F.A. Kuipers
31 records found
1
The Network Time Protocol (NTP) is the primary synchronization protocol for billions of devices. Although attacks on NTP servers have been well studied, attacks on NTP clients are less well understood. In this thesis, we scrutinize the 8 NTP clients across 3 Operating systems and
...
In modern society, critical operations, such as emergency response and public safety, rely on communication systems, in this context also referred to as mission critical systems. These systems must meet strict availability requirements, since any failure can lead to severe conseq
...
Cloud datacenters underpin our increasingly digital society, serving stakeholders across industry, government, and academia. These stakeholders have come to expect reliable operation and high quality of service, yet demand low cost, high scalability, and corporate (environmental)
...
Natural disasters can significantly disturb communication networks. There are examples of events causing massive connectivity failures in the past, such as the Great East Japan Earthquake. Network protection mechanisms have been developed to cope with the destructive power of nat
...
Natural disasters can destroy communication network components, potentially leading to severe losses in connectivity. During those devastating events, network connectivity is crucial for rescue teams as well as anyone in need of assistance. Therefore, swift network restoration fo
...
Multi-label learning is becoming more and moreimportant as real-world data often contains multi-ple labels. The dataset used for learning such aclassifier is of great importance. Acquiring a cor-rectly labelled dataset is however a difficult task.Active le
...
Creating content in the digital era has never beenso easy. However, there exists no framework inwhich artists can share, cooperate and transferuniversal content. We refer to the termuniversalas that allowing our architecture to manage contentboth from the physica
...
Multi-label learning is an emerging extension of the multi-class classification where an image contains multiple labels. Not only acquiring a clean and fully labeled dataset in multi-label learning is extremely expensive, but also many of the actual labels are corrupted or missin
...
Multi-label learning is one of the hot problems in the field of machine learning. The deep neural networks used to solve it could be quite complex and have a huge capacity. This enormous capacity, however, could also be a negative, as they tend to eventually overfit the undesirab
...
Digital identity management has been established in a mainly centralized manner. In response to a lack of control in current identity management systems, the concept of Self-Sovereign Identity (SSI) was defined to enable decentralization. Recently, this concept gained traction, a
...
Self-sovereign identity (SSI) provides users of the internet control over their own data by letting them store it on their own device or in a decentralized way, such as on a blockchain. The Super App is an SSI application currently under development by the Delft Blockchain Lab, b
...
Visible Light Communication (VLC) has gained popularity due to its inherent security as a complementary technology to Radio Frequency (RF) in the last decades to solve the "spectrum crunch'' problem. Meanwhile, The latest IEEE 802.11ah standard, also called WiFi HaLow, offers the
...
The accelerating growth of the Internet of Things (IoT) has led to the development of many technologies for homes like a wireless lighting system. Unlike traditional lighting systems, these can be operated remotely using mobile devices and even with the help of a smart assistant,
...
With the growth in the complexity of real-time embedded systems, there is an increasing need for tools and techniques to understand and compare the observed runtime behavior of a system with the expected one. Since many realtime applications require periodic interactions with the
...
While multiprocessor platforms have been widely adopted by the embedded systems industry in the past couple of years, there are still fundamental challenges about their timing predictability for applications with real-time timing constraints. The common-off-the-shelf (COTS) multi
...
Large cities in the Netherlands, like Rotterdam, have hundreds of playgrounds, but local governments have little information on how children and adults use them. Usage data can help create playgrounds that better fit with the residents' needs by identifying what elements of a
...
Retrieval-Based Open-Domain Question Answering
Exploring The Impact on The Retrieval Component across Datasets
Open-domain question answering (QA) is an important step in Artificial Intelligence and its ultimate goal is to build a QA system that can answer any question posed by humans. The majority of the open-domain QA system is the retrieval-based open-domain QA system, which enables th
...
Optimisation of battery usage in Smart Grids
Comparing mathematical optimisation methods for making charging decisions for a private battery in a smart grid
It is predicted that in about 100 years most of the earth's fossil fuels will have been depleted. Currently, fossil fuels still make up 80% of the Dutch energy production. Thus, to handle this depletion, the research on renewable energy production and its usage is being stimulate
...
Inter-Autonomous System (AS) route monitoring is the process of collecting the inter-AS routing information. This information flows on the Internet in the form of BGP UPDATE messages, and the BGP data are the messages obtained by the monitors. Existing methods of monitor placemen
...
The Internet of Things is a promising vision which enables trillions of sensor devices to be connected. A common bottleneck for such devices is the energy supply. Using batteries is expensive, it reduces the device lifetime and has a negative impact on the environment. Energy har
...