References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailIntegration of Learning Material into an Advanced Project-Based Learning Support Platform
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in INTED2017 Proceedings (in press)

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time ... [more ▼]

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time-intensive task, reusability in different contexts is desirable. In this paper, we propose to move from a material-centric to a student-centric approach, integrating learning material in an advanced project-based learning support platform. Our ecosystem, relying on semantic web technologies, comprises plugins for common authoring and project realization tools. [less ▲]

Detailed reference viewed: 31 (8 UL)
Full Text
Peer Reviewed
See detailA Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications
Jan, Sadeeq UL; Nguyen, Duy Cu UL; Andrea, Arcuri UL et al

in 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017 (in press)

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to ... [more ▼]

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection attacks that target SOAP communications. In this paper, we present a novel, search-based approach used to generate test data for a web application in an attempt to deliver malicious XML messages to web services. <br />Our goal is thus to detect XML injection vulnerabilities in web applications. The proposed approach is evaluated on two studies, including an industrial web application with millions of users. Results show that we are able to effectively generate test data (e.g., input values in an HTML form) that detect such vulnerabilities. [less ▲]

Detailed reference viewed: 159 (16 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

Scientific Conference (in press)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailIncroci autobiografici nel Lussemburgo antifascista
Levi, Fabio; Barenghi, Mario; Cuoghi, Sibilla et al

in Malvetti, Massimo, Neri, Francesco (Ed.) Primo Levi et la chimie des mots (in press)

Detailed reference viewed: 50 (10 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 108 (5 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 85 (9 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 32 (3 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 36 (9 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 50 (3 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 211 (3 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 66 (6 UL)
Full Text
Peer Reviewed
See detailAn Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application
Almasi, Moein; Hemmati, Hadi; Fraser, Gordon et al

in International Conference on Software Engineering (ICSE) (in press)

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at ... [more ▼]

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at detecting faults, but how effective and applicable are they in an industrial application? In this paper, we investigate this question using a life insurance and pension products calculator engine owned by SEB Life & Pension Holding AB Riga Branch. To study fault-finding effectiveness, we extracted 25 real faults from the version history of this software project, and applied two up-to-date unit test generation tools for Java, EvoSuite and Randoop, which implement search-based and feedback-directed random test generation, respectively. Automatically generated test suites detected up to 56.40% (EvoSuite) and 38.00% (Randoop) of these faults. The analysis of our results demonstrates challenges that need to be addressed in order to improve fault detection in test generation tools. In particular, classification of the undetected faults shows that 97.62% of them depend on either “specific primitive values” (50.00%) or the construction of “complex state configuration of objects” (47.62%). To study applicability, we surveyed the developers of the application under test on their experience and opinions about the test generation tools and the generated test cases. This leads to insights on requirements for academic prototypes for successful technology transfer from academic research to industrial practice, such as a need to integrate with popular build tools, and to improve the readability of the generated tests. [less ▲]

Detailed reference viewed: 162 (3 UL)
Full Text
Peer Reviewed
See detailPrivate API Access and Functional Mocking in Automated Unit Test Generation
Arcuri, Andrea UL; Fraser, Gordon; Just, Rene

in Private API Access and Functional Mocking in Automated Unit Test Generation (in press)

Detailed reference viewed: 29 (3 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 38 (3 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 72 (7 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailCustomary international law in the legal order of the European Union
Neframi, Eleftheria UL

in Lopez Escudero, Manuel (Ed.) THE EUROPEAN UNION'S EXTERNAL ACTION IN TIME OF CRISIS (in press)

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the ... [more ▼]

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the exercise of competences with the view to attain an ultimate, constitutional objective of being a credible actor in the international scene. [less ▲]

Detailed reference viewed: 87 (14 UL)
Full Text
See detailMultiscale Modelling of Damage and Fracture in Discrete Materials Using a Variational Quasicontinuum Method
Rokos, Ondrej; Peerlings, Ron; Beex, Lars UL et al

Scientific Conference (2017, September 05)

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 16 (3 UL)
Peer Reviewed
See detailDiscussant
Greiff, Samuel UL

Scientific Conference (2017, August)

Detailed reference viewed: 9 (1 UL)
Full Text
See detaileXtended Variational Quasicontinuum Methodology for Modelling of Crack Propagation in Discrete Lattice Systems
Rokos, Ondrej; Peerlings, Ron; Zeman, Jan et al

Scientific Conference (2017, July 17)

Detailed reference viewed: 2 (0 UL)
Full Text
See detailAn equation-free multiscale method: a result of extending the quasicontinuum method to irregular structures
Beex, Lars UL; Kerfriden, Pierre

Scientific Conference (2017, July 16)

Detailed reference viewed: 3 (0 UL)
Peer Reviewed
See detailTo use or not to use? Investigating the validity argument for the use of short scales in research settings
Kemper, Christoph UL; Becker, N.; Baudson, T. G. et al

Scientific Conference (2017, July)

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial?
Vu, Xuan Thang UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in Abstract book of 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2017, July)

Detailed reference viewed: 8 (2 UL)
Peer Reviewed
See detailProfiles of students on account of complex problem solving strategies
Gnaldi, M.; Bacci, S.; Greiff, Samuel UL et al

Scientific Conference (2017, July)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailPower Allocation for In-Band Full-Duplex Self-Backhauling
Lagunas, Eva UL; Lei, Lei UL; Maleki, Sina UL et al

in International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017 (2017, July)

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailSpatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink
Spano, Danilo UL; Alodeh, Maha UL; Chatzinotas, Symeon UL et al

in IEEE SPAWC 2017 (2017, July)

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the ... [more ▼]

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the constructive interference effect, the proposed scheme aims at improving the robustness of the transmitted signals to the non-linear distortions of practical satellite systems. This is done by reducing the imbalances between the instantaneous power transmitted by the multiple antennas, which are detrimental in non-linear systems. More specifically, this work proposes a symbol-level precoding scheme performing the minimization of the spatial peak-to-average power ratio, under Quality-of-Service constraints. An iterative algorithm is proposed to solve the related optimization problem. Numerical results are presented to assess the performance of the proposed scheme, which outperforms the state of the art symbol-level precoding techniques in terms of spatial peak-to-average power ratio across the transmitting antennas. [less ▲]

Detailed reference viewed: 17 (7 UL)
Full Text
See detailAn Enriched Quasi-Continuum Approach to Crack Propagation in Discrete Lattices
Rokos, Ondrej; Peerlings, Ron; Zeman, Jan et al

Scientific Conference (2017, June 14)

Detailed reference viewed: 5 (0 UL)
Full Text
See detailAn equation-free multiscale method applied to discrete networks
Beex, Lars UL; Kerfriden, Pierre

Scientific Conference (2017, June 06)

Detailed reference viewed: 2 (0 UL)
Full Text
Peer Reviewed
See detailRelay Selection and Transceiver Design for Joint Wireless Information and Energy Transfer in Cooperative Networks
Gautam, Sumit UL; P, Ubaidulla

Scientific Conference (2017, June 04)

In this paper, we consider optimal transceiver design and relay selection for simultaneous transfer of data and energy in a cooperative network consisting of amplify-and-forward (AF) relays. In this ... [more ▼]

In this paper, we consider optimal transceiver design and relay selection for simultaneous transfer of data and energy in a cooperative network consisting of amplify-and-forward (AF) relays. In this context, we address two different problems and propose optimal relay selection and transceiver processing. Furthermore, the problems are formulated for both time switching (TS) and power splitting (PS) schemes. The first problem is the maximization of overall rate while ensuring a minimum harvested energy at the receiver. For this problem, we perform computations of optimal fractions to distribute the received signal corresponding to TS and PS schemes, the relay weighing coefficients, and optimal relay selection. In the second problem, optimal resource allocation for maximizing the overall harvested energy at the user under constraints on the minimum achievable rate has been formulated. For this problem, we propose a suitable solution to meet the requirements for both TS and PS. For both the problems, we obtain a closed form solution. Finally, the performance of proposed design under various operating conditions and parameter values are illustrated with a comparison between TS and PS schemes. [less ▲]

Detailed reference viewed: 30 (9 UL)
Full Text
Peer Reviewed
See detailExperience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering
Garousi, Vahid UL; Felderer, Michael

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June)

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction ... [more ▼]

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction is one of the main phases (activities) when conducting an SM or an SLR, whose objective is to extract required data from the primary studies and to accurately record the information researchers need to answer the questions of the SM/SLR study. Based on experience in a large number of SM/SLR studies, we and many other researchers have found the data extraction in SLRs to be time consuming and error-prone, thus raising the real need for heuristics and guidelines for effective and efficient data extraction in these studies, especially to be learnt by junior and young researchers. As a ‘guideline’ paper, this paper contributes a synthesized list of challenges usually faced during SLRs’ data extraction phase and the corresponding solutions (guidelines). For our synthesis, we consider two data sources: (1) the pool of 16 SLR studies in which the authors have been involved in, as well as (2) a review of challenges and guidelines in the existing literature. Our experience in utilizing the presented guidelines in the near past have helped our junior colleagues to conduct data extractions more effectively and efficiently. [less ▲]

Detailed reference viewed: 30 (2 UL)
Peer Reviewed
See detailProfiles of students on account of complex problem solving strategies exploited via log-data
Gnaldi, M.; Bacci, S.; Greiff, Samuel UL et al

Scientific Conference (2017, June)

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailSpectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band
Artiga, Xavier; Vázquez, Miguel Ángel; Pérez-Neira, Ana et al

in European Conference on Networks and Communications (EuCNC), June 2017 (2017, June)

Detailed reference viewed: 3 (0 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL et al

in International Conference on Software Engineering (ICSE 2017) (2017, May 28)

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage ... [more ▼]

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and fault-revelation remains unknown, yielding uncertainty and controversy. Most previous studies rely on the Clean Program Assumption, that a test suite will obtain similar coverage for both faulty and fixed (‘clean’) program versions. This assumption may appear intuitive, especially for bugs that denote small semantic deviations. However, we present evidence that the Clean Program Assumption does not always hold, thereby raising a critical threat to the validity of previous results. We then conducted a study using a robust experimental methodology that avoids this threat to validity, from which our primary finding is that strong mutation testing has the highest fault revelation of four widely-used criteria. Our findings also revealed that fault revelation starts to increase significantly only once relatively high levels of coverage are attained. [less ▲]

Detailed reference viewed: 82 (9 UL)
Full Text
See detailParentalité en situation vulnérable: trajectoires de résilience familiale?
Dujardin, Céline UL

Poster (2017, May 19)

Le domaine de la protection de la jeunesse porte sur la prise en charge de situations familiales de vulnérabilité qui peuvent engendrer des impacts négatifs sur le développement de l'enfant. A l'inverse ... [more ▼]

Le domaine de la protection de la jeunesse porte sur la prise en charge de situations familiales de vulnérabilité qui peuvent engendrer des impacts négatifs sur le développement de l'enfant. A l'inverse, la notion de résilience permet la perspective sur une trajectoire familiale qui compense le danger pour le développement de l'enfant et le fonctionnement familial. La thèse est développée dans le but d'offrir un cadre de réflexion aux réponses élaborées aussi bien par les services d'aides que par les familles elles-mêmes face aux difficultés rencontrées, tenant compte des particularités liées au contexte luxembourgeois. [less ▲]

Detailed reference viewed: 13 (6 UL)
Full Text
Peer Reviewed
See detailRule Compilation in Multi-Tenant Networks
Blaiech, Khalil; Hamadi, Salaheddine; Hommes, Stefan UL et al

in Rule Compilation in Multi-Tenant Networks (2017, May 18)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailHigh Frequency Acoustic Scattering in Isogeometric Analysis
Khajah, Tahsin; Antoine, Xavier; Bordas, Stéphane UL

Scientific Conference (2017, May 15)

There is an emerging need to perform high frequency scattering analysis on high-fidelity models. Conventional Finite Element analysis suffers from irretrievable loss of the boundary accuracy as well as ... [more ▼]

There is an emerging need to perform high frequency scattering analysis on high-fidelity models. Conventional Finite Element analysis suffers from irretrievable loss of the boundary accuracy as well as pollution error. Man-made geometries can be represented exactly in Isogeometric Analysis (IGA) with no geometrical loss even with very coarse mesh. The aim of this paper is to analyze the accuracy of IGA for exterior acoustic scattering problems. The numerical results show extremely low pollution error even for very high frequencies. [less ▲]

Detailed reference viewed: 79 (2 UL)
Full Text
Peer Reviewed
See detailA PetriNet Mechanism for OLAP in NUMA
Dominico, Simone; Almeida, Eduardo Cunha de; Meira, Jorge Augusto UL

Poster (2017, May 15)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailInnovations and sales growth in new ventures: The mediating effect of growth intention
Gundolf, Katherine; Geraudel, Mickaël UL; Cesinger, Beate

Scientific Conference (2017, May 11)

While the direct impact of innovation on growth has been examined in entrepreneurship literature, the underlying channels of influence have remained largely unexplored. This article draws upon Behavioral ... [more ▼]

While the direct impact of innovation on growth has been examined in entrepreneurship literature, the underlying channels of influence have remained largely unexplored. This article draws upon Behavioral Reasoning Theory to examine whether growth intention is the pathway through which product, process and organizational innovations influence venture growth or not. Results from the analysis of a dataset of 20,472 French new ventures reveal that: (1) product, process and organizational innovations have a positive impact on sales revenue growth; (2) growth intention has a positive impact on sales revenue growth; and (3) growth intention mediates the effects of product and organizational innovations on sales revenue growth. These findings have implications for a more balanced and nuanced view on how innovations impact new venture growth. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
See detailLuxemburg und der Studiengang der Sozialen Arbeit
Böwen, Petra UL; Dujardin, Céline UL; Straus, Liz UL

Poster (2017, May 10)

Detailed reference viewed: 8 (1 UL)
Peer Reviewed
See detailWhat Happens Next? Language Learning Trajectory of an Iraqi Asylum Seeker in Luxembourg
Kalocsanyiova, Erika UL

Scientific Conference (2017, May 05)

The Grand Duchy of Luxembourg is often portrayed as a country of immigration. Official government policies continually draw upon the rhetoric of trilingualism to support claims about the country’s ... [more ▼]

The Grand Duchy of Luxembourg is often portrayed as a country of immigration. Official government policies continually draw upon the rhetoric of trilingualism to support claims about the country’s openness and multicultural spirit. This, along with the recognition of three languages – Luxembourgish, German and French – is expected to facilitate the integration of foreign nationals. It is claimed no Luxembourger is monolingual: moving fluidly back and forth between a multitude of languages is a communication method in its own right and members of the local society are believed to excel in it. Despite widespread acceptance and favourable attitudes towards multilingualism, language resources outside the recognised trilingual model have ambiguous statuses. As a result, broader societal multilingualism is perceived as problematic in numerous instances (Horner & Weber, 2008; Horner, 2015). In present-day language ideological debates, the strong presence of foreigners tends to be perceived as a threat to the established language regime and particularly to the position of the Luxembourgish language. The role of Luxembourgish as “language of integration” has been increasingly emphasised, although it is the one resource new arrivals are least likely to have in their communicative repertoires (de Bres, 2014). The often conflicting nationalist and multilingual language ideologies give rise to ambivalent messages as to what languages and what identities should be offered to newcomers, among them to the refugees who have sought international protection in Luxembourg. This contribution offers detailed insights into the linguistic integration trajectory of an Iraqi asylum seeker who arrived to Luxembourg in the summer of 2015. Our aim is to explore how his language resources are being compiled, enhanced and discarded in the course of the integration process, i.e. the reorganisation of his communicative repertoire. As integration seldom starts from scratch, first we report on language resources the research participant accumulated prior to his arrival to Luxembourg. These are being discussed in the context of his educational and professional experiences and future life-projects. Secondly, we examine his language learning trajectory bearing in mind the competing linguistic ideologies and practices refugees are required to adjust in their daily efforts to integrate in Luxembourg. Thirdly, we offer examples of the language practices he engaged in. These demonstrate how he responded to multilingual social settings in both language use and attitudes towards the languages and identities offered. Furthermore, they provide clues about what language resources have become part of his complex repertoire. Blommaert and Backus (2013) described language learning as a “process of growth” drawing attention to the fact that repertoires do not develop in linear fashion, but “explosively in some phases of life and gradually in some others”. Our data suggest that the process of repertoire-building is highly dynamic during this transition period. The research participant’s deliberate use of newly-acquired language resources, without regard to how well he knows the languages involved, indicates new forms of linguistic identification. These include fluid multilingual practices, which are considered to be expressions of his new emerging identity. This contribution presents data from an ongoing linguistic ethnographic research (obtained through interviews, classroom observations and shadowing) and will include a discussion about the challenges brought by working with vulnerable research participants and the need to research multilingually. [less ▲]

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailThe Effects of Sexualized Violence in Video Games on Rape Myth Acceptance
Fernandez de Henestrosa, Martha UL; Melzer, André UL

Scientific Conference (2017, May)

Previous research has tested the effects of video games on players’ Rape Myth Acceptance (RMA) with regard to either sexual or violent contents. The current study aimed at investigating the combined ... [more ▼]

Previous research has tested the effects of video games on players’ Rape Myth Acceptance (RMA) with regard to either sexual or violent contents. The current study aimed at investigating the combined effects of sexual and violent material in video games on players’ RMA. Participants (N = 82) played either a sexualized female game character or a non-sexualized female game character in a violent video game. Participants’ pre-gaming RMA, gender role attitudes and gaming habits were found to predict RMA after the gaming episode, but sexualized game violence did not. Furthermore, no gender differences were found with regard to RMA. The present findings corroborate the important role of pre-existing gender attitudes for the concept of RMA. In addition, future research should also focus on long-term exposure to video games and players’ gaming habits when examining the effects of sexualized violence in video games on RMA. [less ▲]

Detailed reference viewed: 115 (7 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Maleki, Sina UL; Lei, Lei UL et al

in ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017 (2017, May)

Detailed reference viewed: 23 (4 UL)
Full Text
Peer Reviewed
See detailSearch-driven String Constraint Solving for Vulnerability Detection
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world ... [more ▼]

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world programs typically contain complex string operations that challenge vulnerability detection. State-of-the-art string constraint solvers support only a limited set of string operations and fail when they encounter an unsupported one; this leads to limited effectiveness in finding vulnerabilities. In this paper we propose a search-driven constraint solving technique that complements the support for complex string operations provided by any existing string constraint solver. Our technique uses a hybrid constraint solving procedure based on the Ant Colony Optimization meta-heuristic. The idea is to execute it as a fallback mechanism, only when a solver encounters a constraint containing an operation that it does not support. We have implemented the proposed search-driven constraint solving technique in the ACO-Solver tool, which we have evaluated in the context of injection and XSS vulnerability detection for Java Web applications. We have assessed the benefits and costs of combining the proposed technique with two state-of-the-art constraint solvers (Z3-str2 and CVC4). The experimental results, based on a benchmark with 104 constraints derived from nine realistic Web applications, show that our approach, when combined in a state-of-the-art solver, significantly improves the number of detected vulnerabilities (from 4.7% to 71.9% for Z3-str2, from 85.9% to 100.0% for CVC4), and solves several cases on which the solver fails when used stand-alone (46 more solved cases for Z3-str2, and 11 more for CVC4), while still keeping the execution time affordable in practice. [less ▲]

Detailed reference viewed: 504 (54 UL)
Full Text
Peer Reviewed
See detailA Guided Genetic Algorithm for Automated Crash Reproduction
Soltani, Mozhan; Panichella, Annibale UL; van Deursen, Arie

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution ... [more ▼]

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution, mutation analysis, and directed model checking as underling techniques for post-failure analysis of crash stack traces. However, existing approaches still cannot reproduce many real-world crashes due to such limitations as environment dependencies, path explosion, and time complexity. To address these challenges, we present EvoCrash, a post-failure approach which uses a novel Guided Genetic Algorithm (GGA) to cope with the large search space characterizing real-world software programs. Our empirical study on three open-source systems shows that EvoCrash can replicate 41 (82%) of real-world crashes, 34 (89%) of which are useful reproductions for debugging purposes, outperforming the state-of-the-art in crash replication. [less ▲]

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing (2017, May)

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile ... [more ▼]

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile Crowdsensing (MCS), citizens participate in the sensing process contributing data with their mobile devices such as smartphones, tablets and wearables. To be effective, MCS systems require a large number of users to contribute data. While several studies focus on developing efficient incentive mechanisms to foster user participation, data collection policies still require investigation. In this paper, we propose a novel distributed and energy-efficient framework for data collection in opportunistic MCS architectures. Opportunistic sensing systems require minimal intervention from the user side as sensing decisions are application- or device-driven. The proposed framework minimizes the cost of both sensing and reporting, while maximizing the utility of data collection and, as a result, the quality of contributed information. We evaluate performance of the framework with simulations, performed in a real urban environment and with a large number of participants. The simulation results verify cost-effectiveness of the framework and assess efficiency of the data generation process. [less ▲]

Detailed reference viewed: 65 (7 UL)
Full Text
Peer Reviewed
See detailAutomatically Locating Malicious Packages in Piggybacked Android Apps
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

in Abstract book of 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (2017, May)

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼]

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. [less ▲]

Detailed reference viewed: 109 (9 UL)
Full Text
See detailDiscrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO Radars
Hammes, Christian UL; Nijsure, Yogesh UL; Shankar, Bhavani UL et al

Scientific Conference (2017, May)

A novel Phase Center Motion (PCM) based technique for discriminating angle-Doppler signatures within Multiple-Input-Multiple-Output (MIMO) radars using Frequency Modulated Continuous Wave (FMCW) has been ... [more ▼]

A novel Phase Center Motion (PCM) based technique for discriminating angle-Doppler signatures within Multiple-Input-Multiple-Output (MIMO) radars using Frequency Modulated Continuous Wave (FMCW) has been explored in this work. The PCM technique induces angle dependent Doppler shifts in the back-scattered signal, wherein a modified Doppler post processing for FMCW leads to joint angle-Doppler processing. Specifically, we intend to design unique spatialtemporal motion of the phase center on each individual MIMO radar channel in an effort to synthesize nearly orthogonal angle- Doppler signatures. Subsequently, we also develop a MIMO radar receiver design, which would be capable of discriminating between these induced angle-Doppler signatures. The asymptotic investigation provides a Bessel function characteristic. Simulation results demonstrate a significant side-lobe suppression of 8:5 dB for an individual PCM trajectory and 7 dB over distinct PCM trajectories, in an attempt towards realization of nearly orthogonal MIMO radar channels. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailOn the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime
Vu, Xuan Thang UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE International Conference on Communications (2017, May)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun UL; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]

Detailed reference viewed: 20 (4 UL)
Full Text
Peer Reviewed
See detailThe Multi-Generation Repackaging Hypothesis
Li, Li UL; Bissyande, Tegawendé François D Assise UL; Bartel, Alexandre UL et al

Poster (2017, May)

App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately ... [more ▼]

App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately, although most research involves pairwise similarity comparison to distinguish repackaged apps from their “original” counterparts, no work has considered the threat to validity of not being able to discover the true original apps. We provide in this paper preliminary insights of an investigation into the Multi-Generation Repackaging Hypothesis: is the original in a repackaging process the outcome of a previous repackaging process? Leveraging the Androzoo dataset of over 5 million Android apps, we validate this hypothesis in the wild, calling upon the community to take this threat into account in new solutions for repackaged app detection. [less ▲]

Detailed reference viewed: 56 (7 UL)
Full Text
Peer Reviewed
See detailCost analysis of Smart Lighting Solutions for Smart Cities
Cacciatore, Giuseppe; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in IEEE International Conference on Communications (ICC), Paris, France, 2017 (2017, May)

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose ... [more ▼]

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose heuristics and devise a comparison methodology for new smart lighting solutions in next generation smart cities. The proposed smart lighting techniques make use of Internet of Things (IoT) augmented lamppost, which save energy by turning off or dimming the light according to the presence of citizens. Assessing costs and benefits in adopting the new smart lighting solutions is a pillar step for municipalities to foster real implementation. For evaluation purposes, we have developed a custom simulator which enables the deployment of lampposts in realistic urban environments. The citizens travel on foot along the streets and trigger activation of the lampposts according to the proposed heuristics. For the city of Luxembourg, the results highlight that replacing all existing lamps with LEDs and dimming light intensity according to the presence of users nearby the lampposts is convenient and provides an economical return already after the first year of deployment. [less ▲]

Detailed reference viewed: 81 (6 UL)
Full Text
Peer Reviewed
See detailSpectral-Efficient Model for Multiuser Massive MIMO: Exploiting User Velocity
Vu, Xuan Thang UL; Trinh, Anh Vu; Chatzinotas, Symeon UL et al

in IEEE international Conference on Communications (2017, May)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding Android App Piggybacking
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

Poster (2017, May)

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a ... [more ▼]

The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a large user base. Despite the fact that the literature has already presented a number of tools to detect piggybacked apps, there is still lacking a comprehensive investigation on the piggybacking processes. To fill this gap, in this work, we collect a large set of benign/piggybacked app pairs that can be taken as benchmark apps for further investigation. We manually look into these benchmark pairs for understanding the characteristics of piggybacking apps and eventually we report 20 interesting findings. We expect these findings to initiate new research directions such as practical and scalable piggybacked app detection, explainable malware detection, and malicious code location. [less ▲]

Detailed reference viewed: 71 (6 UL)
Full Text
See detailEvaluation of ERA-Interim for tropospheric delay and water vapour estimation in different climate zones using ground-based GNSS observations
Ahmed, Furqan; Hunegnaw, Addisu UL; Teferle, Felix Norman UL et al

Poster (2017, April 27)

Tropospheric delay and integrated water vapour (IWV) derived from climate reanalysis models, such as that of the European Centre for Medium-range Weather Forecasts (ECMWF) namely the ECMWF ReAnalysis ... [more ▼]

Tropospheric delay and integrated water vapour (IWV) derived from climate reanalysis models, such as that of the European Centre for Medium-range Weather Forecasts (ECMWF) namely the ECMWF ReAnalysis-Interim (ERA-Interim), are widely used in many geodetic and atmospheric applications. Therefore, it is of interest to assess the quality of these reanalysis products using available observations. Observations from Global Navigation Satellite Systems (GNSS) are, as of now, available for a period of over 2 decades and their global availability make it possible to validate the zenith total delay (ZTD) and IWV obtained from climate reanalysis models in different geographical and climatic regions. In this study, a 5-year long homogeneously reprocessed GNSS data set based on double differenced positioning strategy and containing over 400 globally distributed ground-based GNSS stations has been used as a reference to validate the ZTD estimates obtained from the ERA-Interim climate reanalysis model in 25 different climate zones. It has been studied how the difference between the ERA-Interim ZTD and the GNSS-derived ZTD varies with respect to the different climate zones as well as the topographic variations in a particular climate zone. Periodicity in the ZTD residuals in different climate zones has been analyzed. Furthermore, the variation of the ZTD differences with respect to latitude has been presented. Finally, for one GNSS station in each of the 25 climate zones, IWV derived from ERA-Interim has been compared to the IWV derived using GNSS observations. [less ▲]

Detailed reference viewed: 43 (7 UL)
Full Text
See detailA New Global Vertical Land Movement Data Set from the TIGA Combined
Hunegnaw, Addisu UL; Teferle, Felix Norman UL; Abraha, Kibrom Ebuy UL

Poster (2017, April 23)

Globally averaged sea level has been estimated from the network of tide gauges installed around the world since the 19th century. These mean sea level (MSL) records provide sea level relative to a nearby ... [more ▼]

Globally averaged sea level has been estimated from the network of tide gauges installed around the world since the 19th century. These mean sea level (MSL) records provide sea level relative to a nearby tide gauge benchmark (TGBM), which allows for the continuation of the instrumental record in time. Any changes in the benchmark levels, induced by vertical land movements (VLM) affect the MSL records and hence sea level estimates. Over the last two decades sea level has also been observed using satellite altimeters. While the satellite observations are globally more homogeneous providing a picture of sea level not confined to coastlines, they require the VLM-corrected MSL records for the bias calibration of instrumental drifts. Without this calibration altimeter instruments from different missions cannot be combined. GPS has made it possible to obtain highly accurate estimates of VLM in a geocentric reference frame for stations at or close to tide gauges. Under the umbrella of the International GNSS Service (IGS), the Tide Gauge Benchmark Monitoring (TIGA) Working Group (WG) has been established to apply the expertise of the GNSS community to solving issues related to the accuracy and reliability of the vertical component to provide estimates of VLM in a well-defined global reference frame. To achieve this objective, five TIGA Analysis Centers (TACs) contributed re-processed global GPS network solutions to TIGA, employing the latest bias models and processing strategies in accordance with the second re-processing campaign (repro2) of the IGS. These solutions include those of the British Isles continuous GNSS Facility – University of Luxembourg consortium (BLT), the German Research Centre for Geosciences (GFZ) Potsdam, the German Geodetic Research Institute (DGF) at the Technical University of Munich, Geoscience Australia (AUT) and the University of La Rochelle (ULR). In this study we present to the sea level community an evaluation of the VLM estimates from the first combined solution from the IGS TIGA WG. The TAC solutions include more than 700 stations and span the common period 1995-2014. The combined solution was computed by the TIGA Combination Centre (TCC) at the University of Luxembourg, which used the Combination and Analysis of Terrestrial Reference Frame (CATREF) software package for this purpose. This first solution forms Release 1.0 and further releases will be made available after further reprocessing campaigns. We evaluate the combined solution internally using the TAC solutions and externally using solutions from the IGS and the ITRF2008. The derived VLM estimates have undergone an initial evaluation and should be considered as the primary TIGA product for the sea level community to correct MSL records for land level changes [less ▲]

Detailed reference viewed: 55 (7 UL)
Full Text
Peer Reviewed
See detailDynamic qualitative filtering for linked (geo)visualisations: a prototype for exploring the collective memory of Instagram posts
Jones, Catherine UL; Guido, Daniele UL; Severo, Marta

Scientific Conference (2017, April 20)

This paper describes a prototype geo extension to an open source graph-based tool designed for analysing co-occurrence in large multimedia collections of historical resources. Employing an ... [more ▼]

This paper describes a prototype geo extension to an open source graph-based tool designed for analysing co-occurrence in large multimedia collections of historical resources. Employing an interdisciplinary approach, combining tools and practices from humanities and geography, we explore how it can be extended to facilitate both social and spatial enquiry. For the prototype development we use Instagram resources that reference the Via Francigena – a significant cultural route connecting Canterbury, UK and Rome, Italy. The resulting tool facilitates dynamic qualitative filtering and multilevel views to explore the social-spatial collective memory of this cultural route [less ▲]

Detailed reference viewed: 17 (1 UL)
See detailLocational and socio-economic sorting in the use of green space: Evidence from Brussels
Schindler, Mirjam UL; Le Texier, Marion UL; Caruso, Geoffrey UL

Scientific Conference (2017, April 08)

Urban green space is important for making cities sustainable. It provides environmental benefits and makes cities attractive to people. Extensive evidence exists on their benefits but is lacking in ... [more ▼]

Urban green space is important for making cities sustainable. It provides environmental benefits and makes cities attractive to people. Extensive evidence exists on their benefits but is lacking in quantifying how and whether socio-economic benefits of green space accrue to all households or only a portion depending on their socio-economic status and residential location. From urban economic theory we know that residential markets sort households by income along an urban–suburban continuum and the housing-transport-costs trade-off. This trade-off can however be dominated in the presence of exogenous central amenities (parks) or endogenous effects (high income attracting high income) and pull better-off households toward the center, adding discrepancies in accessibility to green amenities by different socio-economic groups. Tiebout's hypothesis implied that marginal benefits from localised amenities are the same for all households in a given location but empirics point to non-efficient sorting and endogenous effects (socio-economic sorting) in the demand for localised amenities in general. We address these questions based on results of a survey conducted along an urban-suburban continuum in Brussels (Belgium) in May 2016. The survey includes around 500 respondents sampled across (non-park) public space and malls to reach both users and non-users of green space and cover the variety of residential locations (good or bad provision of green / distant or far from the CBD). We analyse the role of proximity, size and quality of public green space on its use across different socio-economic attributes and residential/job places and stated willingness-to-pay and substitution possibilities with private green space. [less ▲]

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailFindel: Secure Derivative Contracts for Ethereum
Biryukov, Alex UL; Khovratovich, Dmitry UL; Tikhomirov, Sergei UL

Scientific Conference (2017, April 07)

Blockchain-based smart contracts are considered a promising technology for handling financial agreements securely. In order to realize this vision, we need a formal language to unambiguously describe ... [more ▼]

Blockchain-based smart contracts are considered a promising technology for handling financial agreements securely. In order to realize this vision, we need a formal language to unambiguously describe contract clauses. We introduce Findel -- a purely declarative financial domain-specific language (DSL) well suited for implementation in blockchain networks. We implement an Ethereum smart contract that acts as a marketplace for Findel contracts and measure the cost of its operation. We analyze challenges in modeling financial agreements in decentralized networks and outline directions for future work. [less ▲]

Detailed reference viewed: 207 (26 UL)
Full Text
Peer Reviewed
See detailUsing Selene to Verify your Vote in JCJ
Iovino, Vincenzo UL; Rial Duran, Alfredo UL; Roenne, Peter UL et al

in Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07)

Detailed reference viewed: 5 (0 UL)
Peer Reviewed
See detail"Wie Zeki zu Göhtisch kommt": Lehrerkonstruktion im Dialog
Arend, Béatrice UL; Sunnen, Patrick UL

Scientific Conference (2017, April 07)

Detailed reference viewed: 5 (1 UL)
Peer Reviewed
See detailAddressing climate change through green building in Luxembourg and Freiburg: achieving urban sustainability or business as usual?
JUNG ép. PRELLER, Bérénice UL

Scientific Conference (2017, April 07)

Grounded into critical literature on the green economy and ecological modernisation (e.g. Gibbs and Krueger 2007; Bina 2013; Whitehead 2013; Bailey and Caprotti 2014) the proposed contribution looks at ... [more ▼]

Grounded into critical literature on the green economy and ecological modernisation (e.g. Gibbs and Krueger 2007; Bina 2013; Whitehead 2013; Bailey and Caprotti 2014) the proposed contribution looks at climate policies focusing on green building in two city regions: Luxembourg (LU) and Freiburg (DE). Although they have engaged differently and at different points in time with the topic, both identify the built environment as key in reaching urban sustainability. Through the discursive analysis of policy and media documents, further contextualised with interviews of key local actors, I will inquire how far these green building policies, following their claim to be innovative and transformative, can indeed be considered to be so, further from their technological carbon-controlling dimension. I will focus specifically on the visions, rationales and justifications mobilised to show that, despite their apparently different conceptions, green building policies in both places are framed along a "sustainability (policy) fix" (While et al. 2004; Lombardi et al. 2011) prodded by the dominant socioeconomic consensus. In Luxembourg, green building is strongly articulated as a mean to pursuit the existing model of social affluence, while in Freiburg the citizen-led achievements of the 90's have been recuperated by the city administration to competitively position itself as a leader in green wealth and quality of living (Cidell 2012; Mössner 2016). I will conclude by illustrating how this materialises into concrete building projects with very similar (technological) focuses towards carbon controlling. [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

Poster (2017, April 03)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 13 (4 UL)
Full Text
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs UL; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the ... [more ▼]

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to maximize its pay- o while ensuring the desired level of integrity for the out- sourced computation. We de ne two Stackelberg games and analyze the optimal setting's sensitivity for the parameters of the model. [less ▲]

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailTopics and Research Directions for Symmetric Cryptography
Biryukov, Alex UL; Daemen, Joan; Lucks, Stefan et al

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

This is a summary of the open discussion on future research topics for symmetric cryptography chaired by Stefan Lucks. During this session participants were suggesting topics of potential future interest.

Detailed reference viewed: 20 (4 UL)
Full Text
Peer Reviewed
See detailSensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ... [more ▼]

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more concerned with their privacy in buildings, explicit sensing techniques can lead to uncomfortableness and resistance from occupants. In this paper, we adapt a sensing by proxy paradigm that monitors building status and coarse occupant activities through agglomerative clustering of indoor temperature movements. Through extensive experimentation on 86 classrooms, offices and labs in a five-story school building in western Europe, we prove that indoor temperature movements can be leveraged to infer latent information about indoor environments, especially about rooms' relative physical locations and rough type of occupant activities. Our results evidence a cost-effective approach to extending commercial building control systems and gaining extra relevant intelligence from such systems. [less ▲]

Detailed reference viewed: 59 (12 UL)
Full Text
Peer Reviewed
See detailWhen An Educational Ideology Travels: The Experience Of The New Math Reform In Luxembourg
Nadimi Amiri, Shaghayegh UL

in Mathematics Education and Life at Times of Crisis (2017, April)

Since 1958 a series of new reform programmes, known as “New Math reform” tried to fundamentally deconstruct the mathematics education of schools in the United States. This reform aimed to promote the ... [more ▼]

Since 1958 a series of new reform programmes, known as “New Math reform” tried to fundamentally deconstruct the mathematics education of schools in the United States. This reform aimed to promote the “problem-solving” abilities in students and was a means to modernise not just the school math education but also the idea of why students should learn mathematics. Later, the reform project travelled to Europe through the support of the OECD and some other international or European organisation. This paper briefly reviews the process of the adaptation of this reform project in Luxembourg during the 1960s and 1970s. The aim is to look at how the ideological background about mathematics education, and in general education, mattered in the preceding of this school reform. [less ▲]

Detailed reference viewed: 18 (9 UL)
Full Text
Peer Reviewed
See detailSummary of an Open Discussion on IoT and Lightweight Cryptography
Shamir, Adi; Biryukov, Alex UL; Perrin, Léo Paul UL

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

This is a summary of the open discussion on IoT security and regulation which took place at the Early Symmetric Crypto (ESC) seminar. Participants have identified that IoT poses critical threat to ... [more ▼]

This is a summary of the open discussion on IoT security and regulation which took place at the Early Symmetric Crypto (ESC) seminar. Participants have identified that IoT poses critical threat to security and privacy. It was agreed that government regulation and dialogue of security researchers with engineers and manufacturers is necessary in order to find proper control mechanisms. [less ▲]

Detailed reference viewed: 45 (7 UL)
Full Text
Peer Reviewed
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

in Iacobescu, Remus Ion; Malfliet, Annelies (Eds.) Proceedings of the 5th International Slag Valorisation Symposium (2017, April)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 24 (4 UL)
See detailExtending the scale of critical housing studies: Towards ‘cross-border gentrification’?
Christmann, Nathalie UL

Scientific Conference (2017, April)

Drawing upon the case of a polycentric cross-border metropolitan region in western Europe, this paper seeks to explore population mobility and housing market developments at the regional/international ... [more ▼]

Drawing upon the case of a polycentric cross-border metropolitan region in western Europe, this paper seeks to explore population mobility and housing market developments at the regional/international scale. Transnational linkages within this cross-border region intensified with the opening of the borders and the economic development of the Grand Duchy of Luxembourg as a global financial centre and a centre for European Institutions. Today about 44 per cent of employees working in Luxembourg live nearby across the Belgian, French or German border. One of the reasons is that housing prices in Luxembourg are nearly twice those in the neighbouring border regions. This increased mobility has an impact on the residents living in these areas. The research that guides this paper aims to detect perceptions of this phenomenon. Therefore principles of municipal policy, urban planning documents and the local media of three medium sized towns in the borderland are reviewed. Following a rather open research concept based on qualitative approaches (discourse analysis, grounded theory), findings reveal that locational advantages such as the proximity to Luxembourg do play a role; the perception that affordable housing is becoming increasingly critical leads to resentments that mix up with national stereotypes; while city officials report displacement due to the border-effect, they also illustrate the opportunities for regional development; at the same time property developers foster the internationalisation of urban planning. Pointing to the relational geographies that link these different places, the paper discusses the pros and cons of an umbrella concept that might be called ‘cross-border gentrification’. [less ▲]

Detailed reference viewed: 19 (0 UL)
See detailComptabiliser les crimes pour conceptualiser la violence? Le cas de la prévôté de Luxembourg (1525 et 1630)
Leuck, Jessica UL

Scientific Conference (2017, March 29)

L’historienne Laure Verdon caractérise « tout acte ou parole qui rompt le tissu social et porte atteinte à l’ordre » comme violence. De plus, le chercheur « doit s’interroger sur les formes qu’a pris la ... [more ▼]

L’historienne Laure Verdon caractérise « tout acte ou parole qui rompt le tissu social et porte atteinte à l’ordre » comme violence. De plus, le chercheur « doit s’interroger sur les formes qu’a pris la violence au fil des époques et sur le rapport que les hommes entretiennent avec elle » (Éloïse Adde, 2012). Parmi d’autres voies pour saisir cette variation historique et culturelle de la perception de la violence, nous proposons une analyse minutieuse des comptes des officiers de justice. Contrairement aux règlements, aux lois ou encore aux sources judiciaires qui expriment le fonctionnement théorique de la justice, ces comptes, de par leur caractère administratif, livrent une image réelle des crimes commis. Bien que le terme « violence » n’apparaisse jamais en tant que tel dans ces sources, les crimes et délits mentionnés dans les comptes sont considérés comme tels car ils représentent toujours une forme de violence contre le tissu social ou/et l’ordre établie. Leur présence dans ces sources et leur usage en justice permettent de projeter la conception de la violence pour une époque concrète en nous informant sur la perception quotidienne que les contemporains - surtout les justiciers - en avaient envers. En outre, la variété des cas permet de moduler cette compréhension et de proposer une lecture fine du phénomène. Conservés presque dans leur totalité pour la période de 1525 à 1630, les livres de comptes rédigés dans la prévôté de Luxembourg, une des plus grandes du duché, consistent une source primordiale pour entamer une telle recherche. [less ▲]

Detailed reference viewed: 13 (1 UL)
Peer Reviewed
See detailDigital Work and the Role of Online Platforms. The Need for an Indirect Approach
Ratti, Luca UL

Scientific Conference (2017, March 22)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA
Liu, Zhengxuan; Kang, Guixia; Lei, Lei UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), 2017 (2017, March 19)

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ ... [more ▼]

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ achievable data rate and network throughput are analysed under three transmission schemes: 1) all users’ signals are jointly transmitted by coordinated base stations (BSs); 2) only cell-edge users’ signals are jointly transmitted by coordinated BSs; 3) each user’s signals are transmitted by only one BS. Next, we formulate EE maximization problems for the three schemes under the constraints of minimum users’ data rate and maximum BS transmit power. The considered problem is non-convex and hard to tackle. To address it, an iterative sub-optimal algorithm is proposed by adopting fractional programming and difference of convex programming. Numerical results show that the near optimality performance of EE can be achieved by using the proposed algorithm with advantages of fast convergence and low complexity. Three transmission schemes of NOMA have superior EE performance compared with conventional orthogonal multiple access scheme in the same CoMP networks. [less ▲]

Detailed reference viewed: 65 (26 UL)
Full Text
Peer Reviewed
See detailThe influence of Forced Answering on response behavior in Online Surveys: A reactance effect?
Sischka, Philipp UL; Mergener, Alexandra; Neufang, Kristina Marliese et al

Poster (2017, March 16)

Relevance: Recent studies have shown that the use of the forced answering (FA) option in online surveys results in reduced data. They especially examined that forcing respondents to answer questions in ... [more ▼]

Relevance: Recent studies have shown that the use of the forced answering (FA) option in online surveys results in reduced data. They especially examined that forcing respondents to answer questions in order to proceed through the questionnaire leads to higher dropout rates and lower answer quality. However, no study researched the psychological mechanism behind the correlation of FA on dropout and data quality before. This response behavior has often been interpreted as psychological reactance reaction. So, the Psychological Reactance Theory (PRT) predicts that reactance appears when an individuals’ freedom is threatened and cannot be directly restored. Reactance describes the motivation to restore this loss of freedom. Respondents could experience FA as a loss of freedom, as (s)he is denied the choice to leave a question unanswered. According to PRT, possible reactions in this situation might be to quit survey participation, to fake answers or to show satisficing tendencies. Research content: This study explores the psychological mechanism that effects response behavior in FA condition (compared to non-FA- condition). Our major hypothesis is that forcing respondents to answer will cause reactance, which turns into increasing dropout rates, decreasing answer quality and a satisficing behavior. Methods and Data: We used an online survey-experiment with two conditions (forced and non-forced answering instructions). The sample consists of 914 participants. Throughout the whole questionnaire, a dropout button was implemented on each page. In both conditions, this button led to the same page that fully compliant participants reached at the end of the questionnaire. Reactance was measured with a self-constructed four-item reactance scale. To determine answer quality, we used self-report for faking as well as the analysis of answers to open ended questions. Results: Zero-order effects showed that FA increased state reactance and questionnaire dropout as well as it reduced answer length in open-ended questions. Mediation analysis (Condition -> state reactance -> dropout/answer quality) supported the hypothesis of reactance as an underlying psychological mechanism behind negative FA effects on data quality. Added Value: This is the first study which offers statistical evidence for the often proposed reactance effect influencing response behavior. This offers a base for a deeper psychological reflection of the use of the FA-option. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
See detailSystem Testing of Timing Requirements based on Use Cases and Timed Automata
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by ... [more ▼]

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing requirements, following a methodology aiming at minimizing modeling overhead. We automate the generation of executable test cases using a test strategy based on maximizing test suite diversity and building over the UPPAAL model checker. Initial empirical results based on an industrial case study provide evidence of the effectiveness of the approach. [less ▲]

Detailed reference viewed: 211 (17 UL)
Full Text
Peer Reviewed
See detailSpeeding-Up Mutation Testing via Data Compression and State Infection
Zhu, Qianqian; Panichella, Annibale UL; Zaidman, Andy

in IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (2017, March 13)

Mutation testing is widely considered as a high-end test criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing ... [more ▼]

Mutation testing is widely considered as a high-end test criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, its scalability issue remains in practice. In this paper, we introduce a novel method to speed up mutation testing based on state infection information. In addition to filtering out uninfected test executions, we further select a subset of mutants and a subset of test cases to run leveraging data-compression techniques. In particular, we adopt Formal Concept Analysis (FCA) to group similar mutants together and then select test cases to cover these mutants. To evaluate our method, we conducted an experimental study on six open source Java projects. We used EvoSuite to automatically generate test cases and to collect mutation data. The initial results show that our method can reduce the execution time by 83.93% with only 0.257% loss in precision. [less ▲]

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailReduced basis Nitsche-based domain decomposition: a biomedical application
Baroli, Davide UL; Beex, Lars UL; Hale, Jack UL et al

Scientific Conference (2017, March 10)

Nowadays, the personalized biomedical simulations demand real-time efficient and reliable method to alleviate the computational complexity of high-fidelity simulation. In such applications, the necessity ... [more ▼]

Nowadays, the personalized biomedical simulations demand real-time efficient and reliable method to alleviate the computational complexity of high-fidelity simulation. In such applications, the necessity of solving different substructure, e.g. tissues or organs, with different numbers of the degrees of freedom and of coupling the reduced order spaces for each substructure poses a challenge in the on-fly simulation. In this talk, this challenge is taken into account employing the Nitsche-based domain decomposition technique inside the reduced order model [1]. This technique with respect to other domain decomposition approach allows obtaining a solution with the same accuracy of underlying finite element formulation and to flexibly treat interface with non-matching mesh. The robustness of the coupling is determined by the penalty coefficients that is chosen using ghost penalty technique [2]. Furthermore, to reduce the computational complexity of the on-fly assembling it is employed the empirical interpolation approach proposed in [3]. The numerical tests, performed using FEniCS[4], petsc4py and slepc4py [5], shows the good performance of the method and the reduction of computation cost. [1] Baroli, D., Beex L. and Bordas, S. Reduced basis Nitsche-based domain decomposition. In preparation. [2] Burman, E., Claus, S., Hansbo, P., Larson, M. G., & Massing, A. (2015). CutFEM: Discretizing geometry and partial differential equations. International Journal for Numerical Methods in Engineering, 104(7), 472-501. [3] E. Schenone, E., Beex,L., Hale, J.S., Bordas S. Proper Orthogonal Decomposition with reduced integration method. Application to nonlinear problems. In preparation. [4] A. Logg, K.-A. Mardal, G. N. Wells et al. Automated Solution of Differential Equations by the Finite Element Method, Springer 2012. [5] L. Dalcin, P. Kler, R. Paz, and A. Cosimo, Parallel Distributed Computing using Python, Advances in Water Resources, 34(9):1124-1139, 2011. http://dx.doi.org/10.1016/j.advwatres.2011.04.013 [less ▲]

Detailed reference viewed: 75 (6 UL)
Full Text
Peer Reviewed
See detailMusic and Social Health
Sagrillo, Damien UL

in Devosa, Iván; Maródi, Ágnes; Buzás, Zsuzsanna (Eds.) et al International HEART 2017 Conference Health – Economy – Art (2017, March 08)

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans ... [more ▼]

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans Günter Bastian found out that common music practice and extended music education can lead to more social competence. In my lecture, I will give three examples of how music making cannot only avoid violence and criminality, but can also contribute to well-being among like-minded people. 1) The movie The Choir (les choristes) is a perfect demonstration, how common singing is able to weld together an initial heterogenous group of difficult educable children living in institutions of care 2) El Sistema is a famous programme for children in Venezuela financed by the state with the main objective that “music has to be recognised as an agent of social development” as José Antonio Abreu, its initiator highlights. 3) In my last year’s lecture, I presented my mail choir with an age average beyond 70 years. Recently I published a study on interviews conducted with the choristers to find out their views of social well-being." [less ▲]

Detailed reference viewed: 4 (1 UL)
Full Text
Peer Reviewed
See detailEconomic Law in the EU: How to Ensure More Convergence After the Brexit? Workshop on Corporate Law
Corbisier, Isabelle UL

Scientific Conference (2017, March 06)

See Programme at the start of the appended document for a description of the whole event, followed by the summary of Isabelle Corbisier's intervention (by herself)

Detailed reference viewed: 18 (3 UL)
See detailThe social inclusion of students with physical disabilities
Pit-Ten Cate, Ineke UL; Stevenson, Jim

Scientific Conference (2017, March)

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailSocially assistive robots for teaching emotional abilities to children with autism spectrum disorder
Pinto Costa, Andreia UL; Steffgen, Georges UL; Rodriguez Lera, Francisco Javier UL et al

Scientific Conference (2017, March)

Socially assistive robots, when used in a way that takes into consideration children’s needs and developmental characteristics, can be useful tools to enable children’s development. More specifically, due ... [more ▼]

Socially assistive robots, when used in a way that takes into consideration children’s needs and developmental characteristics, can be useful tools to enable children’s development. More specifically, due to their characteristics (predictability, simplicity, and repetition) robots can be especially helpful to teach emotional abilities to children with autism spectrum disorder (ASD). Previous research has provided preliminary evidence that robots can help children improve in some domains such as joint attention and imitation. However, no studies have examined how robots can be integrated in intervention protocols targeting the acquisition of emotional abilities in children with ASD. This paper presents a work in progress on an emotional ability training developed for children with ASD using the QT socially assistive robot. This training aims to test whether children with ASD can benefit from a robot-mediated training to improve emotional ability. [less ▲]

Detailed reference viewed: 158 (3 UL)
Full Text
Peer Reviewed
See detailToward an in-depth understanding of binge-watching behavior: a qualitative approach with focus group
Flayelle, Maèva UL; Maurage, Pierre; Billieux, Joël

in Journal of behavioral addictions (2017, March), 6 (Suppl.1)

Detailed reference viewed: 13 (2 UL)
Full Text
Peer Reviewed
See detailImpact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone
Rosalie, Martin UL; Danoy, Grégoire UL; Chaumette, Serge et al

in Falcon, Eric; Lefranc, Marc; Pétrélis, François (Eds.) et al Comptes-rendus de la 20e Rencontre du Non Linéaire (2017, March)

Solution of differential equations system can be chaotic attractors with various chaotic mechanisms. In this paper we highlight that the use of these chaotic mechanisms permits to enhance the ... [more ▼]

Solution of differential equations system can be chaotic attractors with various chaotic mechanisms. In this paper we highlight that the use of these chaotic mechanisms permits to enhance the diversification of metaheuristics. We applied our approach to the coverage problem using a swarm of UAVs where the diversification of an ant colony algorithm is enhanced by chaos coming from Ma system and Rössler system. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailCoping with turn-taking:Investigating breakdowns in human-robot interaction from a Conversation Analysis (CA) perspective
Arend, Béatrice UL; Sunnen, Patrick UL

in Proceedings: The 8th International Conference on Society and Information Technologies (2017, March)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailFaster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels
Alodeh, Maha UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (2017, March)

Detailed reference viewed: 18 (4 UL)