References of "2013"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailExistence of Positive Steady States for Mass Conserving and Mass-Action Chemical Reaction Networks with a Single Terminal-Linkage Class
Fleming, Ronan MT UL; Akle, Santiago; Dalal, Onkar et al

in arXiv preprint arXiv:1105.2359 (2013)

We establish that mass conserving, single terminal-linkage networks of chemical reactions admit positive steady states regardless of network deficiency and the choice of reaction rate constants. This ... [more ▼]

We establish that mass conserving, single terminal-linkage networks of chemical reactions admit positive steady states regardless of network deficiency and the choice of reaction rate constants. This result holds for closed systems without material exchange across the boundary, as well as for open systems with material exchange at rates that satisfy a simple sufficient and necessary condition. Our proof uses a fixed point of a novel convex optimization formulation to find the steady state behavior of chemical reaction networks that satisfy the law of mass-action kinetics. A fixed point iteration can be used to compute these steady states, and we show that it converges for weakly reversible homogeneous systems. We report the results of our algorithm on numerical experiments. [less ▲]

Detailed reference viewed: 61 (4 UL)
Full Text
See detailClasses moyennes : des espèces menacées?
Chauvel, Louis UL

Article for general public (2013)

Detailed reference viewed: 140 (7 UL)
Full Text
Peer Reviewed
See detailPOMO - Plotting Omics analysis results for Multiple Organisms
Lin, Jake UL; Kreisberg, Richard; Kallio, Aleksi et al

in BMC Genomics (2013), 14(918),

Background Systems biology experiments studying different topics and organisms produce thousands of data values across different types of genomic data. Further, data mining analyses are yielding ranked ... [more ▼]

Background Systems biology experiments studying different topics and organisms produce thousands of data values across different types of genomic data. Further, data mining analyses are yielding ranked and heterogeneous results and association networks distributed over the entire genome. The visualization of these results is often difficult and standalone web tools allowing for custom inputs and dynamic filtering are limited. Results We have developed POMO (http://pomo.cs.tut.fi), an interactive web-based application to visually explore omics data analysis results and associations in circular, network and grid views. The circular graph represents the chromosome lengths as perimeter segments, as a reference outer ring, such as cytoband for human. The inner arcs between nodes represent the uploaded network. Further, multiple annotation rings, for example depiction of gene copy number changes, can be uploaded as text files and represented as bar, histogram or heatmap rings. POMO has built-in references for human, mouse, nematode, fly,yeast, zebrafish, rice, tomato, Arabidopsis, and Escherichia coli. In addition, POMO provides custom options that allow integrated plotting of unsupported strains or closely related species associations, such as human and mouse orthologs or two yeast wild types, studied together within a single analysis. The web application also supports interactive label and weight filtering. Every iterative filtered result in POMO can be exported as image file and text file for sharing or direct future input. Conclusions The POMO web application is a unique tool for omics data analysis, which can be used to visualize and filter the genome-wide networks in the context of chromosomal locations as well as multiple network layouts. With the several illustration and filtering options the tool supports the analysis and visualization of any heterogeneous omics data analysis association results for many organisms. POMO is freely available and does not require any installation or registration. [less ▲]

Detailed reference viewed: 63 (4 UL)
Full Text
See detail100 ans de politique pragmatique
Sneessens, Henri UL

Article for general public (2013)

Detailed reference viewed: 127 (7 UL)
Full Text
See detailCertiCloud and JShadObf. Towards Integrity and Software Protection in Cloud Computing Platforms
Bertholon, Benoit UL

Doctoral thesis (2013)

A simple concept that has emerged out of the notion of heterogeneous distributed computing is that of Cloud Computing (CC) where customers do not own any part of the infrastructure; they simply use the ... [more ▼]

A simple concept that has emerged out of the notion of heterogeneous distributed computing is that of Cloud Computing (CC) where customers do not own any part of the infrastructure; they simply use the available services and pay for what they use. This approach is often viewed as the next ICT revolution, similar to the birth of the Web or the e-commerce. Indeed, since its advent in the middle of the 2000's, the CC paradigm arouse enthusiasm and interest from the industry and the private sector, probably because it formalizes a concept that reduces computing cost at a time where computing power is key to reach competitiveness. Despite the initiative of several major vendors to propose CC services (Amazon, Google, Microsoft etc.), several security research questions remain open to transform the current euphoria into a wide acceptance. Moreover, these questions are not always tackled from the user's point of view. In this context, the purpose of this thesis is to investigate and design novel mechanisms to cover the following domains: - Integrity and confidentiality of Infrastructure-as-a-Service (IaaS) infrastructures, to provide guarantees on programs and data running in a virtualised environment, either before, during or after a deployment on the CC platform. - Software protection on Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) architectures, using code obfuscation techniques. This dissertation details thus two main contributions. The first one is the development and implementation of CertiCloud, a CC framework which relies on the concepts developed in the Trusted Computing Group (TCG) together with hardware elements, i.e., Trusted Platform Module (TPM) to offer a secured and reassuring environment within IaaS platforms. At the heart of CertiCloud reside two protocols: TCRR and VerifyMyVM. When the first one asserts the integrity of a remote resource and permits to exchange a private symmetric key, the second authorizes the user to detect trustfully and on demand any tampering attempt on its running VM. These protocols being key components in the proposed framework, their analysis against known cryptanalytic attacks has been deeply analysed and testified by their successful validation by AVISPA [1] and Scyther [66], two reference tools for the automatic verification of security protocols. The second major contribution proposed in this manuscript is an obfuscation framework named JShadObf, designed to improve the protection of Javascript-based software running typically on SaaS and PaaS platforms. This framework combines obfuscation transformations, code complexity measurements and Multi-Objective Evolutionary Algorithms (MOEAs) to protect Javascript code, the most ubiquitous programming language at the heart of most modern web services deployed over those CC infrastructures such as Google Office Apps, Dropbox or Doodle. [less ▲]

Detailed reference viewed: 115 (6 UL)
Full Text
Peer Reviewed
See detailChronique de droit coopératif
Hiez, David UL; Tadjudje, Willy UL; Karlshausen, Laurent UL

in Semaine Juridique Entreprises et Affaires (2013), (51), 1703

Detailed reference viewed: 119 (20 UL)
Full Text
See detailMaximal Surface in AdS convex GHM 3-manifold with particles
Toulisse, Jérémy UL

E-print/Working paper (2013)

We prove the existence of a unique maximal surface in an anti-de Sitter (AdS) convex Globally Hyperbolic Maximal (GHM) manifold with particles (i.e. with conical singularities along timelike lines) for ... [more ▼]

We prove the existence of a unique maximal surface in an anti-de Sitter (AdS) convex Globally Hyperbolic Maximal (GHM) manifold with particles (i.e. with conical singularities along timelike lines) for cone-angles less than $\pi$. We reinterpret this result in terms of Teichm\"uller theory, and prove the existence of a unique minimal Lagrangian diffeomorphism isotopic to the identity between two hyperbolic structures with conical singularities of the same angles on a closed surface with marked points. [less ▲]

Detailed reference viewed: 24 (3 UL)
Full Text
Peer Reviewed
See detailDesign of an Energy Efficiency Model and Architecture for Cloud Management using Prediction Models
Nguyen, Anh Quan UL; Tantar, Alexandru-Adrian UL; Bouvry, Pascal UL et al

Scientific Conference (2013, December 18)

In this paper, we present a new energy efficiency model and architecture for cloud management based on a prediction model with Gaussian Mixture Models. The methodology relies on a distributed agent model ... [more ▼]

In this paper, we present a new energy efficiency model and architecture for cloud management based on a prediction model with Gaussian Mixture Models. The methodology relies on a distributed agent model and the validation will be performed on OpenStack. This paper intends to be a position paper, the implementation and experimental run will be conducted in future work. The design concept leverages the prediction model by providing a full architecture binding the resource demands, the predictions and the actual cloud environment (Openstack). The prediction analysis feeds the power-aware agents that run on the compute nodes in order to turn the nodes into sleep mode when the load state is low to reduce the energy consumption of the data center. [less ▲]

Detailed reference viewed: 95 (12 UL)
Full Text
See detailRiemann Surfaces. Lecture notes. Winter semester 2013/2014.
Iena, Oleksandr UL

Learning material (2013)

This is a preliminary version of lecture notes for the course 'Riemann surfaces' (14 Lectures, 90 minutes each).

Detailed reference viewed: 40 (18 UL)
Full Text
See detailConstruction of sheaves on the subanalytic site
Guillermou, Stéphane; Schapira, Pierre UL

E-print/Working paper (2013)

Detailed reference viewed: 18 (3 UL)
See detailL'écologie linguistique de la classe au Luxembourg
Ehrhart, Sabine UL

Presentation (2013, December 17)

Detailed reference viewed: 54 (4 UL)
Full Text
Peer Reviewed
See detailCHD4 Is a RanGTP-Dependent MAP that Stabilizes Microtubules and Regulates Bipolar Spindle Formation
Koffa, Maria UL; Yokoyama, Hideki; Nakos, Konstantinos et al

in Current Biology (2013), 23(24), 2443-2451

Background Production of the GTP-bound form of the Ran GTPase (RanGTP) around chromosomes induces spindle assembly by activating nuclear localization signal (NLS)-containing proteins. Several NLS proteins ... [more ▼]

Background Production of the GTP-bound form of the Ran GTPase (RanGTP) around chromosomes induces spindle assembly by activating nuclear localization signal (NLS)-containing proteins. Several NLS proteins have been identified as spindle assembly factors, but the complexity of the process led us to search for additional proteins with distinct roles in spindle assembly. Results We identify a chromatin-remodeling ATPase, CHD4, as a RanGTP-dependent microtubule (MT)-associated protein (MAP). MT binding occurs via the region containing an NLS and chromatin-binding domains. In Xenopus egg extracts and cultured cells, CHD4 largely dissociates from mitotic chromosomes and partially localizes to the spindle. Immunodepletion of CHD4 from egg extracts significantly reduces the quantity of MTs produced around chromatin and prevents spindle assembly. CHD4 RNAi in both HeLa and Drosophila S2 cells induces defects in spindle assembly and chromosome alignment in early mitosis, leading to chromosome missegregation. Further analysis in egg extracts and in HeLa cells reveals that CHD4 is a RanGTP-dependent MT stabilizer. Moreover, the CHD4-containing NuRD complex promotes organization of MTs into bipolar spindles in egg extracts. Importantly, this function of CHD4 is independent of chromatin remodeling. Conclusions Our results uncover a new role for CHD4 as a MAP required for MT stabilization and involved in generating spindle bipolarity. © 2013 Elsevier Ltd. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailKorea’s Internal Civilizing Mission: Education in the English Edition of The Independent, 1896-1898
Dittrich, Klaus UL

in Acta Koreana (2013), 16(2), 431-472

This article discusses the education-related contents of the English edition of the bilingual Korean newspaper The Independent which appeared from 1896 to 1898. The paper, edited by Seo Jae-pil and Yun ... [more ▼]

This article discusses the education-related contents of the English edition of the bilingual Korean newspaper The Independent which appeared from 1896 to 1898. The paper, edited by Seo Jae-pil and Yun Chi-ho, was the key organ of the enlightenment party. It is argued that education was a key component of an internal civilizing mission spearheaded by the newspaper’s editors. This mission involved two elements. Firstly, The Independent saw education as a major means to emancipate Korea from Confucian tradition (which was itself seen as backward) and forge a new sense of nationalism. Secondly, education was continuously linked to new (predominantly male) practices, such as sports and military drills, as well as public speech and debating contests. Furthermore, reporting in the newspaper provides insights into educational debates and practices in late nineteenth-century Korea. [less ▲]

Detailed reference viewed: 91 (2 UL)
See detailStates of Education: Reflections on the Relationship between Welfare State and Education in Finland and the Federal Republic of Germany
Gardin, Matias UL

Doctoral thesis (2013)

This PhD thesis examines the impact of political ideologies on the welfare state developments of the Republic of Finland and Federal Republic of Germany. It explores the issue by asking whether different ... [more ▼]

This PhD thesis examines the impact of political ideologies on the welfare state developments of the Republic of Finland and Federal Republic of Germany. It explores the issue by asking whether different ideas of ruling parties mattered in these developments or were there other factors, such as the level of economic strength, which became more influential in explaining cross-national welfare variations. Whereas mainstream analysts of comparative social policy since the early 1990s have taken for granted that politics mattered in the immediate post-war era reflecting the more pronounced left-right, catholic-protestant and other historical cleavages, this research moves beyond the oversimplified traditional welfare regime typologies and instead considers how welfare systems became intertwined with other more control-focused aspects of state development: in effect, whether and how they became instruments of discipline through educating citizens. Drawing on the Foucauldian idea of power of normalisation – and using educational expansion of the 1960s as a case study – it is suggested that there are aspects of the development of Finnish and West German policing which had a direct bearing on the emergence of the welfare state. [less ▲]

Detailed reference viewed: 131 (14 UL)
Full Text
See detailComparative Analysis of Real-Time Precise Point Positioning Zenith Total Delay Estimates
Ahmed, Furqan UL; Vaclavovic, Pavel; Teferle, Felix Norman UL et al

Poster (2013, December 13)

The use of observations from Global Navigation Satellite Systems (GNSS) in operational meteorology is increasing worldwide due to the continuous evolution of GNSS. The assimilation of near real-time (NRT ... [more ▼]

The use of observations from Global Navigation Satellite Systems (GNSS) in operational meteorology is increasing worldwide due to the continuous evolution of GNSS. The assimilation of near real-time (NRT) GNSS-derived zenith total delay (ZTD) estimates into local, regional and global scale numerical weather prediction (NWP) models is now in operation at a number of meteorological institutions. The development of NWP models with high update cycles for nowcasting and monitoring of extreme weather events in recent years, requires the estimation of ZTD with minimal latencies, i.e. from 5 to 10 minutes, while maintaining an adequate level of accuracy for these. The availability of real-time (RT) observations and products from the IGS RT service and associated analysis centers make it possible to compute precise point positioning (PPP) solutions in RT, which provide ZTD along with position estimates. This study presents a comparison of the RT ZTD estimates from three different PPP software packages (G-Nut/Tefnut, BNC2.7 and PPP-Wizard) to the state-of-the-art IGS Final Troposphere Product employing PPP in the Bernese GPS Software. Overall, the ZTD time series obtained by the software packages agree fairly well with the estimates following the variations of the other solutions, but showing various biases with the reference. After correction of these the RMS differences are at the order of 0.01 m. The application of PPP ambiguity resolution in one solution or the use of different RT product streams shows little impact on the ZTD estimates. [less ▲]

Detailed reference viewed: 91 (10 UL)
Full Text
Peer Reviewed
See detailA model predictive approach for cyber-attack detection and mitigation in control systems
Rosich, Albert UL; Voos, Holger UL; Li, Yumei et al

in 52nd IEEE Conference on Decision and Control CDC 2013, Florence, Italy, Dec. 2013 (2013, December 13)

The paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario ... [more ▼]

The paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario. Then, a novel attack detector based on limit checking is introduced. The particularity of this detector is that no specific controller knowledge is necessary. Hence, the vulnerability of the detector can be reduced since no reconfiguration is required (limited accessibility). Finally, the paper shows that the effect of the attacks on the system can be significantly mitigated by applying proper optimal control laws. [less ▲]

Detailed reference viewed: 94 (19 UL)
Full Text
See detailComputational Tools for Mass Spectrometry Based Metabolic Profiling
Wegner, André UL

Doctoral thesis (2013)

Detailed reference viewed: 120 (25 UL)
See detailRéflexions sur les itinéraires, rencontres, lieux de pouvoir dans l'espace lotharingien (IXe-Xe siècle)
Pettiau, Hérold UL

Presentation (2013, December 13)

This paper was given in the context of a research seminar devoted to medieval Lotharingia. In it, I have undertaken a reflexion on political space perceived and created by Carolingian and Ottonians kings ... [more ▼]

This paper was given in the context of a research seminar devoted to medieval Lotharingia. In it, I have undertaken a reflexion on political space perceived and created by Carolingian and Ottonians kings and emperors through their itineraries, travels mande in this space. The study is based on a chronological review of the itineraries (under publication as a contribution in another volume) and a reassessment of the itineraries on the light of recent research on space, itineraries, and palaces, and more generally on the practice of power in the Carolingian and Ottonian periods. [less ▲]

Detailed reference viewed: 55 (0 UL)