Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailUnderscoring the value of video analysis in multilingual and multicultural classroom contexts
Wilmes, Sara UL; Gomez-Fernandez, Roberto UL; Gorges, Anna UL et al

in Video Journal of Education and Pedagogy (2018), 3(4),

This article presents multiple episodes drawing from three distinct research projects conducted in multilingual classrooms in Luxembourg, to underscore the value of video analysis in culturally and ... [more ▼]

This article presents multiple episodes drawing from three distinct research projects conducted in multilingual classrooms in Luxembourg, to underscore the value of video analysis in culturally and linguistically diverse classroom contexts. We show how video analysis that valorizes the non-verbal in interaction has the ability to reveal communicative resources often masked by analysis rooted in the verbal. From the examples presented, that span teacher and student interactions in both elementary and secondary classrooms, we make a methodological argument based on analytical approaches utilized in all three research projects to demonstrate how we have come to an expanded notion of voice in our research that is revealed through multimodal video analysis. Specific analytical approaches that illuminate the embodied and multimodal aspects of voice are discussed. We conclude by underscoring the benefits of embodied and multimodal approaches to video analysis for research with all students, but most importantly for students often marginalized through analytical approaches that prioritize the verbal. Finally, we discuss the implications of video research that works to highlight resource-rich views of teaching and learning across learning contexts. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailUnderstanding uctuations and limitations in a multi-sector model of the economy with delays and intrinsic noise
Goncalves, Jorge UL; Tonita, Robert; Lestas, Ioannis et al

in American Control Conference (2010, July)

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding 'La Contagion': Power, Exclusion and Urban Violence in France and the United States
Koff, Harlan UL

in JOURNAL OF ETHNIC AND MIGRATION STUDIES (2009), 35(5), 771-790

Detailed reference viewed: 27 (0 UL)
See detailUnderstanding Alpha Decay
Penasse, Julien UL

Presentation (2017, November 14)

Detailed reference viewed: 36 (0 UL)
See detailUnderstanding and leveraging the social web for information retrieval
Noll, Michael UL

Doctoral thesis (2010)

Detailed reference viewed: 29 (1 UL)
Peer Reviewed
See detailUnderstanding and Predicting Biological Networks Using Linear System Identi cation
Carignano, A.; Yuan, Y.; Dalchau, N. et al

in Kulkarni, V.; Stan, G.; Raman, K. (Eds.) A Systems Theoretic Approach to Systems and Synthetic Biology I: Models and System Characterizations (2014)

Detailed reference viewed: 124 (11 UL)
Full Text
Peer Reviewed
See detailUnderstanding Android App Piggybacking
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

Poster (2017, May)

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a ... [more ▼]

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a large user base. Despite the fact that the literature has already presented a number of tools to detect piggybacked apps, there is still lacking a comprehensive investigation on the piggybacking processes. To fill this gap, in this work, we collect a large set of benign/piggybacked app pairs that can be taken as benchmark apps for further investigation. We manually look into these benchmark pairs for understanding the characteristics of piggybacking apps and eventually we report 20 interesting findings. We expect these findings to initiate new research directions such as practical and scalable piggybacked app detection, explainable malware detection, and malicious code location. [less ▲]

Detailed reference viewed: 169 (11 UL)
Full Text
Peer Reviewed
See detailUnderstanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

in IEEE Transactions on Information Forensics & Security (2017)

The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base. Although recent research has ... [more ▼]

The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base. Although recent research has produced approaches and tools to identify piggybacked apps, the literature lacks a comprehensive investigation into such phenomenon. We fill this gap by 1) systematically building a large set of piggybacked and benign apps pairs, which we release to the community, 2) empirically studying the characteristics of malicious piggybacked apps in comparison with their benign counterparts, and 3) providing insights on piggybacking processes. Among several findings providing insights, analysis techniques should build upon to improve the overall detection and classification accuracy of piggybacked apps, we show that piggybacking operations not only concern app code but also extensively manipulates app resource files, largely contradicting common beliefs. We also find that piggybacking is done with little sophistication, in many cases automatically, and often via library code. [less ▲]

Detailed reference viewed: 210 (24 UL)
Full Text
Peer Reviewed
See detailUnderstanding Anomaly Decay
Penasse, Julien UL

Scientific Conference (2018, April 24)

Detailed reference viewed: 12 (0 UL)
Full Text
See detailUnderstanding audit oversight transformation : ramifications of institutional work and the power of (de-)mythologizing
Löhlein, Lukas; Muessig, Anke UL

E-print/Working paper (2017)

This study investigates the dynamics that transformed audit oversight in Germany from an instrument, organized by the profession, to maintain international legitimacy into a regulatory regime that is ... [more ▼]

This study investigates the dynamics that transformed audit oversight in Germany from an instrument, organized by the profession, to maintain international legitimacy into a regulatory regime that is integrated into the state apparatus. While prior research has focused on countries where the global demand for oversight structures overlapped with local pressures for regulatory reforms, we examine the diffusion of patterns of control within a context that is characterized by a strong mythologized belief in the German qualified statutory auditor and professional self-regulation. By analysing archival documents and interviews with key actors, we investigate through the lens of institutional work how initially the audit establishment maintained the existing self-regulatory logic despite, and because of, the implementation of formal independent oversight structures. We illustrate how the institutional work of small auditors aimed at disrupting the large audit firms’ field dominance unintentionally undermined the mythologized self-regulation. In doing so, we offer insights into how institutional myth is both constructed and dismantled. Our focus on multiple actors allows us to shed light on how parallel institutional work of distinct actors can lead to mutually effective and unintended institutional consequences. We argue that a successful institutional worker executes a combination of two basic types of work, which we refer to as existential and instrumental modes of work. Finally, comparing our findings with literature on audit oversight in other countries allows us to conceptualize audit oversight along a political-operational dimension and a public-private dimension. [less ▲]

Detailed reference viewed: 42 (3 UL)
Full Text
Peer Reviewed
See detailUnderstanding complexity in neurodegenerative diseases: in silico reconstruction of emergence.
Kolodkin, Alexey UL; Simeonidis, Evangelos UL; Balling, Rudi UL et al

in Frontiers in Physiology (2012), 3

Healthy functioning is an emergent property of the network of interacting biomolecules that comprise an organism. It follows that disease (a network shift that causes malfunction) is also an emergent ... [more ▼]

Healthy functioning is an emergent property of the network of interacting biomolecules that comprise an organism. It follows that disease (a network shift that causes malfunction) is also an emergent property, emerging from a perturbation of the network. On the one hand, the biomolecular network of every individual is unique and this is evident when similar disease-producing agents cause different individual pathologies. Consequently, a personalized model and approach for every patient may be required for therapies to become effective across mankind. On the other hand, diverse combinations of internal and external perturbation factors may cause a similar shift in network functioning. We offer this as an explanation for the multi-factorial nature of most diseases: they are "systems biology diseases," or "network diseases." Here we use neurodegenerative diseases, like Parkinson's disease (PD), as an example to show that due to the inherent complexity of these networks, it is difficult to understand multi-factorial diseases with simply our "naked brain." When describing interactions between biomolecules through mathematical equations and integrating those equations into a mathematical model, we try to reconstruct the emergent properties of the system in silico. The reconstruction of emergence from interactions between huge numbers of macromolecules is one of the aims of systems biology. Systems biology approaches enable us to break through the limitation of the human brain to perceive the extraordinarily large number of interactions, but this also means that we delegate the understanding of reality to the computer. We no longer recognize all those essences in the system's design crucial for important physiological behavior (the so-called "design principles" of the system). In this paper we review evidence that by using more abstract approaches and by experimenting in silico, one may still be able to discover and understand the design principles that govern behavioral emergence. [less ▲]

Detailed reference viewed: 81 (13 UL)
Peer Reviewed
See detailUnderstanding coopetitive relationships between subcontracting SMEs: the case of aerospace valley
Salvetat, David; Geraudel, Mickaël UL

Scientific Conference (2010, June)

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailUnderstanding dynamics using sensitivity analysis: caveat and solution
Perumal, Thanneer Malai UL; Gunawan, Rudiyanto

in BMC Systems Biology (2011), 5

BACKGROUND: Parametric sensitivity analysis (PSA) has become one of the most commonly used tools in computational systems biology, in which the sensitivity coefficients are used to study the parametric ... [more ▼]

BACKGROUND: Parametric sensitivity analysis (PSA) has become one of the most commonly used tools in computational systems biology, in which the sensitivity coefficients are used to study the parametric dependence of biological models. As many of these models describe dynamical behaviour of biological systems, the PSA has subsequently been used to elucidate important cellular processes that regulate this dynamics. However, in this paper, we show that the PSA coefficients are not suitable in inferring the mechanisms by which dynamical behaviour arises and in fact it can even lead to incorrect conclusions. RESULTS: A careful interpretation of parametric perturbations used in the PSA is presented here to explain the issue of using this analysis in inferring dynamics. In short, the PSA coefficients quantify the integrated change in the system behaviour due to persistent parametric perturbations, and thus the dynamical information of when a parameter perturbation matters is lost. To get around this issue, we present a new sensitivity analysis based on impulse perturbations on system parameters, which is named impulse parametric sensitivity analysis (iPSA). The inability of PSA and the efficacy of iPSA in revealing mechanistic information of a dynamical system are illustrated using two examples involving switch activation. CONCLUSIONS: The interpretation of the PSA coefficients of dynamical systems should take into account the persistent nature of parametric perturbations involved in the derivation of this analysis. The application of PSA to identify the controlling mechanism of dynamical behaviour can be misleading. By using impulse perturbations, introduced at different times, the iPSA provides the necessary information to understand how dynamics is achieved, i.e. which parameters are essential and when they become important. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding Electoral Violence through Complex Textual Data: OSCE Monitoring Missions in Different Contexts
Mochtak, Michal UL

in Studies in Conflict and Terrorism (2019), Online

The paper analyses more than 20 years of evidence on electoral violence as reported by OSCE monitoring mission reports. It identifies prevailing trends of electoral violence in the OSCE participating ... [more ▼]

The paper analyses more than 20 years of evidence on electoral violence as reported by OSCE monitoring mission reports. It identifies prevailing trends of electoral violence in the OSCE participating states in order to better understand how the phenomenon is understood and framed by leading international monitoring organizations in the region. The analysis utilizes a unique approach based on automated content analysis employing counting algorithms and latent semantic indexing. The results of the analysis show how electoral violence differs throughout the region while highlighting the qualitative variations in regional patterns of the reported incidents of election-related violence. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
See detailUnderstanding employers’ assessment of young job applicants: A comparative vignette experiment
Imdorf, Christian; Samuel, Robin UL; Shi, Lulu P.

Scientific Conference (2016, September 19)

Detailed reference viewed: 25 (3 UL)
Full Text
See detailUnderstanding human need fulfilment to support the design of secure experiences
Distler, Verena UL

in Proceedings of NordiCHI' 18 Doctoral Consortium (2018)

Detailed reference viewed: 28 (11 UL)