References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 66 (3 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (in press)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 63 (4 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 42 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 143 (19 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 116 (6 UL)
Full Text
Peer Reviewed
See detailRevisiting Gaussian Mixture Models for Driver Identification
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (in press)

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼]

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲]

Detailed reference viewed: 24 (6 UL)
Full Text
Peer Reviewed
See detailRevisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Atashpendar, Arash UL; Policharla, Guru Vamsi; Roenne, Peter UL et al

in Secure IT Systems, 23rd Nordic Conference, NordSec 2018 (in press)

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily ... [more ▼]

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange. [less ▲]

Detailed reference viewed: 53 (8 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 281 (4 UL)
Full Text
Peer Reviewed
See detailO-MI/O-DF vs. MQTT: a performance analysis
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL et al

in O-MI/O-DF vs. MQTT: a performance analysis (in press)

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as ... [more ▼]

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as well as Industry 4.0 environments, look more like a collection of isolated “Intranets of Things”, also referred to as “vertical silos”, rather than a federated infrastructure. Breaking down these silos is a key challenge in both the IoT and Industry 4.0 communities. This paper is intended to present and discuss two open and standardised mes- saging protocols designed for IoT applications, namely: MQTT and O-MI/O-DF. First, a traffic load’s analytical model derived from the MQTT standard specifications is presented. Second, a comparison study between MQTT and O-MI/O-DF standards is carried out based on a real-life industrial implementation. This study brings a deep understanding of the extent to which these protocols are performant (from a traffic load perspective) and how they can impact on future architectural designs. [less ▲]

Detailed reference viewed: 50 (4 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 108 (9 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 123 (18 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 66 (6 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 23 (9 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 164 (6 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 30 (1 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 53 (10 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 92 (15 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 40 (7 UL)
Full Text
Peer Reviewed
See detailPower and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks
Lei, Lei UL; You, Lei; Yang, Yang UL et al

in IEEE Global Communications Conference (GLOBECOM) 2018 (2018, December)

Detailed reference viewed: 15 (4 UL)
Full Text
Peer Reviewed
See detailOsiris: Hunting for Integer Bugs in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Schütte, Julian; State, Radu UL

in 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018 (2018, December)

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed ... [more ▼]

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed once deployed to the blockchain. They typically implement the business logic of distributed apps and carry billions of dollars worth of coins. In that respect, it is imperative that smart contracts are correct and have no vulnerabilities or bugs. However, research has identified different classes of vulnerabilities in smart contracts, some of which led to prominent multi-million dollar fraud cases. In this paper we focus on vulnerabilities related to integer bugs, a class of bugs that is particularly difficult to avoid due to some characteristics of the Ethereum Virtual Machine and the Solidity programming language. In this paper we introduce Osiris – a framework that combines symbolic execution and taint analysis, in order to accurately find integer bugs in Ethereum smart contracts. Osiris detects a greater range of bugs than existing tools, while providing a better specificity of its detection. We have evaluated its performance on a large experimental dataset containing more than 1.2 million smart contracts. We found that 42,108 contracts contain integer bugs. Be- sides being able to identify several vulnerabilities that have been reported in the past few months, we were also able to identify a yet unknown critical vulnerability in a couple of smart contracts that are currently deployed on the Ethereum blockchain. [less ▲]

Detailed reference viewed: 50 (3 UL)
Full Text
Peer Reviewed
See detailCollaborative Data Delivery for Smart City-oriented Mobile Crowdsensing Systems
Vitello, Piergiorgio; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 2018 (2018, December)

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing ... [more ▼]

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing infrastructures. In typical MCS systems, sensing tasks are allocated and reported on individual-basis. In this paper, we investigate on collaboration among users for data delivery as it brings a number of benefits for both users and sensing campaign organizers and leads to better coordination and use of resources. By taking advantage from proximity, users can employ device-to-device (D2D) communications like Wi-Fi Direct that are more energy efficient than 3G/4G technology. In such scenario, once a group is set, one of its member is elected to be the owner and perform data forwarding to the collector. The efficiency of forming groups and electing suitable owners defines the efficiency of the whole collaborative-based system. This paper proposes three policies optimized for MCS that are compliant with current Android implementation of Wi-Fi Direct. The evaluation results, obtained using CrowdSenSim simulator, demonstrate that collaborative-based approaches outperform significantly individual-based approaches. [less ▲]

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailSequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, December)

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays facilitate simultaneous wireless information and power transfer (SWIPT) to the end-users. In this context, we address an optimization problem to maximize the end-users’ sum-rate subjected to transmit power and harvested energy constraints. Furthermore, the problem is formulated for both time-switching (TS) and power-splitting (PS) SWIPT schemes.We aim at optimizing the users’ SWIPT splitting factors as well as sub-carrier–destination assignment, sub-carrier pairing, and relay–destination coupling metrics. This kind of joint evaluation is combinatorial in nature with non-linear structure involving mixed-integer programming. In this vein, we propose a sub-optimal low complex sequential resource distribution (SRD) method to solve the aforementioned problem. The performance of the proposed SRD technique is compared with a semi-random resource allocation and relay selection approach. Simulation results reveal the benefits of the proposed design under several parameter values with various operating conditions to illustrate the efficiency of SWIPT schemes for the proposed techniques. [less ▲]

Detailed reference viewed: 42 (5 UL)
See detailResearching education in Luxembourg (symposium)
Fischbach, Antoine UL

Scientific Conference (2018, November 08)

Detailed reference viewed: 4 (2 UL)
Peer Reviewed
See detailAußerschulisches Lesen und Lesekompetenz Zum Zusammenhang zwischen den Deutsch- und Französisch- Lesekompetenzen von Neuntklässlerinnen und Neuntklässlern und ihren außerschulischen Lesegewohnheiten in Luxemburg.
Reichert, Monique UL; Krämer, Charlotte UL; Rivas, Salvador UL et al

Scientific Conference (2018, November)

In Luxemburg erreichen viele Jugendliche ein gutes Lesekompetenzniveau nicht nur in einer, sondern gleich in zwei Sprachen. Allerdings wird wiederholt darauf hingewiesen, dass die Lesekompetenzen in ... [more ▼]

In Luxemburg erreichen viele Jugendliche ein gutes Lesekompetenzniveau nicht nur in einer, sondern gleich in zwei Sprachen. Allerdings wird wiederholt darauf hingewiesen, dass die Lesekompetenzen in Luxemburg stark mit dem familiären Hintergrund der Schülerinnen und Schüler zusammenhängen. Die vorliegende Studie soll jedoch über die Darstellung der Zusammenhänge zwischen den Deutsch- und Französisch-Lesekompetenzen und Einflussfaktoren wie sozio-ökonomischem Hintergrund, Migrationsstatus und Muttersprache hinausgehen. In der Tat stellt sich die Frage, ob es Faktoren gibt, die sich positiv auf das Lesekompetenzniveau der Schülerinnen und Schüler auswirken und auf die sie – anders als bei diesen mittlerweile gut belegten Faktoren – selbst Einfluss nehmen können? Das Leseverhalten Jugendlicher stellt hierfür einen naheliegenden Ansatzpunkt dar. Somit wurden die Schülerinnen und Schüler während der ÉpStan 2016 nicht nur zu ihrem familiären, schulischen und persönlichen Hintergrund befragt, sondern erstmals auch zu ihrem außerschulischen Leseverhalten. Hierbei wurde erfasst, wie häufig sie in ihrer Freizeit Texte unterschiedlicher Art (z. B. Erzählungen, Sachtexte, Zeitungsartikel, Foreneinträge oder Emails) lesen, und in welchen Sprachen sie dies tun. Mittels verschiedener Regressionsanalysen wurde der familiäre Hintergrund der Jugendlichen, ihr Leseverhalten, sowie ihr Lesekompetenzniveau im Deutschen und Französischen zueinander in Bezug gesetzt. Die aus diesen Analysen hervorgehenden Ergebnisse belegen eindrücklich, dass neben dem familiären Hintergrund auch die Lesehäufigkeit und die Sprache, in der die Schülerinnen und Schüler üblicherweise lesen, von Bedeutung für das erreichte Lesekompetenzniveau sind. Darüber hinaus haben insbesondere die Textsorten, mit denen sich die Jugendlichen in ihrer Freizeit auseinandersetzen, entscheidenden Einfluss auf ihre Deutsch- und ihre Französisch-Lesekompetenz. Insbesondere die Häufigkeit, mit der Jugendliche angeben, narrative Texte (wie Geschichten, Romane oder Erzählungen) zu lesen, steht deutlich in positivem Zusammenhang mit ihrer Lesekompetenz in beiden Sprachen. Der Vortrag schließt mit einer Diskussion bezüglich der außerordentlich hohen Attraktivität von digitalen Textsorten bei Kindern und Jugendlichen, und den Möglichkeiten, diese Vielfalt an primär kommunikativ bzw. interaktiv ausgerichteten Lesematerialien als lebensnahe, pädagogische „Sprungbretter“ zu nutzen, mit deren Hilfe zukünftige Leserinnen und Leser an zunehmend komplexere Texte herangeführt werden könnten. [less ▲]

Detailed reference viewed: 8 (2 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 80 (6 UL)
Full Text
Peer Reviewed
See detailAre mutants really natural? A study on how “naturalness” helps mutant selection
Jimenez, Matthieu UL; Titcheu Chekam, Thierry UL; Cordy, Maxime UL et al

in 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18) (2018, October 11)

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling ... [more ▼]

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling techniques. Such models promise to capture the program semantics and identify source code parts that `smell', i.e., they are strange, badly written and are generally error-prone (likely to be defective). Aims: We investigate the use of natural language modelling techniques in mutation testing (a testing technique that uses artificial faults). We thus, seek to identify how well artificial faults simulate real ones and ultimately understand how natural the artificial faults can be. %We investigate this question in a fault revelation perspective. Our intuition is that natural mutants, i.e., mutants that are predictable (follow the implicit coding norms of developers), are semantically useful and generally valuable (to testers). We also expect that mutants located on unnatural code locations (which are generally linked with error-proneness) to be of higher value than those located on natural code locations. Method: Based on this idea, we propose mutant selection strategies that rank mutants according to a) their naturalness (naturalness of the mutated code), b) the naturalness of their locations (naturalness of the original program statements) and c) their impact on the naturalness of the code that they apply to (naturalness differences between original and mutated statements). We empirically evaluate these issues on a benchmark set of 5 open-source projects, involving more than 100k mutants and 230 real faults. Based on the fault set we estimate the utility (i.e. capability to reveal faults) of mutants selected on the basis of their naturalness, and compare it against the utility of randomly selected mutants. Results: Our analysis shows that there is no link between naturalness and the fault revelation utility of mutants. We also demonstrate that the naturalness-based mutant selection performs similar (slightly worse) to the random mutant selection. Conclusions: Our findings are negative but we consider them interesting as they confute a strong intuition, i.e., fault revelation is independent of the mutants' naturalness. [less ▲]

Detailed reference viewed: 21 (4 UL)
See detailDoes Born-Digital Heritage turn Historians into Digital Historians?
Schafer, Valerie UL

Scientific Conference (2018, October 10)

On three levels within digital history - the use of (1) digital sources, (2) digital tools (3) digital narratives, this presentation aims to demonstrate how the practice of born-digital heritage opens new ... [more ▼]

On three levels within digital history - the use of (1) digital sources, (2) digital tools (3) digital narratives, this presentation aims to demonstrate how the practice of born-digital heritage opens new possibilities but also issues for historians. [less ▲]

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailMesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content
Sobon-Muehlenbrock, Elena UL; Greger, Manfred UL; Schlienz, Markus UL

in Mesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content (2018, October)

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of ... [more ▼]

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of synthetic kitchen waste, further called model kitchen waste (MKW) with the same amounts of carbohydrates, fats and proteins. In this study the anaerobic degradation of this MKW (named MKW1; 23 % rapeseed oil) was investigated under mesophilic and thermophilic conditions at 2 different loadings. Additional experiments were performed with lower (MKW2; 14.7 %) and higher (MKW3; 27.2 %) rapeseed oil content at the expense of starch. An organic loading of 5 gVS/l leads to a fast and undisturbed degradation under mesophilic conditions. The volatile fatty acids (mainly acetic acid) appeared only during the first 3 days. Finally the amount of biogas been produced is weakly correlated with the oil content. Under thermophilic conditions the biogas production was retarded and the concentrations of the volatile fatty acids were generally higher whereas acetic acid was present for a period of 10 days. The final biogas amount was higher than compared to mesophilc conditions. At a higher loading of 25 gVS/l a strong retardation of biogas production was observed which correlates with very high concentrations of volatile fatty acids over the whole runtime period of 50 days. [less ▲]

Full Text
Peer Reviewed
See detailThe Price of Privacy in Collaborative Learning
Pejo, Balazs UL; Tang, Qiang UL; Gergely, Biczok

Poster (2018, October)

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼]

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have enough data to train a reasonably accurate model. For such organizations, a realistic solution is to train machine learning models based on a joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 133 (25 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 87 (12 UL)
Full Text
Peer Reviewed
See detailStatic load deflection experiment on a beam for damage detection using the Deformation Area Difference Method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

Scientific Conference (2018, October)

A reliable and safety infrastructure for both transport and traffic is becoming increasingly important today. The condition assessment of bridges remains difficult and new methods must be found to provide ... [more ▼]

A reliable and safety infrastructure for both transport and traffic is becoming increasingly important today. The condition assessment of bridges remains difficult and new methods must be found to provide reliable information. A meaningful in-situ assessment of bridges requires very detailed investigations which cannot be guaranteed by commonly used methods. It is known that the structural response to external loading is influenced by local damages. However, the detection of local damage depends on many factors such as environmental effects (e.g. temperature), construction layer (e.g. asphalt) and accuracy of the structural response measurement. Within the paper, a new so-called Deformation Area Difference (DAD) Method is presented. The DAD method is based on a load deflection experiment and does not require a reference measurement of initial condition. Therefore, the DAD method can be applied on existing bridges. Moreover, the DAD method uses the most modern technologies such as high precision measurement techniques and attempts to combine digital photogrammetry with drone applications. The DAD method uses information given in the curvature course from a theoretical model of the structure and compares it to real measurements. The paper shows results from a laboratory load-deflection experiment with a steel beam which has been gradually damaged at distinct positions. The load size is chosen so that the maximum deflection does not exceed the serviceability limit state. With the data obtained by the laboratory experiment, the damage degree, which can still be detected by the DAD method, is described. Furthermore, the influence of measurement accuracy on damage detection is discussed. [less ▲]

Detailed reference viewed: 64 (16 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailDas Palux-Projekt in Luxemburg: Forschungsdesign und erste Ergebnisse einer Pilotstudie
Eckelt, Melanie UL; Hutmacher, Djenna UL; Steffgen, Georges UL et al

in Bartsch, Fabienne; Mombeck, Mona; Müller, Merle (Eds.) et al Tägliche Herausforderungen meistern - Sportlehrkräfte im Fokus (2018, October)

Detailed reference viewed: 25 (3 UL)
Peer Reviewed
See detailDie Erfindung der Grenze. Zur Konstruktion von Herrschaftsgebieten auf Regionalkarten des 16. Jahrhunderts im Westen des Reiches.
Uhrmacher, Martin UL

Scientific Conference (2018, September 28)

Im Spätmittelalter war das Reich durch Prozesse der Territorialisierung geprägt. Vor allem in den größeren Landesherrschaften wurde versucht, der Zersplitterung von Rechten und Besitzungen ... [more ▼]

Im Spätmittelalter war das Reich durch Prozesse der Territorialisierung geprägt. Vor allem in den größeren Landesherrschaften wurde versucht, der Zersplitterung von Rechten und Besitzungen entgegenzuwirken und Herrschaft zu verdichten. Im Westen des Reiches blieb man jedoch auf dem Weg zum Territorialstaat zumeist noch weit von einer flächigen Durchsetzung von Herrschaft entfernt. Die territorialen Verhältnisse lassen sich häufig als Gemengelage aus sich überlagernden Herrschaftsrechten, Hochgerichtsbezirken, Gemeinherrschaften, umstrittenen Gebieten oder anderen Abhängigkeiten beschreiben. Eine kartographische Erfassung dieser komplexen und mehrdimensionalen räumlichen Strukturen war mit den Mitteln der damaligen Zeit nicht möglich. Der Aufschwung einer zunehmend wissenschaftlich geprägten Kartographie ab der Mitte des 15. Jahrhunderts erlaubte es den Landesherren, kartographischer Darstellungen als Instrumente von Macht und Herrschaft zu nutzen: einerseits als Grundlage für die politische und wirtschaftliche Entwicklung des Territoriums, andererseits als Medium zur Verbreitung territorialer Ansprüche und zur Inszenierung von Herrschaft. Aus diesem Grund wurden einige der bekanntesten zeitgenössischen Kartographen mit der räumlichen Darstellung einzelner Fürstentümer beauftragt, bspw. Martin Waldseemüller durch Herzog René II. von Lothringen. Diese Aufgaben stellten die Kartographen vor große Probleme, denn noch gab es keine geeigneten Mittel, mit denen die politischen und territorialen Verhältnisse im Kartenbild auch nur annähernd widergegeben werden konnten. Eine Analyse ausgewählter Karten zeigt, welche verschiedenen Strategien angewandt wurden, um den fragmentarischen Besitz der Auftraggeber in seiner Gesamtheit als geschlossenes Herrschaftsgebiet erst zu konstruieren. Diese Experimentierphase endete Mitte des 16. Jahrhunderts mit der Etablierung von Grenzen in Form von Linien als allgemein gültiger Konvention, obwohl Territorialgrenzen im Sinne einer umfassenden Scheidelinie zwischen zwei Territorien in dieser Zeit nicht existierten. Der Vortrag widmet sich einer Fragestellung, die in Folge des spatial turn zwar wieder verstärkt in den geschichtswissenschaftlichen Fokus gelangte, aber in vieler Hinsicht noch nicht gründlich genug aufgearbeitet ist. Es gilt, historische Karten als vielschichtige, Schrift und Bild vereinende Wissensträger verstärkt auf Ihre Funktion bei der Ausbildung von politischen Räumen und Einheiten in den Blick zu nehmen. Denn sie müssen stets als bewusste Konstruktionen und keinesfalls als Versuch eines - gemessen an den jeweiligen technischen Möglichkeiten - quasi photographischen Abbildes der Realität verstanden und interpretiert werden. Die mit den Karten vermittelten und durch deren Druck auch weit verbreiteten Inszenierungen von geschlossenen Territorialstaaten erwiesen sich zudem als sehr wirkmächtig und prägend, teilweise bis zum Ende des Alten Reiches. Den zugrundeliegenden Strukturen und Prozessen wird im Rahmen des Vortrags besondere Aufmerksamkeit geschenkt. [less ▲]

Detailed reference viewed: 11 (4 UL)
See detailDie Zeit der Pfandherrschaften (1388-1437). Luxemburg unter fremder Herrschaft?
Dönges, Christa Annette UL

Scientific Conference (2018, September 28)

Detailed reference viewed: 25 (0 UL)
Peer Reviewed
See detailMultilingualism in forced migration research: insights from an ethnographic study in Luxembourg
Kalocsanyiova, Erika UL

Scientific Conference (2018, September 27)

This paper outlines some methodological considerations for researching integration trajectories in multilingual societies. It draws on a linguistic ethnographic study undertaken in Luxembourg. It ... [more ▼]

This paper outlines some methodological considerations for researching integration trajectories in multilingual societies. It draws on a linguistic ethnographic study undertaken in Luxembourg. It discusses ways of accommodating the participants’ (and my own) multilingual but distinct language competences. I reflect upon how my positionality as a multilingual researcher became part of the research process, shaping both the research design and the relationships I had with the informants. Multilingual research practices can play a fundamental role in empowering participants and privileging their voices in migration-related studies. This paper outlines some of the benefits/complexities that can arise if both participants and researchers draw on their old and newly acquired language resources. In this connection, I will argue that narrative analysis allows a refined understanding of foreign- and cross-language exchanges, which in turn helps to uncover the many ways in which linguistic integration can be understood, practiced and experienced. Narratives also proved to be an excellent tool for exploring multiple and shifting ideological stances in (meta)discourses surrounding language, identity and societal participation in the context of this research. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 43 (6 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Teacher Support for Learning Material Authoring
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Advances in Computing - CCC 2018 (2018, September 26)

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning ... [more ▼]

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning material in popular authoring software. As teachers create their learning material, SoLeMiO identifies the concepts they want to address. In order to identify relevant concepts in a reliable, automatic and unambiguous way, we employ state of the art concept recognition and entity linking tools. From the recognized concepts, we build a semantic representation by exploiting additional information from Open Knowledge Graphs through expansion and filtering strategies. These concepts and the semantic representation of the learning material support the authoring process in two ways. First, teachers will be recommended related, heterogeneous resources from an open corpus, including digital libraries, domain-specific knowledge bases, and MOOC platforms. Second, concepts are proposed for semi-automatic tagging of the newly authored learning resource, fostering its reuse in different e-learning contexts. Our approach currently supports resources in English, French, and Spanish. An evaluation of concept identification in lecture video transcripts and a user study based on the quality of tag and resource recommendations yielded promising results concerning the feasibility of our technique. [less ▲]

Detailed reference viewed: 24 (4 UL)
Full Text
Peer Reviewed
See detailSOFTENING AND MELTING MODELING OF IRON ORE PARTICLES USING A CFD-DEM COUPLING METHOD
Baniasadi, Mehdi UL; Peters, Bernhard UL

Scientific Conference (2018, September 25)

The iron-bearing particles start softening and melting because of the weight of burden above and the high temperature in the middle of the blast furnace so-called cohesive zone. In this region, as ... [more ▼]

The iron-bearing particles start softening and melting because of the weight of burden above and the high temperature in the middle of the blast furnace so-called cohesive zone. In this region, as particles are softened, the void space between particles decreases. As the temperature increases further, the softened particles start melting and generate two different liquids: molten iron and slag. Then the generated liquids trickle down to the lower part of the blast furnace. The softening and melting process forms the impermeable ferrous layers forcing gas to flow horizontally through the permeable coke windows. These phenomena have a big effect on the operation of the blast furnace, and since it is not possible to interrupt the blast furnace to investigate details of the phenomena occurring inside, the numerical simulation becomes more practical. In this contribution, the eXtended Discrete Element Method (XDEM) as an advanced numerical tool based on the discrete-continuous framework, is used. Within this model, the gas and liquid phases are described by computational fluid dynamics (CFD) and the soft-sphere discrete element approach (DEM) is used for the coke and iron ore particles. Continuous phases are coupled to the discrete entities through mass, momentum, and energy exchange. Moreover, the internal temperature distribution of the particles is described. The particle’s deformation, temperature, melting, and shrinking along with the saturation of molten iron and slag are examined using the XDEM method. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailVerlet buffer for broad phase interaction detection in Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

Poster (2018, September 24)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that extends the dynamics of granular materials or particles as described through the classical ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that extends the dynamics of granular materials or particles as described through the classical discrete element method (DEM) by additional properties such as the thermodynamic state, stress/strain for each particle. Such DEM simulations used by industries to set up their experimental processes are complexes and heavy in computation time. Therefore, simulations have to be precise, efficient and fast in order to be able to process hundreds of millions of particles. To tackle this issue, such DEM simulations are usually parallelized with MPI. One of the most expensive computation parts of a DEM simulation is the collision detection of particles. It is classically divided into two steps: the broad phase and the narrow phase. The broad phase uses simplified bounding volumes to perform an approximated but fast collision detection. It returns a list of particle pairs that could interact. The narrow phase is applied to the result of the broad phase and returns the exact list of colliding particles. The goal of this research is to apply a Verlet buffer method to (X)DEM simulations regardless of which broad phase algorithm is used. We rely on the fact that such DEM simulations are temporal coherent: the neighborhood only changes slightly from the last time-step to the current time-step. We use the Verlet buffer method to extend the list of pairs returned by the broad phase by stretching the particles bounding volume with an extension range. This allows re-using the result of the broad phase for several time-steps before an update is required once again and thereby its reduce the number of times the broad phase is executed. We have implemented a condition based on particles displacements to ensure the validity of the broad phase: a new one is executed to update the list of colliding particles only when necessary. This guarantees identical results because approximations introduced in the broad phase by our approach are corrected in the narrow phase which is executed at every time-steps anyway. We perform an extensive study to evaluate the influence of the Verlet extension range on the performance of the execution in terms of computation time and memory consumption. We consider different test-cases, partitioners (ORB, Zoltan, METIS, SCOTCH, ...), broad phase algorithms (Link cell, Sweep and prune, ...) and grid configurations (fine, coarse), sequential and parallel (up to 280 cores). While a larger Verlet buffer increases the cost of the broad phase and narrow phase, it also allows skipping a significant number of broad phase execution (> 99 \%). As a consequence, our first results show that this approach can speeds up the total .execution time up to a factor of 5 for sequential executions, and up to a factor of 3 parallel executions on 280 cores while maintaining a reasonable memory consumption. [less ▲]

Detailed reference viewed: 18 (7 UL)
Full Text
See detailTell Your Town – Sprache lernen, Integration fördern, Städte erkunden und entdecken
Reuter, Bob UL; Haberkorn, Marcus

Scientific Conference (2018, September 20)

Wie können ansässige und neu zugezogene Schülerinnen und Schülern in Rheinland-Pfalz und Luxemburg besser in ihren Regionen integriert werden, dabei ihre sprachlichen Fähigkeiten entwickeln und die ... [more ▼]

Wie können ansässige und neu zugezogene Schülerinnen und Schülern in Rheinland-Pfalz und Luxemburg besser in ihren Regionen integriert werden, dabei ihre sprachlichen Fähigkeiten entwickeln und die erforderliche Medienkompetenz erlernen? Diesen Fragen hat sich ein grenzüberschreitendes bilaterales Entwicklungs- und Forschungsprojekt gewidmet, wobei ein „Partizipativer Design“ Ansatz (Danielsson & Wiberg, 2006) angewandt wurde. Unter der Leitung eines Teams der Hochschule Trier wurde in Zusammenarbeit mit SchülerInnen und LehrerInnen der Escher Brill Schule und der Trierer Kurfürst-Balduin-Realschule sowie einem Team der Universität Luxemburg, während des Schuljahres 2016/2017, die mobile App „Tell Your Town" entwickelt. Ziel war es erfundene Geschichten an echten Schauplätzen in Trier und Esch auf Deutsch, Französisch, Englisch und Luxemburgisch in spielerischer Form zu erzählen. Die Geschichten, Schauplätze und Routen wurden in Design Workshops partizipativ erarbeitet. Ein Team an der Hochschule Trier setzte die App anschließend um und ein Team der Universität Luxemburg dokumentierte, analysierte und evaluierte die Benutzung der App durch die SchülerInnen in Feldversuchen in Trier und in Esch, mit Hilfe teilnehmender Beobachtungen, Videographie und Befragungen von SchülerInnen und LehrerInnen, um technische und pädagogische Rückmeldungen an die EntwicklerInnen und LehrerInnen zu geben. Bei diesem Projekt ist eine frei verfügbare App entstanden, welche die Benutzer dazu einlädt eine der beiden Städte „per pedes“ zu entdecken und dabei noch so einiges über die Geschichte der Stadt zu erfahren, was ihnen durch einen fiktionalen Reiseführer in interaktiven Dialogen vermittelt wird. Dabei wird die Geolokalisierungsfunktion des Smartphones genutzt um den Benutzer zu bedeutsamen Sehenswürdigkeiten zu führen, wo dann interaktive Minispiele oder Dialoge mit dem fiktionalen Reiseführer erfolgen. In der Route Esch steht die Geschichte des Luxemburgischen Bergbaus und den dortigen Minenarbeitern im Mittelpunkt. Die Route Trier handelt von einem Wettlauf zwischen Karl Marx und Nero. In diesem wird der Spieler von Karl Marx begleitet und lernt so bekannte Orte aus Trier kennen. Mit Hilfe der Feldversuche wurde sichtbar, dass die App großes Potential hat, um eine relativ autonome Erkundung der Städte zu initiieren und es auch den einheimischen SchülerInnen erlaubt, ihre Stadt mit neuen Augen bewusster wahrzunehmen. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailThe Impact of Feedback Trading on Option Prices
Lehnert, Thorsten UL

Scientific Conference (2018, September 20)

Detailed reference viewed: 3 (0 UL)
Peer Reviewed
See detailIntergenerationelle Solidarität im Kontext von Migration: Gegenseitige Erwartungen, familienbezogene Werthaltungen und filiale Angst in portugiesischen und luxemburgischen Familien
Albert, Isabelle UL; Barros Coimbra, Stephanie UL

Scientific Conference (2018, September 20)

Vor dem Hintergrund einer sich am Übergang zum Rentenalter befindlichen ersten Generation von Migranten gewinnen Fragen zur intergenerationellen Solidarität in Familien mit Migrationshintergrund zunehmend ... [more ▼]

Vor dem Hintergrund einer sich am Übergang zum Rentenalter befindlichen ersten Generation von Migranten gewinnen Fragen zur intergenerationellen Solidarität in Familien mit Migrationshintergrund zunehmend an Bedeutung. Ein Verbleiben im Aufnahmeland könnte im Einklang mit kulturspezifischen Werthaltungen mit besonderen Erwartungen an die erwachsenen Kinder einhergehen. Die vorliegende Studie befasst sich ausgehend von Bengtson’s Solidaritätsmodell mit der Frage, wie sich die intergenerationelle Solidarität im Migrationskontext ausgestaltet, insbesondere welche gegenseitigen Erwartungen Eltern und erwachsene Kinder haben und wie der gegenseitige Austausch reguliert wird. Im Rahmen der vom FNR geförderten IRMA-Studie wurden mittels eines standardisierten Fragebogens Daten zur Familienkohäsion, zu gegenseitigen Erwartungen bezüglich Unterstützung und familienbezogenen Werthaltungen sowie zur filialen Angst und zum subjektiven Wohlbefinden an n = 67 in Luxemburg lebenden portugiesischen sowie n = 87 luxemburgischen Familien (Vater, Mutter und jeweils ein erwachsenes Kind) erhoben. Während luxemburgische und portugiesische Familien eine ähnlich hohe Familienkohäsion aufwiesen, zeigten sich Unterschiede in der Ausgestaltung des gegenseitigen Austauschs. Portugiesische Teilnehmer berichteten höhere Erwartungen bezüglich Kontakthäufigkeit und Unterstützung, wohingegen der Zusammenhalt luxemburgischer Familien eher durch eine generelle Verfügbarkeit bei Bedarf gekennzeichnet war. Es zeigte sich kein Mittelwertsunterschied der portugiesischen und luxemburgischen erwachsenen Kinder bezüglich filialer Angst. Während allerdings ein starker wahrgenommener Familienzusammenhalt mit geringerer filialer Angst in beiden Gruppen einherging, war ein stärkeres Bedürfnis nach Unabhängigkeit aber insbesondere bei den portugiesischen Kindern mit höherer filialer Angst verbunden. Die Ergebnisse werden unter Berücksichtigung intrafamilialer Prozesse der Beziehungsregulation im Rahmen eines integrativen Modells von Familienbeziehungen im Kontext von Altern und Migration diskutiert. [less ▲]

Detailed reference viewed: 5 (0 UL)
See detailA digital and interactive historical atlas of the city of Luxembourg.
Uhrmacher, Martin UL

Scientific Conference (2018, September 20)

Detailed reference viewed: 9 (1 UL)
Peer Reviewed
See detailSymposium "Positive Psychologie III: Soziale Beziehungen"
Baudson, Tanja UL; Brohm-Badry, Michaela

Scientific Conference (2018, September 19)

Detailed reference viewed: 4 (0 UL)
Peer Reviewed
See detailUsing Log-File Data to Uncover Strategy Use in Complex Problem Solving
Nicolay, Björn Fabrice UL; Krieger, Florian UL; Lagou, Charalampia UL et al

Scientific Conference (2018, September 18)

The aim of the current project is to utilize log-file data to enhance the understanding of strategy use in Complex Problem Solving (CPS). CPS can be defined as the ability to manipulate the existing ... [more ▼]

The aim of the current project is to utilize log-file data to enhance the understanding of strategy use in Complex Problem Solving (CPS). CPS can be defined as the ability to manipulate the existing variables of a particular novel, complex, intransparent, and dynamic environment successfully in order to reach a predefined goal. In order to successfully solve a CPS task, the goal-directed application and variation of certain strategies is necessary. To uncover the systematic use of these strategies, log-files have been deemed a fruitful resource as they contain not only the final results of a computer-based CPS item, but also the individual steps undertaken while solving such a task. Recent studies using log-files have highlighted the importance of some strategies for CPS, like the varying one variable at a time (VOTAT) strategy, or of engaging in noninterfering observations (i.e., idle rounds). In addition, other strategies have also been shown to be relevant in neighboring fields of CPS. However, comprehensive studies investigating a broad repertoire of strategies applied in CPS are scarce. Hence, on the basis of existing large-scale assessment data sets, the present project set out to investigate which strategies hidden in log-files are relevant for solving a CPS task in order to gain a more thorough understanding of how CPS tasks are being approached. Preliminary findings indicate that, in addition to VOTAT and idle rounds, particularly the flexibility of switching between strategies should be taken into account. [less ▲]

Detailed reference viewed: 13 (3 UL)
Peer Reviewed
See detailTeachers´ attitudes towards inclusion: Effects of a training module
Pit-Ten Cate, Ineke UL; Krischler, Mireille Gilberte Pauline UL

Scientific Conference (2018, September 17)

The success of implementing inclusive practice depends on teachers´ competence as well as their attitudes. Attitudes are defined as psychological tendencies expressed by evaluating a particular entity ... [more ▼]

The success of implementing inclusive practice depends on teachers´ competence as well as their attitudes. Attitudes are defined as psychological tendencies expressed by evaluating a particular entity with some degree of favor or disfavor. Research has provided mixed results concerning teachers´ attitudes toward students with SEN and inclusive practice, whereby teachers generally have more positive attitudes toward the inclusion of students with mild SEN than toward students with complex needs. Training, especially modules focusing on the cognitive processes underlying judgment, can facilitate positive change in attitudes toward inclusion of students with SEN. In a pre–post-test design, data were collected for a sample of 33 experienced primary school teachers attending a course (2x4hr) on inclusion with a focus on the role of attitudes in decision-making and behavior. We assessed general attitudes toward the inclusion of students with SEN as well as teachers´ emotional reactions, stereotypes and behavioural intentions. Results of a repeated measures ANOVA, with time (pre vs. post) and general attitude toward inclusion (4 subscales) as within group factors only showed a main effect for attitudes, reflecting variations between the subscale scores. The training course did not result in changes in general attitudes. Further analyses revealed a positive pre-post course change in teachers´ emotional reactions concerning the inclusion of a student with SEN in their class. Teachers´ stereotype ratings indicated they perceived students with learning difficulties as less competent but warm, whereas students with challenging behavior were perceived as relatively competent but average in warmth. Finally, teachers´ behavioral intentions shifted from focusing on finding solutions within the classroom to more cooperation with colleagues, parents and experts to provide the best support for the student with SEN. In sum, the training course impacted both the affective and conative components of attitudes, whereas general attitudes toward inclusion remained unchanged. [less ▲]

Detailed reference viewed: 22 (2 UL)
Peer Reviewed
See detailChanges in preservice teachers´ attitudes toward inclusion: the role of competence
Pit-Ten Cate, Ineke UL; Krischler, Mireille Gilberte Pauline UL

Scientific Conference (2018, September 13)

Following policies to promote a more equitable and inclusive educational system, the question arises how to prepare teachers to accommodate an increasingly heterogeneous student population. As teachers´ ... [more ▼]

Following policies to promote a more equitable and inclusive educational system, the question arises how to prepare teachers to accommodate an increasingly heterogeneous student population. As teachers´ competence concerning inclusion is grounded in their training (e.g. Baker-Ericzen et al. 2009), courses focussing on inclusion as an educational practice could reduce uncertainties (e.g. Carroll et al. 2003). However, inclusion not only depends on teachers´ competence but also on their attitudes. Teachers’ attitudes may be pivotal for the success of inclusive education as they can elicit differential expectations and behaviors, which can enhance or limit the successful inclusion of students with special educational needs (SEN). Avramidis and Norwich (2002) stressed the importance of training in the formation of positive attitudes toward the integration of students with SEN. Although several studies have reported positive changes in attitudes following a course on inclusive education (e.g. Shade & Stewart, 2001), the relationship between competence and attitudes is less clear. Therefore, this study aimed to evaluate the effect of a course on inclusive pedagogy on competence and attitudes and the association between these constructs. Data were collected for 69 preservice teachers enrolled in a course on inclusive pedagogy. Attitudes toward the inclusion of students with SEN were assessed before and after the course, using the German version of The Opinions Relative to Integration of Students with Disabilities questionnaire (ORI; Benoit & Bless, 2014). In addition, at the end of the course students indicated to what extend the course had helped them to gain knowledge, skills and strategies concerning teaching a heterogeneous student population. Results of a repeated measures 2×4 ANOVA, with time (pre vs. post) and attitude towards inclusion (ORI subscales) as within group factors showed a main effect for attitudes, reflecting variations between the subscale scores. A significant time × attitudes interaction effect indicated positive attitude changes over time, but only in the domain of educational and social progression of students with SEN. Results of a regression analysis indicated that, after controlling for pre-course attitude ratings, perceived competence predicted attitude ratings at the end of the course. This study shows that teacher training can positively affect both teachers´ competence and attitudes concerning inclusive education, whereby perceived competence contributed to positive attitude change. [less ▲]

Detailed reference viewed: 12 (2 UL)
Peer Reviewed
See detail(Re)writing gender - gender constructions in autobiographies written by trans people
Artuso, Sandy Kathy UL

Scientific Conference (2018, September 13)

Detailed reference viewed: 8 (1 UL)
Full Text
See detailAutogenous Laser welding of copper to aluminium
Mathivanan, Karthik UL; Plapper, Peter UL

Poster (2018, September 13)

This work investigates laser joining of copper sheets to aluminium in overlap configuration. Dissimilar Cu-Al connections are widely used in the electrical and electronics applications e.g. battery and ... [more ▼]

This work investigates laser joining of copper sheets to aluminium in overlap configuration. Dissimilar Cu-Al connections are widely used in the electrical and electronics applications e.g. battery and solar panels.Joining these materials is a very critical assembly process. The laser welding from the aluminium surface to copper (Al-Cu) is well described in the literature .But there is no data concerning the laser seam welding from the copper side to join with aluminium i.e Cu-Al.The selection of aluminium surface to irradiate is mainly because of poor absorption of copper to laser in IR region.But high intensities of about 100 MW/cm2 allow for initial vaporization of copper surface.Once the keyhole is generated, absorption of laser light is improved.Thereby high power lasers allow for successful penetration of copper surface to produce a joint with aluminium. The main objective is to investigate the approach of dissimilar laser welding starting from the copper surface to aluminium.The effect of process parameters on the shear force, microstructure and weld pool dimensions are studied.An experimental design is realized to see the effect of laser irradiation of copper surface (Cu-Al) in contrast to aluminium surface(Al-Cu). The selection of aluminium or copper surface is mainly dependent on the laser power.With the high power disk laser the possibility of joining from the copper side was evident and results of joining copper to aluminium and aluminium to copper are comparable.Therefore welding from a highly reflective surface to achive a comparable shear strength is demonstrated. [less ▲]

Detailed reference viewed: 25 (12 UL)
Full Text
See detailLaser micro-welding of wire to flat geometry for dissimilar materials in an electromechanical application
Amne Elahi, Mahdi UL; Plapper, Peter UL

Poster (2018, September 11)

In the presented study, the laser welding of wire to flat geometry for miniature electromechanical hybrid components has been investigated. Laser welding offers variety of advantages compared to the ... [more ▼]

In the presented study, the laser welding of wire to flat geometry for miniature electromechanical hybrid components has been investigated. Laser welding offers variety of advantages compared to the current joining processes for this application however, considering the geometry of parts to be welded also mechanical properties requirement, an accurate spatial modulation of laser beam should be implemented to achieve a sound joint. Tensile shear test and optical microscopy were employed to represent the mechanical properties and melt pool geometry of the joint. All welds were done by power modulation of the laser beam to better control the energy input at several feed rates and three different beam trajectories. Results show that the shear load of the joint can be controlled by feed rate and the trajectory of the laser beam. The material combination of the study (Nickel and CuSn6), represents solubility in solid state therefore, by defining a proper spatial modulation of the laser beam a joint stronger than base wire metal is achievable. Figure 1 represents schematics of weld components. [less ▲]

Detailed reference viewed: 6 (2 UL)
Full Text
See detailA Bilingual Study for Personalized Sentiment Model PERSEUS
Guo, Siwen UL; Schommer, Christoph UL

Scientific Conference (2018, September 10)

This paper investigates the significance of analyzing language preferences in personalized sentiment analysis. Motivated by the considerable amount of text generated by multilingual speakers on social ... [more ▼]

This paper investigates the significance of analyzing language preferences in personalized sentiment analysis. Motivated by the considerable amount of text generated by multilingual speakers on social platforms, we focus on constructing a single model that is able to analyze sentiments in a multilingual environment. In particular, Twitter texts are used in this research where the choice of language can be switched at a message-, sentence-, word- or topic-level. To represent and analyze the text, we extract concepts and main topics from the text and apply a recurrent neural network with attention mechanism in order to learn the relation between the lexical choices and the opinions of each sentiment holder. The personalized sentiment model PERSEUS is applied as the central structure of this research. Moreover, a language index is added to each concept to enable multilingual analysis, which provides a solution for analyzing code-switching in the text as well. In this work, English and German are chosen for a pilot study, and an artificial corpus is created to evaluate the situation with multilingual speakers. [less ▲]

Detailed reference viewed: 14 (7 UL)
Full Text
Peer Reviewed
See detailSocial participation and peer relationships of students with special educational needs
Pit-Ten Cate, Ineke UL

Scientific Conference (2018, September 06)

Detailed reference viewed: 7 (0 UL)
Peer Reviewed
See detailFamily, migration, and intergenerational solidarity
Albert, Isabelle UL

Scientific Conference (2018, September 06)

Migration and cultural diversity are key issues for many European countries today, and family relations are becoming increasingly important in this context. Intergenerational solidarity can have different ... [more ▼]

Migration and cultural diversity are key issues for many European countries today, and family relations are becoming increasingly important in this context. Intergenerational solidarity can have different forms and may differ across as well as within cultures. In fact, different patterns of support have been found comparing migrant with non-migrant families. In general, parents represent an important resource of support even for adult children; the other way round, offspring in migrant families have been found to provide substantial practical support for their parents such as help with administrative tasks or translations already at younger ages, and family support can become more important with increasing age when older migrants need help or care. Families migrating from more collectivist, family-oriented to more individualistic cultural contexts might find it difficult to adapt to prevalent values and practices regarding intergenerational support in the receiving society, and adult children might experience strain and difficulties in meeting their parents’ expectations. Further, the question of how families arrange intergenerational solidarity in the light of multilocality becomes pertinent as migrants are confronted with the task to regulate their relations with family members who stay in their countries of origin. The present symposium deals with these questions by use of both quantitative and qualitative methods, bringing together researchers from four European countries (Switzerland, Germany, Luxembourg, and Portugal) which are characterized by high numbers of immigrants resp. emigrants. First, Bettina Isengard, Ronny König and Marc Szydlik explore patterns of intergenerational family solidarity all over Europe, concentrating on differences between migrant and non-migrant families as well as geographical distance between family members. Second, Heike Buhl, Sabrina Sommer and Christian Hoellger have a closer look at felt obligations to support parents in a sample from Germany, thereby examining in how far migrants and non-migrants differ with regard to their adherence to family values and how these are related to other aspects of intergenerational solidarity. Stephanie Barros and Isabelle Albert focus then on intergenerational support exchange in Portuguese migrant compared to Luxembourgish families with young adult children. Finally, Carlos Barros, Luana Cunha Ferreira and Carla Crespo analyse the relationship between emigrated family members and those who stay in the country of origin, namely Portugal, focusing in particular on aspects of intergenerational support to foster well-being and cohesion. The contributions will be discussed by Elke Murdock taking into account aspects of multicultural identity and integration and their roles for the regulation of family relations. [less ▲]

Detailed reference viewed: 22 (1 UL)
Peer Reviewed
See detailWhat you give you get, or not? The effects of intergenerational family solidarity on subjective well-being
Albert, Isabelle UL; Barros Coimbra, Stephanie UL

Scientific Conference (2018, September 06)

Much attention has been focused on intergenerational relations and family cultures as these developments are, amongst others, related to important socio-demographic changes creating a new reality for ... [more ▼]

Much attention has been focused on intergenerational relations and family cultures as these developments are, amongst others, related to important socio-demographic changes creating a new reality for families in Europe. Thus, solidarity and mutual support between adult children and their older parents are of particular interest as the exchange and “amount” of mutual support between both generations might gain importance for the well-being of each family member. Additionally, the specific context of migration can arouse special needs in terms of intergenerational support. The current study presents a cross-cultural comparison between Luxembourgish native and Portuguese migrant families, all living in Luxembourg. Quantitative data (n = 118 family triads) gathered by means of standardised questionnaires as well as qualitative data (n = 20 family dyads) collected with face-to-face interviews underlie the discussed results. Regardless of the culture, quantitative results show a higher provided social support from parents to children than the received one. However, PT children reported receiving as much as providing social support to their parents, while LU children reported receiving more support than the one they give. Further analyses will be carried out in order to differentiate between different kinds of support (financial, instrumental and emotional) making use of quantitative as well as qualitative data. Implications regarding family solidarity will be discussed in order to highlight similarities and differences between and within cultures and family generations. [less ▲]

Detailed reference viewed: 16 (0 UL)
Peer Reviewed
See detail(In)flexible Language Use in a Year 4 Class in Luxembourg: Which Languages in Which Subjects?
Kirsch, Claudine UL; Degano, Sarah UL

Scientific Conference (2018, September 06)

The project described in this paper is part of the broader research project ‘Capitalizing on Linguistic Diversity in Education’ that investigates how multilingualism can be used as a resource for ... [more ▼]

The project described in this paper is part of the broader research project ‘Capitalizing on Linguistic Diversity in Education’ that investigates how multilingualism can be used as a resource for educational success and social well-being in Luxembourg. Research projects in preschool, Year 1 and Year 2 classes show that teachers have begun to draw on children’s semiotic repertoires (Kirsch 2017, Kirsch and Bes 2017). The present doctoral research project aims to understand the ways in which and the extent to which, first, Year 4 and Year 5 teachers in three schools address linguistic diversity and, second, children draw on their language repertoire to learn. The focus lies on the translanguaging practices of teachers and children. Translanguaging is a pillar of multilingual pedagogies which promote social equity and build on socio-constructivist learning theories (García & Li Wei 2014). The education system in Luxembourg is trilingual in Luxembourgish, German and French. The curriculum is based on monoglossic ideologies and a compartmentalised view of language teaching (De Korne 2012). The system is particularly challenging for the 63.5 percent of primary school children who do not speak Luxembourgish as a first language and underachieve compared to the Luxembourgish-speakers (Menje 2017). This paper draws its data from six days of observations and video-recordings of learning activities in seven French, eight Mathematics and two Arts lessons from September 2017 to January 2018 in one school characterised by the diversity of its intake and the high SES of the families. The data collection is still on-going. The participants are the two teachers of the Year 4 class and three focus children of Slovenian, French and Icelandic background. The thematic analysis focuses on the type of learning activities, the school subjects, the speech acts, the language use, and the pedagogical use of translanguaging. The preliminary findings show that almost all learning activities are teacher-led and that interactions are based on initiation-response-feedback sequences. The teachers systematically translanguage between a target language and the other curricula languages to scaffold learning, build relationships and manage the classroom. Both teachers and children create a specific space for German which is highly unusual in Luxembourg. The children rarely draw on their home languages unless these are the three languages of the country. While translanguaging is frequently used as a scaffold, it is neither transformative nor does it contribute to raising equal opportunities (García & Kleyn 2016). [less ▲]

Detailed reference viewed: 34 (19 UL)
Peer Reviewed
See detailInclusive multilingual pedagogies in a preschool in Luxembourg
Mortini, Simone UL

Scientific Conference (2018, September 04)

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailOntology Coverage Tool and Document Browser for Learning Material Exploration
Grevisse, Christian UL; Meder, Jeff Alphonse Antoine UL; Botev, Jean UL et al

in 2018 Thirteenth International Conference on Digital Information Management (ICDIM) (2018, September)

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and ... [more ▼]

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and semantic information. Implicit links between documents are hardly understood without a proper visualization. On the other hand, it is difficult for teachers to keep track of the topics covered by a large collection. In this paper, we present an ontology coverage tool and document browser for learning material exploration. Both learners and teachers can benefit from a visualization of an ontology and the documents related to the comprised concepts, overcoming the limitations of traditional file explorers. Guiding users through a visual query process, learners can quickly pinpoint relevant learning material. The visualization, which has been implemented as a web application using the D3.js JavaScript library, can be integrated into different e-learning applications to further enhance the workflow of learners. Finally, teachers are provided an overview of topic coverage within the collection. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 64 (19 UL)
Full Text
Peer Reviewed
See detailInformation Content of Systematic Risk Disclosure
Weber, Véronique UL; Muessig, Anke UL

Scientific Conference (2018, September)

We analyse the relation between systematic risk disclosure, which is the description of a company’s exposure to systematic risk factors and its influence on investors’ risk perception for a sample of UK ... [more ▼]

We analyse the relation between systematic risk disclosure, which is the description of a company’s exposure to systematic risk factors and its influence on investors’ risk perception for a sample of UK listed firms from 2017 to 2015. Our results show that investors react to the systematic component of risk exposure description in the annual report; the information is incorporate into the capital market. For annual reports of financial years ending in 2013 or after, the relation between systematic risk disclosure and investors’ risk perception is negative compared to a positive relation for the annual reports ending before 2013. The mandatory strategic report introduced in 2013, in which firms are required to describe their risk exposure, seems to foster more timely description of risks and uncertainties. Therefore, firms tend to solely update the risk information in their annual reports in subsequent years and thus they resolve known risk factors rather than introducing new ones. [less ▲]

Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 77 (12 UL)
Full Text
Peer Reviewed
See detailRisk disclosure and analyst following: a study of French listed firms
Derouiche, Imen UL; Muessig, Anke UL; Weber, Véronique UL

Scientific Conference (2018, September)

In this study, we analyse the association between risk disclosure and analyst following for a sample of non-financial French listed firms from 2007 to 2015. We identify the number of sentences, the risk ... [more ▼]

In this study, we analyse the association between risk disclosure and analyst following for a sample of non-financial French listed firms from 2007 to 2015. We identify the number of sentences, the risk words, the risk related sentences, and the risk factors as risk disclosure quantity. Company-specific risk factors, industry-specific risk factors, numeric intensity, the degree of similarity, and the degree of boilerplate measure risk disclosure quality. On the aggregated level, the quantity of risk information provided is not significantly associated with analyst following. For the quality, results show that the quality of risk disclosure is an important determinant of analysts’ decision to follow a firm. The higher the quality, expressed as less similar language and more revised information, the more likely it is that analysts follow the firm. From a theoretical perspective, this suggests that analysts are information intermediaries and not information providers. On the non-aggregated level, for the individual quantity measures, the results are ambiguous. For the individual quality measures, results on the aggregated level are confirmed. [less ▲]

Full Text
Peer Reviewed
See detailA Closer Look at Real-World Patches
Liu, Kui UL; Kim, Dongsun UL; Koyuncu, Anil UL et al

Scientific Conference (2018, September)

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown ... [more ▼]

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown that the state-of-the-art techniques in automated repair tend to generate patches only for a small number of bugs even with quality issues (e.g., incorrect behavior and nonsensical changes). To improve automated program repair (APR) techniques, the community should deepen its knowledge on repair actions from real-world patches since most of the techniques rely on patches written by human developers. Previous investigations on real-world patches are limited to statement level that is not sufficiently fine-grained to build this knowledge. In this work, we contribute to building this knowledge via a systematic and fine-grained study of 16,450 bug fix commits from seven Java open-source projects. We find that there are opportunities for APR techniques to improve their effectiveness by looking at code elements that have not yet been investigated. We also discuss nine insights into tuning automated repair tools. For example, a small number of statement and expression types are recurrently impacted by real-world patches, and expression-level granularity could reduce search space of finding fix ingredients, where previous studies never explored. [less ▲]

Detailed reference viewed: 23 (7 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 146 (23 UL)
See detailDie Vorhersage von Selbstkontrolle durch Need for Cognition. Generalisierbarkeit und Erklärungsansätze
Grass, Julia; Krieger, Florian UL; Paulus, P. et al

Scientific Conference (2018, September)

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailHybrid MPI+OpenMP Implementation of eXtended Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

in Proc. of the 9th Workshop on Applications for Multi-Core Architectures (WAMCA'18), part of 30th Intl. Symp. on Computer Architecture and High Performance Computing (SBAC-PAD 2018) (2018, September)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material), by additional properties such as the chemical composition, thermodynamic state, stress/strain for each particle. It has been applied successfully to numerous industries involving the processing of granular materials such as sand, rock, wood or coke [16], [17]. In this context, computational simulation with (X)DEM has become a more and more essential tool for researchers and scientific engineers to set up and explore their experimental processes. However, increasing the size or the accuracy of a model requires the use of High Performance Computing (HPC) platforms over a parallelized implementation to accommodate the growing needs in terms of memory and computation time. In practice, such a parallelization is traditionally obtained using either MPI (distributed memory computing), OpenMP (shared memory computing) or hybrid approaches combining both of them. In this paper, we present the results of our effort to implement an OpenMP version of XDEM allowing hybrid MPI+OpenMP simulations (XDEM being already parallelized with MPI). Far from the basic OpenMP paradigm and recommendations (which simply summarizes by decorating the main computation loops with a set of OpenMP pragma), the OpenMP parallelization of XDEM required a fundamental code re-factoring and careful tuning in order to reach good performance. There are two main reasons for those difficulties. Firstly, XDEM is a legacy code devel- oped for more than 10 years, initially focused on accuracy rather than performance. Secondly, the particles in a DEM simulation are highly dynamic: they can be added, deleted and interaction relations can change at any timestep of the simulation. Thus this article details the multiple layers of optimization applied, such as a deep data structure profiling and reorganization, the usage of fast multithreaded memory allocators and of advanced process/thread-to-core pinning techniques. Experimental results evaluate the benefit of each optimization individually and validate the implementation using a real-world application executed on the HPC platform of the University of Luxembourg. Finally, we present our Hybrid MPI+OpenMP results with a 15%-20% performance gain and how it overcomes scalability limits (by increasing the number of compute cores without dropping of performances) of XDEM-based pure MPI simulations. [less ▲]

Detailed reference viewed: 34 (6 UL)
Full Text
See detailAn equation-free, nested, concurrent multiscale approach without scale-separation
Beex, Lars UL; Kerfriden, Pierre

Scientific Conference (2018, September)

Detailed reference viewed: 30 (0 UL)
See detailProblem solving and its role in large-scale assessments. Transversal skills in educational research
Greiff, Samuel UL

Scientific Conference (2018, September)

Detailed reference viewed: 10 (2 UL)
Full Text
Peer Reviewed
See detailA Temporal Model for Interactive Diagnosis of Adaptive Systems
Mouline, Ludovic UL; Benelallam, Amine; Fouquet, François UL et al

in Mouline, Ludovic; Benelallam, Amine; Fouquet, François (Eds.) et al 2018 IEEE International Conference on Autonomic Computing (ICAC) (2018, September)

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or ... [more ▼]

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or suboptimal system states. Developers thus need diagnosis support that trace system states to the previous circumstances –targeted requirements, input context– that had resulted in these decisions. However, the lack of efficient temporal representation limits the tracing ability of current approaches. To tackle this problem, we first propose a knowledge formalism to define the concept of a decision. Second, we describe a novel temporal data model to represent, store and query decisions as well as their relationship with the knowledge (context, requirements, and actions). We validate our approach through a use case based on the smart grid at Luxembourg. We also demonstrate its scalability both in terms of execution time and consumed memory. [less ▲]

Detailed reference viewed: 15 (3 UL)
Full Text
Peer Reviewed
See detailOn the impact of tokenizer and parameters on N-gram based Code Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

Scientific Conference (2018, September)

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However ... [more ▼]

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However, such models require the appropriate set of numerous parameters. Moreover, the different ways one can read code essentially yield different models (based on the different sequences of tokens). In this paper, we focus on n- gram models and evaluate how the use of tokenizers, smoothing, unknown threshold and n values impact the predicting ability of these models. Thus, we compare the use of multiple tokenizers and sets of different parameters (smoothing, unknown threshold and n values) with the aim of identifying the most appropriate combinations. Our results show that the Modified Kneser-Ney smoothing technique performs best, while n values are depended on the choice of the tokenizer, with values 4 or 5 offering a good trade-off between entropy and computation time. Interestingly, we find that tokenizers treating the code as simple text are the most robust ones. Finally, we demonstrate that the differences between the tokenizers are of practical importance and have the potential of changing the conclusions of a given experiment. [less ▲]

Detailed reference viewed: 68 (7 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 98 (13 UL)
Full Text
Peer Reviewed
See detailSymbol-Level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata 25-28 June 2018 (2018, August 27)

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the ... [more ▼]

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the distance preserving constructive interference regions (DPCIR) are always polyhedral angles (shifted pointed cones) for any given constellation point with unbounded decision region. Then we prove that any signal in a given unbounded DPCIR has a norm larger than the norm of the corresponding vertex if and only if the convex hull of the constellation contains the origin. Using these properties, we show that the power of the noiseless received signal lying on an unbounded DPCIR is an strictly increasing function of two parameters. This allows us to reformulate the originally non-convex SLP max-min SINR as a convex optimization problem. We discuss the loss due to our proposed convex reformulation and provide some simulation results. [less ▲]

Detailed reference viewed: 28 (10 UL)
Full Text
Peer Reviewed
See detailCategories of coalgebras for modal extensions of Łukasiewicz logic
Teheux, Bruno UL; Kurz, Alexander

Scientific Conference (2018, August 27)

The category of complete and completely distributive Boolean algebras with complete operators is dual to the category of frames. We lift this duality to the category of complete and completely ... [more ▼]

The category of complete and completely distributive Boolean algebras with complete operators is dual to the category of frames. We lift this duality to the category of complete and completely distributive MV-algebras with complete operators. [less ▲]

Detailed reference viewed: 13 (1 UL)
See detailFrom the Dustbin of History: Rethinking the History of Amateur Media in a Historical Conversation
Aasman, Susan; van der Heijden, Tim UL; Slootweg, Tom

Scientific Conference (2018, August 23)

“Amateurs of one era are not the amateurs of another, even when a continuous tradition exists to connect them”, is an intriguing statement made by Lisa Gitelman (2014). Overall, Gitelman’s answer would ... [more ▼]

“Amateurs of one era are not the amateurs of another, even when a continuous tradition exists to connect them”, is an intriguing statement made by Lisa Gitelman (2014). Overall, Gitelman’s answer would favor a certain level of complexity as to avoid ‘sloppy media history’ even when a continuous tradition exists to connect them (137). Rather, we should explore how amateur filmmakers ‘doing and its do-ability’ can differ as they are situated in broader historical contexts. Building on this idea of a complex and dynamic history, that consists of a diversity of histories, we propose to start a semi-structured conversation between three experts in amateur media and between the experts and the audience. We seek to follow traces that connect or disconnect the various discourses and practices in amateur media history in which amateurism encountered predictions, hopes, and tried out appropriations of amateur media technologies as an alternative/marginal media space. The set of related concepts that will be deployed through time and in relation to different historical contexts are: marginality, democratization, resistance, alternative, avant-garde, subversive and experimental. By comparing, contrasting and evaluating these set of concepts we hope to add to the overall goal of the conference to open up a space to rethink historiography. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailWhen the exception becomes the rule … When the margins become the center …
Schafer, Valerie UL

Scientific Conference (2018, August 23)

This contribution invited participants of the Summer school to critically reflect upon centers and peripheries in Internet history, not only from a geographical perspective , but also from a narrative ... [more ▼]

This contribution invited participants of the Summer school to critically reflect upon centers and peripheries in Internet history, not only from a geographical perspective , but also from a narrative standpoint [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailKnowledge Discovery Approach from Blockchain, Crypto-currencies, and Financial Stock Exchanges
Lagraa, Sofiane UL; Charlier, Jérémy Henri J. UL; State, Radu UL

Poster (2018, August 20)

Last few years have witnessed a steady growth in interest on crypto-currencies and blockchains. They are receiving considerable interest from industry and the research community, the most popular one ... [more ▼]

Last few years have witnessed a steady growth in interest on crypto-currencies and blockchains. They are receiving considerable interest from industry and the research community, the most popular one being Bitcoin. However, these crypto-currencies are so far relatively poorly analyzed and investigated. Recently, many solutions, mostly based on ad-hoc engineered solutions, are being developed to discover relevant analysis from crypto-currencies, but are not sufficient to understand behind crypto-currencies. In this paper, we provide a deep analysis of crypto-currencies by proposing a new knowledge discovery approach for each crypto-currency, across crypto-currencies, blockchains, and financial stocks. The novel approach is based on a conjoint use of data mining algorithms on imbalanced time series. It automatically reports co-variation dependency patterns of the time series. The experiments on the public crypto-currencies and financial stocks markets data also demonstrate the usefulness of the approach by discovering the different relationships across multiple time series sources and insights correlations behind crypto-currencies. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
See detailA Dynamic Associative Memory for Distant Reading
Kamlovskaya, Ekaterina UL; Schommer, Christoph UL; Sirajzade, Joshgun UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 26 (4 UL)
Full Text
See detailMind and Language. AI in an Example of Similar Patterns of Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 12 (0 UL)
Peer Reviewed
See detailTapping the Potential of Diverse Founding Teams for Firm Growth: The Role of New Venture Activities
Tryba, Anne UL; Patzelt, Holger; Breugst, Nicola

Scientific Conference (2018, August)

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailAutomated Extraction of Semantic Legal Metadata Using Natural Language Processing
Sleimi, Amin UL; Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL et al

in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal ... [more ▼]

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal requirements. [Objectives] Our work is motivated by two observations: (1) The existing requirements engineering (RE) literature does not provide a harmonized view on the semantic metadata types that are useful for legal requirements analysis. (2) Automated support for the extraction of semantic legal metadata is scarce, and further does not exploit the full potential of natural language processing (NLP). Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the semantic legal metadata types proposed in RE. Subsequently, we conduct a qualitative study aimed at investigating how the identified metadata types can be extracted automatically. [Results and Conclusions] We propose (1) a harmonized conceptual model for the semantic metadata types pertinent to legal requirements analysis, and (2) automated extraction rules for these metadata types based on NLP. We evaluate the extraction rules through a case study. Our results indicate that the rules generate metadata annotations with high accuracy. [less ▲]

Detailed reference viewed: 108 (10 UL)