- document
-
van Leeuwen, C.J. (author), Bouter, C.A. (author), Hindriks, H.N. (author), Wilterdink, R.W.J. (author)The Industry 4.0 Asset Administration Shell provides a standardized mechanism for collaboration between digital systems in the factory. Digital data within factories is typically stored in databases, we explore the requirements of providing an AAS as an interface to the data contained within the aforementioned databases. Based on these...conference paper 2022
- document
- Buendia, V.G. (author), Rodriguez, A.A. (author), Alrushud, K. (author), Podilchak, S.K. (author) conference paper 2022
- document
-
Fratric, P. (author), Sileno, G. (author), van Engers, T. (author), Klous, S. (author)The financial sector continues to experience wide digitalization; the resulting transactional activity creates large amounts of data, in principle enabling public and private actors to better understand the social domain they operate on, possibly facilitating the design of interventions to reduce illegal activity. However, the adversarial nature...conference paper 2022
- document
-
Hauge, M. (author), Mjelde, T.M. (author), Holtzer, A. (author), Drijver, F. (author), in't Velt, R. (author), Hegland, A.M. (author), Orbekk, E. (author), Barz, C. (author), Kirchhoff, J. (author), Rogge, H. (author)Combining several mobile networks in order to build a federated network at the tactical edge is a challenge because of the high degree of mobility and limited data capacity available in these networks. Providing the different partners in a coalition with direct connectivity at the tactical edge can be beneficial since it allows for better...conference paper 2020
- document
-
Spini, G. (author), van Heesch, M.P.P. (author), Veugen, P.J.M. (author), Chatterjea, S. (author)Optimizing the workflow of a complex organization such as a hospital is a difficult task. An accurate option is to use a real-time locating system to track locations of both patients and staff. However, privacy regulations forbid hospital management to assess location data of their staff members. In this exploratory work, we propose a secure...article 2019
- document
-
van der Vecht, B. (author), van Diggelen, J. (author), Peeters, M.M.M. (author), van Staal, W. (author), van der Waa, J. (author)Human-machine teaming (HMT) is a promising paradigm to approach situations in which humans and autonomous systems must closely collaborate. This paper describes SAIL, a software framework for implementing HMT-concepts. The approach of SAIL is to integrate existing autonomous systems in a framework, that serves as a social layer between...conference paper 2018
- document
-
van de Kamp, T. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitoring of relations among multiple clients. Since both the clients’ data and the predicates are encrypted, our system is suitable for situations in...conference paper 2018
- document
-
Kaptein, F. (author), Broekens, J. (author), Hindriks, K. (author), Neerincx, M.A. (author)This paper presents a cognitive (belief-desireintention based) agent that can self-explain its behaviour based on its goals and emotions. We implement a cognitive agent, embodied by a nao-robot or virtual avatar thereof, to play a quiz with its user. During the interaction the agent intelligently selects questions to optimally educate the user....conference paper 2018
- document
-
van de Kamp, T.R. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)Information sharing helps to better protect computer sys- tems against digital threats and known attacks. However, since security information is usually considered sensitive, parties are hesitant to share all their information through public channels. Instead, they only exchange this informa- tion with parties with whom they already established...conference paper 2016
- document
-
van Manthena, M.P.V. (author), Adrichem, N.L.M. (author), van den Broek, C. (author), Kuipers, F. (author)Network-as-a-Service (NaaS) is a cloud-based service model that offers on-demand network connectivity and the provisioning and management of network services. However, the actual orchestration of dynamically allocating underlying resources to customer requirements is not trivial. In this paper, we propose an SDN-based approach to support the...conference paper 2015
- document
-
Strijkers, R.J. (author), Makkes, M.X. (author), de Laat, C. (author), Meijer, R.J. (author)We introduce the concept of Internet factories. Internet factories structure the task of creating and managing application-specific overlay networks using infrastructure-as-a-service clouds. We describe the Internet factory architecture and report on a proof of concept with three examples that progressively illustrate its working. In one of...article 2014
- document
-
van de Burgt, Y. (author), Champion, A. (author), Bellouard, Y. (author)Carbon nanotube assemblies can be used for specific applications such as sensors and filters. We present a method and proof-of-concept to directly grow vertically-aligned carbon nanotube structures within sealed enclosures by means of a feedback-controlled laser-assisted chemical vapor deposition technique. The process is compatible with a...article 2013
- document
-
Strijkers, R.J. (author), Cristea, M. (author), Korkhov, V. (author), Marchal, D. (author), Belloum, A. (author), de Laat, C. (author), Meijer, R.J. (author), TNO Informatie- en Communicatietechnologie (author)Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network resources, which leads to unpredictable...conference paper 2010
- document
-
Hofman, W. (author), van Staalduinen, M. (author), TNO Informatie- en communicatietechnologie (author)This paper presents an approach to dynamic public service mediation. It is based on a conceptual model and the use of search and ranking algorithms. The conceptual model is based on Abstract State Machine theory. Requirements for dynamic service mediation were derived from a real-world case. The conceptual model and the algorithms are developed...conference paper 2010
- document
-
van Zon, A.T. (author), Roy Chowdhury, K. (author), TNO Defensie en Veiligheid (author)In this study, a regional scale gravity data set has been inverted to infer the structure (topography) of the top of the basement underlying sub-horizontal strata. We apply our method to this real data set for further proof of concept, validation and benchmarking against results from an earlier forward modelling done elsewhere.Our aim is to...article 2010
- document
-
Matthee, K.W. (author), Mweemba, G. (author), Pais, A.V. (author), Starn, G.V. (author), Rijken, M. (author), TNO Informatie- en Communicatietechnologie (author)This paper presents an initiative to bring connectivity to rural Zambia using a collaborative approach. In particular, it focuses on a proof-of-concept Internet service that has been implemented in rural Macha located in the Southern Province of Zambia. The service operates using satellite terminals (for connection to the Internet) and a...conference paper 2007
- document
-
Bruni, S. (author), Neto, A. (author), Gerini, G. (author), Bekers, D.J. (author), TNO Defensie en Veiligheid (author)This paper proposes a novel imaging architecture suited for use in the mm and the submm wave regimes. The structure is composed by a one dimensional array of radiators in order to enhance the image acquisition time with respect to single element detection. Moreover each of the antenna elements composing the array is characterized by a relatively...conference paper 2007
- document
-
TNO Defensie en Veiligheid (author), Verhagen, T.L.A. (author), Kemper, R. (author), Huisjes, H. (author), Knijnenburg, S.G. (author), Pronk, A. (author), van Klink, M.H. (author)Witness packs are widely used to enable the characterization of fragments generated during ballistic experiments. To assess the effect of fragment impact on an exposed (dis)mounted soldier a follow-up Vulnerability/ Lethality (V/L) simulation is essential. The overall process is elaborative and time consuming. This paper presents a ‘proof of...conference paper 2005