References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
See detail-

Scientific Conference (-)

Detailed reference viewed: 6 (2 UL)
Full Text
Peer Reviewed
See detailMulti-objective regression test selection in practice: an empirical study in the defense software industry
Özkan, Ramazan; Garousi, Vahid UL; Betin-Can, Aysu

in Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)

Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in ... [more ▼]

Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in the literature. One of those approaches is the Multi-Objective Regression Test Optimization (MORTO) approach, which is applied when there are multiple objectives during regression testing (e.g., minimizing the number of test cases and maximizing test coverage). This paper reports an action research type of study which was conducted to improve regression test-selection practices of a safety-critical industrial software in the defence domain based on the MORTO approach. The problem is formulated and solved by converting the multi-objective genetic-algorithm (GA) problem into a custom-built scalarized single-objective GA. The empirical results demonstrate that this approach yields a more efficient test suite (in terms of testing cost and benefits) compared to the old (manual) test-selection approach and another approach from the literature, i.e., the selective requirement coverage-based approach. Based on the context and need of the company, we developed the GA-based solution on a set of five cost objectives and four benefit objectives for regression testing while providing full coverage of the affected (changed) requirements. Since our proposed approach has been beneficial in the industrial context, it is currently in active use in the company. [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 119 (14 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 119 (5 UL)
Full Text
Peer Reviewed
See detailOn the Risk of Tool Over-tuning in Runtime Verification Competitions
Bianculli, Domenico UL; Krstic, Srdan

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (in press)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailTemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (in press)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 76 (6 UL)
Full Text
Peer Reviewed
See detailComparing automated visual GUI testing tools: an industrial case study
Garousi, Vahid UL; Afzal, Wasif; Çağlar, Adem et al

in Proceedings of International Workshop on Automated Software Testing (A-TEST) (in press)

Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context ... [more ▼]

Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context of a large Turkish software and systems company providing solutions in the areas of defense and IT sector, we systematically planned and applied a VGT project in this industrial context. The goal of the initial phase of the project was to empirically evaluate two well-known VGT tools (Sikuli and JAutomate) to help the company select the best tool for a given testing project. Our results show that both two tools suffer from similar test ‘Replay’ problems such as the inability to find smaller-sized images. The repeatability of test executions was better for JAutomate in case of one of the two software under test (SUT) while it was comparable for the other. In terms of test development effort, for both tools, there were high correlations with number of steps in test suites, however the effort is reduced if test code is reused. The study has already provided benefits to the test engineers and managers in the company by increasing the know-how in the company w.r.t. VGT, and by identifying the challenges and their workarounds in using the tools. The industrial case study in this paper intends to add to the body of evidence in VGT and help other researchers and practitioners. [less ▲]

Detailed reference viewed: 43 (3 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 52 (3 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (in press)

Detailed reference viewed: 91 (6 UL)
Full Text
Peer Reviewed
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana UL; Bartolini, Cesare UL; Lenzini, Gabriele UL

in Proceedings of TrustBus 2017 (in press)

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailIntroducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management software
Garousi, Vahid UL; Yıldırım, Erdem

in Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)

Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of ... [more ▼]

Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of two large-scale law-practice management software (comprising of 414 and 105 KLOC). We report in this paper our experience in developing and introducing a set of large automated test suites (more than 50 KLOC in total), using best practices in state-of-the art and –practice, and to report its observed benefits by conducting cost-benefit analysis in the specific industrial context. The project was conducted based on the principles of case-study and “action research” in which the real industrial needs drove the research. Among the best practices that we used are the followings: (1) the page-object test pattern, (2) modularity in test code, (3) creating test-specific libraries, and (4) using systematic guidelines to decide when and what (test cases) to automate. To assess the cost-benefit and Return On Investment (ROI) of test automation, we followed a hybrid measurement approach to assess both the quantitative and qualitative (intangible) benefits of test automation. The empirical findings showed that the automated GUI testing approach has indeed benefitted the test and QA team in the company under study and automation has been highly welcome by the test engineers. By serving as a success story and experience report in development and introduction of automated test suites in an industrial setting, this paper adds to the body of evidence in this area and it aims at sharing both technical (e.g., using automated test patterns) and process aspects (e.g., test process improvement) of our project with other practitioners and researchers with the hope of encouraging more industry-academia collaborations in test automation. [less ▲]

Detailed reference viewed: 34 (4 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

Scientific Conference (in press)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailAutomatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Appelt, Dennis; Panichella, Annibale UL; Briand, Lionel UL

in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (in press)

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases ... [more ▼]

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests. However, existing research suggests that rule sets are very difficult to understand and too complex to be manually fixed. In this paper, we formalise the problem of fixing vulnerable WAFs as a combinatorial optimisation problem. To solve it, we propose an automated approach that combines machine learning with multi-objective genetic algorithms. Given a set of legitimate requests and bypassing SQL injection attacks, our approach automatically infers regular expressions that, when added to the WAF's rule set, prevent many attacks while letting legitimate requests go through. Our empirical evaluation based on both open-source and proprietary WAFs shows that the generated filter rules are effective at blocking previously identified and successful SQL injection attacks (recall between 54.6% and 98.3%), while triggering in most cases no or few false positives (false positive rate between 0% and 2%). [less ▲]

Detailed reference viewed: 68 (4 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 30 (3 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 41 (9 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 92 (9 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 218 (3 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 54 (4 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 22 (0 UL)
Peer Reviewed
See detailValue-Added Modelling in Primary and Secondary School: An Integrative Review of 674 Publications
Levy, Jessica UL; Keller, Ulrich UL; Brunner, Martin et al

Scientific Conference (2017, December)

Detailed reference viewed: 16 (6 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 32 (12 UL)
Peer Reviewed
See detailCharacterizing Driving Environments Through Bluetooth Discovery
Bronzi, Walter UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Scientific Conference (2017, October)

Within the world of wireless technologies, Bluetooth has recently been at the forefront of innovation. It is becoming increasingly relevant for vehicles to become aware of their surroundings. Therefore ... [more ▼]

Within the world of wireless technologies, Bluetooth has recently been at the forefront of innovation. It is becoming increasingly relevant for vehicles to become aware of their surroundings. Therefore, having knowledge of nearby Bluetooth devices, both inside and outside other vehicles, can provide the listening vehicles with enough data to learn about their environment. In this paper, we collect and analyze a dataset of Bluetooth Classic (BC) and Low Energy (BLE) discoveries. We evaluate their respective characteristics and ability to provide context-aware information from a vehicular perspective. By taking a look at data about the encountered devices, such as GPS location, quantity, quality of signal and device class information, we infer distinctive behaviors between BC and BLE relative to context and application. For this purpose, we propose a set a features to train a classifier for the recognition of different driving environments (i.e. road classes) from Bluetooth discovery data alone. Comparing the performance of our classifier with different sampling parameters, the presented results indicate that, with our feature selection, we are able to predict with reasonable confidence up to three classes (Highway, City, Extra-Urban) by using only discovery data and no geographical information. This outcome gives promising results targeted at low energy and privacy-friendly applications and can open up a wide range of research directions. [less ▲]

Detailed reference viewed: 16 (3 UL)
Full Text
Peer Reviewed
See detailRelay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems
Gautam, Sumit UL; Lagunas, Eva UL; Sharma, Shree K. et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017 (2017, October)

Detailed reference viewed: 31 (9 UL)
Full Text
Peer Reviewed
See detailOptical Feeder Links Study towards Future Generation MEO VHTS Systems
Mengali, Alberto UL; Lyras, Nikos K.; Shankar, Bhavani UL et al

in Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC) (2017, October)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailEstimating Urban Road Traffic States Using Mobile Network Signaling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Viti, Francesco UL et al

in Derrmann, Thierry; Frank, Raphaël; Viti, Francesco (Eds.) et al Estimating Urban Road Traffic States Using Mobile Network Signaling Data (2017, October)

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]

Detailed reference viewed: 37 (4 UL)
Full Text
Peer Reviewed
See detailMultiscale model of sintering: diffusion and plastic flow
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

Scientific Conference (2017, September 27)

Impacting particles or static aggregated particles at high temperature may undergo a permanent change of shape modifying the microstructure. Two particles in contact can develop some bonds within sub ... [more ▼]

Impacting particles or static aggregated particles at high temperature may undergo a permanent change of shape modifying the microstructure. Two particles in contact can develop some bonds within sub-second time. This fast sintering force in the particular case of the snow contribute to the rheological behavior and grain rearrangement [1]. Understanding the kinetics of sintering in granular material is of great importance in some engineering applications. For decades, diffusional processes have received more attention in investigations related to the mechanisms behind sintering [2]. Some works have suggested that the plastic flow might be neglected in sintering process for stresses are not high enough to cause dislocation. However, some studies have showed that stresses experienced in fine particles necks can be high enough and even lead to plasticity driven sintering. The importance of each mechanism in the sintering process may lie in the temporal and spatial scale of interest. Increasing importance is being accorded to the role of plastic flow in sintering. however, several investigations have proved that the conventional plasticity theory may fail to predict plastic activity at micro-scale, The objective of this work is to develop adequate computational model that includes instantaneous and time-dependent plastic flow at micro-scale. We aim at extending existing models of sintering and plasticity to cope with multiple spatial and temporal scales simulations using Extended Discrete Element Method. The numerical results are compare to experimental data on snow. [less ▲]

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailMechanical Model to Predict the Resistance of the Shear Connection in Composite Beams with Deep Steel Decking
Odenbreit, Christoph UL; Nellinger, Sebastian UL

in Eurosteel 2017 (2017, September 13)

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking ... [more ▼]

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking onto the ultimate load bearing capacity is considered with empirically derived reduction factors and equations, which have been developed in the last century between the late 70th and the early 80th. The RFCS research project “DISCCO” investigated the shear stud resistance with novel types of steel decking. In many cases, the shear resistance, which was predicted by EN 1994-1-1 was not reached in tests. In the respective experiments with composite beams and deep decking, a concrete cone failure mode was identified and not a pure shear failure of the stud. This failure mode acted in combination with the load bearing capacity of the shear stud, which formed one or two plastic hinges in the shaft - depending on the available geometry. Based on these observations, new equations have been developed to predict the shear connection’s resistance with more accurcy. The yield hinge mechanism of the shear stud, which was developed by Lungershausen, was extended by the above mentioned load bearing component ‘concrete cone’. The formulae consider the geometry of the stud and the steel decking, the material strength of the stud and of the concrete material. The statistical evaluation of the developed equations shows a good accordance with test results. [less ▲]

Detailed reference viewed: 4 (1 UL)
Full Text
Peer Reviewed
See detailExperimental investigations on semi-continuous encased composite joints
Duarte Da Costa, Job UL; Obiala, Renata UL; Odenbreit, Christoph UL

in Eurosteel 2017 (2017, September 13)

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has ... [more ▼]

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has been analytically proven that at serviceability limit state (SLS) the performance of composite beams benefits from the use of semi-continuous composite joints [1]. At ultimate limit state (ULS) it is of common knowledge that the use of semi-continuous composite joints is only judicious in combination with the plastic hinge theory, which requires the verification of the rotation capacity of the joint. Despite all the effort done in this area, a concise and well-defined method to determine the rotation capacity of composite joints is lacking. Hence, a research programme with a large experimental part has been designed to investigate the behaviour of the connection between a column and a composite slim-floor beam subjected to a negative bending moment. It is the first time that the rotation capacity of an encased composite joint is analysed. The experimental campaign, presented in here, aims at determining the influence of each joint component on the rotation capacity of composite joints. Three test series have been performed; on boltless beam-to-column connections using variable longitudinal reinforcement ratio and bar diameter of the slab, on a bare bolted end-plate steel connection without reinforced concrete slab and finally on the encased composite joint with the complete bolted end-plate connection. This paper presents a detailed description of the tested specimen, shows the main results of the experimental investigations and gives an outlook on future work regarding this research project. The final goal of the research project is to develop a comprehensive methodology to predict the rotation capacity for traditional and slim-floor type of composite beams. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailSpecification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract)
Shin, Seung Yeob UL

in Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017) (2017, September 10)

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial ... [more ▼]

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial in assuring that these processes achieve their goals. But complex utilization policies may govern the use of such resources, increasing the difficulty of accurately incorporating resource considerations into complex processes. This dissertation presents an approach to the specification, allocation, and analysis of the management of such resources. [less ▲]

Detailed reference viewed: 19 (12 UL)
Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 33 (1 UL)
Peer Reviewed
See detailAvatar Sex Moderates Aggression in Violent Video Games, But Only for Women
Melzer, André UL; Schmidt, Alexander F.

Poster (2017, September 07)

Three studies tested findings reported by Yang, Huesmann, and Bushman (2014) that playing a male avatar in a violent video game leads to greater aggression than playing a female avatar in the same game ... [more ▼]

Three studies tested findings reported by Yang, Huesmann, and Bushman (2014) that playing a male avatar in a violent video game leads to greater aggression than playing a female avatar in the same game. The male avatar effect was confirmed in Study 1 (N=79) for post-game aggression: compared to playing a female character, participants who had played the male fighter in a violent mixed martials arts game chose more Hot Sauce for another participant who allegedly disliked spicy food. In contrast to Yang et al. (2014), however, the male avatar effect was qualified by participant sex, indicating that the effect was more strongly pronounced and only significant for female participants. A similar interaction effect was observed in Study 2 (N=76) and Study 3 (N=70) for in-game aggression: only female participants playing a male avatar showed a greater hit ratio in a mixed martials arts game (Study 2) or a greater number of attacks in a brawler game (Study 3) than their colleagues who played a female avatar. At this stage, the reason for this cross-gender effect is unclear. Given that games allow for behavior (i.e., aggression) independent of socially shared gender norms, we may speculate that for women, male avatars may provide the opportunity to “step out” of prevailing social norms regarding non-aggressive female behavior and adopt the role of the (hyper-)aggressive male. However, this hypothesis needs to be tested in future studies. All three studies additionally tested the mediating effect of male gender stereotype activation that was hypothesized by Yang et al. (2014). In addition to priming violent behavior, and in line with the General Aggression Model, the authors had speculated that playing the male avatar automatically activated male gender stereotypes (i.e., aggressive thoughts and behavior) which then caused aggressive behavior. In order to address this activation hypothesis, we designed an indirect cognitive measure of gender role identity using the Positive-Negative Sex-Role Inventory (PN-SRI: Berger & Krahé, 2013). After participants played the violent game, positive and negative aspects of masculinity and femininity were presented as word fragments in a five-minute response window in Study 1 and 2. Fragment completion rates served as indicators of cognitive activation of male stereotypes. In Study 3, participants used the intact PN-SRI gender attributes to rate the avatar after playing the game. However, both direct and indirect measures failed to corroborate the stereotype activation hypothesis in the present studies: word fragments related to male stereotypes were not completed more often than fragments related to female stereotypes (Study 1 and 2). Also, neither in-game aggression nor success in the game was associated with how masculine participants perceived their fighter (Study 3). At the present stage, thus, the mechanisms underlying the gender effect that participants respond differently when playing a male or female avatar in a violent video game remain unclear. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
See detailMultiscale Modelling of Damage and Fracture in Discrete Materials Using a Variational Quasicontinuum Method
Rokos, Ondrej; Peerlings, Ron; Beex, Lars UL et al

Scientific Conference (2017, September 05)

Detailed reference viewed: 21 (1 UL)
Peer Reviewed
See detailExposure to Sexualized Pictures Primes Occupational Stereotypes
Melzer, André UL; Ramsperger, Stephan

Scientific Conference (2017, September 05)

Gender stereotypes in advertisements, magazines, or videogames often appear in the form of sexualized portrayals of women characterized by inappropriately foregrounding female sexuality. Women are shown ... [more ▼]

Gender stereotypes in advertisements, magazines, or videogames often appear in the form of sexualized portrayals of women characterized by inappropriately foregrounding female sexuality. Women are shown with highly revealing clothing and engaging in seductive acts. Sexualization may serve as a motivator to adopt congruent gender-related stereotypes in the viewers and, thus, influence beliefs about women in the real world, including negative effects on self-efficacy of women (Behm-Morawitz & Mastro, 2009). In two studies, sexualization had similar adverse effects on participants’ spontaneous judgments of occupational stereotypes and job classification. In a field study (Study 1, N=128), sexualized female game characters were spontaneously associated with jobs of lower prestige (e.g., hairdresser). In contrast, non-sexualized portrayals were linked to jobs of higher status (i.e., physician, educator). This detrimental effect of sexualized portrayal on occupational status was replicated for depictions of male and female fashion models in an online survey (Study 2, N=459). Moreover, this effect was partially mediated by ratings of lower perceived competence for sexualized portrayals of both men and women. The findings of the present studies extend the multifaceted negative effects of sexualization on stereotyping by showing that the resulting spontaneous competence judgments may have detrimental job-related consequences. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailComparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM Applications
Rousset, Alban UL; Mainassara Chekaraou, Abdoul Wahid UL; Liao, Yu-Chung UL et al

Scientific Conference (2017, September)

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric ... [more ▼]

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric contact when it is about to occur or has actually occurred. Unfortunately, detailed and exact collision detection for large amounts of objects represent an immense amount of computations, naivly n 2 operation with n being the number of objects [9]. To avoid and reduce these expensive computations, the collision detection is decomposed in two phases as it shown on Figure 1: the Broad-Phase and the Narrow-Phase. In this paper, we focus on Broad-Phase algorithm in a large dynamic three-dimensional environment. We studied two kinds of Broad-Phase algorithms: spatial partitioning and spatial sorting. Spatial partitioning techniques op- erate by dividing space into a number of regions that can be quickly tested against each object. Two types of spatial partitioning will be considered: grids and trees. The grid-based algorithms consist of a spatial partitioning processing by dividing space into regions and testing if objects overlap the same region of space. And this reduces the number of pairwise to test. The tree-based algorithms use a tree structure where each node spans a particular space area. This reduces the pairwise checking cost because only tree leaves are checked. The spatial sorting based algorithm consists of a sorted spatial ordering of objects. Axis-Aligned Bounding Boxes (AABBs) are projected onto x, y and z axes and put into sorted lists. By sorting projection onto axes, two objects collide if and only if they collide on the three axes. This axis sorting reduces the number of pairwise to tested by reducing the number of tests to perform to only pairs which collide on at least one axis. For this study, ten different Broad-Phase collision detection algorithms or framework have been considered. The Bullet [6], CGAL [10, 11] frameworks have been used. Concerning the implemented algorithms most of them come from papers or given implementation [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailA Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)

Detailed reference viewed: 36 (4 UL)
See detailThe relevance of verbal and visuo-spatial abilities for verbal number skills – what matters in 5 to 6 year olds?
Cornu, Véronique UL; Schiltz, Christine UL; Martin, Romain UL et al

Poster (2017, September)

The acquisition of verbal number skills, as defined by the meaningful use of number words, marks a milestone in numerical development. In the present study, we were particularly interested in the question ... [more ▼]

The acquisition of verbal number skills, as defined by the meaningful use of number words, marks a milestone in numerical development. In the present study, we were particularly interested in the question, whether verbal number skills are primarily verbal in nature, or if they call upon visuo-spatial processes, reflecting a spatial grounding of verbal number skills. 141 five- to six-year old children were tested on a range of verbal (i.e. vocabulary, phonological awareness and verbal working memory) and visuo-spatial abilities (i.e. spatial perception, visuo-motor integration and visuo-spatial working memory). We were particularly interested in the predictive role of these abilities for children’s verbal number skills (as measured by different counting and number naming tasks). In a latent regression model, basic visuo-spatial abilities, measured by spatial perception and visuo-motor integration, emerge as the most important predictor of verbal number skills. This gives raise to the assumption, that verbal number skills are, despite their verbal nature, spatially grounded in young children. [less ▲]

Detailed reference viewed: 31 (4 UL)
Full Text
Peer Reviewed
See detailLaboratory experiment for damage assessment using the DAD-method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

in Conference proceedings SMAR 2017 (2017, September)

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam ... [more ▼]

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam. An essential prerequisite for the application of this method is a high precise measurement of the deflection line. In this paper, the results from a laboratory experiment using modern measurement techniques such as photogrammetry and displacement sensors are discussed. A reinforced concrete beam is stepwise loaded until reaching the ultimate limit state. The DAD-method is applied to the resulting data from the measurements and the outcome is discussed for further optimisation of the method. In principle, the measured deflection line of the beam contains already essential information on discontinuities which occur due to cracking. These entries are processed and visualised using the DAD-method. This study shows that a high accuracy of the measurement techniques in combination with the DAD-method can become an effective tool for damage detection. [less ▲]

Detailed reference viewed: 8 (0 UL)
Peer Reviewed
See detailOrganizational learning and complex problem solving. Towards a better understanding of the modern workplace.
Jaster, Christian UL; Mainert, Jakob; Greiff, Samuel UL

Scientific Conference (2017, September)

Detailed reference viewed: 2 (0 UL)
Full Text
Peer Reviewed
See detailLegal Markup Generation in the Large: An Experience Report
Sannier, Nicolas UL; Adedjouma, Morayo UL; Sabetzadeh, Mehrdad UL et al

in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 39 (6 UL)
Full Text
Peer Reviewed
See detailIntroduction to Detection of Non-Technical Losses using Data Analytics
Glauner, Patrick UL; Meira, Jorge Augusto UL; State, Radu UL et al

Scientific Conference (2017, September)

Electricity losses are a frequently appearing problem in power grids. Non-technical losses (NTL) appear during distribution and include, but are not limited to, the following causes: Meter tampering in ... [more ▼]

Electricity losses are a frequently appearing problem in power grids. Non-technical losses (NTL) appear during distribution and include, but are not limited to, the following causes: Meter tampering in order to record lower consumptions, bypassing meters by rigging lines from the power source, arranged false meter readings by bribing meter readers, faulty or broken meters, un-metered supply, technical and human errors in meter readings, data processing and billing. NTLs are also reported to range up to 40% of the total electricity distributed in countries such as Brazil, India, Malaysia or Lebanon. This is an introductory level course to discuss how to predict if a customer causes a NTL. In the last years, employing data analytics methods such as data mining and machine learning have evolved as the primary direction to solve this problem. This course will compare and contrast different approaches reported in the literature. Practical case studies on real data sets will be included. Therefore, attendees will not only understand, but rather experience the challenges of NTL detection and learn how these challenges could be solved in the coming years. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailJoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]

Detailed reference viewed: 92 (27 UL)
Peer Reviewed
See detailZusammenhänge zwischen Zahlenstrahlschätzfähigkeit, Mathematikleistung und Schülercharakteristika: Eine Vollerhebung mit 6484 Luxemburgischen Neuntklässlern
Nurayadin, Sevim; Ugen, Sonja UL; Martin, Romain et al

Scientific Conference (2017, September)

In der Zahlenstrahlschätzaufgabe sehen die Probanden eine Zahl und einen leeren Zahlenstrahl, bei dem nur die erste und die letzte Position markiert und mit ihrem Wert beschriftet sind. Die Aufgabe der ... [more ▼]

In der Zahlenstrahlschätzaufgabe sehen die Probanden eine Zahl und einen leeren Zahlenstrahl, bei dem nur die erste und die letzte Position markiert und mit ihrem Wert beschriftet sind. Die Aufgabe der Probanden besteht darin, die Position der Zahl auf dem Strahl anzugeben. Der vorherrschende Ansatz in der Literatur geht davon aus, dass diese Aufgabe die Qualität der mentalen Repräsentation numerischer Größen erfasst. Diese gibt Lernen ein Verständnis von numerischen Größen und ihren Interrelationen, das eine wichtige Grundlage für den Erwerb anspruchsvollerer mathematischer Kompetenzen z.B. in Arithmetik oder Algebra darstellt. Zahlreiche Studien fanden positive Korrelationen zwischen der Zahlenstrahlschätzfähigkeit und der Mathematikleistung. Daher bietet es sich an, die Zahlenstrahlschätzaufgabe zur Diagnostik mathematischer Leistung und Entwicklung zu nutzen. Jedoch ist zum einen noch unklar, wie die Zahlstrahlschätzfähigkeit in der Population ausgeprägt und verteilt ist. Zum anderen ist offen, inwieweit die Korrelation mit der Mathematikleistung eine Scheinkorrelation darstellt, die auf den Einfluss anderer Personeneigenschaften zurückgeht. Um diese Punkte zu klären, analysierten wir Daten aus einer Vollerhebung aller Neuntklässler in Luxemburg (N = 6484). Die Schüler lösten die Zahlenstrahlschätzaufgabe mit ganzen Zahlen sowie Brüchen, absolvierten einen standardisierten Mathematikleistungstest und beantworteten zahlreiche Fragen zu domänenspezifischen (Matheängstlichkeit, Selbstkonzept, Interesse, Testmotivation) und domänenübergreifenden (Geschlecht, Immigrationsstatus, Gewissenhaftigkeit und elterlicher sozioökonomischer Status) Personenmerkmalen. Wir dokumentierten Mittelwerte und Verteilungseigenschaften der Zahlenstrahlschätzfähigkeit für diverse Subpopulationen (Jungen, Mädchen, Migranten, Schulformen etc.). Die Ergebnisse von Mehrebenenregressionsmodellen zeigten, dass die Zahlenstrahlschätzfähigkeit erheblich enger als alle anderen erhobenen Personeneigenschaften mit der Mathematikleistung zusammenhing. Der Zusammenhang war stärker für das Schätzen von Brüchen als ganzen Zahlen. Die Ergebnisse bestätigen die Annahme, dass die Zahlenstrahlschätzfähigkeit eine zentrale Komponente mathematischen Vorwissens erfasst, die weiteres Lernen leitet. In Anbetracht der einfachen Handhabung kann die Aufgabe vielfältig eingesetzt werden, um die mathematische Leistung in der Schule zu messen oder vorherzusagen. Zukünftige Studien sollten verstärkt die Nutzung der Aufgabe in Interventionen erproben. [less ▲]

Detailed reference viewed: 11 (2 UL)
Peer Reviewed
See detailDie Trainierbarkeit von komplexem Problemlösen im Rahmen eines Trainings für Experimentieren.
Stebner, Ferdinand; Kunze, Thiemo UL; Kemper, Christoph UL et al

Scientific Conference (2017, September)

Detailed reference viewed: 5 (2 UL)
Peer Reviewed
See detailSelektives Enkodieren in figuralen Matrizen.
Domnick, Florian UL; Becker, Nicolas; Greiff, Samuel UL et al

Scientific Conference (2017, September)

Detailed reference viewed: 11 (1 UL)
Peer Reviewed
See detailKomplexes Problemlösen und Intelligenz
Greiff, Samuel UL

Scientific Conference (2017, September)

Detailed reference viewed: 2 (1 UL)
See detailDie steuerrechtlichen Herausforderungen der digitalen Wirtschaft - Was passiert in Europa?
Sinnig, Julia UL

in Taeger, Juergen (Ed.) Tagungsband Herbstakademie 2017: Recht 4.0 - Innovationen aus den rechtswissenschaftlichen Laboren (2017, September)

Detailed reference viewed: 12 (2 UL)
Full Text
Peer Reviewed
See detailMining AndroZoo: A Retrospect
Li, Li UL

in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]

Detailed reference viewed: 60 (4 UL)
Full Text
Peer Reviewed
See detailA Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet
Lei, Lei UL; You, Lei; Dai, Gaoyang et al

in IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017 (2017, August 31)

Detailed reference viewed: 47 (6 UL)
Peer Reviewed
See detailStereotypes and attitudes towards students with special educational needs in relation to teachers´ attitudes towards inclusive education
Pit-Ten Cate, Ineke UL; Krischler, Mireille UL; Krolak-Schwerdt, Sabine UL

Scientific Conference (2017, August 30)

Decisions concerning the educational instruction and pathways of students with special educational needs (SEN) may be affected by general stereotypes and associated teachers´ attitudes. Both stereotypes ... [more ▼]

Decisions concerning the educational instruction and pathways of students with special educational needs (SEN) may be affected by general stereotypes and associated teachers´ attitudes. Both stereotypes and attitudes affect judgments and behavior and hence may be pivotal for the success of inclusive education. More specifically, stereotypes and attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion of students with SEN in regular classrooms. The current study investigated stereotypes of and teachers´ implicit attitudes toward students with SEN in relation to teachers´ explicit attitudes towards inclusive education. Results show that teachers hold ambivalent views of students with learning difficulties (i.e. low competence, high warmth), whereas students with behavioral problems are perceived as neither particularly (in)competent nor warm. These stereotypes matched teachers´ implicit attitudes to the extent that implicit attitudes towards students with learning difficulties were more negative than towards students with behavioral problems. Although teachers expressed positive attitudes towards the benefits of inclusion they reported negative attitudes in regards to their ability to teach students with SEN. No associations were found between stereotypes and implicit attitudes. Implicit attitudes towards students with SEN were also not associated with explicit attitudes towards inclusive education. The warmth dimension of stereotype was however positively correlated with perceived ability to teach students with SEN. That is, perceived ability to successfully teach these students may rely on perceptions of these students´ alleged sociability. [less ▲]

Detailed reference viewed: 18 (0 UL)
Peer Reviewed
See detailIntervention strategies to improve the quality of teachers´ judgments: Changes in the accuracy of teachers´ transition decisions
Pit-Ten Cate, Ineke UL; Krolak-Schwerdt, Sabine UL; Hörstermann, Thomas UL et al

Scientific Conference (2017, August 30)

This paper focuses on intervention modules to improve teachers’ diagnostic competence, especially in regards to decisions on students’ transition from primary to secondary education. Although these ... [more ▼]

This paper focuses on intervention modules to improve teachers’ diagnostic competence, especially in regards to decisions on students’ transition from primary to secondary education. Although these transition decisions should be based on academic achievement, research has shown non-academic variables to influence decisions, leading to disadvantages for specific groups of students. Using an experimental pre-post design, we investigated the short and long term effects of accountability, theoretical knowledge and the application of prediction rules on teachers’ judgment accuracy, respectively. Pre-intervention data showed that although teachers’ decision accuracy was of high standard, decision accuracy for ethnic majority students was significantly higher than for ethnic minority students. Increased accountability resulted in increased decision accuracy, especially in regards to decisions for ethnic minority students. Similarly, the introduction of theoretical models of decision making and judgment formation and the application of prediction rules also resulted in an improvement of transition decisions but only for ethnic minority students. Unfortunately, the differential intervention effects of the intervention modules could not be maintained over time, that is, at follow up, the ethnicity bias reappeared. From these studies we can conclude that all three intervention modules can improve the accuracy of teachers’ transition decisions. In line with the intention of the interventions, the disproportionally high rate of decision errors for ethnic minority students observed pre-intervention was eliminated post-intervention and in line with error rates for ethnic majority students. However, training or instruction should be repeated briefly before making such judgments as their influence was not maintained over time. [less ▲]

Detailed reference viewed: 9 (1 UL)
Peer Reviewed
See detailTeachers’, parents’ and students’ perspectives’ on teaching and learning Greek in a community school in Luxembourg
Kirsch, Claudine UL

Scientific Conference (2017, August 25)

Many scholars have been interested in studying patterns of language shift or maintenance of migrants during their diaspora. One way of sustaining the development of the home language is through attending ... [more ▼]

Many scholars have been interested in studying patterns of language shift or maintenance of migrants during their diaspora. One way of sustaining the development of the home language is through attending a complementary school. This paper explores the differing perspectives on teaching and learning Greek in a complementary school in Luxembourg. The participants include the two teachers of this school, the mothers of three newly migrated families and their children. Like most children of newly migrated Greek families, the children in this study attend a state schools where they learn Luxembourgish, German and French (Gogonas & Kirsch 2016). They attend the Greek school one afternoon a week for three hours. The data stem from a survey with 37 parents and interviews with the teachers, parents and children. The findings of the survey indicate that the parents expect the school to develop high competences in Greek and knowledge of Greek culture and history. The newly arrived families have higher expectations than the established ones (Frygana 2016). The thematic analysis of the interviews indicates that the teachers adhered to a monolingual policy and reinforced a sense of “Greekness” by focusing on the Greek language and teaching some elements of culture (Tsagkogeorga 2016). They were aware that the multilingual children had different school experiences depending on their language competence and friendships. The children’s experiences varied in the light of their age and the teaching approaches. While the younger children saw little purpose in attending the school, the older child could make connections between the Greek school, the state school and her life and was motivated to learn Greek. The findings of this paper encourage teachers to reflect on their language policies and teaching approaches, and encourage them to capitalize on their students’ heterogeneity. [less ▲]

Detailed reference viewed: 12 (1 UL)
Peer Reviewed
See detailSocial acceptance and peer relationships of children with physical disabilities
Pit-Ten Cate, Ineke UL; Stevenson, Jim

Scientific Conference (2017, August 24)

Following the UN Convention on the rights of people with disabilities a drive towards inclusive education can be observed. Inclusive education not only aims to reduce educational inequalities but also ... [more ▼]

Following the UN Convention on the rights of people with disabilities a drive towards inclusive education can be observed. Inclusive education not only aims to reduce educational inequalities but also promotes social participation. Although social participation partly depends on the opportunity of social interaction with peers (Kirpalani et al., 2000), other factors such as social competence and peer acceptance are important too (e.g. Schwab et al., 2013). Children with special needs are often found to be socially excluded by peers (Garrote & Dessemontet, 2015) and have fewer friends than their typically developing peers (e.g. Eriksson et al., 2007). Research has also indicated that the incidence of social maladjustment problems in children with disabilities is at least twice of that for typically developing children (Goodman & Graham, 1996; Wallander et al., 1989). Hence children with disabilities may be particularly vulnerable in regards to their peer relationships and social participation. Method: Data were collected for a clinical sample of 87 children (aged 6-18 years) with disabilities (i.e. hydrocephalus with or without spina bifida) and 57 typical developing children. Children or parents completed measures on social acceptance (the Self-Perception Profile, Harter, 1985; Harter & Pike, 1984), peer problems and prosocial behaviour (SDQ; Goodman, 1997, 1999), friendship (Berndt et al., 1986) and perceived quality of life (Graham, Stevenson, & Flynn, 1997). Results: Parent and child ratings of social acceptance and peer problems indicated children with disabilities felt less accepted and experienced more peer problems than typically developing children. No differences in prosocial behaviour were found. Although parents of children with disabilities rated the quality of life regarding friendships lower than parents of typically developing children, no differences in child ratings were found. Children with disabilities rated their friendships as less positive compared to typically developing children. Variance in the perceived quality of life could be explained by peer problems and friendship ratings but not social acceptance or peer problems. Conclusion: Friendship and peer relationships emerged as an area of specific difficulty for children with disabilities. These problems were reflected in reports of lower social acceptance, more peer problems and less positive friendship ratings. Child rated quality of life in the domain of friendship was predicted by peer problems and quality of friendship but not social acceptance. Although parents and children were generally in agreement, this study demonstrates the importance of collecting data from different sources, including the children with disabilities themselves. [less ▲]

Detailed reference viewed: 19 (1 UL)
Peer Reviewed
See detailDeveloping language skills in 3-year-olds in multilingual Luxembourg: a case study
Kirsch, Claudine UL; Mortini, Simone UL

Scientific Conference (2017, August 24)

Detailed reference viewed: 7 (1 UL)
Peer Reviewed
See detailPerspectives on translanguaging and its practices in early years in Luxembourg
Kirsch, Claudine UL

Scientific Conference (2017, August 23)

Detailed reference viewed: 15 (2 UL)
Full Text
Peer Reviewed
See detailLived Histories of Science Education in Modern Luxembourg: Interactions between Global Policies, National Curriculum and Local Practices.
Reuter, Bob UL; Schreiber, Catherina

Scientific Conference (2017, August 23)

The current paper is part of a larger research project, that seeks to gain insights into the policy and curricular reform of science education in Luxembourg’s primary schools through a state of the art ... [more ▼]

The current paper is part of a larger research project, that seeks to gain insights into the policy and curricular reform of science education in Luxembourg’s primary schools through a state of the art approach that integrates research in educational sciences (interviews and classroom observations) with research in the history of education (interviews and document analyses). Beginning with the premise that “science education” as a school discipline is the product of culturally shaped expectations, we examine the interface of international and national educational policy with local educational practice through the lens of primary school science education in Luxembourg (from 1920 through the present). This papers focuses on the historical analysis of science education and policy changes in modern Luxembourg using (1) a document-based historical analysis of curricula, textbooks and public discourses and (2) interviews with curriculum developers from the 1980s and 1990s and with key participants in science education in Luxembourg to examine the lived practices in a local context. In the synergy of the different approaches, local analysis of historically shaped notions of science education can be integrated with a transnational global perspective. Our analysis shows, among other findings, that the science education curriculum was conceived as a response to a variety of specific national educational needs (e.g. environmental protection, love of nature, scientific rational thinking, economy development, technological progress, social progress, demographic changes and challenges). But at the same time, it was covertly in line with international “scientization” policies (e.g. Drori & Meyer, 2009) building on transnational ideas such as the “spiral curriculum”. The analysed educational reform is thus a relevant example to understand culturally and historically embedded perspectives of what “science” is, and how this shapes ideals of “science education” as a discipline in school. [less ▲]

Detailed reference viewed: 6 (3 UL)
Peer Reviewed
See detailSocial participation of students with special educational needs in regular classes
Pit-Ten Cate, Ineke UL; Krischler, Mireille UL

Scientific Conference (2017, August 23)

Theoretical background: Although more than twenty years have passed since the Salamanca statement (UNESCO, 1994), research still shows that children with special educational needs (SEN) are often socially ... [more ▼]

Theoretical background: Although more than twenty years have passed since the Salamanca statement (UNESCO, 1994), research still shows that children with special educational needs (SEN) are often socially excluded by peers (Garrote & Dessemontet, 2015) and have fewer friends than their typically developing peers (e.g. Eriksson, Welander, & Granlund, 2007). Following UN conventions (UN, 2006; UNESCO, 2000) there is a drive to a more inclusive society and hence inclusive education is on the political agenda of many countries. Inclusive education not only aims to reduce educational inequalities but also promotes social participation as being accepted and appreciated by typically developing peers facilitates the development of social relations and creates opportunities for participating in peer groups (Hartup, 1996). However, social participation not only depends on the opportunity of social interaction with peers but is also affected by social competence and peer acceptance (e.g. Schwab, Gebhardt, & Gasteiger-Klicpera, 2013). To this extent, children with SEN seem to have poorer social skills than their peers and experience more problems in creating and maintaining social relations (Carlson, 1987). Students with SEN are also more vulnerable of being bullied by their typically developing peers (Rose, Monda-Amaya, & Espelage, 2011). Studies comparing the social participation of groups of students having different types of SEN suggest that the risk of being less well accepted by peers is higher for students with behavioural problems than for students with learning difficulties (Avramidis, 2010; Bossaert, Colpin, Pijl, & Petry, 2013a). Social participation includes the extent of social interactions, peer acceptance, friendships as well as social self-concept (Bossaert et al., 2013a; 2013b). As merely including these students in regular classes alone cannot guarantee social participation, the question arises to what extent different person variables contribute to social inclusion or rejection. To this extent Bossaert et al (2013a) reported that not all students with SEN experience difficulties, and that especially boys with social-emotional difficulties (i.e. autistic spectrum disorders) and girls with motor and sensory difficulties were at risk. Similarly, Schwab et al (2013) concluded that social participation was associated with specific behavioural difficulties of some students with SEN. Students with learning difficulties may also be at risk as research generally has found that these students often have problems with social skills (Wight & Chapparo, 2008), which may affect their friendships and social participation. The current study therefore first aimed to investigate the social participation of primary school students with SEN (i.e bahvioural problems or learning difficulties) attending regular schools. Second, we investigated to what extent social participation was related to academic performance, behavioural problems, and prosocial behaviour. Method: Preservice teachers completed measures of social participation, behavior and academic performance for a total of 50 primary students. Students attended different primary school classes and were described as having learning difficulties, behavioural difficulties, or both. More specifically, preservice teachers completed the Perceptions of Inclusion Questionnaire (Venetz, et al., 2015), the Strengths and Difficulties Questionnaire (Goodman, 1997) and estimated the students´ academic performance in German, French and Mathematics. The PIQ is a brief measure to assess the emotional, social and competence-based relatedness of students aged 8-16 years. The 12 items comprise 3 scales: social inclusion, emotional inclusion and academic self-concept. Each item is rated on a 4-point scale from 1 (not at all true) to 4 (certainly true). The Strengths and Difficulties Questionnaire consists of 25 statements of behavior. For each statement the degree to which this behavior is typical of their child Is rated on a 3-point scale (0 = not true, 1 = somewhat true, 2 = certainly true). The scale contains four behaviour difficulty subscales (conduct problems; hyperactivity; peer problems; and emotional symptoms) and one strength category (prosocial behavior). A total behaviour score is calculated by adding the scores of the four problem domains. Academic performance was assessed by estimates of students´ academic performance in German, French and Mathematics. Preliminary Results: Frequency distributions indicate that although the social participation of students with learning difficulties and behavioural problems, nearly one third experiences problems. In addition preservice teachers reported behavioural difficulties for a large proportion of their students (34-42%). Furthermore, for 46% of the students, prosocial behavior was rated low (i.e. scores less than 5). No differences in social inclusion were found for students with behavioural or learning difficulties. However, students with behavioural problems had significantly higher SDQ scores (i.e. more behavioural problems) than students with learning difficulties Social inclusion was negatively correlated with peer problems and conduct problems, that is students with more peer or conduct problems are less socially integrated. In contrast, a positive correlation between prosocial behavior and social inclusion indicated that students displaying kindness and support towards others are more successful in participating in their social group. No relationships were found between academic performance and social participation. Conclusion: Students with SEN may have difficulties to be fully accepted in social groups, even when educated in inclusive schools, whereby especially students with conduct and peer problems may be vulnerable. Prosocial behavior however may facilitate social participation. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailFacial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations
Oyedotun, Oyebade UL; Demisse, Girum UL; Shabayek, Abd El Rahman UL et al

in 2017 IEEE International Conference on Computer Vision Workshop (ICCVW) (2017, August 21)

Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we ... [more ▼]

Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we propose deep convolutional neural network (DCNN) for joint learning of robust facial expression features from fused RGB and depth map latent representations. We posit that learning jointly from both modalities result in a more robust classifier for facial expression recognition (FER) as opposed to learning from either of the modalities independently. Particularly, we construct a learning pipeline that allows us to learn several hierarchical levels of feature representations and then perform the fusion of RGB and depth map latent representations for joint learning of facial expressions. Our experimental results on the BU-3DFE dataset validate the proposed fusion approach, as a model learned from the joint modalities outperforms models learned from either of the modalities. [less ▲]

Detailed reference viewed: 60 (15 UL)
Full Text
Peer Reviewed
See detailCoverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics
Rosalie, Martin UL; Brust, Matthias UL; Danoy, Grégoire UL et al

in IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (2017, August 11)

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation ... [more ▼]

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation to swarm members in favor of achieving an efficient global behavior. In this paper, we address the problem of optimizing two adversary criteria for such a UAV swarm: (a) maximizing the area coverage, while (b) preserving network connectivity. Our approach, called CACOC², solves the problem with a novel chaotic ant colony optimization approach, which combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC² employs swarming behavior to obtain UAV clustering that result in maximized area coverage and preserved network connectivity. We show by extensive simulations how the size of the UAV swarm influences the coverage and connectivity. A metrics comparison chart shows the correlation of coverage and connectivity metrics. [less ▲]

Detailed reference viewed: 21 (5 UL)
Peer Reviewed
See detailDignity as Discursive Enactment of Tradition: A Narrative Approach on Tradition in Family Business
Adiguna, Rocky UL

Scientific Conference (2017, August 06)

Our current understanding of tradition in organizations remain very limited. The lack of studies that take tradition as the main focus have made this concept overlooked as an important organizational ... [more ▼]

Our current understanding of tradition in organizations remain very limited. The lack of studies that take tradition as the main focus have made this concept overlooked as an important organizational feature. In this paper, I set out to address this issue by exploring how tradition is (re)produced and (re)interpreted in a century-old family-owned hotel. By adopting a narrative approach as an interpretive lens, I found that the reproduction and reinterpretation of tradition is discursively mediated through the notion of dignity. In particular, this paper argues for three forms of 'doing' dignity: first, dignity-by-category that is enacted through the discursive use of category making; second, dignity-by-sanctity that is enacted through sanctifying particular relations; and third, dignity-by-authority that is enacted through the exercise of authority to compel others to acknowledge one's dignity. To extend it further, the possibility of conceptual relations between tradition, dignity, and narrative identity is discussed. Drawing from the broader fields of social sciences, this study contributes to the scarce literature on tradition theory and dignity in organizations. [less ▲]

Detailed reference viewed: 7 (0 UL)
Peer Reviewed
See detailPanel participant
Greiff, Samuel UL

Scientific Conference (2017, August)

Detailed reference viewed: 1 (0 UL)
Peer Reviewed
See detailDiscussant
Greiff, Samuel UL

Scientific Conference (2017, August)

Detailed reference viewed: 19 (3 UL)
Full Text
Peer Reviewed
See detailRandom Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO Radars
Hammes, Christian UL; Shankar, Bhavani UL; Nijsure, Yogesh UL et al

Scientific Conference (2017, August)

A random Phase Center Motion (PCM) technique is presented in this paper, based on Frequency Modulated Continuous Wave (FMCW) radar, in order to suppress the angle- Doppler coupling in Time Division ... [more ▼]

A random Phase Center Motion (PCM) technique is presented in this paper, based on Frequency Modulated Continuous Wave (FMCW) radar, in order to suppress the angle- Doppler coupling in Time Division Multiplex (TDM) Multiple- Input-Multiple-Output (MIMO) radar when employing sparse array structures. The presented approach exploits an apparently moving transmit platform or PCM due to spatio-temporal transmit array modulation. In particular, the work considers a framework utilizing a random PCM trajectory. The statistical characterization of the random PCM trajectory is devised, such that the PCM and the target motion coupling is minimal, while the angular resolution is increased by enabling the virtual MIMO concept. In more details, this paper discusses sidelobe suppression approaches within the angle-Doppler Ambiguity Function (AF) by introducing a phase center probability density function within the array. This allows for enhanced discrimination of multiple targets. Simulation results demonstrate the suppression angle- Doppler coupling by more than 30 dB, even though spatiotemporal transmit array modulation is done across chirps which leads usually to strong angle-Doppler coupling. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailBelief Change in a Preferential Non-Monotonic Framework
Casini, Giovanni UL; Meyer, Thomas

in Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (2017, August)

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can ... [more ▼]

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can also integrate the two formalisms by studying belief change within a (preferential) non-monotonic framework. This integration relies heavily on the identification of the monotonic core of a non-monotonic framework. We consider belief change operators in a non-monotonic propositional setting with a view towards preserving consistency. These results can also be applied to the preservation of coherence—an important notion within the field of logic-based ontologies. We show that the standard AGM approach to belief change can be adapted to a preferential non-monotonic framework, with the definition of expansion, contraction, and revision operators, and corresponding representation results. Surprisingly, preferential AGM belief change, as defined here, can be obtained in terms of classical AGM belief change. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailAn engineering approach to mapping meanings in products and services
Waltersdorfer, Gregor UL; Gericke, Kilian UL; Desmet, Pieter M. A. et al

in Maier, Anja; Skec, Stanko; Kim, Harrison (Eds.) et al Proceedings of the 21st International Conference on Engineering Design (ICED 17) Vol 3: Product, Services and Systems Design (2017, August)

Detailed reference viewed: 27 (3 UL)
Peer Reviewed
See detailThe role of international organisations in the New Math reform process
Nadimi Amiri, Shaghayegh UL

Scientific Conference (2017, August)

This paper studies a particular school reform that travelled over countries and continents. The target reform of this paper is the New Math reform, which started in the United States and travelled through ... [more ▼]

This paper studies a particular school reform that travelled over countries and continents. The target reform of this paper is the New Math reform, which started in the United States and travelled through many European countries. This article is part of my PhD project. I previously presented some of the results in different conferences, for instance: (Nadimi, 2015a, 2015b, 2016). The present paper studies the role of the international institutions in the adaptation of the reform in Luxembourg In 1958, the School Mathematics Study Group (SMSG) in the United States started a series of mathematics reform under the title “the New Math reform”. The aim of this reform plan was to promote the “problem solving” abilities in students (Phillips, 2014, pp. 16- 59). Many of mathematicians and math educators who became a member of the SMSG, had already started working on a new system of math education at the University of Chicago since 1955. However, the launch of Sputnik satellite by the USSR in 1957 gave the opportunity to trigger the New Math reform. The origin of the New Math reform was the ‘modern mathematics’ of the French Bourbaki group. A group of French mathematicians, since 1935, under the pseudonym Nicolas Bourbaki founded the “modern mathematics” by publishing the series of Elements of Mathematics (Bourbaki's_homepage). The reform came back to its land of origin through a conference organised by OEEC (Organisation for European Economic Co-operation) in the Royaumont abbey in Paris to foster the reform movement in Europe (OECD, 1961). The official title of the conference was “New thinking in mathematics education”, but it is known as the “Royaumont seminar”. OECD (the Organisation succeeding the OEEC) published the proceeding of the conference and organised other following conferences. The fact that OEEC/OECD hosts these conferences shows the politico-economic aspect of this reform. (Tröhler, 2015, p. 6) indicates that organisations like OEEC were created to link the national and the international, to create a global sphere, and to form an institutional or organisational channel to transfer desired ideas, policies, and curricula. The practical implementations of the New Math reform, in Europe, were discussed in two international organisations: ICMI (International Commission on Mathematical Instruction), founded in 1908, and CIEAEM (Commission Internationale pour l’Étude et l’Améloration de l’Enseignement des Mathématiques), established in 1950 (Vanpaemel, 2012). Furthermore, there were also local institutions, such as Centre Belge de Pédagogie de la Mathématique (CBPM). This centre had a close collaboration with Luxembourgian teachers and school stakeholders. This paper reviews the process of the New Math reform in Luxembourg by focusing on the interactions between the international institutions and the local school system. By telling the story of Luxembourg, the paper reveals a part of history related to the acts and efforts of the mentioned international organisations in the dissemination of the New Math reform idea in Europe. It shows how the national and international interactions could help the advancement of the reform and where the collaboration met challenges. The central question that shapes the paper is that up to what point the international cooperation of Luxembourgian stakeholders could be influential at the national level. This can be an example of how the acts and efforts of international organisations interact with the local interested parties in the development of an educational idea. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailAn Extensible and Lightweight Modular Ontology for Programming Education
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in Advances in Computing - 12th Colombian Conference, CCC 2017, Cali, Colombia, September 19-22, 2017, Proceedings (2017, August)

Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an ... [more ▼]

Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an open, heterogeneous corpus is a nontrivial problem. In this paper, we propose an extensible and lightweight modular ontology for programming education. Its main purpose is to integrate annotated learning material related to programming into an IDE such as Eclipse. Our ontology is based on a modular architecture, which is extensible with respect to different programming languages. Aligning language-specific concepts with user-specific tags allows us to suggest learning resources for code elements in a fine-grained and cross-curricular way. Our concrete implementation establishes relations between learning aspects in Java or C code and annotated resources such as articles on online question-and-answer sites. [less ▲]

Detailed reference viewed: 40 (10 UL)
Peer Reviewed
See detailCollaborative problem solving behavior. A deep dive into log files
Schweitzer, Nick UL; Herborn, Katharina UL; Mustafic, Maida UL et al

Scientific Conference (2017, August)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailWhat do we need to say about a design method?
Gericke, Kilian UL; Eckert, Claudia; Stacey, Martin

in Proceedings of the 21st International Conference on Engineering Design (2017, August)

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with ... [more ▼]

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with methods is the lack of clarity about what is actually proposed to industry and the academic community when a new method is put forward, in terms of how detailed, strict, precise and rigorous the method is and what it can deliver. This paper puts the concept of method in the context of related concepts and proposes a multi-level model of the elements of a method to argue that a contribution on each of these levels can be of value and that the introduction of methods can fail on each of these levels. Implications thereof for industry and academia are discussed, concluding that a clear description of methods and their intended use is important for enabling proper validation of each of the method’s elements and for communicating methods to academia and industry. [less ▲]

Detailed reference viewed: 25 (3 UL)
Full Text
See detailExperimental and numerical assessment of the mechanics of keloid-skin composites undergoing large deformations
Sensale, Marco UL; Chambert, Jerome; Chouly, Franz et al

Scientific Conference (2017, August)

Detailed reference viewed: 22 (6 UL)
Full Text
Peer Reviewed
See detailTraining Very Deep Networks via Residual Learning with Stochastic Input Shortcut Connections
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017 (2017, July 31)

Many works have posited the benefit of depth in deep networks. However, one of the problems encountered in the training of very deep networks is feature reuse; that is, features are ’diluted’ as they are ... [more ▼]

Many works have posited the benefit of depth in deep networks. However, one of the problems encountered in the training of very deep networks is feature reuse; that is, features are ’diluted’ as they are forward propagated through the model. Hence, later network layers receive less informative signals about the input data, consequently making training less effective. In this work, we address the problem of feature reuse by taking inspiration from an earlier work which employed residual learning for alleviating the problem of feature reuse. We propose a modification of residual learning for training very deep networks to realize improved generalization performance; for this, we allow stochastic shortcut connections of identity mappings from the input to hidden layers.We perform extensive experiments using the USPS and MNIST datasets. On the USPS dataset, we achieve an error rate of 2.69% without employing any form of data augmentation (or manipulation). On the MNIST dataset, we reach a comparable state-of-the-art error rate of 0.52%. Particularly, these results are achieved without employing any explicit regularization technique. [less ▲]

Detailed reference viewed: 49 (24 UL)