References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 84 (9 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 60 (6 UL)
Full Text
Peer Reviewed
See detailPrivate API Access and Functional Mocking in Automated Unit Test Generation
Arcuri, Andrea UL; Fraser, Gordon; Just, Rene

in Private API Access and Functional Mocking in Automated Unit Test Generation (in press)

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailAn Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application
Almasi, Moein; Hemmati, Hadi; Fraser, Gordon et al

in International Conference on Software Engineering (ICSE) (in press)

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at ... [more ▼]

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at detecting faults, but how effective and applicable are they in an industrial application? In this paper, we investigate this question using a life insurance and pension products calculator engine owned by SEB Life & Pension Holding AB Riga Branch. To study fault-finding effectiveness, we extracted 25 real faults from the version history of this software project, and applied two up-to-date unit test generation tools for Java, EvoSuite and Randoop, which implement search-based and feedback-directed random test generation, respectively. Automatically generated test suites detected up to 56.40% (EvoSuite) and 38.00% (Randoop) of these faults. The analysis of our results demonstrates challenges that need to be addressed in order to improve fault detection in test generation tools. In particular, classification of the undetected faults shows that 97.62% of them depend on either “specific primitive values” (50.00%) or the construction of “complex state configuration of objects” (47.62%). To study applicability, we surveyed the developers of the application under test on their experience and opinions about the test generation tools and the generated test cases. This leads to insights on requirements for academic prototypes for successful technology transfer from academic research to industrial practice, such as a need to integrate with popular build tools, and to improve the readability of the generated tests. [less ▲]

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 20 (2 UL)
Full Text
Peer Reviewed
See detailIncroci autobiografici nel Lussemburgo antifascista
Levi, Fabio; Barenghi, Mario; Cuoghi, Sibilla et al

in Malvetti, Massimo, Neri, Francesco (Ed.) Primo Levi et la chimie des mots (in press)

Detailed reference viewed: 48 (10 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 192 (3 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

Scientific Conference (in press)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 15 (1 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailA Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications
Jan, Sadeeq UL; Nguyen, Duy Cu UL; Andrea, Arcuri UL et al

in 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017 (in press)

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to ... [more ▼]

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection attacks that target SOAP communications. In this paper, we present a novel, search-based approach used to generate test data for a web application in an attempt to deliver malicious XML messages to web services. <br />Our goal is thus to detect XML injection vulnerabilities in web applications. The proposed approach is evaluated on two studies, including an industrial web application with millions of users. Results show that we are able to effectively generate test data (e.g., input values in an HTML form) that detect such vulnerabilities. [less ▲]

Detailed reference viewed: 92 (7 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 100 (5 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailCustomary international law in the legal order of the European Union
Neframi, Eleftheria UL

in Lopez Escudero, Manuel (Ed.) THE EUROPEAN UNION'S EXTERNAL ACTION IN TIME OF CRISIS (in press)

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the ... [more ▼]

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the exercise of competences with the view to attain an ultimate, constitutional objective of being a credible actor in the international scene. [less ▲]

Detailed reference viewed: 78 (13 UL)
Full Text
Peer Reviewed
See detailIntegration of Learning Material into an Advanced Project-Based Learning Support Platform
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in INTED2017 Proceedings (in press)

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time ... [more ▼]

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time-intensive task, reusability in different contexts is desirable. In this paper, we propose to move from a material-centric to a student-centric approach, integrating learning material in an advanced project-based learning support platform. Our ecosystem, relying on semantic web technologies, comprises plugins for common authoring and project realization tools. [less ▲]

Detailed reference viewed: 23 (7 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 32 (9 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 50 (6 UL)
Full Text
Peer Reviewed
See detailHigh Frequency Acoustic Scattering in Isogeometric Analysis
Khajah, Tahsin; Antoine, Xavier; Bordas, Stéphane UL

Scientific Conference (2017, May 15)

There is an emerging need to perform high frequency scattering analysis on high-fidelity models. Conventional Finite Element analysis suffers from irretrievable loss of the boundary accuracy as well as ... [more ▼]

There is an emerging need to perform high frequency scattering analysis on high-fidelity models. Conventional Finite Element analysis suffers from irretrievable loss of the boundary accuracy as well as pollution error. Man-made geometries can be represented exactly in Isogeometric Analysis (IGA) with no geometrical loss even with very coarse mesh. The aim of this paper is to analyze the accuracy of IGA for exterior acoustic scattering problems. The numerical results show extremely low pollution error even for very high frequencies. [less ▲]

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailInnovations and sales growth in new ventures: The mediating effect of growth intention
Gundolf, Katherine; Geraudel, Mickaël UL; Cesinger, Beate

Scientific Conference (2017, May 11)

While the direct impact of innovation on growth has been examined in entrepreneurship literature, the underlying channels of influence have remained largely unexplored. This article draws upon Behavioral ... [more ▼]

While the direct impact of innovation on growth has been examined in entrepreneurship literature, the underlying channels of influence have remained largely unexplored. This article draws upon Behavioral Reasoning Theory to examine whether growth intention is the pathway through which product, process and organizational innovations influence venture growth or not. Results from the analysis of a dataset of 20,472 French new ventures reveal that: (1) product, process and organizational innovations have a positive impact on sales revenue growth; (2) growth intention has a positive impact on sales revenue growth; and (3) growth intention mediates the effects of product and organizational innovations on sales revenue growth. These findings have implications for a more balanced and nuanced view on how innovations impact new venture growth. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailCost analysis of Smart Lighting Solutions for Smart Cities
Cacciatore, Giuseppe; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in IEEE International Conference on Communications (ICC), Paris, France, 2017 (2017, May)

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose ... [more ▼]

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose heuristics and devise a comparison methodology for new smart lighting solutions in next generation smart cities. The proposed smart lighting techniques make use of Internet of Things (IoT) augmented lamppost, which save energy by turning off or dimming the light according to the presence of citizens. Assessing costs and benefits in adopting the new smart lighting solutions is a pillar step for municipalities to foster real implementation. For evaluation purposes, we have developed a custom simulator which enables the deployment of lampposts in realistic urban environments. The citizens travel on foot along the streets and trigger activation of the lampposts according to the proposed heuristics. For the city of Luxembourg, the results highlight that replacing all existing lamps with LEDs and dimming light intensity according to the presence of users nearby the lampposts is convenient and provides an economical return already after the first year of deployment. [less ▲]

Detailed reference viewed: 50 (4 UL)
Full Text
Peer Reviewed
See detailSearch-driven String Constraint Solving for Vulnerability Detection
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world ... [more ▼]

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world programs typically contain complex string operations that challenge vulnerability detection. State-of-the-art string constraint solvers support only a limited set of string operations and fail when they encounter an unsupported one; this leads to limited effectiveness in finding vulnerabilities. In this paper we propose a search-driven constraint solving technique that complements the support for complex string operations provided by any existing string constraint solver. Our technique uses a hybrid constraint solving procedure based on the Ant Colony Optimization meta-heuristic. The idea is to execute it as a fallback mechanism, only when a solver encounters a constraint containing an operation that it does not support. We have implemented the proposed search-driven constraint solving technique in the ACO-Solver tool, which we have evaluated in the context of injection and XSS vulnerability detection for Java Web applications. We have assessed the benefits and costs of combining the proposed technique with two state-of-the-art constraint solvers (Z3-str2 and CVC4). The experimental results, based on a benchmark with 104 constraints derived from nine realistic Web applications, show that our approach, when combined in a state-of-the-art solver, significantly improves the number of detected vulnerabilities (from 4.7% to 71.9% for Z3-str2, from 85.9% to 100.0% for CVC4), and solves several cases on which the solver fails when used stand-alone (46 more solved cases for Z3-str2, and 11 more for CVC4), while still keeping the execution time affordable in practice. [less ▲]

Detailed reference viewed: 379 (40 UL)
Full Text
Peer Reviewed
See detailA Guided Genetic Algorithm for Automated Crash Reproduction
Soltani, Mozhan; Panichella, Annibale UL; van Deursen, Arie

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution ... [more ▼]

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution, mutation analysis, and directed model checking as underling techniques for post-failure analysis of crash stack traces. However, existing approaches still cannot reproduce many real-world crashes due to such limitations as environment dependencies, path explosion, and time complexity. To address these challenges, we present EvoCrash, a post-failure approach which uses a novel Guided Genetic Algorithm (GGA) to cope with the large search space characterizing real-world software programs. Our empirical study on three open-source systems shows that EvoCrash can replicate 41 (82%) of real-world crashes, 34 (89%) of which are useful reproductions for debugging purposes, outperforming the state-of-the-art in crash replication. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailThe Effects of Sexualized Violence in Video Games on Rape Myth Acceptance
Fernandez de Henestrosa, Martha UL; Melzer, André UL

Scientific Conference (2017, May)

Previous research has tested the effects of video games on players’ Rape Myth Acceptance (RMA) with regard to either sexual or violent contents. The current study aimed at investigating the combined ... [more ▼]

Previous research has tested the effects of video games on players’ Rape Myth Acceptance (RMA) with regard to either sexual or violent contents. The current study aimed at investigating the combined effects of sexual and violent material in video games on players’ RMA. Participants (N = 82) played either a sexualized female game character or a non-sexualized female game character in a violent video game. Participants’ pre-gaming RMA, gender role attitudes and gaming habits were found to predict RMA after the gaming episode, but sexualized game violence did not. Furthermore, no gender differences were found with regard to RMA. The present findings corroborate the important role of pre-existing gender attitudes for the concept of RMA. In addition, future research should also focus on long-term exposure to video games and players’ gaming habits when examining the effects of sexualized violence in video games on RMA. [less ▲]

Detailed reference viewed: 61 (7 UL)
Full Text
Peer Reviewed
See detailAutomatically Locating Malicious Packages in Piggybacked Android Apps
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

in 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (2017, May)

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼]

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. [less ▲]

Detailed reference viewed: 53 (2 UL)
Full Text
Peer Reviewed
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun UL; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing (2017, May)

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile ... [more ▼]

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile Crowdsensing (MCS), citizens participate in the sensing process contributing data with their mobile devices such as smartphones, tablets and wearables. To be effective, MCS systems require a large number of users to contribute data. While several studies focus on developing efficient incentive mechanisms to foster user participation, data collection policies still require investigation. In this paper, we propose a novel distributed and energy-efficient framework for data collection in opportunistic MCS architectures. Opportunistic sensing systems require minimal intervention from the user side as sensing decisions are application- or device-driven. The proposed framework minimizes the cost of both sensing and reporting, while maximizing the utility of data collection and, as a result, the quality of contributed information. We evaluate performance of the framework with simulations, performed in a real urban environment and with a large number of participants. The simulation results verify cost-effectiveness of the framework and assess efficiency of the data generation process. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailThe Multi-Generation Repackaging Hypothesis
Li, Li UL; Bissyande, Tegawendé François D Assise UL; Bartel, Alexandre UL et al

Poster (2017, May)

App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately ... [more ▼]

App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately, although most research involves pairwise similarity comparison to distinguish repackaged apps from their “original” counterparts, no work has considered the threat to validity of not being able to discover the true original apps. We provide in this paper preliminary insights of an investigation into the Multi-Generation Repackaging Hypothesis: is the original in a repackaging process the outcome of a previous repackaging process? Leveraging the Androzoo dataset of over 5 million Android apps, we validate this hypothesis in the wild, calling upon the community to take this threat into account in new solutions for repackaged app detection. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailUnderstanding Android App Piggybacking
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

Poster (2017, May)

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a ... [more ▼]

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a large user base. Despite the fact that the literature has already presented a number of tools to detect piggybacked apps, there is still lacking a comprehensive investigation on the piggybacking processes. To fill this gap, in this work, we collect a large set of benign/piggybacked app pairs that can be taken as benchmark apps for further investigation. We manually look into these benchmark pairs for understanding the characteristics of piggybacking apps and eventually we report 20 interesting findings. We expect these findings to initiate new research directions such as practical and scalable piggybacked app detection, explainable malware detection, and malicious code location. [less ▲]

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailSensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ... [more ▼]

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more concerned with their privacy in buildings, explicit sensing techniques can lead to uncomfortableness and resistance from occupants. In this paper, we adapt a sensing by proxy paradigm that monitors building status and coarse occupant activities through agglomerative clustering of indoor temperature movements. Through extensive experimentation on 86 classrooms, offices and labs in a five-story school building in western Europe, we prove that indoor temperature movements can be leveraged to infer latent information about indoor environments, especially about rooms' relative physical locations and rough type of occupant activities. Our results evidence a cost-effective approach to extending commercial building control systems and gaining extra relevant intelligence from such systems. [less ▲]

Detailed reference viewed: 39 (11 UL)
See detailComptabiliser les crimes pour conceptualiser la violence? Le cas de la prévôté de Luxembourg (1525 et 1630)
Leuck, Jessica UL

Scientific Conference (2017, March 29)

L’historienne Laure Verdon caractérise « tout acte ou parole qui rompt le tissu social et porte atteinte à l’ordre » comme violence. De plus, le chercheur « doit s’interroger sur les formes qu’a pris la ... [more ▼]

L’historienne Laure Verdon caractérise « tout acte ou parole qui rompt le tissu social et porte atteinte à l’ordre » comme violence. De plus, le chercheur « doit s’interroger sur les formes qu’a pris la violence au fil des époques et sur le rapport que les hommes entretiennent avec elle » (Éloïse Adde, 2012). Parmi d’autres voies pour saisir cette variation historique et culturelle de la perception de la violence, nous proposons une analyse minutieuse des comptes des officiers de justice. Contrairement aux règlements, aux lois ou encore aux sources judiciaires qui expriment le fonctionnement théorique de la justice, ces comptes, de par leur caractère administratif, livrent une image réelle des crimes commis. Bien que le terme « violence » n’apparaisse jamais en tant que tel dans ces sources, les crimes et délits mentionnés dans les comptes sont considérés comme tels car ils représentent toujours une forme de violence contre le tissu social ou/et l’ordre établie. Leur présence dans ces sources et leur usage en justice permettent de projeter la conception de la violence pour une époque concrète en nous informant sur la perception quotidienne que les contemporains - surtout les justiciers - en avaient envers. En outre, la variété des cas permet de moduler cette compréhension et de proposer une lecture fine du phénomène. Conservés presque dans leur totalité pour la période de 1525 à 1630, les livres de comptes rédigés dans la prévôté de Luxembourg, une des plus grandes du duché, consistent une source primordiale pour entamer une telle recherche. [less ▲]

Full Text
Peer Reviewed
See detailPower Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA
Liu, Zhengxuan; Kang, Guixia; Lei, Lei UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), 2017 (2017, March 19)

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ ... [more ▼]

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ achievable data rate and network throughput are analysed under three transmission schemes: 1) all users’ signals are jointly transmitted by coordinated base stations (BSs); 2) only cell-edge users’ signals are jointly transmitted by coordinated BSs; 3) each user’s signals are transmitted by only one BS. Next, we formulate EE maximization problems for the three schemes under the constraints of minimum users’ data rate and maximum BS transmit power. The considered problem is non-convex and hard to tackle. To address it, an iterative sub-optimal algorithm is proposed by adopting fractional programming and difference of convex programming. Numerical results show that the near optimality performance of EE can be achieved by using the proposed algorithm with advantages of fast convergence and low complexity. Three transmission schemes of NOMA have superior EE performance compared with conventional orthogonal multiple access scheme in the same CoMP networks. [less ▲]

Detailed reference viewed: 40 (25 UL)
Full Text
Peer Reviewed
See detailThe influence of Forced Answering on response behavior in Online Surveys: A reactance effect?
Sischka, Philipp UL; Mergener, Alexandra; Neufang, Kristina Marliese et al

Poster (2017, March 16)

Relevance: Recent studies have shown that the use of the forced answering (FA) option in online surveys results in reduced data. They especially examined that forcing respondents to answer questions in ... [more ▼]

Relevance: Recent studies have shown that the use of the forced answering (FA) option in online surveys results in reduced data. They especially examined that forcing respondents to answer questions in order to proceed through the questionnaire leads to higher dropout rates and lower answer quality. However, no study researched the psychological mechanism behind the correlation of FA on dropout and data quality before. This response behavior has often been interpreted as psychological reactance reaction. So, the Psychological Reactance Theory (PRT) predicts that reactance appears when an individuals’ freedom is threatened and cannot be directly restored. Reactance describes the motivation to restore this loss of freedom. Respondents could experience FA as a loss of freedom, as (s)he is denied the choice to leave a question unanswered. According to PRT, possible reactions in this situation might be to quit survey participation, to fake answers or to show satisficing tendencies. Research content: This study explores the psychological mechanism that effects response behavior in FA condition (compared to non-FA- condition). Our major hypothesis is that forcing respondents to answer will cause reactance, which turns into increasing dropout rates, decreasing answer quality and a satisficing behavior. Methods and Data: We used an online survey-experiment with two conditions (forced and non-forced answering instructions). The sample consists of 914 participants. Throughout the whole questionnaire, a dropout button was implemented on each page. In both conditions, this button led to the same page that fully compliant participants reached at the end of the questionnaire. Reactance was measured with a self-constructed four-item reactance scale. To determine answer quality, we used self-report for faking as well as the analysis of answers to open ended questions. Results: Zero-order effects showed that FA increased state reactance and questionnaire dropout as well as it reduced answer length in open-ended questions. Mediation analysis (Condition -> state reactance -> dropout/answer quality) supported the hypothesis of reactance as an underlying psychological mechanism behind negative FA effects on data quality. Added Value: This is the first study which offers statistical evidence for the often proposed reactance effect influencing response behavior. This offers a base for a deeper psychological reflection of the use of the FA-option. [less ▲]

Detailed reference viewed: 12 (1 UL)
Full Text
See detailSystem Testing of Timing Requirements based on Use Cases and Timed Automata
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by ... [more ▼]

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing requirements, following a methodology aiming at minimizing modeling overhead. We automate the generation of executable test cases using a test strategy based on maximizing test suite diversity and building over the UPPAAL model checker. Initial empirical results based on an industrial case study provide evidence of the effectiveness of the approach. [less ▲]

Detailed reference viewed: 157 (15 UL)
Full Text
Peer Reviewed
See detailReduced basis Nitsche-based domain decomposition: a biomedical application
Baroli, Davide UL; Beex, Lars UL; Hale, Jack UL et al

Scientific Conference (2017, March 10)

Nowadays, the personalized biomedical simulations demand real-time efficient and reliable method to alleviate the computational complexity of high-fidelity simulation. In such applications, the necessity ... [more ▼]

Nowadays, the personalized biomedical simulations demand real-time efficient and reliable method to alleviate the computational complexity of high-fidelity simulation. In such applications, the necessity of solving different substructure, e.g. tissues or organs, with different numbers of the degrees of freedom and of coupling the reduced order spaces for each substructure poses a challenge in the on-fly simulation. In this talk, this challenge is taken into account employing the Nitsche-based domain decomposition technique inside the reduced order model [1]. This technique with respect to other domain decomposition approach allows obtaining a solution with the same accuracy of underlying finite element formulation and to flexibly treat interface with non-matching mesh. The robustness of the coupling is determined by the penalty coefficients that is chosen using ghost penalty technique [2]. Furthermore, to reduce the computational complexity of the on-fly assembling it is employed the empirical interpolation approach proposed in [3]. The numerical tests, performed using FEniCS[4], petsc4py and slepc4py [5], shows the good performance of the method and the reduction of computation cost. [1] Baroli, D., Beex L. and Bordas, S. Reduced basis Nitsche-based domain decomposition. In preparation. [2] Burman, E., Claus, S., Hansbo, P., Larson, M. G., & Massing, A. (2015). CutFEM: Discretizing geometry and partial differential equations. International Journal for Numerical Methods in Engineering, 104(7), 472-501. [3] E. Schenone, E., Beex,L., Hale, J.S., Bordas S. Proper Orthogonal Decomposition with reduced integration method. Application to nonlinear problems. In preparation. [4] A. Logg, K.-A. Mardal, G. N. Wells et al. Automated Solution of Differential Equations by the Finite Element Method, Springer 2012. [5] L. Dalcin, P. Kler, R. Paz, and A. Cosimo, Parallel Distributed Computing using Python, Advances in Water Resources, 34(9):1124-1139, 2011. http://dx.doi.org/10.1016/j.advwatres.2011.04.013 [less ▲]

Detailed reference viewed: 44 (2 UL)
Full Text
Peer Reviewed
See detailEconomic Law in the EU: How to Ensure More Convergence After the Brexit? Workshop on Corporate Law
Corbisier, Isabelle UL

Scientific Conference (2017, March 06)

See Programme at the start of the appended document for a description of the whole event, followed by the summary of Isabelle Corbisier's intervention (by herself)

Detailed reference viewed: 10 (2 UL)
Full Text
Peer Reviewed
See detailSocially assistive robots for teaching emotional abilities to children with autism spectrum disorder
Pinto Costa, Andreia UL; Steffgen, Georges UL; Rodriguez Lera, Francisco Javier UL et al

Scientific Conference (2017, March)

Socially assistive robots, when used in a way that takes into consideration children’s needs and developmental characteristics, can be useful tools to enable children’s development. More specifically, due ... [more ▼]

Socially assistive robots, when used in a way that takes into consideration children’s needs and developmental characteristics, can be useful tools to enable children’s development. More specifically, due to their characteristics (predictability, simplicity, and repetition) robots can be especially helpful to teach emotional abilities to children with autism spectrum disorder (ASD). Previous research has provided preliminary evidence that robots can help children improve in some domains such as joint attention and imitation. However, no studies have examined how robots can be integrated in intervention protocols targeting the acquisition of emotional abilities in children with ASD. This paper presents a work in progress on an emotional ability training developed for children with ASD using the QT socially assistive robot. This training aims to test whether children with ASD can benefit from a robot-mediated training to improve emotional ability. [less ▲]

Detailed reference viewed: 24 (2 UL)
Full Text
See detailExploiting Transistor-Level Reconfiguration to Optimize Combinational Circu
Raitza, Michael; Kumar, Akash; Volp, Marcus UL et al

Scientific Conference (2017, March)

Silicon nanowire reconfigurable field effect transistors (SiNW RFETs) abolish the physical separation of n-type and p-type transistors by taking up both roles in a configurable way within a doping-free ... [more ▼]

Silicon nanowire reconfigurable field effect transistors (SiNW RFETs) abolish the physical separation of n-type and p-type transistors by taking up both roles in a configurable way within a doping-free technology. However, the potential of transistor-level reconfigurability has not been demonstrated in larger circuits, so far. In this paper, we present first steps to a new compact and efficient design of combinational circuits by employing transistor-level reconfiguration. We contribute new basic gates realized with silicon nanowires, such as 2/3-XOR and MUX gates. Exemplifying our approach with 4-bit, 8-bit and 16-bit conditional carry adders, we were able to reduce the number of transistors to almost one half. With our current case study we show that SiNW technology can reduce the required chip area by 16 %, despite larger size of the individual transistor, and improve circuit speed by 26 %. [less ▲]

Detailed reference viewed: 92 (7 UL)
See detailStahlverbundkonstruktionen im Hochbau - Entwicklungen in der Normung
Schäfer, Markus UL

Scientific Conference (2017, March)

Die Eurocodes (EC) repräsentieren europäische Normen (EN) für die Bemessung und Konstruktion von Bauwerken im Hoch- und Brückenbau. Die Entwicklung dieser europäischen Regelwerke erfolgte im Auftrag der ... [more ▼]

Die Eurocodes (EC) repräsentieren europäische Normen (EN) für die Bemessung und Konstruktion von Bauwerken im Hoch- und Brückenbau. Die Entwicklung dieser europäischen Regelwerke erfolgte im Auftrag der Europäischen Union durch das „European Committee for Standardisation“ CEN. Seit einigen Jahren sind die Eurocodes bereits in der Anwendung. Basierend auf diesen Erfahrungen und vielfachen Kommentaren aus der Industrie erfolgt derzeit eine Überarbeitung aller Teile des Eurocodes mit dem Ziel, die aktuellen Bemessungsnormen an den Stand der Technik und Forschung anzupassen, die Anwendung zu vereinfachen sowie der Harmonisierung der Eurocodes untereinander. Abschließend werden diese Modifikationen in die zweite Generation der europäischen Normen überführt. In den folgenden Ausführungen wird die Arbeit des Projektteams SC4.T1 vorgestellt. Es wird ein Einblick in die bestehende Normungsarbeit und die fachlichen Diskussionen gegeben sowie auszugsweise die Entwürfe zu den anstehenden Änderungen der EN 1994-1-1 vorgestellt. [less ▲]

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailA Change Management Approach in Product Lines for Use Case-Driven Development and Testing
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL

Poster (2017, March)

In this paper, driven by industrial needs, we present a change management approach for product lines within the context of use case-driven development and testing. As part of the approach, we first ... [more ▼]

In this paper, driven by industrial needs, we present a change management approach for product lines within the context of use case-driven development and testing. As part of the approach, we first provide a modeling method to support variability modeling in Product Line (PL) use case diagrams, specifications, and domain models, intentionally avoiding any reliance on feature models and thus avoiding unnecessary modeling and traceability overhead. Then, we introduce a use case-driven configuration approach based on the proposed modeling method to automatically generate Product Specific (PS) use case and domain models from the PL models and configuration decisions. Building on this, we provide a change impact analysis approach for evolving configuration decisions in PL use case models. In addition, we plan to develop a change impact analysis approach for evolving PL use case models and an automated regression test selection technique for evolving configuration decisions and PL models. [less ▲]

Detailed reference viewed: 23 (14 UL)
Full Text
Peer Reviewed
See detailIncremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL et al

in 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (2017, March)

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use ... [more ▼]

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use cases are central development artifacts for requirements engineering and system testing. In such contexts, use case configurators can play a significant role to capture variable and common requirements in Product Line (PL) use case models and to generate Product Specific (PS) use case models for each new customer in a product family. [Question/Problem] Although considerable research has been devoted to use case configurators, little attention has been paid to supporting the incremental reconfiguration of use case models with evolving configuration decisions. [Principal ideas/results] We propose, apply, and assess an incremental reconfiguration approach to support evolving configuration decisions in PL use case models. PS use case models are incrementally reconfigured by focusing only on the changed decisions and their side effects. In our prior work, we proposed and applied Product line Use case modeling Method (PUM) to support variability modeling in PL use case diagrams and specifications. We also developed a use case configurator, PUMConf, which interactively collects configuration decisions from analysts to generate PS use case models from PL models. Our approach is built on top of PUM and PUMConf. [Contributions] We provide fully automated tool support for incremental configuration as an extension of PUMConf. Our approach has been evaluated in an industrial case study in the automotive domain, which provided evidence it is practical and beneficial. [less ▲]

Detailed reference viewed: 80 (38 UL)
Full Text
See detailNoise characteristics in Zenith Total Delay from homogeneously reprocessed GPS time series
Klos, Anna; Hunegnaw, Addisu UL; Teferle, Felix Norman UL et al

Scientific Conference (2017, February 22)

Zenith Total Delay (ZTD) time series, derived from the re-processing of Global Positioning System (GPS) data, provide valuable information for the evaluation of global atmospheric reanalysis products such ... [more ▼]

Zenith Total Delay (ZTD) time series, derived from the re-processing of Global Positioning System (GPS) data, provide valuable information for the evaluation of global atmospheric reanalysis products such as ERA-Interim. Identifying the correct noise characteristics in the ZTD time series is an important step to assess the ’true’ magnitude of ZTD trend uncertainties. The ZTD residual time series for 1995-2015 are generated from our homogeneously re-processed and homogenized GPS time series from over 700 globally distributed stations classified into five major climate zones. The annual peak of ZTD data ranges between 10 and 150 mm with the smallest values for the polar and Alpine zone. The amplitudes of daily curve fall between 0 and 12 mm with the greatest variations for the dry zone. The autoregressive process of fourth order plus white noise model were found to be optimal for ZTD series. The tropical zone has the largest amplitude of autoregressive noise (9.59 mm) and the greatest amplitudes of white noise (13.00 mm). All climate zones have similar median coefficients of AR(1) (0.80±0.05) with a minimum for polar and Alpine, which has the highest coefficients of AR(2) (0.27±0.01) and AR(3) (0.11±0.01) and clearly different from the other zones considered. We show that 53 of 120 examined trends became insignificant, when the optimum noise model was employed, compared to 11 insignificant trends for pure white noise. The uncertainty of the ZTD trends may be underestimated by a factor of 3 to 12 compared to the white noise only assumption. [less ▲]

Detailed reference viewed: 25 (5 UL)
See detailDigitaler historischer Stadtatlas Luxemburgs (Villux10) - Projektvorstellung
Uhrmacher, Martin UL

Scientific Conference (2017, February 22)

Detailed reference viewed: 12 (1 UL)
Full Text
See detailAn Evaluaton of Real-Time Troposphere Products Based on mult-GNSS Precise Point Posi)oning
Ding, Wenwu; Teferle, Felix Norman UL; Kazmierski, Kamil et al

Scientific Conference (2017, February 21)

When employing observations from multiple Global Navigation Satellite System (GNSS) the performance of real-time (RT) GNSS meteorology can be improved. In this paper, we describe an operational RT system ... [more ▼]

When employing observations from multiple Global Navigation Satellite System (GNSS) the performance of real-time (RT) GNSS meteorology can be improved. In this paper, we describe an operational RT system for extracting zenith tropospheric delay (ZTD) using a modified version of the PPP-wizard. Multi-GNSS, including GPS, GLONASS and Galileo, observation streams are processed using a RT PPP strategy based on RT satellite orbit/clock products from CNES. A continuous experiment for 30 days is conducted, in which the RT observation streams of 20 globally distributed stations are processed. The initialization time and accuracy of the RT troposphere products using single/multi-system observations are evaluated. The effect of RT PPP ambiguity resolution is also evaluated. The results reveal that the RT troposphere products based on single system observations can fulfill the requirements of meteorological application, in which the GPS-only solution is better than the GLONASS-only solution in both initialization and accuracy. The performance can also be improved by applying RT PPP ambiguity resolution and utilizing multi-GNSS observations. Specifically, we notice that the ambiguity resolution is more effective in improving the accuracy, whereas the initialization process can be better accelerated by multi-GNSS observations. Combining all systems, RT troposphere products with an average accuracy of about 8 mm in ZTD can be achieved after an initialization process of approximately 9 minutes, which supports the application of multi-GNSS observations and ambiguity resolution for RT meteorological applications. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailLightweight Detection of Android-specific Code Smells: the aDoctor Project
Palomba, Fabio; Di Nucci, Dario; Panichella, Annibale UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, February 21)

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising ... [more ▼]

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising approaches for detecting the traditional code smells defined by Fowler, little knowledge and support is available for an emerging category of Mobile app code smells. Recently, Reimann etal proposed a new catalogue of Android-specific code smells that may be a threat for the maintainability and the efficiency of Android applications. However, current tools working in the context of Mobile apps provide limited support and, more importantly, are not available for developers interested in monitoring the quality of their apps. To overcome these limitations, we propose a fully automated tool, coined aDoctor, able to identify 15 Android-specific code smells from the catalogue by Reimann et al. An empirical study conducted on the source code of 18 Android applications reveals that the proposed tool reaches, on average, 98% of precision and 98% of recall. We made aDoctor publicly available. [less ▲]

Detailed reference viewed: 35 (16 UL)
Full Text
Peer Reviewed
See detailSoftware-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable?
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017, February 21)

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and ... [more ▼]

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and software-based techniques to approximate the actual energy profile. However, all these solutions present their own advantages and disadvantages. Hardware-based tools are highly precise, but at the same time their use is bound to the acquisition of costly hardware components. Model-based tools require the calibration of parameters needed to correctly create a model on a specific hardware device. Software-based approaches do not need any hardware components, but they rely on battery measurements and, thus, they are hardware-assisted. These tools are cheaper and easier to use than hardware-based tools, but they are believed to be less precise. In this paper, we take a deeper look at the pros and cons of software-based solutions investigating to what extent their measurements depart from hardware-based solutions. To this aim, we propose a software-based tool named PETRA that we compare with the hardware-based MONSOON toolkit on 54 Android apps. The results show that PETRA performs similarly to MONSOON despite not using any sophisticated hardware components. In fact, in all the apps the mean relative error with respect to MONSOON is lower than 0.05. Moreover, for 95% of the analyzed methods the estimation error is within 5% of the actual values measured using the hardware-based toolkit. [less ▲]

Detailed reference viewed: 54 (20 UL)
Full Text
Peer Reviewed
See detailIntegration of sparse electrophysiological measurements with preoperative MRI using 3D surface estimation in deep brain stimulation surgery
Husch, Andreas Dominik UL; Gemmar, Peter; Thunberg, Johan UL et al

in Webster, Robert; Fei, Baowei (Eds.) Medical Imaging 2017: Image-Guided Procedures, Robotic Interventions, and Modeling (2017, February 14)

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the ... [more ▼]

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the subthalamic nucleus (STN) to suppress the symptoms of Parkinson’s Disease. The standard approach is to use an array of up to five MER electrodes in a fixed configuration. Interpretation of the recorded signals yields a spatiallyvery sparse set of information about the morphology of the respective brain structures in the targeted area. However, no aid is currently available for surgeons to intraoperatively integrate this information with other data available on the patient’s individual morphology (e.g. MR imaging data used for surgical planning). This integration might allow surgeons to better determine the most probable position of the electrodes within the target structure during surgery. This paper suggests a method for reconstructing a surface patch from the sparse MER dataset utilizing additional a-priori knowledge about the geometrical configuration of the measurement electrodes. The conventional representation of MER measurements as intervals of target region/non-target region is therefore transformed into an equivalent boundary set representation, allowing efficient point-based calculations. Subsequently, the problem is to integrate the resulting patch with a preoperative model of the target structure, which can be formulated as registration problem minimizing a distance measure between the two surfaces. When restricting this registration procedure to translations, which is reasonable given certain geometric considerations, the problem can be solved globally by employing an exhaustive search with arbitrary precision in polynomial time. The proposed method is demonstrated using bilateral STN/Substantia Nigra segmentation data from preoperative MRIs of 17 Patients with simulated MER electrode placement. When using simulated data of heavily perturbed electrodes and subsequent MER measuremen [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
See detailNew methodology for designing direct-laser-sintered motorcycle frame based on combination of topology optimization and lattice implementation
Cao, Thanh Binh UL; Kedziora, Slawomir UL

Scientific Conference (2017, February 07)

The use of direct laser sintering (DLS) has become more attractive recently since it offers a promising tool in fabricating complex components rapidly. Particularly, the technique is seen more powerful ... [more ▼]

The use of direct laser sintering (DLS) has become more attractive recently since it offers a promising tool in fabricating complex components rapidly. Particularly, the technique is seen more powerful when it is combined with computer-aid design and computational optimization. In spite of knowledge increment in the above areas presently, design method for sophisticated structures towards DLS is still far from being fully exploited. Therefore, this paper was issued to investigate a novel methodology of design, developed by combining topology optimization and lattice-beam implementation, for a blend-solid-lattice frame of a motorcycle. From the obtained results, it was recognized that the as-built tubular hybrid structure demonstrated comparable values of first resonant frequency and mass with respected to those of the original. Additionally, it was found that stiffness of the generated structures depended strongly on locations where lattice was substituted. In particular, less stressed frame’s components were evidenced as appropriate regions for the substitution. The achieved results also revealed estimated buckling load factors, being circa 17 times higher than applied bumping loads acted on the tubular-lattice structure. Finally, equivalent stress predicted in static analyses confirmed all designs working safely in nominated conditions. Based on these achievements, it is believed that the new method worked quite acceptably in designing direct-laser-sintered motorcycle frame, and it is very promising to further develop the method as well as extend it into different complex direct-laser-sintered elements designed for future applications. [less ▲]

Detailed reference viewed: 27 (3 UL)
See detailCanonically defined star products for Kaehler manifolds
Schlichenmaier, Martin UL

Scientific Conference (2017, February 07)

Detailed reference viewed: 4 (0 UL)
See detailInherently Unneutral Investment Treaty Arbitration and Never-Ending Excuses
Radović, Relja UL

Scientific Conference (2017, February)

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailIntergenerational differences in social and political participation in Western Europe
Meyers, Christiane UL

Scientific Conference (2017, January 17)

The global crisis and its negative consequences on living conditions in Europe have led in some countries to massive protests, especially among young persons. Kern et al. (2015) argue that this rising and ... [more ▼]

The global crisis and its negative consequences on living conditions in Europe have led in some countries to massive protests, especially among young persons. Kern et al. (2015) argue that this rising and sudden political engagement can be explained by grievance theory: individuals whose interests are threatened react by engaging themselves politically. However, they also demonstrate that political participation in a more long-term perspective is better explained by the civic voluntarism model. Brady et al. (1995) establish that resources like time, money and civic skills are central for getting politically active. Persons with a low socioeconomic status who possess fewer resources are generally less political active. In a long-term perspective the economic crisis and the deterioration of living conditions should lead to less political participation of young people. I want to use the civic voluntarism model to analyse and describe the changing political participation forms of different generations. Generations are defined as persons having experienced similar historical conditions when growing up, thus developing similar values and beliefs (Grasso, 2014). I will look at the generation of the baby boomers born after World War II and compare them to the generation Y born before the turn of the millennium. Both generations grew up in times of social changes and challenges. I will use a broad definition of participation, which integrates political and social engagement, to look at the different participation modes of the generations (Meyers & Willems, 2016; Sloam, 2014; Dalton, 2008). The analysis is based on data of the European Values Study and uses multivariate methods (factor and cluster analysis) to determine different engagement types within the two generations in Western Europe. Are there signs that the young generation disengages from society? Do they engage themselves in other ways than the older generation? How can the civic voluntarism model help to explain the differences between older and younger generations? [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailChez nous, les fraises ne poussent pas en hiver. Le rôle de la locavoracité dans la (re)prise de conscience de la saisonnalité des aliments
Reckinger, Rachel UL

Scientific Conference (2017, January 11)

Basé sur deux études empiriques, conjointement quantitatives et qualitatives, menées dans le contexte de deux projets interdisciplinaires à l’Université du Luxembourg, l’argumentaire porte sur l’interface ... [more ▼]

Basé sur deux études empiriques, conjointement quantitatives et qualitatives, menées dans le contexte de deux projets interdisciplinaires à l’Université du Luxembourg, l’argumentaire porte sur l’interface régionalité / saisonnalité tant au Grand-Duché que dans les régions limitrophes. En effet, dans les populations considérées, la régionalité comme qualification alimentaire prime largement sur la saisonnalité, qui, elle, demande une réflexivité et une conscience agricole plus importante. Mais la forme locavore de la notion de régionalité est actuellement une tendance montante et elle favorise, justement, une (re)prise de conscience des contextes géolocalisés de la production alimentaire. Sa diffusion pourrait avoir un impact positif sur la saisonnalité tant dans les représentations que dans les pratiques des consommateurs – en tant que facteur de réduction d’émissions liées au transport, de potentiel d’identification communautaire et de valorisation locale, ainsi que de lutte contre le gaspillage alimentaire. [less ▲]

Detailed reference viewed: 45 (6 UL)
See detailAsset Pricing under Rational Learning about Rare Disasters
Koulovatianos, Christos UL; Wieland, Volker

Scientific Conference (2017, January 07)

Why is investment in stocks so persistently weak after a rare disaster? Connecting disaster episodes with post-disaster expectations seems crucial for such post-disaster forecasting and also policymaking ... [more ▼]

Why is investment in stocks so persistently weak after a rare disaster? Connecting disaster episodes with post-disaster expectations seems crucial for such post-disaster forecasting and also policymaking, but rational-expectations models with variable disaster risk often fail to achieve this connection. To this end, while retaining full rationality, we introduce limited information and learning about rare-disaster risk and show that the resulting stock-investment behavior seems similar to persistent investor fear after a rare disaster. We study, (a) rational learning for state verification (RLS), with investors knowing the data-generating process of disaster riskiness but being unable to observe whether the economy is in a riskier state (regime) or not, and (b) rational learning about the data-generating process (RLP) of disaster risk, with investors also being unaware of the data-generating process of disaster riskiness. We analytically show that both RLS and RLP synchronize disaster events with post-disaster expectations and asset prices, and create persistence in price-dividend ratios even if data-generating processes of disaster risk have no persistence. Using De Finetti's theorem we show that RLP offers an explanation for global spells of pessimism and weak investment after a disaster. [less ▲]

Detailed reference viewed: 11 (0 UL)
Peer Reviewed
See detailData Abundance and Asset Price Informativeness
Dugast, Jérôme UL; Foucault, Thierry

Scientific Conference (2017, January 06)

Detailed reference viewed: 9 (3 UL)
Full Text
Peer Reviewed
See detailHow representative are EAP listening books of real lectures?
Deroey, Katrien UL

in Kemp, Jenny (Ed.) Proceedings of the 2015 BALEAP Conference. EAP in a rapidly changing landscape: Issues, challenges and solutions (2017)

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is ... [more ▼]

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is arguably whether it prepares students for lectures. In this regard, the availability of spoken academic corpora (e.g. BASE, MICASE, ELFA) and the research arising from these provides insights into lecture discourse that could be usefully integrated in such materials. However, as I will here show, the integration of corpus findings in EAP course books is surprisingly limited, raising the question of whether training based on such materials forms an adequate preparation for the demands of real lectures. I illustrate the gap between authentic lecture discourse and various current listening books by comparing the treatment of importance markers (e.g. the important point is; remember; I want to emphasize this) with their realisation in a lecture corpus. (Deroey and Taverniers 2012; Deroey 2013). Since these discourse organisational signals alert students to key points, being able to identify these markers may facilitate lecture comprehension and note-taking. Importance markers were retrieved from all 160 lectures of the British Academic Spoken English corpus using corpus-driven and corpus-based methods. The investigation revealed that while listening books typically highlight the importance of identifying the lecturer’s main points, students are either not or inadequately trained to recognise importance markers. Where examples of such markers are included, they are few and prototypical (e.g. the important point is). However, in the lecture corpus prototypical markers are relatively uncommon; instead less explicit, multifunctional markers such as ‘the thing is’ and ‘remember’ predominate. The findings suggest that much remains to be done to make lecture listening books more representative of real lectures. References Deroey, K. L. B. and Taverniers, M. 2012. “‘Just remember this’: Lexicogrammatical relevance markers in lectures”. English for Specific Purposes 31 (4): 221-233. Deroey, K. L. B. (2015). Marking importance in lectures: Interactive and textual orientation. Applied Linguistics, 36(1), 51-72. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailAutomata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation
Devroey, Xavier; Perrouin, Gilles UL; Papadakis, Mike UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017) (2017)

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailTowards Security-aware Mutation Testing
Loise, Thomas; Devroey, Xavier; Perrouin, Gilles et al

in The 12th International Workshop on Mutation Analysis (Mutation 2017) (2017)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis
Huynen, Jean-Louis UL; Lenzini, Gabriele UL

in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied ... [more ▼]

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodology works also retrospectively. It assists analysts in retrieving the causes of an observed socio-technical attack, guiding them to understand where the information security management of the system has failed. The methodology is tuned to find causes that root in the human-related factors that an attacher can exploit to execute its intrusion. [less ▲]

Detailed reference viewed: 16 (3 UL)
Full Text
Peer Reviewed
See detailDistilling Provider-Independent Data for General Detection of Non-Technical Losses
Meira, Jorge Augusto UL; Glauner, Patrick UL; State, Radu UL et al

in Power and Energy Conference, Illinois 23-24 February 2017 (2017)

Non-technical losses (NTL) in electricity distribution are caused by different reasons, such as poor equipment maintenance, broken meters or electricity theft. NTL occurs especially but not exclusively in ... [more ▼]

Non-technical losses (NTL) in electricity distribution are caused by different reasons, such as poor equipment maintenance, broken meters or electricity theft. NTL occurs especially but not exclusively in emerging countries. Developed countries, even though usually in smaller amounts, have to deal with NTL issues as well. In these countries the estimated annual losses are up to six billion USD. These facts have directed the focus of our work to the NTL detection. Our approach is composed of two steps: 1) We compute several features and combine them in sets characterized by four criteria: temporal, locality, similarity and infrastructure. 2) We then use the sets of features to train three machine learning classifiers: random forest, logistic regression and support vector vachine. Our hypothesis is that features derived only from provider-independent data are adequate for an accurate detection of non-technical losses. [less ▲]

Detailed reference viewed: 41 (10 UL)
Full Text
Peer Reviewed
See detailDiskursivität und Einheit des Bewusstseins bei Kant
Heidemann, Dietmar UL

in Kant-Studien (2017)

Im ersten Abschnitt des Beitrags wird der Zusammenhang von Kantischer Begriffslehre und Theorie des transzendentalen Selbstbewusstseins transparent gemacht. Die Einheit des Bewusstseins, so wird die ... [more ▼]

Im ersten Abschnitt des Beitrags wird der Zusammenhang von Kantischer Begriffslehre und Theorie des transzendentalen Selbstbewusstseins transparent gemacht. Die Einheit des Bewusstseins, so wird die Rekonstruktion dieses Zusammenhanges ergeben, gründet in der Theorie des diskursiven Begriffs. Die dabei herausgearbeitete Konzeption der diskursiven Identität wird dann im zweiten Abschnitt anhand des dritten Paralogismus der ersten Auflage der Kritik der reinen Vernunft mit dem Begriff der personalen Identität kontrastiert, um zu zeigen, warum der auch hier bestehende konstitutive Zusammenhang zwischen kognitiver Einheit und Identität des Bewusstseins zu keiner spezifischen Erkenntnis hinsichtlich des Bewusstseins führt. Während die transzendentale Deduktion die Theorie nichtzeitlicher, logischer Einheit und diskursiver Identität der transzendentalen Apperzeption entfaltet, thematisiert der dritte Paralogismus das mentale Phänomen kontingenter, temporaler Einheit und damit personaler Identität. Über die prinzipiellen Bedeutungsunterschiede dieser beiden Konzeptionen von Einheit und Identität im Bereich des Mentalen ist Klarheit zu schaffen. Der Schlussteil widmet sich einigen naheliegenden Einwänden gegen den in diesem Beitrag entwickelten Interpretationsvorschlag. Insbesondere wird eine Kritik an der hier verteidigten Diskursivitätsthese diskutiert, derzufolge die Einheit des Bewusstseins in der Diskursivität des Verstandes bzw. Begriffs und nicht umgekehrt die Diskursivität des Verstandes bzw. des Begriffs in der Einheit des Bewusstseins gründet [less ▲]

Detailed reference viewed: 152 (3 UL)
Full Text
Peer Reviewed
See detailImproving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models
Liu, Bing UL; Lucia, Lucia; Nejati, Shiva UL et al

in 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017)

One promising way to improve the accuracy of fault localization based on statistical debugging is to increase diversity among test cases in the underlying test suite. In many practical situations, adding ... [more ▼]

One promising way to improve the accuracy of fault localization based on statistical debugging is to increase diversity among test cases in the underlying test suite. In many practical situations, adding test cases is not a cost-free option because test oracles are developed manually or running test cases is expensive. Hence, we require to have test suites that are both diverse and small to improve debugging. In this paper, we focus on improving fault localization of Simulink models by generating test cases. We identify three test objectives that aim to increase test suite diversity. We use these objectives in a search-based algorithm to generate diversified but small test suites. To further minimize test suite sizes, we develop a prediction model to stop test generation when adding test cases is unlikely to improve fault localization. We evaluate our approach using three industrial subjects. Our results show (1) the three selected test objectives are able to significantly improve the accuracy of fault localization for small test suite sizes, and (2) our prediction model is able to maintain almost the same fault localization accuracy while reducing the average number of newly generated test cases by more than half. [less ▲]

Detailed reference viewed: 116 (6 UL)
Full Text
Peer Reviewed
See detail"Communauté du royaume" et affirmation de la noblesse dans les pays tchèques (XIIIe-XIVe siècles)
Vomacka, Eloïse UL

in Lachaud, Frédérique (Ed.) La « communauté du royaume » (Angleterre, Écosse, France, Empire, Scandinavie), de la fin du Xe siècle au début du XIVe siècle, théories et pratiques, Nancy – 6 novembre / 8 novembre 2014 (2017)

Detailed reference viewed: 18 (2 UL)
Full Text
Peer Reviewed
See detailFormally Verified Differential Dynamic Logic
Bohrer, Brandon; Rahli, Vincent UL; Vukotic, Ivana UL et al

in CPP 2017 (2017)

Detailed reference viewed: 40 (12 UL)
Full Text
Peer Reviewed
See detailControlled Homomorphic Encryption: Definition and Construction
Desmedt, Yvo; Iovino, Vincenzo UL; Persiano, Giuseppe et al

in FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (2017)

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE ... [more ▼]

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE) to homomorphically evaluate a ciphertext Ct = Enc(m) and a circuit C therefore obtaining Enc(C(m)) but only if (similarly to a FunctE) a token for C has been received from the owner of the secret key. We discuss difficulties in constructing a CHES and then show a construction based on any FunctE. As a byproduct our CHES also represents a FunctE supporting the re-encryption functionality and in that respect improves existing solutions. [less ▲]

Detailed reference viewed: 15 (6 UL)
Full Text
Peer Reviewed
See detailAssessing and Improving the Mutation Testing Practice of PIT
Laurent, Thomas; Papadakis, Mike UL; Kintis, Marinos UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (2017)

Detailed reference viewed: 16 (2 UL)
Full Text
Peer Reviewed
See detailWhen An Educational Ideology Travels: The Experience Of The New Math Reform In Luxembourg
Nadimi Amiri, Shaghayegh UL

in Mathematics Education and Life at Times of Crisis (2017)

Detailed reference viewed: 8 (2 UL)
Full Text
Peer Reviewed
See detailThe Justification of Tyrannicide in the Chronicle of Dalimil. The Czech Nobility as the “Mystical Body” of the Realm.
Vomacka, Eloïse UL

in Valdoliso, Covadonga (Ed.) Debuerit habere regnum. Deposing and Proclaiming Kings in the Middle Ages (2017)

Detailed reference viewed: 6 (0 UL)
See detailDie deutschsprachige Übersetzung der Dalimil-Chronik. Ein Versuch der politischen Legitimation der städtischen Eliten im Böhmen der Luxemburger?
Vomacka, Eloïse UL

in Sieburg, Heinz (Ed.) Prag in der Zeit der Luxemburger. Literatur, religiöse Ideen und Herrschaftskulturen zwischen Bereicherung und Behauptung (2017)

Detailed reference viewed: 7 (0 UL)
See detailLuxemburg, Brabant und die Karolinger. Versuch einer Neubewertung der Selbstdarstellung der beiden ersten Kaiser aus dem Hause Luxemburg
Vomacka, Eloïse UL; Margue, Michel UL

in Dolezalova, Eva (Ed.) Ověnčený slávou, láskou i pohrdáním. Jan Lucemburský a Karel IV. v historické paměti (2017)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailA Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons
Galetzka, Michael; Glauner, Patrick UL

in Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP (2017)

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special ... [more ▼]

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special cases to be considered. This holds true in particular for complex polygons whose edges intersect each other creating holes. In this paper we present a simple even-odd algorithm to solve this problem for complex polygons in linear time and prove its correctness for all possible points and polygons. We furthermore provide examples and implementation notes for this algorithm. [less ▲]

Detailed reference viewed: 47 (8 UL)
Full Text
Peer Reviewed
See detailVideo-Based Feedback for Assisting Physical Activity
Baptista, Renato UL; Goncalves Almeida Antunes, Michel UL; Aouada, Djamila UL et al

in 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2017)

In this paper, we explore the concept of providing feedback to a user moving in front of a depth camera so that he is able to replicate a specific template action. This can be used as a home based ... [more ▼]

In this paper, we explore the concept of providing feedback to a user moving in front of a depth camera so that he is able to replicate a specific template action. This can be used as a home based rehabilitation system for stroke survivors, where the objective is for patients to practice and improve their daily life activities. Patients are guided in how to correctly perform an action by following feedback proposals. These proposals are presented in a human interpretable way. In order to align an action that was performed with the template action, we explore two different approaches, namely, Subsequence Dynamic Time Warping and Temporal Commonality Discovery. The first method aims to find the temporal alignment and the second one discovers the interval of the subsequence that shares similar content, after which standard Dynamic Time Warping can be used for the temporal alignment. Then, feedback proposals can be provided in order to correct the user with respect to the template action. Experimental results show that both methods have similar accuracy rate and the computational time is a decisive factor, where Subsequence Dynamic Time Warping achieves faster results. [less ▲]

Detailed reference viewed: 67 (21 UL)
Full Text
Peer Reviewed
See detailWeak Interference Detection with Signal Cancellation in Satellite Communications
Politis, Christos UL; Maleki, Sina UL; Tsinos, Christos UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017 (2017)

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference ... [more ▼]

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference efficiently. While there are efficient techniques to monitor strong interference in SATCOM, weak interference is not so easily detected because of its low interference to signal and noise ratio (ISNR). To address this issue, this paper proposes and develops a technique which takes place on-board the satellite by decoding the desired signal, removing it from the total received signal and applying an Energy Detector (ED) in the remaining signal for the detection of interference. Different from the existing literature, this paper considers imperfect signal cancellation, examining how the decoding errors affect the sensing performance, derives the expressions for the probability of false alarm and provides a set of simulations results, verifying the efficiency of the technique. [less ▲]

Detailed reference viewed: 65 (10 UL)
Full Text
See detailSingle station Monitoring of Volcanoes Using Seismic ambient noise
De Plaen, Raphaël UL; Lecocq, Thomas; Caudron, Corentin et al

Poster (2016, December 16)

Detailed reference viewed: 16 (2 UL)
Full Text
Peer Reviewed
See detailConnected Motorized Riders - A Smart Mobility System to Connect Two and Three-wheelers
Sundharam, Sakthivel Manikandan UL; Fejoz, Loic; Navet, Nicolas UL

in Proceedings of 6th Intentional Symposium on Embedded computing & system Design (ISED 2016) (2016, December 15)

The Smart Cities Mission has been launched in India in 2015 to develop 100 cities, with smart mobility being one of the main topics in the mission. As urban areas are flooded with two (motorcycles) and ... [more ▼]

The Smart Cities Mission has been launched in India in 2015 to develop 100 cities, with smart mobility being one of the main topics in the mission. As urban areas are flooded with two (motorcycles) and three wheelers (auto-rickshaws), introducing smart control of such vehicles may reduce the congestion on the roads and the number of accidents. Indeed, over-speeding and drunken driving are common traffic violations. In this project we propose an IoT-based smart mobility system which tracks data, such as the vehicle location, vehicle speed, alcohol level of the driver, etc. efficiently over the internet. Our system has been conceived with CPAL, a high-level language meant to simulate and execute Cyber Physical Systems including IoT applications. A prototype running on ARM mbed IoT hardware, shows the feasibility of our concept. We believe that more efficient and interactive traffic management, more disciplined driving behaviors, reduction in accident rate, more controlled pollution, increased passenger safety can be achieved if systems like the one prototyped in this work deployed contributing to smarter cities. [less ▲]

Detailed reference viewed: 44 (16 UL)
Full Text
Peer Reviewed
See detailA Model-Based Development Environment for Rapid-Prototyping of Latency-Sensitive Automotive Control Software
Sundharam, Sakthivel Manikandan UL; Havet, Lionel; Altmeyer, Sebastian et al

in Proceedings of 6th Intentional Symposium on Embedded computing & system Design (ISED 2016) (2016, December 15)

The innovation in the field of automotive embedded systems has been increasingly relying on software-implemented functions. The control laws of these functions typically assume deterministic sampling ... [more ▼]

The innovation in the field of automotive embedded systems has been increasingly relying on software-implemented functions. The control laws of these functions typically assume deterministic sampling rates and constant delays from input to output. However, on the target processors, the execution times of the software will depend on many factors such as the amount of interferences from other tasks, resulting in varying delays from sensing to actuating. Three approaches supported by tools, namely TrueTime, T-Res, and SimEvents, have been developed to facilitate the evaluation of how timing latencies affect control performance. However, these approaches support the simulation of control algorithms, but not their actual implementation. In this paper, we present a model interpretation engine running in a co-simulation environment to study control performances while considering the run-time delays in to account. Introspection features natively available facilitate the implementation of self-adaptive and fault-tolerance strategies to mitigate and compensate the run-time latencies. A DC servo controller is used as a supporting example to illustrate our approach. Experiments on controller tasks with injected delays show that our approach is on par with the existing techniques with respect to simulation. We then discuss the main benefits of our development approach that are the support for rapid-prototyping and the re-use of the simulation model at run-time, resulting in productivity and quality gains. [less ▲]

Detailed reference viewed: 99 (30 UL)
Peer Reviewed
See detailN-point Virasoro algebras are multi-point Krichever-Novikov type algebras
Schlichenmaier, Martin UL

Scientific Conference (2016, December 14)

Detailed reference viewed: 5 (1 UL)
Full Text
Peer Reviewed
See detailGlobal converegence properties of a consensus protocol on the n-sphere
Markdahl, Johan UL; Goncalves, Jorge UL

Scientific Conference (2016, December 13)

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is ... [more ▼]

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is intrinsic to the n-sphere, i.e., it does not rely on the use of local coordinates obtained through a parametrization. It is shown that, for any connected undirected graph topology and all n>1, the consensus protocol yields convergence that is akin to almost global consensus in a weak sense. Simulation results suggest that actual almost global consensus holds. This result is of interest in the context of consensus on Riemannian manifolds since it differs from what is known with regard to the 1-sphere and SO(3) where more advanced intrinsic consensus protocols are required in order to generate equivalent results. [less ▲]

Detailed reference viewed: 54 (9 UL)
Peer Reviewed
See detailL'enseignement transsystémique du droit des contrats: l'expérience luxembourgeoise
Ancel, Pascal UL

Scientific Conference (2016, December 13)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailUsing Virtual Desktop Infrastructure to Improve Power Efficiency in Grinfy System
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Kliazovich, Dzmitry UL; Bouvry, Pascal UL et al

in IEEE 8th International Conference on Cloud Computing Technology and Science(CloudCom), Luxembourg 2016 (2016, December 13)

Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a ... [more ▼]

Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a new shape of delivering operating systems remotely. Operating systems are executing in a cloud data center. Users desktops and applications can be accessed by using thin client devices. Thin client device is consisting of screen attached with small CPU. VDI has benefits in terms of cost reduction and energy saving. In this paper, we increase the power saved by Grinfy system. Without VDI, Grinfy can save at least 30% of energy consumption to its users companies. By integrating VDI in computing systems and using Grinfy, the power efficiency and saving can be improved and save more than 30%. The improving and increasing of energy saving features of VDI are also illustrated by experiment and will be integrated to Grinfy system to increase percentage of energy saved. [less ▲]

Detailed reference viewed: 22 (1 UL)
Peer Reviewed
See detailN-point Virasoro algebras are multi-point Krichever-Novikov type algebras
Schlichenmaier, Martin UL

Scientific Conference (2016, December 12)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailAvoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control
Volp, Marcus UL; Lackorzynski, Adam; Decouchant, Jérémie UL et al

Scientific Conference (2016, December 12)

Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified ... [more ▼]

Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified vulnerabilities that allow an untrusted management OS to extract secret information from Intel SGX's enclaves, and to violate their integrity by exploiting concurrency bugs. In this work, we re-investigate delayed preemption (DP) in the context of Intel SGX. DP is a mechanism originally proposed for L4-family microkernels as disable-interrupt replacement. Recapitulating earlier results on language-based information-flow security, we illustrate the construction of leakage-free code for enclaves. However, as long as adversaries have fine-grained control over preemption timing, these solutions are impractical from a performance/complexity perspective. To overcome this, we resort to delayed preemption, and sketch a software implementation for hypervisors providing enclaves as well as a hardware extension for systems like SGX. Finally, we illustrate how static analyses for SGX may be extended to check confidentiality of preemption-delaying programs. [less ▲]

Detailed reference viewed: 83 (17 UL)
Full Text
See detailBayesian inference for parameter identification in computational mechanics
Rappel, Hussein UL; Beex, Lars UL; Hale, Jack UL et al

Poster (2016, December 12)

Detailed reference viewed: 42 (3 UL)
Full Text
See detailElastography under uncertainty
Hale, Jack UL; Farrell, Patrick; Bordas, Stéphane UL

Poster (2016, December 12)

Detailed reference viewed: 62 (9 UL)
Full Text
Peer Reviewed
See detailImage to analysis pipeline: single and double balloons kyphoplasty
Baroli, Davide UL; Hauseux, Paul UL; Hale, Jack UL et al

Poster (2016, December 12)

In this work, we present a semi-automatic pipeline from image to simulation of a patient fractured vertebra after the kyphoplastic augmentation with two balloons. In this procedure, the CT-scan medical ... [more ▼]

In this work, we present a semi-automatic pipeline from image to simulation of a patient fractured vertebra after the kyphoplastic augmentation with two balloons. In this procedure, the CT-scan medical image are pre-processed using open-source software Slice3D for segmentation and 3D reconstruction operation. Then, using geometric processing the 3D surface geometry is enhanced to avoid degenerate element and trigging phenomena on vertebra and cement area. We perform a finite element analysis to evaluate the risk of subsequent vertebral fracture. Finally using Monte-Carlo technique, we assess the propagation of uncertainty of material parameter on the evaluation of this risk. Based on the developed semi-automatic pipelines, it is possible to perform a patient-specific simulation that assesses the successful of kyphoplasty operation. [less ▲]

Detailed reference viewed: 67 (22 UL)
Full Text
See detailError analysis of Tide Gauge Benchmark Monitoring (TIGA) Analysis Center stacked solutions
Hunegnaw, Addisu UL; Teferle, Felix Norman UL; Abraha, Kibrom Ebuy UL et al

Poster (2016, December 12)

In 2013 the International GNSS Service (IGS) Tide Gauge Benchmark Monitoring (TIGA) Working Group (WG) started their reprocessing campaign, which proposes to re-analyze all relevant Global Positioning ... [more ▼]

In 2013 the International GNSS Service (IGS) Tide Gauge Benchmark Monitoring (TIGA) Working Group (WG) started their reprocessing campaign, which proposes to re-analyze all relevant Global Positioning System (GPS) observations from 1995 to the end of 2013. This re-processed dataset will provide high quality estimates of land motions, enabling regional and global high-precision geophysical/geodetic studies. Several of the individual TIGA Analysis Centers (TACs) have completed processing the full history of GPS observations recorded by the IGS global network, as well as, many other GPS stations at or close to tide gauges, which are available from the TIGA data center at the University of La Rochelle (www.sonel.org). The TAC solutions contain a total of over 700 stations. This study focuses on the evaluations of any systematic error present in the three TIGA analysis center (TAC) SINEX solutions: the British Isles continuous GNSS Facility – University of Luxembourg consortium (BLT), the GeoForschungsZentrum (GFZ) Potsdam, and of the University of La Rochelle (ULR). We have analyzed the residual position time series of the individual TAC a combination of automatic and manual discontinuity identification, applying a post-seismic deformation model adopted from ITRF2014 for those stations that are affected by earthquakes, followed by the stacking of the daily solution of the individual TAC into a long term linear frame. We have carried out the error analysis using the Combination and Analysis of Terrestrial Reference Frame (CATREF) software package. The TIGA Combination Centre (TCC) at the University of Luxembourg (UL) is responsible for providing a combined solution with a global set of vertical land movement estimates. [less ▲]

Detailed reference viewed: 53 (18 UL)
Full Text
See detailReal-time error control for surgical simulation
Bui, Huu Phuoc UL; Tomar, Satyendra UL; Courtecuisse, Hadrien et al

Poster (2016, December 12)

Objective: To present the first real-time a posteriori error-driven adaptive finite element approach for real-time simulation and to demonstrate the method on a needle insertion problem. Methods: We use ... [more ▼]

Objective: To present the first real-time a posteriori error-driven adaptive finite element approach for real-time simulation and to demonstrate the method on a needle insertion problem. Methods: We use corotational elasticity and a frictional needle/tissue interaction model based on friction. The problem is solved using finite elements within SOFA. The refinement strategy relies upon a hexahedron-based finite element method, combined with a posteriori error estimation driven local $h$-refinement, for simulating soft tissue deformation. Results: We control the local and global error level in the mechanical fields (e.g. displacement or stresses) during the simulation. We show the convergence of the algorithm on academic examples, and demonstrate its practical usability on a percutaneous procedure involving needle insertion in a liver. For the latter case, we compare the force displacement curves obtained from the proposed adaptive algorithm with that obtained from a uniform refinement approach. Conclusions: Error control guarantees that a tolerable error level is not exceeded during the simulations. Local mesh refinement accelerates simulations. Significance: Our work provides a first step to discriminate between discretization error and modeling error by providing a robust quantification of discretization error during simulations. [less ▲]

Detailed reference viewed: 113 (18 UL)
Full Text
See detailOn the Impact of Multi-GNSS Solutions on Satellite Products and Positioning
Abraha, Kibrom Ebuy UL; Teferle, Felix Norman UL; Hunegnaw, Addisu UL et al

Poster (2016, December 12)

In Global Navigation Satellite System (GNSS) coordinate time series unrecognised errors and un-modelled (periodic) effects may bias non-linear motions induced by geophysical signals. Those spurious ... [more ▼]

In Global Navigation Satellite System (GNSS) coordinate time series unrecognised errors and un-modelled (periodic) effects may bias non-linear motions induced by geophysical signals. Those spurious signals can be caused either due to un-modelled long periodic signals or propagation of sub-daily signals into the time series. Understanding and mitigating these errors is vital to reduce biases and on revealing subtle geophysical signals. Mostly, the spurious signals are caused by unmodelled errors which occur due to the draconitic years, satellite ground repeats and absorption into resonant GNSS orbits. Accordingly, different features can be observed in GNSS-derived products from different single-GNSS or combined-GNSS solutions. To assess the nature of periodic signals on station coordinate time series Precise Point Positioning (PPP) solutions are generated using the Bernese GNSS Software V5.2. The solutions consider only GPS, only GLONASS or combined GPS+GLONASS (GNSS) observations. We assess the periodic signals of station coordinates computed using the combined International GNSS Service (IGS) and four of its Analysis Centers (ACs) products. [less ▲]

Detailed reference viewed: 75 (20 UL)
Full Text
Peer Reviewed
See detailA Probabilistic View of Neighborhood-based Recommendation Methods
Wang, Jun UL; Tang, Qiang

in ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE (2016, December 12)

Probabilistic graphic model is an elegant framework to compactly present complex real-world observations by modeling uncertainty and logical flow (conditionally independent factors). In this paper, we ... [more ▼]

Probabilistic graphic model is an elegant framework to compactly present complex real-world observations by modeling uncertainty and logical flow (conditionally independent factors). In this paper, we present a probabilistic framework of neighborhood-based recommendation methods (PNBM) in which similarity is regarded as an unobserved factor. Thus, PNBM leads the estimation of user preference to maximizing a posterior over similarity. We further introduce a novel multi-layer similarity descriptor which models and learns the joint influence of various features under PNBM, and name the new framework MPNBM. Empirical results on real-world datasets show that MPNBM allows very accurate estimation of user preferences. [less ▲]

Detailed reference viewed: 18 (6 UL)
Full Text
Peer Reviewed
See detailDeep Learning on Big Data Sets in the Cloud with Apache Spark and Google TensorFlow
Glauner, Patrick UL; State, Radu UL

Scientific Conference (2016, December 09)

Machine learning is the branch of artificial intelligence giving computers the ability to learn patterns from data without being explicitly programmed. Deep Learning is a set of cutting-edge machine ... [more ▼]

Machine learning is the branch of artificial intelligence giving computers the ability to learn patterns from data without being explicitly programmed. Deep Learning is a set of cutting-edge machine learning algorithms that are inspired by how the human brain works. It allows to selflearn feature hierarchies from the data rather than modeling hand-crafted features. It has proven to significantly improve performance in challenging data analytics problems. In this tutorial, we will first provide an introduction to the theoretical foundations of neural networks and Deep Learning. Second, we will demonstrate how to use Deep Learning in a cloud using a distributed environment for Big Data analytics. This combines Apache Spark and TensorFlow, Google’s in-house Deep Learning platform made for Big Data machine learning applications. Practical demonstrations will include character recognition and time series forecasting in Big Data sets. Attendees will be provided with code snippets that they can easily amend in order to analyze their own data. A related, but shorter tutorial focusing on Deep Learning on a single computer was given at the Data Science Luxembourg Meetup in April 2016. It was attended by 70 people making it the most attended event of this Meetup series in Luxembourg ever since its beginning. [less ▲]

Detailed reference viewed: 124 (3 UL)
Peer Reviewed
See detailPoster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity
Derrmann, Thierry UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Poster (2016, December 08)

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of ... [more ▼]

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of this trend. They become increasingly interesting, not only as sensors, but also as participants in Intelligent Transportation System (ITS) applications. More specifically, their pervasive connectivity to cellular networks enables them as passive and active sensing units. In this paper, we introduce LuST-LTE, a package of open-source simulation tools that allows the simulation of vehicular traffic along with pervasive LTE connectivity. [less ▲]

Detailed reference viewed: 47 (8 UL)