Searched for:
(1 - 20 of 8,821)

Pages

document
Pasqualetto Cassinis, L. (author), Fónod, R. (author), Gill, E.K.A. (author), Ahrns, Ingo (author), Gil Fernandez, Jesus (author)
This paper reports on a comparative assessment of Image Processing (IP) tech- niques for the relative pose estimation of uncooperative spacecraft with a monocular camera. Currently, keypoints-based algorithms suffer from partial occlusion of the target, as well as from the different illumination conditions be- tween the required offline database...
conference paper 2019
document
Kechagia, M. (author), Devroey, X.D.M. (author), Panichella, A. (author), Gousios, Giorgos (author), van Deursen, A. (author)
Application Programming Interfaces (APIs) typically come with (implicit) usage constraints. The violations of these constraints (API misuses) can lead to software crashes. Even though there are several tools that can detect API misuses, most of them suffer from a very high rate of false positives. We introduce Catcher, a novel API misuse...
conference paper 2019
document
Gujarati, Arpan (author), Nasri Nasrabadi, Mitra (author), Majumdar, Rupak (author), Brandenburg, Björn B. (author)
Estimating metrics such as the Mean Time To Failure (MTTF) or its inverse, the Failures-In-Time (FIT), is a central problem in reliability estimation of safety-critical systems. To this end, prior work in the real-time and embedded systems community has focused on bounding the probability of failures in a single iteration of the control loop,...
conference paper 2019
document
Nasri Nasrabadi, Mitra (author), Nelissen, Geoffrey (author), Brandenburg, Björn B. (author)
Most recurrent real-time applications can be modeled as a set of sequential code segments (or blocks) that must be (repeatedly) executed in a specific order. This paper provides a schedulability analysis for such systems modeled as a set of parallel DAG tasks executed under any limited-preemptive global job-level fixed priority scheduling...
conference paper 2019
document
Janssen, M.F.W.H.A. (author)
IT Governance is often viewed as an important factor for creating business value for firms. However, there is limited work investigating the relationship between architectural governance and the contributions of enterprise architecture (EA) to firm performance. Based on a study of more than 15 cases the analyzes shows that architectural...
conference paper 2019
document
Pereira, Gabriela Viale (author), Estevez, Elsa (author), Krimmer, Robert (author), Janssen, M.F.W.H.A. (author), Janowski, Tomasz (author)
This workshop of the CAP4CITY (Erasmus+ Strengthening Governance Capacity for Smart Sustainable Cities) project is to promote and stimulate the discussion and networking in the area of Digital Government. Smart Sustainable Cities and related concepts of Digital, Intelligent and Smart Cities represent a progression of how cities around the...
conference paper 2019
document
Ubacht, J. (author), Tan, Y. (author), Janssen, M.F.W.H.A. (author), Rukanova, B.D. (author)
The use of blockchain technology has the potential to change many core processes in society, industry, education, healthcare, business and government by introducing new ways of transacting that are expected to change the traditional ways in which organizations exchange data and money. Proponents of developing blockchain applications suggest...
conference paper 2019
document
Cubuk, Ecem Buse Sevinc (author), Karkin, N. (author), Yavuz, Nilay (author)
In public administration (PA) literature, there are a number of big questions regarding institutional and organizational factors. Competency formation, availability of resources and citizen empowerment [1] are among them. The importance of big questions must not rely on instrumentality; rather should focus on how and whether they have...
conference paper 2019
document
Lancelot, P.M.G.J. (author), De Breuker, R. (author)
In this paper, a methodology is presented to size an aircraft wing-box accounting for steady and dynamic loads combined with active control. Several aerodynamic corrections are used and benchmarked to ensure a consistent level of fidelity during the load analysis. Reduced order models (ROM) of the aircraft movables, gust loads and maneuvers...
conference paper 2019
document
Anderson, Ross (author), Barton, Chris (author), Böhme, Rainer (author), Clayton, Richard (author), Hernandez Ganan, C. (author), Grasso, Tom (author), Levi, Michael (author), Moore, Tyler (author), Vasek, Marie (author)
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the...
conference paper 2019
document
Slingerland, G. (author), Mulder, I.J. (author), Jaskiewicz, T.J. (author)
The current work explores the participation divide that is oftentimes at play within local citizen communities. The studied case illustrates a common situation where the majority of local citizens does not participate in public space improvement and maintenance activities organised by local community activists. The presented research involved...
conference paper 2019
document
Molina, Urko Rueda (author), Kifetew, Fitsum Meshesha (author), Devroey, X.D.M. (author)
This short paper reports our observations after six editions of the JUnitContest that benchmarks automated unit test generation tools for Java programs. We discuss our experience and depict the current state-of-the-art and identify potential future research directions. We advocate the use of benchmark as a standard practice to enhance maturity...
conference paper 2019
document
Kifetew, Fitsum Meshesha (author), Devroey, X.D.M. (author), Molina, Urko Rueda (author)
We report on the results of the seventh edition of the JUnit tool competition. This year, four tools were executed on a benchmark with (i) new classes, selected from real-world software projects, and (ii) challenging classes from the previous edition. We use Randoop and manual test suites from the projects as baselines. Given the interesting...
conference paper 2019
document
Panichella, A. (author)
Over the last decades, white-box search-based techniques have been applied to automate the design and the execution of test cases. While most of the research effort has been devoted to unit-level testing, integration-level test case generation requires to solve several open challenges, such as the combinatorial explosion of conditions or pre...
conference paper 2019
document
Meesters, K.J.M.G. (author), Nespeca, V. (author), Comes, M. (author)
Information and supporting information systems is a key element in an effective emergency response. From creating situational awareness to informed decision making, information enables responders to optimize their decisions and operations. Today, with the increased availability of information technology around the globe, a new active player in...
conference paper 2019
document
Abdelgawad, Ahmed (author), Comes, M. (author)
Evaluation and testing are major steps in the development of any information system, particularly if it is to be used in high-risk contexts such as conflicts. While thus far there are various approaches for testing against technology requirements; usability or usefulness, there is a lack of a comprehensive evaluation framework that combines the...
conference paper 2019
document
Morishita, Shun (author), Hoizumi, Takuya (author), Ueno, Wataru (author), Tanabe, Rui (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Yoshioka, Katsunari (author), Matsumoto, Tsutomu (author)
Open-source honeypots are a vital component in the protection of networks and the observation of trends in the threat landscape. Their open nature also enables adversaries to identify the characteristics of these honeypots in order to detect and avoid them. In this study, we investigate the prevalence of 14 open-source honeypots running more or...
conference paper 2019
document
Yalcinkaya, Beyazit (author), Nasri Nasrabadi, Mitra (author), Brandenburg, Björn B. (author)
Exact schedulability analysis of limited-preemptive (or non-preemptive) real-time workloads with variable execution costs and release jitter is a notoriously difficult challenge due to the scheduling anomalies inherent in non-preemptive execution. Furthermore, the presence of self-suspending tasks is well-understood to add tremendous...
conference paper 2019
document
Polachan, K.P. (author), Prabhakar, T. V. (author), Singh, Chandramani (author), Kuipers, F.A. (author)
In this paper, we consider Tactile Cyber Physical Systems (TCPS), which differ from typical CPS in that haptic sensory feedback is included. In particular, we design and implement a TCPS testbed, called TCPSbed, using well-defined components and interfaces glued together using APIs. In addition to real connections, our testbed supports the...
conference paper 2019
document
Röggla, Thomas (author), Li, Jie (author), Fjellsten, Stefan (author), Jansen, Jack (author), Kegel, Ian (author), Pilgrim, Luke (author), Trimby, Martin (author), Williams, Doug (author), Cesar Garcia, P.S. (author)
While traditional live-broadcasting is typically comprised of a handful of well-defined workflows, these become insufficient when targeting multiple screens and interactive companion devices on the viewer side. In this case study, we describe the development of an end-to-end system enabling immersive and interactive experiences using an...
conference paper 2019
Searched for:
(1 - 20 of 8,821)

Pages