Searched for:
(1 - 20 of 8,745)

Pages

document
Anderson, Ross (author), Barton, Chris (author), Böhme, Rainer (author), Clayton, Richard (author), Hernandez Ganan, C. (author), Grasso, Tom (author), Levi, Michael (author), Moore, Tyler (author), Vasek, Marie (author)
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the...
conference paper 2019
document
Slingerland, G. (author), Mulder, I.J. (author), Jaskiewicz, T.J. (author)
The current work explores the participation divide that is oftentimes at play within local citizen communities. The studied case illustrates a common situation where the majority of local citizens does not participate in public space improvement and maintenance activities organised by local community activists. The presented research involved...
conference paper 2019
document
Meesters, K.J.M.G. (author), Nespeca, V. (author), Comes, M. (author)
Information and supporting information systems is a key element in an effective emergency response. From creating situational awareness to informed decision making, information enables responders to optimize their decisions and operations. Today, with the increased availability of information technology around the globe, a new active player in...
conference paper 2019
document
Morishita, Shun (author), Hoizumi, Takuya (author), Ueno, Wataru (author), Tanabe, Rui (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Yoshioka, Katsunari (author), Matsumoto, Tsutomu (author)
Open-source honeypots are a vital component in the protection of networks and the observation of trends in the threat landscape. Their open nature also enables adversaries to identify the characteristics of these honeypots in order to detect and avoid them. In this study, we investigate the prevalence of 14 open-source honeypots running more or...
conference paper 2019
document
Abdelgawad, Ahmed (author), Comes, M. (author)
Evaluation and testing are major steps in the development of any information system, particularly if it is to be used in high-risk contexts such as conflicts. While thus far there are various approaches for testing against technology requirements; usability or usefulness, there is a lack of a comprehensive evaluation framework that combines the...
conference paper 2019
document
van den Bercken, Laurens (author), Sips, R.H.J. (author), Lofi, C. (author)
Health literacy, i.e. the ability to read and understand medical text, is a relevant component of public health. Unfortunately, many medical texts are hard to grasp by the general population as they are targeted at highly-skilled professionals and use complex language and domain-specific terms. Here, automatic text simplification making text...
conference paper 2019
document
Akgün, O.C. (author), Mangia, Mauro (author), Pareschi, Fabio (author), Rovatti, Riccardo (author), Setti, Gianluca (author), Serdijn, W.A. (author)
This paper presents the design of an ultra-low energy, rakeness-based compressed sensing (CS) system that utilizes time-mode (TM) signal processing (TMSP). To realize TM CS operation, the presented implementation makes use of monostable multivibrator based analog-to-time converters, fixed-width pulse generators, basic digital gates and an...
conference paper 2019
document
Abu Lebdeh, M.F.M. (author), Reinsalu, Uljana (author), Du Nguyen, H.A. (author), Wong, J.S.S.M. (author), Hamdioui, S. (author)
Emerging computing applications (such as big-data and Internet-of-things) are extremely demanding in terms of storage, energy and computational efficiency, while today’s architectures and device technologies are facing major challenges making them incapable to meet these demands. Computation-in-Memory (CIM) architecture based on memristive...
conference paper 2019
document
Sharifi Noorian, S. (author), Psyllidis, A. (author), Bozzon, A. (author)
Street-level imagery contains a variety of visual information about the facades of Points of Interest (POIs). In addition to general mor- phological features, signs on the facades of, primarily, business-related POIs could be a valuable source of information about the type and iden- tity of a POI. Recent advancements in computer vision could...
conference paper 2019
document
Azizah, Erwina Nurul (author), Pujianto, Utomo (author), Nugraha, Eki (author), Darusalam, D. (author)
People now trying to maximizing function of Virtual Learning Environment. Virtual Learning Environment, not only as a place to help learning system but now has become a place of learning itself. But with the change of the learning system, teacher now have difficulty to monitor the activity of the student and the learning material. Although...
conference paper 2019
document
Laguarda Sanchez, L. (author), Hickel, S. (author), Schrijer, F.F.J. (author), van Oudheusden, B.W. (author)
The dynamic interaction of two planar and asymmetric shock waves at a free-stream Mach number M¥ = 3 is studied numerically in order to characterize the transition between the regular (RI) and Mach (MI) interaction patterns. Shock deflection disturbances are independently introduced in the form of a sinusoidal oscillation of the shock generator....
conference paper 2019
document
Hu, W. (author), Hickel, S. (author), van Oudheusden, B.W. (author)
The unsteadiness of shock wave-boundary layer interactions is investigated in a transitional backward-facing step flow at Ma=1:7 and Red0 =13718 using large eddy simulation. The mean and instantaneous flow shows that the laminar inflow undergoes a laminar-to-turbulence transition in which Kelvin-Helmholtz vortices form, distort and eventually...
conference paper 2019
document
Laguarda Sanchez, L. (author), Schrijer, F.F.J. (author), van Oudheusden, B.W. (author), Hickel, S. (author)
An experimental investigation of shock-shock interactions has been conducted with the aim of studying the transition between Regular (RI) and Mach (MI) interactions induced by a variation of the inflow Mach number. The experiments were conducted in the TST-27 wind tunnel at Delft University of Technology. For all cases, the wind tunnel runs were...
conference paper 2019
document
van Duijvenbode, J.R. (author), Buxton, M.W.N. (author)
Metallurgical attributes are often omitted from the mine to metal valuation models since they are either absent or unreliable. However, recent developments in sensor technology indicate the potential to collect information on metallurgical properties directly or by measurement of proxies. Integrating this information back into the resource model...
conference paper 2019
document
Tambe, S.S. (author), Schrijer, F.F.J. (author), Gangoli Rao, A. (author), Veldhuis, L.L.M. (author)
Boundary layer instabilities and the formation of coherent spiral vortices over a rotating cone and ellipsoid are studied experimentally. It is found that under a non-axial inflow, the breaking of symmetry in the flow field significantly disturbs the coherence and delays the formation of spiral vortices to higher local Reynolds numbers (Re_l)...
conference paper 2019
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad Rostami, N. (author), van Gelder, P.H.A.J.M. (author)
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In...
conference paper 2019
document
Alons-Hoen, Kristel (author), Somers, Guy (author), van Duin, Ron (author)
In order to meet emission targets for 2050 in Europe transport needs to be executed more 2 efficiently. A promising way to make transport more efficient is synchromodal transport. When the 3 service provider has more flexibility to arrange transport, the utilization and use of intermodal transport, 4 such as rail, can be increased and emissions...
conference paper 2019
document
Kiel, J (author), Taale, Henk (author)
In Europe, different road authorities have to face the ever increasing pressure to integrate their road network service provision with - often conflicting - different trends and conditions such as congestion, climate change, individualism, urbanization, safety, environmental issues and economic growth. There is also a need to cooperate with...
conference paper 2019
document
Snelder, M. (author), Wilmink, Isabel (author), van der Gun, J.P.T. (author), Bergveld, HJ (author), Hoseini, Parvin (author), van Arem, B. (author)
This paper presents a model specifically developed to explore the mobility impacts of connected and automated driving and shared mobility. It is an explorative iterative model that uses an elasticity model for destination choice, a multinomial logit model for mode choice and a network fundamental diagram to assess traffic impacts. To the best of...
conference paper 2019
document
LeRon Shults, F. (author), Wildman, Wesley J. (author), Dignum, M.V. (author)
This paper describes a framework for ethical analysis of the practice of computer Modeling & Simulation (M&S). Each of the authors presents a computational model as a case study and offers an ethical analysis by applying the philosophical, scientific, and practical components of the framework. Each author also provides a constructive...
conference paper 2019
Searched for:
(1 - 20 of 8,745)

Pages