References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 64 (6 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

Scientific Conference (in press)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 206 (3 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 49 (3 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 61 (6 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailAn Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application
Almasi, Moein; Hemmati, Hadi; Fraser, Gordon et al

in International Conference on Software Engineering (ICSE) (in press)

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at ... [more ▼]

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at detecting faults, but how effective and applicable are they in an industrial application? In this paper, we investigate this question using a life insurance and pension products calculator engine owned by SEB Life & Pension Holding AB Riga Branch. To study fault-finding effectiveness, we extracted 25 real faults from the version history of this software project, and applied two up-to-date unit test generation tools for Java, EvoSuite and Randoop, which implement search-based and feedback-directed random test generation, respectively. Automatically generated test suites detected up to 56.40% (EvoSuite) and 38.00% (Randoop) of these faults. The analysis of our results demonstrates challenges that need to be addressed in order to improve fault detection in test generation tools. In particular, classification of the undetected faults shows that 97.62% of them depend on either “specific primitive values” (50.00%) or the construction of “complex state configuration of objects” (47.62%). To study applicability, we surveyed the developers of the application under test on their experience and opinions about the test generation tools and the generated test cases. This leads to insights on requirements for academic prototypes for successful technology transfer from academic research to industrial practice, such as a need to integrate with popular build tools, and to improve the readability of the generated tests. [less ▲]

Detailed reference viewed: 91 (3 UL)
Full Text
Peer Reviewed
See detailPrivate API Access and Functional Mocking in Automated Unit Test Generation
Arcuri, Andrea UL; Fraser, Gordon; Just, Rene

in Private API Access and Functional Mocking in Automated Unit Test Generation (in press)

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailA Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications
Jan, Sadeeq UL; Nguyen, Duy Cu UL; Andrea, Arcuri UL et al

in 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017 (in press)

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to ... [more ▼]

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection attacks that target SOAP communications. In this paper, we present a novel, search-based approach used to generate test data for a web application in an attempt to deliver malicious XML messages to web services. <br />Our goal is thus to detect XML injection vulnerabilities in web applications. The proposed approach is evaluated on two studies, including an industrial web application with millions of users. Results show that we are able to effectively generate test data (e.g., input values in an HTML form) that detect such vulnerabilities. [less ▲]

Detailed reference viewed: 116 (11 UL)
Full Text
Peer Reviewed
See detailCustomary international law in the legal order of the European Union
Neframi, Eleftheria UL

in Lopez Escudero, Manuel (Ed.) THE EUROPEAN UNION'S EXTERNAL ACTION IN TIME OF CRISIS (in press)

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the ... [more ▼]

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the exercise of competences with the view to attain an ultimate, constitutional objective of being a credible actor in the international scene. [less ▲]

Detailed reference viewed: 81 (14 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 84 (9 UL)
Full Text
Peer Reviewed
See detailIntegration of Learning Material into an Advanced Project-Based Learning Support Platform
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in INTED2017 Proceedings (in press)

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time ... [more ▼]

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time-intensive task, reusability in different contexts is desirable. In this paper, we propose to move from a material-centric to a student-centric approach, integrating learning material in an advanced project-based learning support platform. Our ecosystem, relying on semantic web technologies, comprises plugins for common authoring and project realization tools. [less ▲]

Detailed reference viewed: 28 (8 UL)
Full Text
Peer Reviewed
See detailIncroci autobiografici nel Lussemburgo antifascista
Levi, Fabio; Barenghi, Mario; Cuoghi, Sibilla et al

in Malvetti, Massimo, Neri, Francesco (Ed.) Primo Levi et la chimie des mots (in press)

Detailed reference viewed: 48 (10 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 35 (9 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 102 (5 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 25 (2 UL)
Full Text
Peer Reviewed
See detailRelay Selection and Transceiver Design for Joint Wireless Information and Energy Transfer in Cooperative Networks
Gautam, Sumit UL; P, Ubaidulla

Scientific Conference (2017, June 04)

In this paper, we consider optimal transceiver design and relay selection for simultaneous transfer of data and energy in a cooperative network consisting of amplify-and-forward (AF) relays. In this ... [more ▼]

In this paper, we consider optimal transceiver design and relay selection for simultaneous transfer of data and energy in a cooperative network consisting of amplify-and-forward (AF) relays. In this context, we address two different problems and propose optimal relay selection and transceiver processing. Furthermore, the problems are formulated for both time switching (TS) and power splitting (PS) schemes. The first problem is the maximization of overall rate while ensuring a minimum harvested energy at the receiver. For this problem, we perform computations of optimal fractions to distribute the received signal corresponding to TS and PS schemes, the relay weighing coefficients, and optimal relay selection. In the second problem, optimal resource allocation for maximizing the overall harvested energy at the user under constraints on the minimum achievable rate has been formulated. For this problem, we propose a suitable solution to meet the requirements for both TS and PS. For both the problems, we obtain a closed form solution. Finally, the performance of proposed design under various operating conditions and parameter values are illustrated with a comparison between TS and PS schemes. [less ▲]

Detailed reference viewed: 14 (5 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL et al

in An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption (2017, May 28)

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage ... [more ▼]

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and fault-revelation remains unknown, yielding uncertainty and controversy. Most previous studies rely on the Clean Program Assumption, that a test suite will obtain similar coverage for both faulty and fixed (‘clean’) program versions. This assumption may appear intuitive, especially for bugs that denote small semantic deviations. However, we present evidence that the Clean Program Assumption does not always hold, thereby raising a critical threat to the validity of previous results. We then conducted a study using a robust experimental methodology that avoids this threat to validity, from which our primary finding is that strong mutation testing has the highest fault revelation of four widely-used criteria. Our findings also revealed that fault revelation starts to increase significantly only once relatively high levels of coverage are attained. [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detailHigh Frequency Acoustic Scattering in Isogeometric Analysis
Khajah, Tahsin; Antoine, Xavier; Bordas, Stéphane UL

Scientific Conference (2017, May 15)

There is an emerging need to perform high frequency scattering analysis on high-fidelity models. Conventional Finite Element analysis suffers from irretrievable loss of the boundary accuracy as well as ... [more ▼]

There is an emerging need to perform high frequency scattering analysis on high-fidelity models. Conventional Finite Element analysis suffers from irretrievable loss of the boundary accuracy as well as pollution error. Man-made geometries can be represented exactly in Isogeometric Analysis (IGA) with no geometrical loss even with very coarse mesh. The aim of this paper is to analyze the accuracy of IGA for exterior acoustic scattering problems. The numerical results show extremely low pollution error even for very high frequencies. [less ▲]

Detailed reference viewed: 68 (2 UL)
Full Text
Peer Reviewed
See detailInnovations and sales growth in new ventures: The mediating effect of growth intention
Gundolf, Katherine; Geraudel, Mickaël UL; Cesinger, Beate

Scientific Conference (2017, May 11)

While the direct impact of innovation on growth has been examined in entrepreneurship literature, the underlying channels of influence have remained largely unexplored. This article draws upon Behavioral ... [more ▼]

While the direct impact of innovation on growth has been examined in entrepreneurship literature, the underlying channels of influence have remained largely unexplored. This article draws upon Behavioral Reasoning Theory to examine whether growth intention is the pathway through which product, process and organizational innovations influence venture growth or not. Results from the analysis of a dataset of 20,472 French new ventures reveal that: (1) product, process and organizational innovations have a positive impact on sales revenue growth; (2) growth intention has a positive impact on sales revenue growth; and (3) growth intention mediates the effects of product and organizational innovations on sales revenue growth. These findings have implications for a more balanced and nuanced view on how innovations impact new venture growth. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailAutomatically Locating Malicious Packages in Piggybacked Android Apps
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

in 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (2017, May)

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼]

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. [less ▲]

Detailed reference viewed: 73 (3 UL)
Full Text
Peer Reviewed
See detailUnderstanding Android App Piggybacking
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

Poster (2017, May)

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a ... [more ▼]

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a large user base. Despite the fact that the literature has already presented a number of tools to detect piggybacked apps, there is still lacking a comprehensive investigation on the piggybacking processes. To fill this gap, in this work, we collect a large set of benign/piggybacked app pairs that can be taken as benchmark apps for further investigation. We manually look into these benchmark pairs for understanding the characteristics of piggybacking apps and eventually we report 20 interesting findings. We expect these findings to initiate new research directions such as practical and scalable piggybacked app detection, explainable malware detection, and malicious code location. [less ▲]

Detailed reference viewed: 48 (6 UL)
Full Text
Peer Reviewed
See detailThe Effects of Sexualized Violence in Video Games on Rape Myth Acceptance
Fernandez de Henestrosa, Martha UL; Melzer, André UL

Scientific Conference (2017, May)

Previous research has tested the effects of video games on players’ Rape Myth Acceptance (RMA) with regard to either sexual or violent contents. The current study aimed at investigating the combined ... [more ▼]

Previous research has tested the effects of video games on players’ Rape Myth Acceptance (RMA) with regard to either sexual or violent contents. The current study aimed at investigating the combined effects of sexual and violent material in video games on players’ RMA. Participants (N = 82) played either a sexualized female game character or a non-sexualized female game character in a violent video game. Participants’ pre-gaming RMA, gender role attitudes and gaming habits were found to predict RMA after the gaming episode, but sexualized game violence did not. Furthermore, no gender differences were found with regard to RMA. The present findings corroborate the important role of pre-existing gender attitudes for the concept of RMA. In addition, future research should also focus on long-term exposure to video games and players’ gaming habits when examining the effects of sexualized violence in video games on RMA. [less ▲]

Detailed reference viewed: 103 (7 UL)
Full Text
Peer Reviewed
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun UL; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailThe Multi-Generation Repackaging Hypothesis
Li, Li UL; Bissyande, Tegawendé François D Assise UL; Bartel, Alexandre UL et al

Poster (2017, May)

App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately ... [more ▼]

App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately, although most research involves pairwise similarity comparison to distinguish repackaged apps from their “original” counterparts, no work has considered the threat to validity of not being able to discover the true original apps. We provide in this paper preliminary insights of an investigation into the Multi-Generation Repackaging Hypothesis: is the original in a repackaging process the outcome of a previous repackaging process? Leveraging the Androzoo dataset of over 5 million Android apps, we validate this hypothesis in the wild, calling upon the community to take this threat into account in new solutions for repackaged app detection. [less ▲]

Detailed reference viewed: 36 (4 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing (2017, May)

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile ... [more ▼]

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile Crowdsensing (MCS), citizens participate in the sensing process contributing data with their mobile devices such as smartphones, tablets and wearables. To be effective, MCS systems require a large number of users to contribute data. While several studies focus on developing efficient incentive mechanisms to foster user participation, data collection policies still require investigation. In this paper, we propose a novel distributed and energy-efficient framework for data collection in opportunistic MCS architectures. Opportunistic sensing systems require minimal intervention from the user side as sensing decisions are application- or device-driven. The proposed framework minimizes the cost of both sensing and reporting, while maximizing the utility of data collection and, as a result, the quality of contributed information. We evaluate performance of the framework with simulations, performed in a real urban environment and with a large number of participants. The simulation results verify cost-effectiveness of the framework and assess efficiency of the data generation process. [less ▲]

Detailed reference viewed: 47 (4 UL)
Full Text
Peer Reviewed
See detailA Guided Genetic Algorithm for Automated Crash Reproduction
Soltani, Mozhan; Panichella, Annibale UL; van Deursen, Arie

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution ... [more ▼]

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution, mutation analysis, and directed model checking as underling techniques for post-failure analysis of crash stack traces. However, existing approaches still cannot reproduce many real-world crashes due to such limitations as environment dependencies, path explosion, and time complexity. To address these challenges, we present EvoCrash, a post-failure approach which uses a novel Guided Genetic Algorithm (GGA) to cope with the large search space characterizing real-world software programs. Our empirical study on three open-source systems shows that EvoCrash can replicate 41 (82%) of real-world crashes, 34 (89%) of which are useful reproductions for debugging purposes, outperforming the state-of-the-art in crash replication. [less ▲]

Detailed reference viewed: 34 (0 UL)
Full Text
See detailDiscrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO Radars
Hammes, Christian UL; Nijsure, Yogesh UL; Shankar, Bhavani UL et al

Scientific Conference (2017, May)

A novel Phase Center Motion (PCM) based technique for discriminating angle-Doppler signatures within Multiple-Input-Multiple-Output (MIMO) radars using Frequency Modulated Continuous Wave (FMCW) has been ... [more ▼]

A novel Phase Center Motion (PCM) based technique for discriminating angle-Doppler signatures within Multiple-Input-Multiple-Output (MIMO) radars using Frequency Modulated Continuous Wave (FMCW) has been explored in this work. The PCM technique induces angle dependent Doppler shifts in the back-scattered signal, wherein a modified Doppler post processing for FMCW leads to joint angle-Doppler processing. Specifically, we intend to design unique spatialtemporal motion of the phase center on each individual MIMO radar channel in an effort to synthesize nearly orthogonal angle- Doppler signatures. Subsequently, we also develop a MIMO radar receiver design, which would be capable of discriminating between these induced angle-Doppler signatures. The asymptotic investigation provides a Bessel function characteristic. Simulation results demonstrate a significant side-lobe suppression of 8:5 dB for an individual PCM trajectory and 7 dB over distinct PCM trajectories, in an attempt towards realization of nearly orthogonal MIMO radar channels. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailCost analysis of Smart Lighting Solutions for Smart Cities
Cacciatore, Giuseppe; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in IEEE International Conference on Communications (ICC), Paris, France, 2017 (2017, May)

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose ... [more ▼]

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose heuristics and devise a comparison methodology for new smart lighting solutions in next generation smart cities. The proposed smart lighting techniques make use of Internet of Things (IoT) augmented lamppost, which save energy by turning off or dimming the light according to the presence of citizens. Assessing costs and benefits in adopting the new smart lighting solutions is a pillar step for municipalities to foster real implementation. For evaluation purposes, we have developed a custom simulator which enables the deployment of lampposts in realistic urban environments. The citizens travel on foot along the streets and trigger activation of the lampposts according to the proposed heuristics. For the city of Luxembourg, the results highlight that replacing all existing lamps with LEDs and dimming light intensity according to the presence of users nearby the lampposts is convenient and provides an economical return already after the first year of deployment. [less ▲]

Detailed reference viewed: 63 (6 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Maleki, Sina UL; Lei, Lei UL et al

in ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017 (2017, May)

Detailed reference viewed: 13 (2 UL)
Full Text
Peer Reviewed
See detailSearch-driven String Constraint Solving for Vulnerability Detection
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world ... [more ▼]

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world programs typically contain complex string operations that challenge vulnerability detection. State-of-the-art string constraint solvers support only a limited set of string operations and fail when they encounter an unsupported one; this leads to limited effectiveness in finding vulnerabilities. In this paper we propose a search-driven constraint solving technique that complements the support for complex string operations provided by any existing string constraint solver. Our technique uses a hybrid constraint solving procedure based on the Ant Colony Optimization meta-heuristic. The idea is to execute it as a fallback mechanism, only when a solver encounters a constraint containing an operation that it does not support. We have implemented the proposed search-driven constraint solving technique in the ACO-Solver tool, which we have evaluated in the context of injection and XSS vulnerability detection for Java Web applications. We have assessed the benefits and costs of combining the proposed technique with two state-of-the-art constraint solvers (Z3-str2 and CVC4). The experimental results, based on a benchmark with 104 constraints derived from nine realistic Web applications, show that our approach, when combined in a state-of-the-art solver, significantly improves the number of detected vulnerabilities (from 4.7% to 71.9% for Z3-str2, from 85.9% to 100.0% for CVC4), and solves several cases on which the solver fails when used stand-alone (46 more solved cases for Z3-str2, and 11 more for CVC4), while still keeping the execution time affordable in practice. [less ▲]

Detailed reference viewed: 424 (46 UL)
Full Text
See detailEvaluation of ERA-Interim for tropospheric delay and water vapour estimation in different climate zones using ground-based GNSS observations
Ahmed, Furqan; Hunegnaw, Addisu UL; Teferle, Felix Norman UL et al

Poster (2017, April 27)

Tropospheric delay and integrated water vapour (IWV) derived from climate reanalysis models, such as that of the European Centre for Medium-range Weather Forecasts (ECMWF) namely the ECMWF ReAnalysis ... [more ▼]

Tropospheric delay and integrated water vapour (IWV) derived from climate reanalysis models, such as that of the European Centre for Medium-range Weather Forecasts (ECMWF) namely the ECMWF ReAnalysis-Interim (ERA-Interim), are widely used in many geodetic and atmospheric applications. Therefore, it is of interest to assess the quality of these reanalysis products using available observations. Observations from Global Navigation Satellite Systems (GNSS) are, as of now, available for a period of over 2 decades and their global availability make it possible to validate the zenith total delay (ZTD) and IWV obtained from climate reanalysis models in different geographical and climatic regions. In this study, a 5-year long homogeneously reprocessed GNSS data set based on double differenced positioning strategy and containing over 400 globally distributed ground-based GNSS stations has been used as a reference to validate the ZTD estimates obtained from the ERA-Interim climate reanalysis model in 25 different climate zones. It has been studied how the difference between the ERA-Interim ZTD and the GNSS-derived ZTD varies with respect to the different climate zones as well as the topographic variations in a particular climate zone. Periodicity in the ZTD residuals in different climate zones has been analyzed. Furthermore, the variation of the ZTD differences with respect to latitude has been presented. Finally, for one GNSS station in each of the 25 climate zones, IWV derived from ERA-Interim has been compared to the IWV derived using GNSS observations. [less ▲]

Detailed reference viewed: 15 (2 UL)
Full Text
See detailA New Global Vertical Land Movement Data Set from the TIGA Combined
Hunegnaw, Addisu UL; Teferle, Felix Norman UL; Abraha, Kibrom Ebuy UL

Poster (2017, April 23)

Globally averaged sea level has been estimated from the network of tide gauges installed around the world since the 19th century. These mean sea level (MSL) records provide sea level relative to a nearby ... [more ▼]

Globally averaged sea level has been estimated from the network of tide gauges installed around the world since the 19th century. These mean sea level (MSL) records provide sea level relative to a nearby tide gauge benchmark (TGBM), which allows for the continuation of the instrumental record in time. Any changes in the benchmark levels, induced by vertical land movements (VLM) affect the MSL records and hence sea level estimates. Over the last two decades sea level has also been observed using satellite altimeters. While the satellite observations are globally more homogeneous providing a picture of sea level not confined to coastlines, they require the VLM-corrected MSL records for the bias calibration of instrumental drifts. Without this calibration altimeter instruments from different missions cannot be combined. GPS has made it possible to obtain highly accurate estimates of VLM in a geocentric reference frame for stations at or close to tide gauges. Under the umbrella of the International GNSS Service (IGS), the Tide Gauge Benchmark Monitoring (TIGA) Working Group (WG) has been established to apply the expertise of the GNSS community to solving issues related to the accuracy and reliability of the vertical component to provide estimates of VLM in a well-defined global reference frame. To achieve this objective, five TIGA Analysis Centers (TACs) contributed re-processed global GPS network solutions to TIGA, employing the latest bias models and processing strategies in accordance with the second re-processing campaign (repro2) of the IGS. These solutions include those of the British Isles continuous GNSS Facility – University of Luxembourg consortium (BLT), the German Research Centre for Geosciences (GFZ) Potsdam, the German Geodetic Research Institute (DGF) at the Technical University of Munich, Geoscience Australia (AUT) and the University of La Rochelle (ULR). In this study we present to the sea level community an evaluation of the VLM estimates from the first combined solution from the IGS TIGA WG. The TAC solutions include more than 700 stations and span the common period 1995-2014. The combined solution was computed by the TIGA Combination Centre (TCC) at the University of Luxembourg, which used the Combination and Analysis of Terrestrial Reference Frame (CATREF) software package for this purpose. This first solution forms Release 1.0 and further releases will be made available after further reprocessing campaigns. We evaluate the combined solution internally using the TAC solutions and externally using solutions from the IGS and the ITRF2008. The derived VLM estimates have undergone an initial evaluation and should be considered as the primary TIGA product for the sea level community to correct MSL records for land level changes [less ▲]

Detailed reference viewed: 25 (3 UL)
Full Text
Peer Reviewed
See detailDynamic qualitative filtering for linked (geo)visualisations: a prototype for exploring the collective memory of Instagram posts
Jones, Catherine UL; Guido, Daniele UL; Severo, Marta

Scientific Conference (2017, April 20)

This paper describes a prototype geo extension to an open source graph-based tool designed for analysing co-occurrence in large multimedia collections of historical resources. Employing an ... [more ▼]

This paper describes a prototype geo extension to an open source graph-based tool designed for analysing co-occurrence in large multimedia collections of historical resources. Employing an interdisciplinary approach, combining tools and practices from humanities and geography, we explore how it can be extended to facilitate both social and spatial enquiry. For the prototype development we use Instagram resources that reference the Via Francigena – a significant cultural route connecting Canterbury, UK and Rome, Italy. The resulting tool facilitates dynamic qualitative filtering and multilevel views to explore the social-spatial collective memory of this cultural route [less ▲]

See detailLocational and socio-economic sorting in the use of green space: Evidence from Brussels
Schindler, Mirjam UL; Le Texier, Marion UL; Caruso, Geoffrey UL

Scientific Conference (2017, April 08)

Urban green space is important for making cities sustainable. It provides environmental benefits and makes cities attractive to people. Extensive evidence exists on their benefits but is lacking in ... [more ▼]

Urban green space is important for making cities sustainable. It provides environmental benefits and makes cities attractive to people. Extensive evidence exists on their benefits but is lacking in quantifying how and whether socio-economic benefits of green space accrue to all households or only a portion depending on their socio-economic status and residential location. From urban economic theory we know that residential markets sort households by income along an urban–suburban continuum and the housing-transport-costs trade-off. This trade-off can however be dominated in the presence of exogenous central amenities (parks) or endogenous effects (high income attracting high income) and pull better-off households toward the center, adding discrepancies in accessibility to green amenities by different socio-economic groups. Tiebout's hypothesis implied that marginal benefits from localised amenities are the same for all households in a given location but empirics point to non-efficient sorting and endogenous effects (socio-economic sorting) in the demand for localised amenities in general. We address these questions based on results of a survey conducted along an urban-suburban continuum in Brussels (Belgium) in May 2016. The survey includes around 500 respondents sampled across (non-park) public space and malls to reach both users and non-users of green space and cover the variety of residential locations (good or bad provision of green / distant or far from the CBD). We analyse the role of proximity, size and quality of public green space on its use across different socio-economic attributes and residential/job places and stated willingness-to-pay and substitution possibilities with private green space. [less ▲]

Detailed reference viewed: 16 (2 UL)
Full Text
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

Poster (2017, April 03)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 8 (0 UL)
Full Text
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs UL; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the ... [more ▼]

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to maximize its pay- o while ensuring the desired level of integrity for the out- sourced computation. We de ne two Stackelberg games and analyze the optimal setting's sensitivity for the parameters of the model. [less ▲]

Detailed reference viewed: 9 (0 UL)
See detailExtending the scale of critical housing studies: Towards ‘cross-border gentrification’?
Christmann, Nathalie UL

Scientific Conference (2017, April)

Drawing upon the case of a polycentric cross-border metropolitan region in western Europe, this paper seeks to explore population mobility and housing market developments at the regional/international ... [more ▼]

Drawing upon the case of a polycentric cross-border metropolitan region in western Europe, this paper seeks to explore population mobility and housing market developments at the regional/international scale. Transnational linkages within this cross-border region intensified with the opening of the borders and the economic development of the Grand Duchy of Luxembourg as a global financial centre and a centre for European Institutions. Today about 44 per cent of employees working in Luxembourg live nearby across the Belgian, French or German border. One of the reasons is that housing prices in Luxembourg are nearly twice those in the neighbouring border regions. This increased mobility has an impact on the residents living in these areas. The research that guides this paper aims to detect perceptions of this phenomenon. Therefore principles of municipal policy, urban planning documents and the local media of three medium sized towns in the borderland are reviewed. Following a rather open research concept based on qualitative approaches (discourse analysis, grounded theory), findings reveal that locational advantages such as the proximity to Luxembourg do play a role; the perception that affordable housing is becoming increasingly critical leads to resentments that mix up with national stereotypes; while city officials report displacement due to the border-effect, they also illustrate the opportunities for regional development; at the same time property developers foster the internationalisation of urban planning. Pointing to the relational geographies that link these different places, the paper discusses the pros and cons of an umbrella concept that might be called ‘cross-border gentrification’. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailSensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ... [more ▼]

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more concerned with their privacy in buildings, explicit sensing techniques can lead to uncomfortableness and resistance from occupants. In this paper, we adapt a sensing by proxy paradigm that monitors building status and coarse occupant activities through agglomerative clustering of indoor temperature movements. Through extensive experimentation on 86 classrooms, offices and labs in a five-story school building in western Europe, we prove that indoor temperature movements can be leveraged to infer latent information about indoor environments, especially about rooms' relative physical locations and rough type of occupant activities. Our results evidence a cost-effective approach to extending commercial building control systems and gaining extra relevant intelligence from such systems. [less ▲]

Detailed reference viewed: 47 (12 UL)
Full Text
Peer Reviewed
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

in Iacobescu, Remus Ion; Malfliet, Annelies (Eds.) Proceedings of the 5th International Slag Valorisation Symposium (2017, April)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 16 (1 UL)
See detailComptabiliser les crimes pour conceptualiser la violence? Le cas de la prévôté de Luxembourg (1525 et 1630)
Leuck, Jessica UL

Scientific Conference (2017, March 29)

L’historienne Laure Verdon caractérise « tout acte ou parole qui rompt le tissu social et porte atteinte à l’ordre » comme violence. De plus, le chercheur « doit s’interroger sur les formes qu’a pris la ... [more ▼]

L’historienne Laure Verdon caractérise « tout acte ou parole qui rompt le tissu social et porte atteinte à l’ordre » comme violence. De plus, le chercheur « doit s’interroger sur les formes qu’a pris la violence au fil des époques et sur le rapport que les hommes entretiennent avec elle » (Éloïse Adde, 2012). Parmi d’autres voies pour saisir cette variation historique et culturelle de la perception de la violence, nous proposons une analyse minutieuse des comptes des officiers de justice. Contrairement aux règlements, aux lois ou encore aux sources judiciaires qui expriment le fonctionnement théorique de la justice, ces comptes, de par leur caractère administratif, livrent une image réelle des crimes commis. Bien que le terme « violence » n’apparaisse jamais en tant que tel dans ces sources, les crimes et délits mentionnés dans les comptes sont considérés comme tels car ils représentent toujours une forme de violence contre le tissu social ou/et l’ordre établie. Leur présence dans ces sources et leur usage en justice permettent de projeter la conception de la violence pour une époque concrète en nous informant sur la perception quotidienne que les contemporains - surtout les justiciers - en avaient envers. En outre, la variété des cas permet de moduler cette compréhension et de proposer une lecture fine du phénomène. Conservés presque dans leur totalité pour la période de 1525 à 1630, les livres de comptes rédigés dans la prévôté de Luxembourg, une des plus grandes du duché, consistent une source primordiale pour entamer une telle recherche. [less ▲]

Detailed reference viewed: 12 (1 UL)
Peer Reviewed
See detailDigital Work and the Role of Online Platforms. The Need for an Indirect Approach
Ratti, Luca UL

Scientific Conference (2017, March 22)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA
Liu, Zhengxuan; Kang, Guixia; Lei, Lei UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), 2017 (2017, March 19)

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ ... [more ▼]

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ achievable data rate and network throughput are analysed under three transmission schemes: 1) all users’ signals are jointly transmitted by coordinated base stations (BSs); 2) only cell-edge users’ signals are jointly transmitted by coordinated BSs; 3) each user’s signals are transmitted by only one BS. Next, we formulate EE maximization problems for the three schemes under the constraints of minimum users’ data rate and maximum BS transmit power. The considered problem is non-convex and hard to tackle. To address it, an iterative sub-optimal algorithm is proposed by adopting fractional programming and difference of convex programming. Numerical results show that the near optimality performance of EE can be achieved by using the proposed algorithm with advantages of fast convergence and low complexity. Three transmission schemes of NOMA have superior EE performance compared with conventional orthogonal multiple access scheme in the same CoMP networks. [less ▲]

Detailed reference viewed: 53 (25 UL)
Full Text
Peer Reviewed
See detailThe influence of Forced Answering on response behavior in Online Surveys: A reactance effect?
Sischka, Philipp UL; Mergener, Alexandra; Neufang, Kristina Marliese et al

Poster (2017, March 16)

Relevance: Recent studies have shown that the use of the forced answering (FA) option in online surveys results in reduced data. They especially examined that forcing respondents to answer questions in ... [more ▼]

Relevance: Recent studies have shown that the use of the forced answering (FA) option in online surveys results in reduced data. They especially examined that forcing respondents to answer questions in order to proceed through the questionnaire leads to higher dropout rates and lower answer quality. However, no study researched the psychological mechanism behind the correlation of FA on dropout and data quality before. This response behavior has often been interpreted as psychological reactance reaction. So, the Psychological Reactance Theory (PRT) predicts that reactance appears when an individuals’ freedom is threatened and cannot be directly restored. Reactance describes the motivation to restore this loss of freedom. Respondents could experience FA as a loss of freedom, as (s)he is denied the choice to leave a question unanswered. According to PRT, possible reactions in this situation might be to quit survey participation, to fake answers or to show satisficing tendencies. Research content: This study explores the psychological mechanism that effects response behavior in FA condition (compared to non-FA- condition). Our major hypothesis is that forcing respondents to answer will cause reactance, which turns into increasing dropout rates, decreasing answer quality and a satisficing behavior. Methods and Data: We used an online survey-experiment with two conditions (forced and non-forced answering instructions). The sample consists of 914 participants. Throughout the whole questionnaire, a dropout button was implemented on each page. In both conditions, this button led to the same page that fully compliant participants reached at the end of the questionnaire. Reactance was measured with a self-constructed four-item reactance scale. To determine answer quality, we used self-report for faking as well as the analysis of answers to open ended questions. Results: Zero-order effects showed that FA increased state reactance and questionnaire dropout as well as it reduced answer length in open-ended questions. Mediation analysis (Condition -> state reactance -> dropout/answer quality) supported the hypothesis of reactance as an underlying psychological mechanism behind negative FA effects on data quality. Added Value: This is the first study which offers statistical evidence for the often proposed reactance effect influencing response behavior. This offers a base for a deeper psychological reflection of the use of the FA-option. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
See detailSystem Testing of Timing Requirements based on Use Cases and Timed Automata
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by ... [more ▼]

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing requirements, following a methodology aiming at minimizing modeling overhead. We automate the generation of executable test cases using a test strategy based on maximizing test suite diversity and building over the UPPAAL model checker. Initial empirical results based on an industrial case study provide evidence of the effectiveness of the approach. [less ▲]

Detailed reference viewed: 173 (15 UL)
Full Text
Peer Reviewed
See detailReduced basis Nitsche-based domain decomposition: a biomedical application
Baroli, Davide UL; Beex, Lars UL; Hale, Jack UL et al

Scientific Conference (2017, March 10)

Nowadays, the personalized biomedical simulations demand real-time efficient and reliable method to alleviate the computational complexity of high-fidelity simulation. In such applications, the necessity ... [more ▼]

Nowadays, the personalized biomedical simulations demand real-time efficient and reliable method to alleviate the computational complexity of high-fidelity simulation. In such applications, the necessity of solving different substructure, e.g. tissues or organs, with different numbers of the degrees of freedom and of coupling the reduced order spaces for each substructure poses a challenge in the on-fly simulation. In this talk, this challenge is taken into account employing the Nitsche-based domain decomposition technique inside the reduced order model [1]. This technique with respect to other domain decomposition approach allows obtaining a solution with the same accuracy of underlying finite element formulation and to flexibly treat interface with non-matching mesh. The robustness of the coupling is determined by the penalty coefficients that is chosen using ghost penalty technique [2]. Furthermore, to reduce the computational complexity of the on-fly assembling it is employed the empirical interpolation approach proposed in [3]. The numerical tests, performed using FEniCS[4], petsc4py and slepc4py [5], shows the good performance of the method and the reduction of computation cost. [1] Baroli, D., Beex L. and Bordas, S. Reduced basis Nitsche-based domain decomposition. In preparation. [2] Burman, E., Claus, S., Hansbo, P., Larson, M. G., & Massing, A. (2015). CutFEM: Discretizing geometry and partial differential equations. International Journal for Numerical Methods in Engineering, 104(7), 472-501. [3] E. Schenone, E., Beex,L., Hale, J.S., Bordas S. Proper Orthogonal Decomposition with reduced integration method. Application to nonlinear problems. In preparation. [4] A. Logg, K.-A. Mardal, G. N. Wells et al. Automated Solution of Differential Equations by the Finite Element Method, Springer 2012. [5] L. Dalcin, P. Kler, R. Paz, and A. Cosimo, Parallel Distributed Computing using Python, Advances in Water Resources, 34(9):1124-1139, 2011. http://dx.doi.org/10.1016/j.advwatres.2011.04.013 [less ▲]

Detailed reference viewed: 66 (4 UL)
Full Text
Peer Reviewed
See detailMusic and Social Health
Sagrillo, Damien UL

in Devosa, Iván; Maródi, Ágnes; Buzás, Zsuzsanna (Eds.) et al International HEART 2017 Conference Health – Economy – Art (2017, March 08)

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans ... [more ▼]

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans Günter Bastian found out that common music practice and extended music education can lead to more social competence. In my lecture, I will give three examples of how music making cannot only avoid violence and criminality, but can also contribute to well-being among like-minded people. 1) The movie The Choir (les choristes) is a perfect demonstration, how common singing is able to weld together an initial heterogenous group of difficult educable children living in institutions of care 2) El Sistema is a famous programme for children in Venezuela financed by the state with the main objective that “music has to be recognised as an agent of social development” as José Antonio Abreu, its initiator highlights. 3) In my last year’s lecture, I presented my mail choir with an age average beyond 70 years. Recently I published a study on interviews conducted with the choristers to find out their views of social well-being." [less ▲]

Detailed reference viewed: 2 (0 UL)
Full Text
Peer Reviewed
See detailEconomic Law in the EU: How to Ensure More Convergence After the Brexit? Workshop on Corporate Law
Corbisier, Isabelle UL

Scientific Conference (2017, March 06)

See Programme at the start of the appended document for a description of the whole event, followed by the summary of Isabelle Corbisier's intervention (by herself)

Detailed reference viewed: 15 (2 UL)
Full Text
Peer Reviewed
See detailA Change Management Approach in Product Lines for Use Case-Driven Development and Testing
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL

Poster (2017, March)

In this paper, driven by industrial needs, we present a change management approach for product lines within the context of use case-driven development and testing. As part of the approach, we first ... [more ▼]

In this paper, driven by industrial needs, we present a change management approach for product lines within the context of use case-driven development and testing. As part of the approach, we first provide a modeling method to support variability modeling in Product Line (PL) use case diagrams, specifications, and domain models, intentionally avoiding any reliance on feature models and thus avoiding unnecessary modeling and traceability overhead. Then, we introduce a use case-driven configuration approach based on the proposed modeling method to automatically generate Product Specific (PS) use case and domain models from the PL models and configuration decisions. Building on this, we provide a change impact analysis approach for evolving configuration decisions in PL use case models. In addition, we plan to develop a change impact analysis approach for evolving PL use case models and an automated regression test selection technique for evolving configuration decisions and PL models. [less ▲]

Detailed reference viewed: 33 (17 UL)
Full Text
See detailExploiting Transistor-Level Reconfiguration to Optimize Combinational Circu
Raitza, Michael; Kumar, Akash; Volp, Marcus UL et al

Scientific Conference (2017, March)

Silicon nanowire reconfigurable field effect transistors (SiNW RFETs) abolish the physical separation of n-type and p-type transistors by taking up both roles in a configurable way within a doping-free ... [more ▼]

Silicon nanowire reconfigurable field effect transistors (SiNW RFETs) abolish the physical separation of n-type and p-type transistors by taking up both roles in a configurable way within a doping-free technology. However, the potential of transistor-level reconfigurability has not been demonstrated in larger circuits, so far. In this paper, we present first steps to a new compact and efficient design of combinational circuits by employing transistor-level reconfiguration. We contribute new basic gates realized with silicon nanowires, such as 2/3-XOR and MUX gates. Exemplifying our approach with 4-bit, 8-bit and 16-bit conditional carry adders, we were able to reduce the number of transistors to almost one half. With our current case study we show that SiNW technology can reduce the required chip area by 16 %, despite larger size of the individual transistor, and improve circuit speed by 26 %. [less ▲]

Detailed reference viewed: 107 (7 UL)
See detailThe social inclusion of students with physical disabilities
Pit-Ten Cate, Ineke UL; Stevenson, Jim

Scientific Conference (2017, March)

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailFaster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels
Alodeh, Maha UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (2017, March)

Detailed reference viewed: 13 (1 UL)
See detailStahlverbundkonstruktionen im Hochbau - Entwicklungen in der Normung
Schäfer, Markus UL

Scientific Conference (2017, March)

Die Eurocodes (EC) repräsentieren europäische Normen (EN) für die Bemessung und Konstruktion von Bauwerken im Hoch- und Brückenbau. Die Entwicklung dieser europäischen Regelwerke erfolgte im Auftrag der ... [more ▼]

Die Eurocodes (EC) repräsentieren europäische Normen (EN) für die Bemessung und Konstruktion von Bauwerken im Hoch- und Brückenbau. Die Entwicklung dieser europäischen Regelwerke erfolgte im Auftrag der Europäischen Union durch das „European Committee for Standardisation“ CEN. Seit einigen Jahren sind die Eurocodes bereits in der Anwendung. Basierend auf diesen Erfahrungen und vielfachen Kommentaren aus der Industrie erfolgt derzeit eine Überarbeitung aller Teile des Eurocodes mit dem Ziel, die aktuellen Bemessungsnormen an den Stand der Technik und Forschung anzupassen, die Anwendung zu vereinfachen sowie der Harmonisierung der Eurocodes untereinander. Abschließend werden diese Modifikationen in die zweite Generation der europäischen Normen überführt. In den folgenden Ausführungen wird die Arbeit des Projektteams SC4.T1 vorgestellt. Es wird ein Einblick in die bestehende Normungsarbeit und die fachlichen Diskussionen gegeben sowie auszugsweise die Entwürfe zu den anstehenden Änderungen der EN 1994-1-1 vorgestellt. [less ▲]

Detailed reference viewed: 37 (5 UL)
Full Text
Peer Reviewed
See detailSocially assistive robots for teaching emotional abilities to children with autism spectrum disorder
Pinto Costa, Andreia UL; Steffgen, Georges UL; Rodriguez Lera, Francisco Javier UL et al

Scientific Conference (2017, March)

Socially assistive robots, when used in a way that takes into consideration children’s needs and developmental characteristics, can be useful tools to enable children’s development. More specifically, due ... [more ▼]

Socially assistive robots, when used in a way that takes into consideration children’s needs and developmental characteristics, can be useful tools to enable children’s development. More specifically, due to their characteristics (predictability, simplicity, and repetition) robots can be especially helpful to teach emotional abilities to children with autism spectrum disorder (ASD). Previous research has provided preliminary evidence that robots can help children improve in some domains such as joint attention and imitation. However, no studies have examined how robots can be integrated in intervention protocols targeting the acquisition of emotional abilities in children with ASD. This paper presents a work in progress on an emotional ability training developed for children with ASD using the QT socially assistive robot. This training aims to test whether children with ASD can benefit from a robot-mediated training to improve emotional ability. [less ▲]

Detailed reference viewed: 148 (3 UL)
Full Text
Peer Reviewed
See detailIncremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL et al

in 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (2017, March)

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use ... [more ▼]

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use cases are central development artifacts for requirements engineering and system testing. In such contexts, use case configurators can play a significant role to capture variable and common requirements in Product Line (PL) use case models and to generate Product Specific (PS) use case models for each new customer in a product family. [Question/Problem] Although considerable research has been devoted to use case configurators, little attention has been paid to supporting the incremental reconfiguration of use case models with evolving configuration decisions. [Principal ideas/results] We propose, apply, and assess an incremental reconfiguration approach to support evolving configuration decisions in PL use case models. PS use case models are incrementally reconfigured by focusing only on the changed decisions and their side effects. In our prior work, we proposed and applied Product line Use case modeling Method (PUM) to support variability modeling in PL use case diagrams and specifications. We also developed a use case configurator, PUMConf, which interactively collects configuration decisions from analysts to generate PS use case models from PL models. Our approach is built on top of PUM and PUMConf. [Contributions] We provide fully automated tool support for incremental configuration as an extension of PUMConf. Our approach has been evaluated in an industrial case study in the automotive domain, which provided evidence it is practical and beneficial. [less ▲]

Detailed reference viewed: 100 (47 UL)
Full Text
Peer Reviewed
See detailVisuo-spatial abilities are key for children’s verbal number skills
Cornu, Véronique UL; Martin, Romain UL; Hornung, Caroline

Poster (2017, February 22)

Verbal number skills (i.e. counting and number naming) are milestones in numerical development. The aim of the present study was to clarify the role of different verbal abilities (VA) and visuo-spatial ... [more ▼]

Verbal number skills (i.e. counting and number naming) are milestones in numerical development. The aim of the present study was to clarify the role of different verbal abilities (VA) and visuo-spatial abilities (VSA) in the development of these verbal number skills in kindergarten. We recruited 152 children (mean age: 5.8 years) and administered different measures of VA (e.g. phonological awareness, pseudoword recall) and of VSA (e.g. spatial perception, copying) to assess their contribution to verbal number skills. Firstly, we computed two independent regression models, a “VA only” model explaining 23% of variance, and a “VSA only” model explaining 38% of variance. Adding verbal measures to the “VSA only” model does not lead to a significant increase in R2. Our results show that VSA, rather than VA, contribute to a larger extent to children’s verbal number skills. Intriguingly, the development of verbal number skills builds on VA, but more importantly on VSA. These results are potentially informative for the conception early mathematics interventions. [less ▲]

Detailed reference viewed: 4 (1 UL)
Full Text
See detailNoise characteristics in Zenith Total Delay from homogeneously reprocessed GPS time series
Klos, Anna; Hunegnaw, Addisu UL; Teferle, Felix Norman UL et al

Scientific Conference (2017, February 22)

Zenith Total Delay (ZTD) time series, derived from the re-processing of Global Positioning System (GPS) data, provide valuable information for the evaluation of global atmospheric reanalysis products such ... [more ▼]

Zenith Total Delay (ZTD) time series, derived from the re-processing of Global Positioning System (GPS) data, provide valuable information for the evaluation of global atmospheric reanalysis products such as ERA-Interim. Identifying the correct noise characteristics in the ZTD time series is an important step to assess the ’true’ magnitude of ZTD trend uncertainties. The ZTD residual time series for 1995-2015 are generated from our homogeneously re-processed and homogenized GPS time series from over 700 globally distributed stations classified into five major climate zones. The annual peak of ZTD data ranges between 10 and 150 mm with the smallest values for the polar and Alpine zone. The amplitudes of daily curve fall between 0 and 12 mm with the greatest variations for the dry zone. The autoregressive process of fourth order plus white noise model were found to be optimal for ZTD series. The tropical zone has the largest amplitude of autoregressive noise (9.59 mm) and the greatest amplitudes of white noise (13.00 mm). All climate zones have similar median coefficients of AR(1) (0.80±0.05) with a minimum for polar and Alpine, which has the highest coefficients of AR(2) (0.27±0.01) and AR(3) (0.11±0.01) and clearly different from the other zones considered. We show that 53 of 120 examined trends became insignificant, when the optimum noise model was employed, compared to 11 insignificant trends for pure white noise. The uncertainty of the ZTD trends may be underestimated by a factor of 3 to 12 compared to the white noise only assumption. [less ▲]

Detailed reference viewed: 29 (6 UL)
See detailDigitaler historischer Stadtatlas Luxemburgs (Villux10) - Projektvorstellung
Uhrmacher, Martin UL

Scientific Conference (2017, February 22)

Detailed reference viewed: 13 (1 UL)
Full Text
See detailAn Evaluaton of Real-Time Troposphere Products Based on mult-GNSS Precise Point Posi)oning
Ding, Wenwu; Teferle, Felix Norman UL; Kazmierski, Kamil et al

Scientific Conference (2017, February 21)

When employing observations from multiple Global Navigation Satellite System (GNSS) the performance of real-time (RT) GNSS meteorology can be improved. In this paper, we describe an operational RT system ... [more ▼]

When employing observations from multiple Global Navigation Satellite System (GNSS) the performance of real-time (RT) GNSS meteorology can be improved. In this paper, we describe an operational RT system for extracting zenith tropospheric delay (ZTD) using a modified version of the PPP-wizard. Multi-GNSS, including GPS, GLONASS and Galileo, observation streams are processed using a RT PPP strategy based on RT satellite orbit/clock products from CNES. A continuous experiment for 30 days is conducted, in which the RT observation streams of 20 globally distributed stations are processed. The initialization time and accuracy of the RT troposphere products using single/multi-system observations are evaluated. The effect of RT PPP ambiguity resolution is also evaluated. The results reveal that the RT troposphere products based on single system observations can fulfill the requirements of meteorological application, in which the GPS-only solution is better than the GLONASS-only solution in both initialization and accuracy. The performance can also be improved by applying RT PPP ambiguity resolution and utilizing multi-GNSS observations. Specifically, we notice that the ambiguity resolution is more effective in improving the accuracy, whereas the initialization process can be better accelerated by multi-GNSS observations. Combining all systems, RT troposphere products with an average accuracy of about 8 mm in ZTD can be achieved after an initialization process of approximately 9 minutes, which supports the application of multi-GNSS observations and ambiguity resolution for RT meteorological applications. [less ▲]

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailLightweight Detection of Android-specific Code Smells: the aDoctor Project
Palomba, Fabio; Di Nucci, Dario; Panichella, Annibale UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, February 21)

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising ... [more ▼]

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising approaches for detecting the traditional code smells defined by Fowler, little knowledge and support is available for an emerging category of Mobile app code smells. Recently, Reimann etal proposed a new catalogue of Android-specific code smells that may be a threat for the maintainability and the efficiency of Android applications. However, current tools working in the context of Mobile apps provide limited support and, more importantly, are not available for developers interested in monitoring the quality of their apps. To overcome these limitations, we propose a fully automated tool, coined aDoctor, able to identify 15 Android-specific code smells from the catalogue by Reimann et al. An empirical study conducted on the source code of 18 Android applications reveals that the proposed tool reaches, on average, 98% of precision and 98% of recall. We made aDoctor publicly available. [less ▲]

Detailed reference viewed: 42 (16 UL)
Full Text
Peer Reviewed
See detailSoftware-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable?
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017, February 21)

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and ... [more ▼]

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and software-based techniques to approximate the actual energy profile. However, all these solutions present their own advantages and disadvantages. Hardware-based tools are highly precise, but at the same time their use is bound to the acquisition of costly hardware components. Model-based tools require the calibration of parameters needed to correctly create a model on a specific hardware device. Software-based approaches do not need any hardware components, but they rely on battery measurements and, thus, they are hardware-assisted. These tools are cheaper and easier to use than hardware-based tools, but they are believed to be less precise. In this paper, we take a deeper look at the pros and cons of software-based solutions investigating to what extent their measurements depart from hardware-based solutions. To this aim, we propose a software-based tool named PETRA that we compare with the hardware-based MONSOON toolkit on 54 Android apps. The results show that PETRA performs similarly to MONSOON despite not using any sophisticated hardware components. In fact, in all the apps the mean relative error with respect to MONSOON is lower than 0.05. Moreover, for 95% of the analyzed methods the estimation error is within 5% of the actual values measured using the hardware-based toolkit. [less ▲]

Detailed reference viewed: 54 (20 UL)
Full Text
See detailProject NUMTEST; Assessing basic number competence without language
Greisen, Max UL; Schiltz, Christine UL; Hornung, Caroline et al

Poster (2017, February 20)

While numerical skills are fundamental in modern societies, some estimated 5-7% of children suffer from a mathematical learning disorder, called developmental dyscalculia (DD). Nevertheless, universally ... [more ▼]

While numerical skills are fundamental in modern societies, some estimated 5-7% of children suffer from a mathematical learning disorder, called developmental dyscalculia (DD). Nevertheless, universally valid diagnostic instruments are still lacking, as all current DD test batteries are based on language instructions. Consequently their measurements are tightly linked to the specific language context of test administration and thus their results cannot easily be compared across countries. The present study is the first pilot study of a research project that aims to develop a test for basic math abilities that does not rely on language instruction and minimizes language use. To this aim, video and animation based instructions were implemented on touchscreen devices. A first version of the application has been tested with a sample of first grade children in Luxembourg’s fundamental schools, of which half used the same application but with traditional German instructions. First results indicate that performance in the experimental group was similar to the control group using verbal instructions. Relationships between linguistic background and the sample’s performance on one hand and qualitative usability aspects of nonverbal task instruction and tablet use with young children will be discussed. [less ▲]

Detailed reference viewed: 18 (2 UL)
Full Text
Peer Reviewed
See detailIntegration of sparse electrophysiological measurements with preoperative MRI using 3D surface estimation in deep brain stimulation surgery
Husch, Andreas Dominik UL; Gemmar, Peter; Thunberg, Johan UL et al

in Webster, Robert; Fei, Baowei (Eds.) Medical Imaging 2017: Image-Guided Procedures, Robotic Interventions, and Modeling (2017, February 14)

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the ... [more ▼]

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the subthalamic nucleus (STN) to suppress the symptoms of Parkinson’s Disease. The standard approach is to use an array of up to five MER electrodes in a fixed configuration. Interpretation of the recorded signals yields a spatiallyvery sparse set of information about the morphology of the respective brain structures in the targeted area. However, no aid is currently available for surgeons to intraoperatively integrate this information with other data available on the patient’s individual morphology (e.g. MR imaging data used for surgical planning). This integration might allow surgeons to better determine the most probable position of the electrodes within the target structure during surgery. This paper suggests a method for reconstructing a surface patch from the sparse MER dataset utilizing additional a-priori knowledge about the geometrical configuration of the measurement electrodes. The conventional representation of MER measurements as intervals of target region/non-target region is therefore transformed into an equivalent boundary set representation, allowing efficient point-based calculations. Subsequently, the problem is to integrate the resulting patch with a preoperative model of the target structure, which can be formulated as registration problem minimizing a distance measure between the two surfaces. When restricting this registration procedure to translations, which is reasonable given certain geometric considerations, the problem can be solved globally by employing an exhaustive search with arbitrary precision in polynomial time. The proposed method is demonstrated using bilateral STN/Substantia Nigra segmentation data from preoperative MRIs of 17 Patients with simulated MER electrode placement. When using simulated data of heavily perturbed electrodes and subsequent MER measuremen [less ▲]

Detailed reference viewed: 8 (0 UL)
See detailCanonically defined star products for Kaehler manifolds
Schlichenmaier, Martin UL

Scientific Conference (2017, February 07)

Detailed reference viewed: 8 (1 UL)
Full Text
See detailNew methodology for designing direct-laser-sintered motorcycle frame based on combination of topology optimization and lattice implementation
Cao, Thanh Binh UL; Kedziora, Slawomir UL

Scientific Conference (2017, February 07)

The use of direct laser sintering (DLS) has become more attractive recently since it offers a promising tool in fabricating complex components rapidly. Particularly, the technique is seen more powerful ... [more ▼]

The use of direct laser sintering (DLS) has become more attractive recently since it offers a promising tool in fabricating complex components rapidly. Particularly, the technique is seen more powerful when it is combined with computer-aid design and computational optimization. In spite of knowledge increment in the above areas presently, design method for sophisticated structures towards DLS is still far from being fully exploited. Therefore, this paper was issued to investigate a novel methodology of design, developed by combining topology optimization and lattice-beam implementation, for a blend-solid-lattice frame of a motorcycle. From the obtained results, it was recognized that the as-built tubular hybrid structure demonstrated comparable values of first resonant frequency and mass with respected to those of the original. Additionally, it was found that stiffness of the generated structures depended strongly on locations where lattice was substituted. In particular, less stressed frame’s components were evidenced as appropriate regions for the substitution. The achieved results also revealed estimated buckling load factors, being circa 17 times higher than applied bumping loads acted on the tubular-lattice structure. Finally, equivalent stress predicted in static analyses confirmed all designs working safely in nominated conditions. Based on these achievements, it is believed that the new method worked quite acceptably in designing direct-laser-sintered motorcycle frame, and it is very promising to further develop the method as well as extend it into different complex direct-laser-sintered elements designed for future applications. [less ▲]

Detailed reference viewed: 39 (3 UL)
Peer Reviewed
See detailTeacher-Student Relationship and Its Impact on Students' Desire for Knowledge
Voynova, Ruzhena UL; Weber, Jean-Marie UL

Scientific Conference (2017, February)

Detailed reference viewed: 8 (1 UL)
See detailInherently Unneutral Investment Treaty Arbitration and Never-Ending Excuses
Radović, Relja UL

Scientific Conference (2017, February)

Detailed reference viewed: 12 (1 UL)
Full Text
See detailMultiphysics applications and computational challenges
Zilian, Andreas UL

Scientific Conference (2017, January 24)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailIntergenerational differences in social and political participation in Western Europe
Meyers, Christiane UL

Scientific Conference (2017, January 17)

The global crisis and its negative consequences on living conditions in Europe have led in some countries to massive protests, especially among young persons. Kern et al. (2015) argue that this rising and ... [more ▼]

The global crisis and its negative consequences on living conditions in Europe have led in some countries to massive protests, especially among young persons. Kern et al. (2015) argue that this rising and sudden political engagement can be explained by grievance theory: individuals whose interests are threatened react by engaging themselves politically. However, they also demonstrate that political participation in a more long-term perspective is better explained by the civic voluntarism model. Brady et al. (1995) establish that resources like time, money and civic skills are central for getting politically active. Persons with a low socioeconomic status who possess fewer resources are generally less political active. In a long-term perspective the economic crisis and the deterioration of living conditions should lead to less political participation of young people. I want to use the civic voluntarism model to analyse and describe the changing political participation forms of different generations. Generations are defined as persons having experienced similar historical conditions when growing up, thus developing similar values and beliefs (Grasso, 2014). I will look at the generation of the baby boomers born after World War II and compare them to the generation Y born before the turn of the millennium. Both generations grew up in times of social changes and challenges. I will use a broad definition of participation, which integrates political and social engagement, to look at the different participation modes of the generations (Meyers & Willems, 2016; Sloam, 2014; Dalton, 2008). The analysis is based on data of the European Values Study and uses multivariate methods (factor and cluster analysis) to determine different engagement types within the two generations in Western Europe. Are there signs that the young generation disengages from society? Do they engage themselves in other ways than the older generation? How can the civic voluntarism model help to explain the differences between older and younger generations? [less ▲]

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailChez nous, les fraises ne poussent pas en hiver. Le rôle de la locavoracité dans la (re)prise de conscience de la saisonnalité des aliments
Reckinger, Rachel UL

Scientific Conference (2017, January 11)

Basé sur deux études empiriques, conjointement quantitatives et qualitatives, menées dans le contexte de deux projets interdisciplinaires à l’Université du Luxembourg, l’argumentaire porte sur l’interface ... [more ▼]

Basé sur deux études empiriques, conjointement quantitatives et qualitatives, menées dans le contexte de deux projets interdisciplinaires à l’Université du Luxembourg, l’argumentaire porte sur l’interface régionalité / saisonnalité tant au Grand-Duché que dans les régions limitrophes. En effet, dans les populations considérées, la régionalité comme qualification alimentaire prime largement sur la saisonnalité, qui, elle, demande une réflexivité et une conscience agricole plus importante. Mais la forme locavore de la notion de régionalité est actuellement une tendance montante et elle favorise, justement, une (re)prise de conscience des contextes géolocalisés de la production alimentaire. Sa diffusion pourrait avoir un impact positif sur la saisonnalité tant dans les représentations que dans les pratiques des consommateurs – en tant que facteur de réduction d’émissions liées au transport, de potentiel d’identification communautaire et de valorisation locale, ainsi que de lutte contre le gaspillage alimentaire. [less ▲]

Detailed reference viewed: 49 (7 UL)
See detailAsset Pricing under Rational Learning about Rare Disasters
Koulovatianos, Christos UL; Wieland, Volker

Scientific Conference (2017, January 07)

Why is investment in stocks so persistently weak after a rare disaster? Connecting disaster episodes with post-disaster expectations seems crucial for such post-disaster forecasting and also policymaking ... [more ▼]

Why is investment in stocks so persistently weak after a rare disaster? Connecting disaster episodes with post-disaster expectations seems crucial for such post-disaster forecasting and also policymaking, but rational-expectations models with variable disaster risk often fail to achieve this connection. To this end, while retaining full rationality, we introduce limited information and learning about rare-disaster risk and show that the resulting stock-investment behavior seems similar to persistent investor fear after a rare disaster. We study, (a) rational learning for state verification (RLS), with investors knowing the data-generating process of disaster riskiness but being unable to observe whether the economy is in a riskier state (regime) or not, and (b) rational learning about the data-generating process (RLP) of disaster risk, with investors also being unaware of the data-generating process of disaster riskiness. We analytically show that both RLS and RLP synchronize disaster events with post-disaster expectations and asset prices, and create persistence in price-dividend ratios even if data-generating processes of disaster risk have no persistence. Using De Finetti's theorem we show that RLP offers an explanation for global spells of pessimism and weak investment after a disaster. [less ▲]

Detailed reference viewed: 14 (0 UL)
Peer Reviewed
See detailData Abundance and Asset Price Informativeness
Dugast, Jérôme UL; Foucault, Thierry

Scientific Conference (2017, January 06)

Detailed reference viewed: 10 (3 UL)
Full Text
Peer Reviewed
See detailWhen An Educational Ideology Travels: The Experience Of The New Math Reform In Luxembourg
Nadimi Amiri, Shaghayegh UL

in Mathematics Education and Life at Times of Crisis (2017)

Detailed reference viewed: 10 (4 UL)
Full Text
Peer Reviewed
See detailShould We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study
Wang, Jingyi; Sun, Jun; Yuan, Qixia UL et al

in Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (2017)

Detailed reference viewed: 20 (3 UL)
Full Text
Peer Reviewed
See detailAutomata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation
Devroey, Xavier; Perrouin, Gilles UL; Papadakis, Mike UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017) (2017)

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailThe Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study
Glauner, Patrick UL; Du, Manxing UL; Paraschiv, Victor et al

in Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017) (2017)

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we ... [more ▼]

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we revisit this question from a quantitative perspective. Concretely, we collect 54K abstracts of papers published between 2007 and 2016 in leading machine learning journals and conferences. We then use machine learning in order to determine the top 10 topics in machine learning. We not only include models, but provide a holistic view across optimization, data, features, etc. This quantitative approach allows reducing the bias of surveys. It reveals new and up-to-date insights into what the 10 most prolific topics in machine learning research are. This allows researchers to identify popular topics as well as new and rising topics for their research. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailWeak Interference Detection with Signal Cancellation in Satellite Communications
Politis, Christos UL; Maleki, Sina UL; Tsinos, Christos UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017 (2017)

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference ... [more ▼]

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference efficiently. While there are efficient techniques to monitor strong interference in SATCOM, weak interference is not so easily detected because of its low interference to signal and noise ratio (ISNR). To address this issue, this paper proposes and develops a technique which takes place on-board the satellite by decoding the desired signal, removing it from the total received signal and applying an Energy Detector (ED) in the remaining signal for the detection of interference. Different from the existing literature, this paper considers imperfect signal cancellation, examining how the decoding errors affect the sensing performance, derives the expressions for the probability of false alarm and provides a set of simulations results, verifying the efficiency of the technique. [less ▲]

Detailed reference viewed: 84 (11 UL)
Full Text
Peer Reviewed
See detailFormally Verified Differential Dynamic Logic
Bohrer, Brandon; Rahli, Vincent UL; Vukotic, Ivana UL et al

in CPP 2017 (2017)

Detailed reference viewed: 49 (14 UL)
Full Text
Peer Reviewed
See detailFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis
Huynen, Jean-Louis UL; Lenzini, Gabriele UL

in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied ... [more ▼]

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodology works also retrospectively. It assists analysts in retrieving the causes of an observed socio-technical attack, guiding them to understand where the information security management of the system has failed. The methodology is tuned to find causes that root in the human-related factors that an attacher can exploit to execute its intrusion. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailHow representative are EAP listening books of real lectures?
Deroey, Katrien UL

in Kemp, Jenny (Ed.) Proceedings of the 2015 BALEAP Conference. EAP in a rapidly changing landscape: Issues, challenges and solutions (2017)

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is ... [more ▼]

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is arguably whether it prepares students for lectures. In this regard, the availability of spoken academic corpora (e.g. BASE, MICASE, ELFA) and the research arising from these provides insights into lecture discourse that could be usefully integrated in such materials. However, as I will here show, the integration of corpus findings in EAP course books is surprisingly limited, raising the question of whether training based on such materials forms an adequate preparation for the demands of real lectures. I illustrate the gap between authentic lecture discourse and various current listening books by comparing the treatment of importance markers (e.g. the important point is; remember; I want to emphasize this) with their realisation in a lecture corpus. (Deroey and Taverniers 2012; Deroey 2013). Since these discourse organisational signals alert students to key points, being able to identify these markers may facilitate lecture comprehension and note-taking. Importance markers were retrieved from all 160 lectures of the British Academic Spoken English corpus using corpus-driven and corpus-based methods. The investigation revealed that while listening books typically highlight the importance of identifying the lecturer’s main points, students are either not or inadequately trained to recognise importance markers. Where examples of such markers are included, they are few and prototypical (e.g. the important point is). However, in the lecture corpus prototypical markers are relatively uncommon; instead less explicit, multifunctional markers such as ‘the thing is’ and ‘remember’ predominate. The findings suggest that much remains to be done to make lecture listening books more representative of real lectures. References Deroey, K. L. B. and Taverniers, M. 2012. “‘Just remember this’: Lexicogrammatical relevance markers in lectures”. English for Specific Purposes 31 (4): 221-233. Deroey, K. L. B. (2015). Marking importance in lectures: Interactive and textual orientation. Applied Linguistics, 36(1), 51-72. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailMehrsprachigkeit in der juristischen Ausbildung an der Universität Luxemburg. Rechtswissenschaft trifft Mehrsprachigkeitsforschung
Uwera, Francine UL; Heuschling, Luc UL

in Warto, Patrick; Zumbach, Jörg; Lagodny, Otto (Eds.) et al Rechtdidaktik - Pflicht oder Kür? (2017)

Detailed reference viewed: 102 (29 UL)
Full Text
Peer Reviewed
See detailAssessing and Improving the Mutation Testing Practice of PIT
Laurent, Thomas; Papadakis, Mike UL; Kintis, Marinos UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (2017)

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailTowards Security-aware Mutation Testing
Loise, Thomas; Devroey, Xavier; Perrouin, Gilles et al

in The 12th International Workshop on Mutation Analysis (Mutation 2017) (2017)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailControlled Homomorphic Encryption: Definition and Construction
Desmedt, Yvo; Iovino, Vincenzo UL; Persiano, Giuseppe et al

in FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (2017)

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE ... [more ▼]

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE) to homomorphically evaluate a ciphertext Ct = Enc(m) and a circuit C therefore obtaining Enc(C(m)) but only if (similarly to a FunctE) a token for C has been received from the owner of the secret key. We discuss difficulties in constructing a CHES and then show a construction based on any FunctE. As a byproduct our CHES also represents a FunctE supporting the re-encryption functionality and in that respect improves existing solutions. [less ▲]

Detailed reference viewed: 24 (6 UL)