Zobrazeno 1 - 10
of 121
pro vyhledávání: '"Lamotte, Wim"'
Publikováno v:
In Procedia Computer Science 2017 108:2348-2352
Assessing media streaming performance traditionally requires the presence of reproducible network conditions and a heterogeneous dataset of media materials. Setting up such experiments represents a complex challenge in itself. This challenge becomes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______105::4d8ecca10ab4b5709aac0b4f9a026ec2
http://hdl.handle.net/1942/40458
http://hdl.handle.net/1942/40458
Publikováno v:
Computational Science – ICCS 2020
Hierarchical models describe phenomena by grouping data into multiple levels. Due to the size of these models, parallel execution is required to avoid prohibitively long computing time. While it is occasionally possible to specify some of these model
Publikováno v:
Campus-Wide Information Systems, 2008, Vol. 25, Issue 5, pp. 329-341.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/10650740810921475
Autor:
Marx, Robin, Piraux, Maxime, Quax, Peter, Lamotte, Wim, ANRW '20: Applied Networking Research Workshop
Publikováno v:
ANRW
The QUIC and HTTP/3 protocols are powerful but complex and difficult to debug and analyse. Our previous work proposed the qlog format for structured endpoint logging to aid in taming this complexity. This follow-up study evaluates the real-world impl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d4f85d335e387ee865de6e4646d7c60d
https://hdl.handle.net/2078.1/235224
https://hdl.handle.net/2078.1/235224
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Meeting
The General Data Protection Regulation (GDPR) “Right of Access” grants (European) natural persons the right to request and access all their personal data that is being processed by a given organization. Verifying the identity of the requester is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______105::54ca4898b7b282c81f9305f2b8ce99e9
http://hdl.handle.net/1942/29194
http://hdl.handle.net/1942/29194
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 1 (2018)
Sensitive cryptographic information, e.g. AES secret keys, can be extracted from the electromagnetic (EM) leakages unintentionally emitted by a device using techniques such as Correlation Electromagnetic Analysis (CEMA). In this paper, we introduce C
Wicability is an open platform created for researchers, that aims to provide insights into the spatial and temporal impact of both novel and past 802.11 security vulnerabilities. This is achieved through the automated collection and analysis of large
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______105::e8eaee2298f4db1186d2493ddbb36ffa
http://hdl.handle.net/1942/22600
http://hdl.handle.net/1942/22600
Autor:
WIJNANTS, Maarten, ROVELO RUIZ, Gustavo, DEGRAEN, Donald, QUAX, Peter, LUYTEN, Kris, LAMOTTE, Wim
Physically attending an event or visiting a venue might not always be practically feasible (e.g., due to travel overhead). This article presents a system that enables users to remotely navigate in and interact with a real-world site using 360° video
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______105::3889775e170d8e0df3a86ea039044e02
http://hdl.handle.net/1942/19033
http://hdl.handle.net/1942/19033