Searched for: mods_originInfo_publisher_s%3A%22Springer%22
(81 - 100 of 1,391)

Pages

document
Xia, Z. (author), Booij, Olaf (author), Manfredi, Marco (author), Kooij, J.F.P. (author)
This work addresses visual cross-view metric localization for outdoor robotics. Given a ground-level color image and a satellite patch that contains the local surroundings, the task is to identify the location of the ground camera within the satellite patch. Related work addressed this task for range-sensors (LiDAR, Radar), but for vision,...
conference paper 2022
document
Päßler, J. (author), Aguado, Esther (author), Rezende Silva, G. (author), Tarifa, Silvia Lizeth Tapia (author), Hernández, Carlos (author), Johnsen, Einar Broch (author)
Nowadays smart applications appear in domains spanning from commodity household applications to advanced underwater robotics. These smart applications require adaptation to dynamic environments, changing requirements and internal system errors Metacontrol takes a systems of systems view on autonomous control systems and self-adaptation, by...
conference paper 2022
document
Atza, E. (author), Budko, N.V. (author)
Vitality is a fundamental trait for the development of a plant. It is known to depend on various factors, such as climate, soil, and the plant’s genetics, but the progressive depletion of soil nutrients make it a priority for the industry to pinpoint which of the controllable qualities of a seed have the biggest impact on vitality. This work...
book chapter 2022
document
Barsotti, F.B. (author)
This paper proposes a sovereign CDS analysis for systemic risk, assuming a macroprudential perspective and building on the modelling framework proposed by Baglioni and Cherubini (J. Econ. Dynam. Control 37:1581–1597, 2013). A data-driven approach applied to CDS quotes is considered to estimate a reduced form model for the marginal intensity...
book chapter 2022
document
Liu, L. (author), Lekic, A. (author), Popov, M. (author)
Due to its excellent performance, VSC-based high voltage direct current (HVDC) power systems draw significant attention. They are being heavily used in modern industrial applications, such as onshore and offshore wind farms, and for interconnection between asynchronous networks. However, the traditional proportional-integral (PI) control...
conference paper 2022
document
Kniestedt, I. (author), Lukosch, Stephan (author), van der Kuil, Milan (author), Lefter, I. (author), Brazier, F.M. (author)
Whereas entertainment games are capable of creating deeply rewarding and emotional experiences, applied game projects often result in products that, while potentially effective, are lacking in many other aspects of the user experience. This may be due to the fact that the focus of most design approaches for applied games lies primarily on the...
conference paper 2022
document
Rimmer, Vera (author), Nadeem, A. (author), Verwer, S.E. (author), Preuveneers, Davy (author), Joosen, Wouter (author)
This chapter contributes to the ongoing discussion of strengthening security by applying AI techniques in the scope of intrusion detection. The focus is set on open-world detection of attacks through data-driven network traffic analysis. This research topic is complementary to the earlier chapter on intelligent malware detection. In this...
book chapter 2022
document
van den Hout, Thijs (author), Wabeke, Thymen (author), Moura, Giovane C. M. (author), Hesselman, Cristian (author)
Logos give a website a familiar feel and promote trust. Scammers take advantage of that by using well-known organizations’ logos on malicious websites. Unsuspecting Internet users see these logos and think they are looking at a government website or legitimate webshop, when it is a phishing site, a counterfeit webshop, or a site set up to...
conference paper 2022
document
Garofalo, Giuseppe (author), Slokom, M. (author), Preuveneers, Davy (author), Joosen, Wouter (author), Larson, M.A. (author)
We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting...
book chapter 2022
document
Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto standard for the most powerful profiling side-channel analysis.The results from the last few years show that deep learning techniques can efficiently break targets that are even protected with countermeasures. While there are constant improvements in making...
conference paper 2022
document
Moura, Giovane C. M. (author), Heidemann, John (author), Hardaker, Wes (author), Charnsethikul, Pithayuth (author), Bulten, Jeroen (author), Ceron, João M. (author), Hesselman, Cristian (author)
DNS latency is a concern for many service operators: CDNs exist to reduce service latency to end-users but must rely on global DNS for reachability and load-balancing. Today, DNS latency is monitored by active probing from distributed platforms like RIPE Atlas, with Verfploeter, or with commercial services. While Atlas coverage is wide, its...
conference paper 2022
document
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
The deep learning-based side-channel analysis represents one of the most powerful side-channel attack approaches. Thanks to its capability in dealing with raw features and countermeasures, it becomes the de facto standard approach for the SCA community. The recent works significantly improved the deep learning-based attacks from various...
conference paper 2022
document
Ludwig, Stephan (author), Aschenbrenner, D. (author), Scharle, Marvin (author), Klessig, Henrik (author), Karrenbauer, Michael (author), Wu, Huanzhuo (author), Taghouti, Maroua (author), Lozano, Pedro (author), Schotten, Hans D. (author), Fitzek, F.H.P. (author)
5G promises to shift Industry 4.0 to the next level by allowing flexible production. However, many communication standards are used throughout a production site, which will stay so in the foreseeable future. Furthermore, localization of assets will be equally valuable in order to get to a higher level of automation. This paper proposes a...
conference paper 2022
document
Browne, J.T. (author), Garnham, Ignacio (author)
This paper blends work in extended mind, distributed cognition, and predictive processing to provide a novel generative theory of interaction. This dovetailing offers an emerging picture of cognition that HCI stands to benefit from: our cognition is extended, distributed, and constantly trying to predict incoming sensory stimuli across social...
conference paper 2022
document
Arora, Vipul (author), Buhan, Ileana (author), Perin, G. (author), Picek, S. (author)
Advances in cryptography have enabled the features of confidentiality, security, and integrity on small embedded devices such as IoT devices. While mathematically strong, the platform on which an algorithm is implemented plays a significant role in the security of the final product. Side-channel attacks exploit the variations in the system’s...
conference paper 2022
document
Tielen, R.P.W.M. (author), Möller, M. (author), Vuik, Cornelis (author)
Since its introduction in [20], Isogeometric Analysis (IgA) has established itself as a viable alternative to the Finite Element Method (FEM). Solving the resulting linear systems of equations efficiently remains, however, challenging when high-order B-spline basis functions of order p> 1 are adopted for approximation. The use of...
book chapter 2022
document
This open access book provides new perspectives on circular economy and space, explored towards the definition of regenerative territories characterised by healthy metabolisms. Going beyond the mere reuse/recycle of material waste as resources, this work aims to understand how to apply circularity principles to, among others, the regeneration of...
book 2022
document
Provides an overview of different failure mechanisms in different organic materials<br/>Presents methodologies for analysing the reliability, failure, and degradation of different organic materials<br/>Explains how to correlate product performance and reliability to materials degradation<br/><br/>
book 2022
document
Park, Laurence A.F. (author), Ganji, Mohadeseh (author), Demirović, E. (author), Chan, Jeffrey (author), Stuckey, Peter (author), Bailey, James (author), Leckie, Christopher (author), Kotagiri, Rao (author)
Blockmodelling is the process of determining community structure in a graph. Real graphs contain noise and so it is up to the blockmodelling method to allow for this noise and reconstruct the most likely role memberships and role relationships. Relationships are encoded in a graph using the absence and presence of edges. Two objects are...
conference paper 2022
document
He, C. (author), Yang, Z. (author), Zhang, P. (author), Li, S. (author), Naeimi, M. (author), Li, Z. (author)
Polygonal wear is a common type of damage on the railway wheel tread, which could induce wheel-rail impacts and further components failure. This study presents a finite element (FE) thermomechanical model to investigate the causes of wheel polygonal wear. The FE model is able to cope with three possible causes of polygonal wear: thermal...
conference paper 2022
Searched for: mods_originInfo_publisher_s%3A%22Springer%22
(81 - 100 of 1,391)

Pages