IDR(s)) (Sonneveld and van Gijzen, 2008) is a short-recurrences Krylov method to solve systems of linear equations. In this work, we accelerate this method using spectral information. We construct a Hessenberg relation from the IDR(s) residual recurrences formulas, from which we approximate the eigenvalues...
article 2019
document
Sileno, G. (author), Boer, A. (author), van Engers, T. (author)
conference paper 2019
document
Schuts, M. (author), Hooman, J.J.M. (author), Kurtev, I. (author), Swagerman, D.J. (author)
Cyber-physical systems consist of many hardware and software components. Over the life-cycle of these systems, components are replaced or updated. To avoid integration problems, good interface descriptions are crucial for component-based development of these systems. For new components, a Domain Specific Language called Component Modeling...
conference paper 2018
document
Ruiz-Armenteros, A.M. (author), Lazecky, M. (author), Ruiz-Constan, A. (author), Bakon, M. (author), Delgado, J. Manuel (author), Sousa, J.J. (author), Galindo-Zaldivar, J. (author), de Galdeano, C.S. (author), Caro-Cuenca, M. (author), Martos-Rosillo, S. (author), Jimenez-Gavilan, P. (author), Perissin, D. (author)
In this paper we analyze the subsidence behavior of a coastal area in the province of Malaga (Costa del Sol), southern Spain, in the period 1992-2018 using C-band SAR interferometry. The area comprises several zones of interest where continuous deformation has happened during the analyzed period. Using SAR data from ESA's ERS-1/2, Envisat, and...
conference paper 2018
document
Ruiz-Armenteros, A.M. (author), Lazecky, M. (author), Hlavacova, I. (author), BakoAaˆ, M. (author), manuel Delgado, J. (author), Sousa, J.J. (author), Lamas-Fernandez, F. (author), Marchamalo, M. (author), Caro-Cuenca, M. (author), Papco, J. (author), Perissin, D. (author)
Dams require continuous security and monitoring programs, integrated with visual inspection and testing in dam surveillance programs. New approaches for dam monitoring focus on multi-sensor integration, taking into account emerging technologies such as GNSS, optic fiber, TLS, InSAR techniques, GBInSAR, GPR, that can be used as complementary data...
conference paper 2018
document
Suri, N. (author), Nilsson, J. (author), Hansson, A. (author), Sterner, U. (author), Marcus, K. (author), Misirlioglu, L. (author), Hauge, M. (author), Peuhkuri, M. (author), Buchin, B. (author), In'T Velt, R. (author), Breedy, M. (author)
The Anglova scenario is designed to support experimentation with tactical networking environments and provides node mobility and network connectivity for a realistic battalion-sized military operation consisting of three vignettes, including the deployment of armored vehicles, surveillance of the maritime domain and an urban operation with a...
conference paper 2018
document
Moreira, J. (author), Ferreira Pires, L. (author), Sinderen, M.V. (author), Daniele, L. (author)
Recently, a number of ontology-driven healthcare systems have been leveraged by the Internet-of-Things (IoT) technologies, which offer opportunities to improve patient monitoring and abnormal situation detection with support of medical wearables and cloud infrastructure. Usually, these systems rely on IoT ontologies to represent sensor data...
conference paper 2018
document
Langley, D.J. (author), Tel, J.W. (author)
Protests that target firms’ socially irresponsible behavior are increasingly organized via digital media. This study uses two methods to investigate the effects that online protests and mitigating firm responses have on shareholders’ and consumers’ evaluation. The first method is a financial analysis that includes an event study which measures...
conference paper 2017
document
van den Broek, S.P. (author), Nieuwenhuizen, R.P.J. (author), Fischer, N.M. (author), ter Haar, F.B. (author), Baan, J. (author), Van Der Stap, N. (author), Dijk, J. (author), Schutte, K. (author)
Naval ships have camera systems available to assist in performing their operational tasks. Some include automatic detection and tracking, assisting an operator by keeping a ship in view or by keeping collected information about ships. Tracking errors limit the use of camera information. When keeping a ship in view, an operator has to re-Target a...
conference paper 2016
document
Verbree, E. (author), Stoter, J. (author), Zlatanova, S. (author), de Haan, G. (author), Reuvers, M. (author), Vosselman, G. (author), Goos, J. (author), van Berlo, L. (author), Klooster, R. (author)
This paper presents the work in progress of a research project that aims at establishing a reference model for 3D geo-information in the Netherlands. The research project is initiated by four national organizations: 1) Ministry of Housing, Spatial Planning and the Environment, 2) Kadaster, 3) Geonovum, and 4) the Netherlands Geodetic Commission....
conference paper 2010
document
van Dongen, C.J.G. (author), Schraagen, J.M.C. (author), Eikelboom, A. (author), te Brake, G.M. (author), TNO Defensie en Veiligheid (author)
Building up situation understanding is one of the most difficult tasks in the beginning stages of largescale accidents. As ambiguous information about the events becomes available, decision-makers are often tempted to quickly develop a particular story to explain the observed events. As the accident evolves, decision-makers can fail to revise...
conference paper 2005
Searched for: subject%3A%22Information%255C%2Buse%22
(1 - 20 of 20)