Searched for: subject:"Society"
(1 - 20 of 1,115)

Pages

document
Peeters, M.M.M. (author), van Diggelen, J. (author), van den Bosch, K. (author), Bronkhorst, A. (author), Neerincx, M.A. (author), Schraagen, J.M. (author), Raaijmakers, S. (author)
Within current debates about the future impact of Artificial Intelligence (AI) on human society, roughly three different perspectives can be recognised: (1) the technology-centric perspective, claiming that AI will soon outperform humankind in all areas, and that the primary threat for humankind is superintelligence; (2) the human-centric...
article 2020
document
Steen, M. (author), Nauta, J. (author)
We view Societal Engagement (SE) as a key element of Responsible Innovation (RI) and want to better understand the advantages and disadvantage of SE, both in theory and in practice. Moreover, we are interested in the role that Research and Technology Organizations (RTOs) might play in bridging the gap between fundamental research in academia and...
article 2020
document
Neumann, N.M.P. (author), Phillipson, F. (author), Versluis, R. (author)
Everyday computers can be used to solve numerous tasks which are often too difficult for humans to do quickly. Whether it is finding the shortest route between your home and your work or automatically finding the solutions to puzzles such as sudoku’s, computers can solve these problems faster and often better than humans can. On the other hand,...
article 2019
document
Vasenev, A. (author), Stahl, F. (author), Hamazaryan, H. (author), Ma, Z. (author), Shan, L. (author), Kemmerich, J. (author), Loiseaux, C. (author)
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research on OTA threats often exclude human actors, such as drivers and maintenance personnel, as well as leave aside privacy threats. This...
conference paper 2019
document
other 2019
document
Jasper, M. (author), Mues, M. (author), Murtovi, A. (author), Schlüter, M. (author), Howar, F. (author), Steffen, B. (author), Schordan, M. (author), Hendriks, D. (author), Schiffelers, R. (author), Kuppens, H. (author), Vaandrager, F.W. (author)
This paper covers the Rigorous Examination of Reactive Systems (RERS) Challenge 2019. For the first time in the history of RERS, the challenge features industrial tracks where benchmark programs that participants need to analyze are synthesized from real-world models. These new tracks comprise LTL, CTL, and Reachability properties. In addition,...
conference paper 2019
document
other 2019
document
other 2019
document
Eendebak, P.T. (author), Vazquez, A.R. (author)
article 2019
document
other 2019
document
Sioutas, S. (author), Stuijk, S. (author), Waeijen, L. (author), Basten, T. (author), Corporaal, H. (author), Somers, L. (author)
Efficient code generation for image processing applications continues to pose a challenge in a domain where high performance is often necessary to meet real-time constraints. The inherently complex structure found in most image-processing pipelines, the plethora of transformations that can be applied to optimize the performance of an...
article 2019
document
other 2019
document
Hofman, W.J. (author)
Data sharing is important to optimize and manage logistics chains. Open standards have been developed and implemented by various logistics stakeholders. These implementations have led to closed solutions with barriers to change and implement innovative concepts like synchromodality. This paper analyzes the implementation of open standards by...
bookPart 2019
document
Steen, M.G.D. (author)
Het gaat steeds vaker over algoritmes en artificiële intelligentie (AI) in overheid en openbaar bestuur. Zo was daar het 'Ongevraagd advies over de effecten van de digitalisering voor de rechtsstatelijke verhoudingen' van de Raad van State, over geautomatiseerde besluitvorming, zelflerende systemen en ketenbesluitvorming. Een mooi onderwerp....
article 2019
document
Yuan, R. (author), Rodrigues, J.F.D. (author), Tukker, A. (author), Behrens, P. (author)
In recent years, China has embarked upon an ambitious roll-out of non-fossil electricity investments. This has led to substantial impacts on carbon emissions, which is expected to continue into the future. However, non-fossil electricity has a significant carbon footprint in pre-operation activities, which we term investments (in the form of the...
article 2018
document
Holtzer, A.C.G. (author), in 't Velt, R. (author), Drijver, F.B. (author), Rogge, H. (author), Kirchhoff, J. (author), Barz, C. (author), van Adrichem, N.L.M. (author), Hauge, M. (author)
Interoperability on the lower tactical levels, e.g. in a multinational battalion or team, poses challenges because of the high degree of mobility and limited data capacity at the tactical edge. Enabling such multi-national teams with direct connectivity can be beneficial since it allows the combination of capabilities from multiple nations and...
conference paper 2018
document
van Adrichem, N.L.M. (author), Panneman, J.J. (author), van Deventer, M.O. (author)
Blockchains or blockchain technology (BCT) are technologies based on peer-to-peer cryptographic functions in a fully distributed architecture. The scalability of blockchains is threatened by the suboptimality of its data exchange model, due to the fact that most data is exchanged redundantly many times. Blockchain scalability is a widely...
public lecture 2018
document
Tavakoli, R. (author), Nabi, M. (author), Basten, T. (author), Goossens, K. (author)
IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) aims to improve communication reliability in Wireless Sensor Networks (WSNs) by reducing the impact of the medium access contention, multipath fading, and blocking of wireless links. While TSCH outperforms single-channel communications, cross-technology interference on the license-free ISM bands...
article 2018
document
van Lieshout, M. (author), Djafari, S. (author), Vermeulen, P. (author)
Privacy is becoming a business asset. A number of developments contribute to this repositioning of privacy. In the first place, the extreme growth in the creation of data in the past few years makes the protection of persons in relation to the processing of their data more relevant. Secondly, the advent of new services that are largerly based on...
other 2018
document
Bakker, B.J. (author), Gijsbers, G.J. (author), Bree, M.W. (author), Reijzen, M.E van (author)
report 2018
Searched for: subject:"Society"
(1 - 20 of 1,115)

Pages