Searched for: +
(1 - 13 of 13)
document
Al-Kaswan, A. (author)
Large Language Models (LLMs) are gaining popularity in the field of Natural Language Processing (NLP) due to their remarkable accuracy in various NLP tasks. LLMs designed for coding are trained on massive datasets, which enables them to learn the structure and syntax of programming languages. These datasets are scraped from the web and LLMs...
conference paper 2024
document
Xu, Li (author), Li, T. (author), Erkin, Z. (author)
Verifiable Credential (VC) is a new standard proposed by the W3C association to facilitate the expression and verification of third-party-verified credentials on the Internet, such as passports or diplomas. However, the current VC data model lacks an explicit revocation design that guarantees the secure operations of the system, which limits its...
conference paper 2023
document
Colenberg, Susanne (author), Romero Herrera, Natalia (author), Keyson, David (author)
Background and aim - Lack of privacy is a prominent issue in contemporary offices. This study aimed to identify interior design features that jointly influence satisfaction with privacy and noise in the office workspace, and estimate their predictive power. This knowledge can inform strategic workplace design. Methods - Eight design features...
conference paper 2022
document
Colenberg, S.E. (author), Romero Herrera, N.A. (author), Keyson, D.V. (author)
Background and aim – Lack of privacy is a prominent issue in contemporary offices. This study aimed to identify interior design features that jointly influence satisfaction with privacy and noise in the office workspace, and estimate their predictive power. This knowledge can inform strategic workplace design.<br/>Methods – Eight design features...
conference paper 2022
document
Colenberg, S.E. (author), Romero Herrera, N.A. (author), Keyson, D.V. (author)
The prolonged working from home during the recent pandemic has increased awareness of the social function of the office: employees missed informal social interaction with co-workers, face-to-face meetings, and spontaneous encounters. If the trend of hybrid working persists, one of the main functions of the physical office will be to support face...
conference paper 2022
document
Li, Qiongxiu (author), Lopuhaä-Zwakenberg, Milan (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)
Both communication overhead and privacy are main concerns in designing distributed computing algorithms. It is very challenging to address them simultaneously as encryption methods required for privacy-preservation often incur high communication costs. In this paper, we argue that there is a fundamental link between communication efficiency...
conference paper 2022
document
Hutiri, Wiebke (author), Ding, Aaron Yi (author)
In an age of surveillance capitalism, anchoring the design of emerging smart services in trustworthiness is urgent and important. Edge Intelligence, which brings together the fields of AI and Edge computing, is a key enabling technology for smart services. Trustworthy Edge Intelligence should thus be a priority research concern. However,...
conference paper 2022
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, M. Graesboll (author)
Over the past decades, privacy-preservation has received considerable attention, not only as a consequence of regulations such as the General Data Protection Regulation in the EU, but also from the fact that people are more concerned about data abuse as the world is becoming increasingly digitized. In this paper we propose a convex optimization...
conference paper 2020
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)
In many applications of wireless sensor networks, it is important that the privacy of the nodes of the network be protected. Therefore, privacy-preserving algorithms have received quite some attention recently. In this paper, we propose a novel convex optimization-based solution to the problem of privacy-preserving distributed average consensus....
conference paper 2020
document
Ali-Eldin, A.M.T. (author), Zuiderwijk-van Eijk, A.M.G. (author), Janssen, M.F.W.H.A. (author)
While the opening of data has become a common practice for both governments and companies, many datasets are still not published since they might violate privacy regulations. The risk on privacy violations is a factor that often blocks the publication of data and results in a reserved attitude of governments and companies. Additionally, even...
conference paper 2017
document
Harbers, M. (author), Aydogan, R. (author), Jonker, C.M. (author), Neerincx, M.A. (author)
Human teamwork can be supported by agent technology by providing each human team member with an agent that monitors, supports and advices the human. The agent can, for example, monitor the human’s workload, and share that information with (agents of) other team members so that work can be distributed effectively. However, though sharing...
conference paper 2014
document
Jurgenhake, B. (author)
In a time in which 50% of the world inhabitants live in an urban context, a percentage that will definitely even grow, it is important to ask whether the residential building within daily public and anonymous city life still has the quality of privacy and identity of a ‘home’. The on-going PhD research “The façade as an intermediary element...
conference paper 2013
document
Blok, M. (author), De Korte, E.M. (author), Groenesteijn, L. (author), Formanoy, M. (author), Vink, P. (author)
conference paper 2009
Searched for: +
(1 - 13 of 13)