Searched for: subject%3A%22Vital%255C%2BICT%255C%2BInfrastructure%22
(1 - 20 of 61)

Pages

document
Graafland, M. (author), Schraagen, J.M.C. (author), Boermeester, M.A. (author), Bemelman, W.A. (author), Schijven, M.P. (author)
Background: Surgical errors result from faulty decision-making, misperceptions and the application of suboptimal problem-solving strategies, just as often as they result from technical failure. To date, surgical training curricula have focused mainly on the acquisition of technical skills. The aim of this review was to assess the validity of...
article 2015
document
report 2013
document
Roosendaal, A.P.C. (author)
.
book 2013
document
Stokking, H.M. (author), van Brandenburg, R. (author), Boronat, F. (author), Montagud, M. (author)
Inter-Destination Media Synchronization (IDMS) is a process in which various receivers of the same content are synchronized in their playout. Standardization of an IDMS solution helps to enable interoperability between receivers manufactured by different companies. This paper describes the efforts by ETSI TISPAN and by the IETF AVTCORE working...
conference paper 2012
document
Luiijf, H.A.M. (author)
This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevance to consider possible threats and their impact...
bookPart 2012
document
Ellens, W. (author), Zivkovic, M. (author), Akkerboom, J.D. (author), Litjens, R. (author), van den Berg, J.L. (author)
In this paper we consider the general problem of resource provisioning within cloud computing. We analyze the problem of how to allocate resources to different clients such that the service level agreements (SLAs) for all of these clients are met. A model with multiple service request classes generated by different clients is proposed to...
conference paper 2012
document
Klaver, M.H.A. (author)
Op 16 oktober vond in Amsterdam The Grand Conference plaats. Deze conferentie werd georganiseerd door het Centre for the Protection of National Infrastructure (CPNI.NL) in nauwe samenwerking met de Europese Commissie, de Europese Network and Information Security Agency (ENISA), het Amerikaanse Department of Homeland Security (DHS) en het World...
article 2012
document
European cable networks have played an important role in the development of broadcast television and broadband services. The delivery of Gigabit broadband services is considered to be the next access network challenge in the development of broadband services. In this whitepaper we have studied and analysed the technical capabilities of cable...
report 2012
document
Klein Wolterink, W. (author), Heijenk, G. (author), van den Berg, J.L. (author)
Piggybacking on beacons is a forwarding technique in vehicular ad-hoc networks (VANET) as a means to disseminate data. With this technique data is attached to and transmitted along with scheduled beacons. Nodes are assumed to beacon asynchronously. In this paper we present a first version of an analytical model that is able to accurately capture...
conference paper 2012
document
Thurlings, M.E. (author), van Erp, J.B.F. (author), Brouwer, A.-M. (author), Blankertz, B. (author), Werkhoven, P.J. (author)
Event-related potential (ERP) based brain-computer interfaces (BCIs) employ differences in brain responses to attended and ignored stimuli. When using a tactile ERP-BCI for navigation, mapping is required between navigation directions on a visual display and unambiguously corresponding tactile stimuli (tactors) from a tactile control device:...
article 2012
document
Zhang, H. (author), Oostveen, J.C. (author), Litjens, R. (author)
In this document, we propose two approaches of obtaining radio distance between data cells (especially inactive ones) and terminal via real-time measurement. One approach is via terminals measurement of downlink beacon signals broadcast by inactive cells, showing their presence in the network. The other approach is via data base stations...
report 2012
document
Norp, A.H.J. (author), Landais, B. (author)
Many M2M applications use public telecommunications networks to transfer data from M2M devices to an M2M server. These telecommunications networks will have to be adapted to cope with the traffic generated by the projected growth of M2M applications. In the near future, many more devices will be connected to the existing networks, as more and...
conference paper 2012
document
Demchenko, Y. (author), Ngo, C. (author), Makkes, M.X. (author), Strijkers, R.J. (author), de Laat, C. (author)
This paper presents on-going research to develop the Inter-Cloud Architecture that should address problems in multi-provider multi-domain heterogeneous Cloud based applications integration and interoperability, including integration and interoperability with legacy infrastructure services. Cloud technologies are evolving as a common way of...
conference paper 2012
document
Kooij, R.E. (author)
In de afgelopen jaren verschijnen er steeds vaker voorbeelden in de media van storingen en kwetsbaarheden van (mobiele) communicatienetwerken. In dit artikel schetsen we enkele ontwikkelingen die het een uitdaging maken onze communicatie netwerken voldoende beschikbaar en robuust te maken. Aan de hand van een rekenvoorbeeld laten we zien hoe...
article 2012
document
Luiijf, H.A.M. (author)
Monitoring en besturing van steeds meer technische apparatuur,zowel lokaal als op afstand, gaat met computers. Zonder na te denken over enige vorm van informatiebeveiliging koppelt men de bediening van de apparatuur met het internet of publieke netwerken. Deskundigen maken zich al jaren zorgen. Recente incidenten laten zien dat bedrijven,...
article 2012
document
Roosendaal, A.P.C. (author), Kool, L. (author)
Een belangrijk deel van de gegevens die bedrijven gebruiken zijn persoonsgegevens. Als grondstof hebben deze gegevens een sterke economische rol, hoewel de waarde niet direct voor de hand lijkt te liggen. Vanuit privacyperspectief hebben deze gegevens een directe waarde: het verzamelen en gebruiken van gegevens over personen heeft een directe...
bookPart 2012
document
Sinclair, I. (author), Carter, J. (author), Kassner, S. (author), van Erp, J.B.F. (author), Weber, G. (author), Elliott, L. (author), Andrew, I. (author)
Tactile and haptic interaction is becoming increasingly important; ergonomic standards can ensure that systems are designed with sufficient concern for ergonomics and interoperability. ISO (through working group TC159/SC4/WG9) is developing international standards in this subject area, dual-tracked as both ISO and CEN standards. A framework and...
conference paper 2012
document
Alpár, G. (author), Batina, L. (author), Verdult, R. (author)
In this paper we propose a new solution for mobile payments called Tap2 technology. To use it, users need only their NFC-enabled mobile phones and credentials implemented on their smart cards. An NFC device acts like a bridge between service providers and secure elements and the secure credentials (on the card) are never revealed. In this way,...
conference paper 2012
document
Spitzer, A.M. (author), Worm, D.T.H. (author), Bomhof, F.W. (author), Bastiaans, M. (author)
Cloud computing is het op afroep, dynamisch ontsluiten van een verzameling ICT-middelen (zoals netwerken, opslag, verwerking, applicaties en diensten) over een netwerk. In dit rapport is uitgegaan van “Infrastructure as a Service”-clouds: opslag- en verwerkingscapaciteit wordt als dienst ter beschikking gesteld, hetzij als een publieke cloud (op...
report 2012
document
van Liempd, B.W.M. (author), Vidojkovic, M. (author), Lont, M. (author), Zhou, C. (author), Harpe, P. (author), Milosevic, D. (author), Dolmans, G. (author)
A fully differential envelope detector (ED) operating at 2.4GHz is designed in 90nm CMOS technology. The new design uses the common-gate topology to deal with large common-mode input signals through first-order current cancellation. Thereby, a fully differential ultra-low power super-regenerative front-end is enabled. It has a measured output...
conference paper 2012
Searched for: subject%3A%22Vital%255C%2BICT%255C%2BInfrastructure%22
(1 - 20 of 61)

Pages