Searched for: +
(25,101 - 25,120 of 172,116)

Pages

document
Murgia, Emiliana (author), Landoni, Monica (author), Huibers, Theo (author), Pera, M.S. (author)
In this manuscript, we discuss the findings from an introductory survey conducted with more than 50 teachers in Italy. We inquired about teachers’ opinions of educational technology used in the classroom, in particular search tools. Qualitative and quantitative data inferred from collected responses provide us with a multifaceted picture of...
conference paper 2022
document
Krijnen, T.F. (author), Noardo, F. (author), Arroyo Ohori, G.A.K. (author), Stoter, J.E. (author)
In this chapter, we start from the typical concepts from Geographic Information System (GIS): data representation, acquisition, querying and analysis. We follow with the transition from 2 to 3D GIS and describe open standards such as CityGML and CityJSON and recent advances on 3D geospatial simulations, computing and real-time GIS and...
book chapter 2022
document
Furlan, C. (author), Wandl, Alex (author), Cavalieri, Chiara (author), Unceta, Pablo Munoz (author)
Nowadays, the circularity concept dominates the debate on resource management in cities and territories. The idea is often used as a vehicle towards a more sustainable socio-ecological transition, based on the circular economy (CE) framework. Unlike other sustainability frameworks, CE originates in ecological and environmental economics and...
book chapter 2022
document
Dell'Anna, D. (author), Alechina, Natasha (author), Dalpiaz, Fabiano (author), Dastani, Mehdi (author), Löffler, Maarten (author), Logan, Brian (author)
Norms have been widely proposed as a way of coordinating and controlling the activities of agents in a multi-agent system (MAS). A norm specifies the behaviour an agent should follow in order to achieve the objective of the MAS. However, designing norms to achieve a particular system objective can be difficult, particularly when there is no...
conference paper 2022
document
Kootte, M.E. (author), Vuik, Cornelis (author)
Power system simulations should be adapted to be applicable to the trends that are currently evoked by the energy transition. This transition is pushing our power system from a traditional hierarchical system to a modern interactive system. In order to keep the supply and transport of energy safe and reliant, we need to change the way we perform...
book chapter 2022
document
Lupetti, M.L. (author), Romagnoli, L. (author)
This work illustrates and reflects on the design process of MLTK01, an open-source toolkit for fast prototyping tangible learning things, built on top of Arduino and ml5js. The toolkit was developed as a response to the current lack of fast and easy to use tools for tangible experiments with machine learning. Learning from insights gained...
conference paper 2022
document
Heinlein, A. (author), Klawonn, Axel (author), Rheinbach, Oliver (author), Röver, Friederike (author)
The Fast and Robust Overlapping Schwarz framework [7, 8], which is part of the Trilinos Software library [18], contains a parallel implementation of the generalized Dryja–Smith–Widlund (GDSW) preconditioner.
conference paper 2022
document
Heinlein, A. (author), Klawonn, Axel (author), Lanser, Martin (author), Weber, Janine (author)
For complex model problems with coefficient or material distributions with large jumps along or across the domain decomposition interface, the convergence rate of classic domain decomposition methods for scalar elliptic problems usually deteriorates. In particular, the classic condition number bounds [1, 12] will depend on the contrast of the...
conference paper 2022
document
Arora, Vipul (author), Buhan, Ileana (author), Perin, G. (author), Picek, S. (author)
Advances in cryptography have enabled the features of confidentiality, security, and integrity on small embedded devices such as IoT devices. While mathematically strong, the platform on which an algorithm is implemented plays a significant role in the security of the final product. Side-channel attacks exploit the variations in the system’s...
conference paper 2022
document
De Iuliis, Melissaw (author), Kammouh, O. (author), Cimellaro, Gian Paolo (author)
The multitude of uncertainties of both natural and man-made disasters have prompted an increased attention in resilience engineering and disaster management. To overcome the effects of disastrous events, such as economic and social effects, modern communities need to be resilient. Natural disasters are unpredictable and unavoidable. While it is...
book chapter 2022
document
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...
conference paper 2022
document
Roch, Christoph (author), Winderl, David (author), Linnhoff-Popien, Claudia (author), Feld, S. (author)
The Stable Marriage Problem (SMP) describes the problem, of finding a stable matching between two equally sized sets of elements (e.g., males and females) given an ordering of preferences for each element. A matching is stable, when there does not exist any match of a male and female which both prefer each other to their current partner under...
conference paper 2022
document
Oevermann, Heike (author), Erek, Ayse (author), Hein, C.M. (author), Horan, Conor (author), Krasznahorkai, Kata (author), Gøtzsche Lange, Ida Sofie (author), Manahasa, Edmond (author), Martin, Marijke (author), Menezes, Marluci (author)
This chapter reflects on responsible science with an eye toward concrete research practice. To this end, we briefly introduce the RRI paradigm (Responsible Research and Innovation) and then highlight seven EU research projects in the context of a transnational COST Action project. This COST Action will investigate how placemaking activities,...
book chapter 2022
document
Medici, P. (author)
Today, the evident need for more efficient conservation, management and redistribution of natural and human-made common resources have inspired thinkers, researchers, and designers to redefine the organization of our societies. For example, Silke Helfrich and David Bollier argue that the common-pool resources (CPR) defined by Elinor Ostrom...
book chapter 2022
document
Li, M. (author), Aschenbrenner, D. (author), van Tol, D.H. (author), van Eijk, D.J. (author), Vink, P. (author)
For designing large-scale products like an airplane, engaging end-users in the concept phase is difficult. However, early user evaluation is important to choose the path which fits the user’s needs best. In particular, comfort-related assessments are difficult to conduct with digital models that are shown on a desktop PC application. Digital...
conference paper 2022
document
Chen, C. (author), Reniers, G.L.L.M.E. (author), Yang, M. (author)
An accident within a chemical plant may trigger escalation effects, leading to a catastrophic degradation of operating performance. Due to possible severe consequences of domino effects, safety and security measures are needed to prevent and mitigate domino effects in chemical industrial areas. However, safety and security measures may be...
book chapter 2022
document
Rätz, Raphael (author), Müri, René M. (author), Marchal Crespo, L. (author)
In order to identify the clinical requirements for a novel upper-limb robotic device for sensorimotor neurorehabilitation, a survey with 33 participants (including physiotherapists, occupational therapists, speech therapists, nurses and physicians) was conducted. The results show that grasping, eating and personal hygiene are amongst the most...
book chapter 2022
document
Mariot, L. (author), Jakobovic, Domagoj (author), Bäck, Thomas (author), Hernandez-Castro, Julio C. (author)
This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief introduction to the basic concepts underlying the field of cryptography, we review the most researched use cases concerning the use of AI techniques and models to design cryptographic primitives,...
book chapter 2022
document
Yadav, Sunil Kumar (author), Skrodzki, M. (author), Zimmermann, Eric (author), Polthier, Konrad (author)
During a surface acquisition process using 3D scanners, noise is inevitable and an important step in geometry processing is to remove these noise components from these surfaces (given as point set or triangulated mesh). The noise removal process (denoising) can be performed by filtering the surface normals first and by adjusting the vertex...
book chapter 2022
document
Ma, L. (author), Kitsak, M.A. (author), Van Mieghem, P.F.A. (author)
Despite many studies on the transmission mechanism of the Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), it remains still challenging to efficiently reduce mortality. In this work, we apply a two-population Susceptible-Infected-Removed (SIR) model to investigate the COVID-19 spreading when contacts between elderly and non...
conference paper 2022
Searched for: +
(25,101 - 25,120 of 172,116)

Pages