References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 62 (3 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailA Natural Language Programming Approach for Requirements-based Security Testing
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Göknil, Arda UL et al

in Mai, Xuan Phu; Pastore, Fabrizio; Göknil, Arda (Eds.) et al A Natural Language Programming Approach for Requirements-based Security Testing (in press)

To facilitate communication among stakeholders, software security requirements are typically written in natural language and capture both positive requirements (i.e., what the system is supposed to do to ... [more ▼]

To facilitate communication among stakeholders, software security requirements are typically written in natural language and capture both positive requirements (i.e., what the system is supposed to do to ensure security) and negative requirements (i.e., undesirable behavior undermining security). In this paper, we tackle the problem of automatically generat- ing executable security test cases from security requirements in natural language (NL). More precisely, since existing approaches for the generation of test cases from NL requirements verify only positive requirements, we focus on the problem of generating test cases from negative requirements. We propose, apply and assess Misuse Case Programming (MCP), an approach that automatically generates security test cases from misuse case specifications (i.e., use case specifications capturing the behavior of malicious users). MCP relies on natural language processing techniques to extract the concepts (e.g., inputs and activities) appearing in requirements specifications and generates executable test cases by matching the extracted concepts to the members of a provided test driver API. MCP has been evaluated in an industrial case study, which provides initial evidence of the feasibility and benefits of the approach. [less ▲]

Detailed reference viewed: 68 (3 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 22 (9 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 64 (6 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 111 (6 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 53 (10 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 154 (6 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 130 (18 UL)
Full Text
Peer Reviewed
See detailO-MI/O-DF vs. MQTT: a performance analysis
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL et al

in O-MI/O-DF vs. MQTT: a performance analysis (in press)

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as ... [more ▼]

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as well as Industry 4.0 environments, look more like a collection of isolated “Intranets of Things”, also referred to as “vertical silos”, rather than a federated infrastructure. Breaking down these silos is a key challenge in both the IoT and Industry 4.0 communities. This paper is intended to present and discuss two open and standardised mes- saging protocols designed for IoT applications, namely: MQTT and O-MI/O-DF. First, a traffic load’s analytical model derived from the MQTT standard specifications is presented. Second, a comparison study between MQTT and O-MI/O-DF standards is carried out based on a real-life industrial implementation. This study brings a deep understanding of the extent to which these protocols are performant (from a traffic load perspective) and how they can impact on future architectural designs. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
See detailUne cour constitutionnelle différente des autres. Etendue, raisons & avenir de l'originalité de la Cour constitutionnelle luxembourgeoise
Heuschling, Luc UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: trop jeune pour mourir? (in press)

Detailed reference viewed: 83 (10 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (in press)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 10 (0 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 38 (1 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 272 (4 UL)
Peer Reviewed
See detailStatic load deflection experiment on a beam for damage detection using the Deformation Area Difference Method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

Scientific Conference (in press)

A reliable and safety infrastructure for both transport and traffic is becoming increasingly important today. The condition assessment of bridges remains difficult and new methods must be found to provide ... [more ▼]

A reliable and safety infrastructure for both transport and traffic is becoming increasingly important today. The condition assessment of bridges remains difficult and new methods must be found to provide reliable information. A meaningful in-situ assessment of bridges requires very detailed investigations which cannot be guaranteed by commonly used methods. It is known that the structural response to external loading is influenced by local damages. However, the detection of local damage depends on many factors such as environmental effects (e.g. temperature), construction layer (e.g. asphalt) and accuracy of the structural response measurement. Within the paper, a new so-called Deformation Area Difference (DAD) Method is presented. The DAD method is based on a load deflection experiment and does not require a reference measurement of initial condition. Therefore, the DAD method can be applied on existing bridges. Moreover, the DAD method uses the most modern technologies such as high precision measurement techniques and attempts to combine digital photogrammetry with drone applications. The DAD method uses information given in the curvature course from a theoretical model of the structure and compares it to real measurements. The paper shows results from a laboratory load-deflection experiment with a steel beam which has been gradually damaged at distinct positions. The load size is chosen so that the maximum deflection does not exceed the serviceability limit state. With the data obtained by the laboratory experiment, the damage degree, which can still be detected by the DAD method, is described. Furthermore, the influence of measurement accuracy on damage detection is discussed. [less ▲]

Detailed reference viewed: 50 (13 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 113 (16 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 102 (9 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 90 (15 UL)
Full Text
Peer Reviewed
See detailSequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, December)

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays facilitate simultaneous wireless information and power transfer (SWIPT) to the end-users. In this context, we address an optimization problem to maximize the end-users’ sum-rate subjected to transmit power and harvested energy constraints. Furthermore, the problem is formulated for both time-switching (TS) and power-splitting (PS) SWIPT schemes.We aim at optimizing the users’ SWIPT splitting factors as well as sub-carrier–destination assignment, sub-carrier pairing, and relay–destination coupling metrics. This kind of joint evaluation is combinatorial in nature with non-linear structure involving mixed-integer programming. In this vein, we propose a sub-optimal low complex sequential resource distribution (SRD) method to solve the aforementioned problem. The performance of the proposed SRD technique is compared with a semi-random resource allocation and relay selection approach. Simulation results reveal the benefits of the proposed design under several parameter values with various operating conditions to illustrate the efficiency of SWIPT schemes for the proposed techniques. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 60 (5 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 91 (20 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 53 (10 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 27 (5 UL)
Full Text
Peer Reviewed
See detailOn the impact of tokenizer and parameters on N-gram based Code Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

Scientific Conference (2018, September)

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However ... [more ▼]

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However, such models require the appropriate set of numerous parameters. Moreover, the different ways one can read code essentially yield different models (based on the different sequences of tokens). In this paper, we focus on n- gram models and evaluate how the use of tokenizers, smoothing, unknown threshold and n values impact the predicting ability of these models. Thus, we compare the use of multiple tokenizers and sets of different parameters (smoothing, unknown threshold and n values) with the aim of identifying the most appropriate combinations. Our results show that the Modified Kneser-Ney smoothing technique performs best, while n values are depended on the choice of the tokenizer, with values 4 or 5 offering a good trade-off between entropy and computation time. Interestingly, we find that tokenizers treating the code as simple text are the most robust ones. Finally, we demonstrate that the differences between the tokenizers are of practical importance and have the potential of changing the conclusions of a given experiment. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 124 (18 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 78 (12 UL)
Full Text
Peer Reviewed
See detailResource Allocation and Relay Selection for Multi-User OFDM-Based Cooperative Networks with SWIPT
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, August)

In this paper, we investigate resource allocation and relay selection in a two-hop relay-assisted multi-user network, where the end users support Simultaneous Wireless Information and Power Transfer ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a two-hop relay-assisted multi-user network, where the end users support Simultaneous Wireless Information and Power Transfer (SWIPT). In particular, we consider single source assisted by a set of spatially distributed relays able to amplify-and-forward orthogonal frequency division multiplexing (OFDM) signals carrying both data and power at the same time. The users are assumed to implement a power splitting technique where the received signal is orthogonally split in two streams of different power levels, where one signal stream is sent to the power harvesting module while the other is converted to baseband for information decoding. We aim at optimizing the users’ power splitting ratios as well as the relay, carrier and power assignment so that the end-users’ sum-rate is maximized subject to transmitted and harvested power constraints. Such joint optimization is combinatorial in nature with a non-convex structure. Therefore, we present a sub-optimal low complex solution based on the harmonic mean of the two-hop relay channel coefficients. Simulation results reveal that the proposed algorithm provides significant performance gains in comparison with a semi-random resource allocation and relay selection approach. [less ▲]

Detailed reference viewed: 52 (12 UL)
Peer Reviewed
See detailTapping the Potential of Diverse Founding Teams for Firm Growth: The Role of New Venture Activities
Tryba, Anne UL; Patzelt, Holger; Breugst, Nicola

Scientific Conference (2018, August)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Extraction of Semantic Legal Metadata Using Natural Language Processing
Sleimi, Amin UL; Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL et al

in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal ... [more ▼]

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal requirements. [Objectives] Our work is motivated by two observations: (1) The existing requirements engineering (RE) literature does not provide a harmonized view on the semantic metadata types that are useful for legal requirements analysis. (2) Automated support for the extraction of semantic legal metadata is scarce, and further does not exploit the full potential of natural language processing (NLP). Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the semantic legal metadata types proposed in RE. Subsequently, we conduct a qualitative study aimed at investigating how the identified metadata types can be extracted automatically. [Results and Conclusions] We propose (1) a harmonized conceptual model for the semantic metadata types pertinent to legal requirements analysis, and (2) automated extraction rules for these metadata types based on NLP. We evaluate the extraction rules through a case study. Our results indicate that the rules generate metadata annotations with high accuracy. [less ▲]

Detailed reference viewed: 47 (5 UL)
See detailThe Challenge of Situating Sacred Wind Music on the Example of Laurent Menager (1835-1902)
Duhr, Marlène UL

Scientific Conference (2018, July 20)

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailWind Music and Terminology. A Critical Review of an Immanent Phenomenon
Sagrillo, Damien UL

in Sagrillo, Damien (Ed.) Conference Guide (2018, July 20)

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A ... [more ▼]

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A band is a Band is Band”. However, he seemed to hesitate because he referred to Joseph Manfredo who, in his awarded dissertation, asked: “What is a Band?” In my lecture, I will bring this topic to the fore again and deal with the terminology used to designate a group of wind instruments, and I will come up with some suggestions for definitions. I will try to find an answer to questions such as: When is a band a symphonic band, or even a symphonic wind ensemble or “only” a community band? When I say: “I will try to find an answer”, I must admit that I cannot guarantee to find an acceptable one: Are these terms filled with a substance – what makes the difference? – or are they simply a grandiloquent absurdity? Do pretentious terms refer to “better” musicians or music? I will present my paper in English, but I will also deal with band designations in German, in French and my native language – Luxembourgish. [less ▲]

Detailed reference viewed: 92 (1 UL)
Full Text
Peer Reviewed
See detailStochastic Optimum Energy Management for Advanced Transportation Network
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (2018, July 19)

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced ... [more ▼]

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced driver assistance system which predictively plans for a safe and energy-efficient cruising velocity profile autonomously for battery electric vehicles. However, high entropy in transportation network leads to a challenging task to derive a computationally efficient and tractable model to predict the traffic flow. Stochastic optimal control has been developed to systematically find an optimal decision with the aim of performance improvement. However, most of the developed methods are not real-time algorithms. Moreover, they are mainly risk-neutral for safety-critical systems. This paper investigates on the real-time risk-sensitive nonlinear optimal control design subject to safety and ecological constraints. This system improves the efficiency of the transportation network at the microscopic level. Obtained results demonstrate the effectiveness of the proposed method in terms of states regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailConclusions générales: La Cour Constitutionnelle en tant qu'autorité de dialogue
Gerkrath, Jörg UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: Trop jeune pour mourir? (2018, July 17)

Detailed reference viewed: 38 (4 UL)
Peer Reviewed
See detailHow working conditions influence work-related anger
Steffgen, Georges UL; Sischka, Philipp UL

Scientific Conference (2018, July 13)

Detailed reference viewed: 19 (4 UL)
Peer Reviewed
See detailGlobal inequalities 1980-2050: a microdata oriented simulation – Worldsim
Chauvel, Louis UL; Bar-Haim, Eyal UL; Hartung, Anne UL et al

Scientific Conference (2018, July 13)

Former global inequality models lack realistic features of the population (age, gender, education, behavior). Worldsim develops a panel sample based simulation of the world population until 2050, relying ... [more ▼]

Former global inequality models lack realistic features of the population (age, gender, education, behavior). Worldsim develops a panel sample based simulation of the world population until 2050, relying on UN, Cepii, etc, big data aggregated forecasts, that we individually disaggregate. The simulation confirms the decline of the world's Gini index, but underlines several paradoxes in the socioecodemography of the world, with increasing gaps between resources and needs. Compared to more standard socioeconomic simulations of inequalities, we provide more substantial characterization of the population, and compared to other global simulations, we capture the dimensions of social divergences between social groups and geographic regions. [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailPsychological contact violation or basic need frustration? Psychological mechanisms behind the effects of workplace bullying.
Sischka, Philipp UL; Steffgen, Georges UL

Scientific Conference (2018, July 12)

Workplace bullying is a serious phenomenon that has serious detrimental effects on victim’s health, attitudes, and work-related behavior. However, research that examines the mechanisms behind these ... [more ▼]

Workplace bullying is a serious phenomenon that has serious detrimental effects on victim’s health, attitudes, and work-related behavior. However, research that examines the mechanisms behind these relations is still sparse. Two theories that may explain the links between workplace bullying and various negative outcomes are social exchange theory and self-determination theory. Drawing on these theories, we hypothesized that the relationship between workplace bullying and various outcomes is mediated by perceptions of psychological contract violation and the frustration of basic psychological needs (i.e. autonomy, competence, relatedness). Therefore, the aim of our study was to test these mediators separately and simultaneously to see whether they have an incremental mediation effect between workplace bullying and well-being, work satisfaction, engagement, performance, burnout, workplace deviance and turnover intentions. An online survey design was employed and data were collected among U.S. employees. The final sample consists of 1,408 respondents (56.6% females, n=798, age: M=37.3, SD =10.4). Single mediation analysis within a structural equation modeling framework revealed that psychological contract violation acted as a mediator for all outcome variables. Furthermore, basic need frustrations were also meaningfully mediators between workplace bullying and all outcomes, but different need frustration were differently linked with them. The multiple mediation analyses mainly supported the hypothesized importance of the mediators for the different outcomes. The study findings advance the field through identifying the most important mediators between workplace bullying and several outcome variables guiding possible interventions. [less ▲]

Detailed reference viewed: 20 (1 UL)
Peer Reviewed
See detailThe Reasons of Older people for the Use or Non-use of Assistive Technologies:
A Systematic Review of Qualitative Studies
Abrilahij, Afsaneh UL; Boll, Thomas UL

Scientific Conference (2018, July 06)

The baby boomer generation is aging and the proportion of older people in the population is increasing. While people age, functional, cognitive, and physical problems increase. Assistive technology (AT ... [more ▼]

The baby boomer generation is aging and the proportion of older people in the population is increasing. While people age, functional, cognitive, and physical problems increase. Assistive technology (AT) can help to overcome some activity limitations relevant to aging. Although ATs have potential benefits (e.g., to reduce the burden of caregivers, to increase independence), their usage rate is still low. Whereas several reviews of quantitative studies on factors of ATs use already exist, a systematic review of qualitative research about AT use is still missing. The aim of the current review is to provide more differentiated answers about what makes some older people use ATs while others not. Based on systematic literature searches in PsycINFO, MEDLINE, and Google Scholar databases 18 relevant papers were identified according to our selection criteria. These studies were based on to self-reported reasons of older people for using or not-using diverse types of ATs designed for many different activities. We classified the key reasons as referring to three aspects: attributes of “potential technology users”, “context”, and “technology”. Perceived usefulness and attitudes towards use were the most common “personal” reasons and social impact by significant others was the most common “contextual” reason, and technology design was the most common “technological” reason influencing use or non-use of ATs. We discussed the identified reasons in relation to the major models of developmental self-regulation and action-theoretical approaches to development in age. Based on the current review, we generated methodological and theoretical recommendations for future research and for practical applications. [less ▲]

Detailed reference viewed: 22 (6 UL)
Peer Reviewed
See detailComparative Evaluation of Models of Assistive Technologies’ Use
Abrilahij, Afsaneh UL; Boll, Thomas UL

Scientific Conference (2018, July 06)

Many older people have functional limitations and are at risk of losing their ability to live autonomously. Assistive Technology (AT) could help to reduce that risk. However, many older people don’t use ... [more ▼]

Many older people have functional limitations and are at risk of losing their ability to live autonomously. Assistive Technology (AT) could help to reduce that risk. However, many older people don’t use ATs. Our presentation reviews existing models of ATs use, their applicability to specific types of AT, predictive value, fundamental elements, and critiques of such models. In systematic literature searches in PsycINFO, MEDLINE, and Google Scholar 46 papers were identified that met our inclusion criteria. 32 papers covered models of ATs use, applicability to special types of ATs, components of models, and their predictive value. 14 papers cover criticisms of models of AT use. We classified the models into two groups: The first included 11 models focusing on individuals’ mental states (e.g., beliefs, desires) as factors explaining ATs use; the second included 22 models that also considered contextual factors (e.g., social influence, physical environment) in addition to individuals’ mental states. Across both groups the most frequently included explanatory components were subjective norm and personal attitudes towards AT use, followed by perceived usefulness, perceived ease of use and then intention to use. Models were most frequently applied to information technologies followed by application to socially assistive robots. Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) and an extended version of Technology Acceptance Model showed the highest amount of explained variance in intention to use (56-74%) and an extended model of UTAUT in actual use of ATs (64%). We conclude with recommendations for further improvement of AT use models. [less ▲]

Detailed reference viewed: 33 (18 UL)
Peer Reviewed
See detailNational, European or Cosmopolitan identification? Insights from the heart of Europe
Murdock, Elke UL; Kraus, Xavier; Ferring, Dieter UL

Scientific Conference (2018, July 04)

Trilingual Luxembourg shares borders with three European countries and has a foreign population percentage of 47%. Given this multicultural context we wanted to explore firstly the national, supra ... [more ▼]

Trilingual Luxembourg shares borders with three European countries and has a foreign population percentage of 47%. Given this multicultural context we wanted to explore firstly the national, supra-national or non-national identification among the native population, secondly their stereotypical judgements of EU Member State countries and attitudes towards the European Union and thirdly identify predictors for cosmopolitanism. With a sentence completion task we investigated the reasons for a feeling of belonging to a national entity or lack of it. All 255 participants in our study (Mage = 38.8 SD = 10.7, 59% female) had Luxembourgish citizenship. Forty percent provided a national self-identification (“Luxembourger”), 36% supra-national identification (“European”) and 24% a non-national identification (“cosmopolitan”). These three groups did not differ in terms of stereotypical assessments of the EU Member states regarding warmth and competence (stereotype content model). Yet, when asked about their own assessment of Luxembourg, differences occurred with supra- and non-national identifiers providing significantly lower ratings under the self-rating condition. The three groups differed in their attitude towards the European Union. Low commitment (MEIM subscale), high contact with non-natives and group self-identification predicted cosmopolitanism. There were no effects in terms of self-efficacy, age, gender or socioeconomic status. The content analysis of the sentence completion exercise revealed that affective components dominated arguments for belonging whereas cognitive reasoning governed the statements expressing a lack of belonging. The implications of these findings among natives within the multicultural context of Luxembourg will be discussed – against the rise of nationalism in many European countries and beyond. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
See detailAn n-ary generalization of the concept of distance
Kiss, Gergely; Marichal, Jean-Luc UL; Teheux, Bruno UL

Scientific Conference (2018, July 03)

Detailed reference viewed: 23 (0 UL)
Full Text
See detailAssociative and quasitrivial operations on finite sets: characterizations and enumeration
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

Scientific Conference (2018, July 02)

We investigate the class of binary associative and quasitrivial operations on a given finite set. Here the quasitriviality property (also known as conservativeness) means that the operation always outputs ... [more ▼]

We investigate the class of binary associative and quasitrivial operations on a given finite set. Here the quasitriviality property (also known as conservativeness) means that the operation always outputs one of its input values. We also examine the special situations where the operations are commutative and nondecreasing, in which cases the operations reduce to discrete uninorms (which are discrete fuzzy connectives playing an important role in fuzzy logic). Interestingly, associative and quasitrivial operations that are nondecreasing are characterized in terms of total and weak orderings through the so-called single-peakedness property introduced in social choice theory by Duncan Black. We also address and solve a number of enumeration issues: we count the number of binary associative and quasitrivial operations on a given finite set as well as the number of those operations that are commutative and/or nondecreasing. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailOn associative, idempotent, symmetric, and nondecreasing operations
Devillet, Jimmy UL; Teheux, Bruno UL

Scientific Conference (2018, July 02)

see attached file

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailApprentissage formel, non-formel et informel de musique dans la communauté. Comment correspondent-ils
Sagrillo, Damien UL

Scientific Conference (2018, July 02)

Tandis que le concept de l’apprentissage formel, non-formel et informel est supposé connu en ce qui concerne ses orientations générales, il en est moins pour la pédagogie musicale. Sa vue sous différents ... [more ▼]

Tandis que le concept de l’apprentissage formel, non-formel et informel est supposé connu en ce qui concerne ses orientations générales, il en est moins pour la pédagogie musicale. Sa vue sous différents angles, notamment sous l’optique de la musique pour amateurs, fera l’objet de ma communication. De l'autre côté, le concept de musique dans la communauté est emprunté de l’anglais « community music ». Celui-ci signifie que la pratique des amateurs de musique est fondée sur des activités de loisir. Mais il existe bien d’autres volets qui pourraient être regroupés sous la perspective d’une musique dans ou par la communauté. D’abord il semble qu’il est totalement dissocié des méthodes traditionnelles d’apprentissage musical de nature formelle ou non-formelle. Mais il serait plutôt lié à une éducation de nature informelle qui, cependant, ne peut pas être mise en relation avec l’autodidactie. Des approches récentes la voient en rapport avec l’inclusion et la participation réalisée dans un milieu associatif et comme moyen de surmonter l’obstacle qui existe entre la pédagogie musicale traditionnelle et les exigences de la communauté musicale. De l’autre côté, la musique dans la communauté se présente comme un contre-projet face à la haute culture musicale professionnalisée (Lichtinger 2013). En ce qui concerne le terme de « community music », il n’existe pas de traduction littérale française. Cependant, il est parfaitement approprié de retracer le processus d’une éducation musicale des jeunes qui commence souvent par une phase amateur pour mener par après à la vie professionnelle pour les plus doués, soit pour décrire la formation et la vie musicale des jeunes amateurs, soit pour retracer la vie de musicien amateur tout au long de la vie de ces musicophiles. Dans ma communication, je présenterai des définitions pour chacun des trois aspects de formation musicale n’ignorant pas que surtout pour l’éducation musicale de type non-formel il n’existe pas de consensus. Ensuite, je mettrai en relation les deux concepts – i.e. celui des trois aspects de formation musicale et celui de la musique dans la communauté – en donnant des exemples d’une pratique musicale très répandue, à savoir la musique à vent (et/ou chant choral) pour enfin comparer des modèles d’apprentissage musical tels qu’ils existent et sont appliqués dans différents pays européens liés à cette tradition. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailThe Multicultural Ideology Scale (MIS): Factor structure and measurement invariance
Stogianni, Maria UL; Murdock, Elke UL

Scientific Conference (2018, July 02)

The concept of multiculturalism has been widely used in cross-cultural research to describe positive attitudes towards a culturally plural society and practices that support cultural diversity. To date ... [more ▼]

The concept of multiculturalism has been widely used in cross-cultural research to describe positive attitudes towards a culturally plural society and practices that support cultural diversity. To date, attitudes towards multiculturalism among majority and minority group members have been assessed with the same instruments. However, there is little psychometric evidence that these measures operate appropriately in various cultural contexts. The purpose of the present study was to investigate the factor structure of the Multicultural Ideology Scale (MIS; Berry & Kalin, 1995) and test its measurement invariance across different language versions and ethnic groups. The entire sample consisted of 1572 adolescents and adults in Luxembourg, including native majority members (N = 693) and immigrants from diverse ethnic backgrounds (N = 879). Participants were given the option to complete the questionnaire in one of the following languages: English, German or French. The unidimensional model of multicultural ideology did not show an acceptable fit of the data across all language versions of the MIS. Exploratory and confirmatory factorial analyses revealed a two-factor structure, which was partially invariant across two different language versions (English and German). The two factors reflected positive and negative attitudes towards cultural diversity respectively. Subsequent multigroup confirmatory factor analyses supported configural and metric invariance across majority and minority group members. Scalar invariance was not established, indicating that respondents across these two groups conceptualize multiculturalism in different ways. Implications of these findings are discussed together with methodological issues concerning the assessment of measurement invariance. [less ▲]

Detailed reference viewed: 32 (13 UL)
Full Text
Peer Reviewed
See detailTest Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a ... [more ▼]

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (near-)operational environment. Acceptance testing of a CPS often necessitates that the test cases be prioritized, as there are usually too many scenarios to consider given time constraints. CPS acceptance testing is further complicated by the uncertainty in the environment and the impact of testing on hardware. We propose an automated test case prioritization approach for CPS acceptance testing, accounting for time budget constraints, uncertainty, and hardware damage risks. Our approach is based on multi-objective search, combined with a test case minimization algorithm that eliminates redundant operations from an ordered sequence of test cases. We evaluate our approach on a representative case study from the satellite domain. The results indicate that, compared to test cases that are prioritized manually by satellite engineers, our automated approach more than doubles the number of test cases that fit into a given time frame, while reducing to less than one third the number of operations that entail the risk of damage to key hardware components. [less ▲]

Detailed reference viewed: 133 (14 UL)
Full Text
Peer Reviewed
See detailSome basic reflections on voice-controlled natural language human-Siri talk: Hey Siri, you are challenging the interface between the oral and the written.
Arend, Béatrice UL; Fixmer, Pierre UL

in Proceedings 10th International Conference on Education and New Learning Technologies (2018, July)

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (2018, July)

Detailed reference viewed: 133 (17 UL)
See detailTowards a multifaceted framework of complex problem solving
Stadler, Matthias UL; Niepel, Christoph UL; Greiff, Samuel UL

Scientific Conference (2018, July)

Detailed reference viewed: 8 (0 UL)
Peer Reviewed
See detailToward a new model of collaborative problem solving definition and assessment
Stoeffler, K.; Greiff, Samuel UL; Von Davier, A. et al

Scientific Conference (2018, July)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailInstilling teacher agency in professional development: an international outlook. Enabling teachers in Luxembourg to implement inclusive practice
Pit-Ten Cate, Ineke UL

in Sibilio, Maurizio; Aiello, Paola (Eds.) Lo sviluppo professionale dei docenti. Ragionare di agentività per una scuola inclusiva (2018, July)

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion ... [more ▼]

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion of students with special educational needs (SEN) in regular classrooms. Over the last decades, Luxembourg has invested significant effort in providing training to teachers and other professionals to improve educational services for students with SEN. The recent School Law (Summer 2017) stipulates how the inclusion of students with SEN can be facilitated. Although these changes all aim to facilitate the successful implementation of inclusive educational practice, it will be important to continue to investigate and interpret teachers’ attitudes and perceived competence and efficacy in the context of the educational system. [less ▲]

Detailed reference viewed: 7 (1 UL)
Peer Reviewed
See detailIntroducing MaFIN. A dynamic matrices finite state automata test
Kunze, Thiemo UL; Krieger, Florian UL; Stadler, Matthias UL et al

Scientific Conference (2018, July)

Detailed reference viewed: 26 (5 UL)
See detailReduced modulatory effects of distraction on pain due to aging
Siquier, A; Prats, MA; Montoya, P et al

Scientific Conference (2018, July)

Detailed reference viewed: 8 (0 UL)
Full Text
See detailPeut-on se moquer de tout ? L'étendue de la liberté d'expression face au sentiment religieux
Gerkrath, Jörg UL

in Institut Grand Ducal (Ed.) Actes de la Section des sciences morales et politiques (2018, July)

Detailed reference viewed: 76 (33 UL)
Full Text
Peer Reviewed
See detailGenerating Multi-Categorical Samples with Generative Adversarial Networks
Camino, Ramiro Daniel UL; Hammerschmidt, Christian UL; State, Radu UL

Scientific Conference (2018, July)

We propose a method to train generative adversarial networks on mutivariate feature vectors representing multiple categorical values. In contrast to the continuous domain, where GAN-based methods have ... [more ▼]

We propose a method to train generative adversarial networks on mutivariate feature vectors representing multiple categorical values. In contrast to the continuous domain, where GAN-based methods have delivered considerable results, GANs struggle to perform equally well on discrete data. We propose and compare several architectures based on multiple (Gumbel) softmax output layers taking into account the structure of the data. We evaluate the performance of our architecture on datasets with different sparsity, number of features, ranges of categorical values, and dependencies among the features. Our proposed architecture and method outperforms existing models. [less ▲]

Detailed reference viewed: 28 (3 UL)
Full Text
See detailProject NUMTEST: Assessing basic number competence without language
Greisen, Max UL; Hornung, Caroline UL; Schiltz, Christine UL

Poster (2018, June 28)

Although numerical skills are essential in modern societies, 5- 7 % of the population suffer from mathematical learning disabilities. Due to the hierarchical nature of mathematical knowledge, screening ... [more ▼]

Although numerical skills are essential in modern societies, 5- 7 % of the population suffer from mathematical learning disabilities. Due to the hierarchical nature of mathematical knowledge, screening during the earliest stages of learning is essential to intervene efficiently. While different screening tools exist, they rely on verbal instructions and task content, hampering their usefulness in linguistically heterogeneous young school populations. We developed a computerized task that requires subjects to encode both auditory and visual numerical information to successfully respond to the task’s demands. For task instruction, participants were presented a video showing a person correctly solving three easy items of the task, before moving on to a practice session of three different items. If any item was solved incorrectly, the entire practice session was repeated for the participant. We administered the task to a sample of first grade students and collected participant’s performance in standardized addition, subtraction and number comparison (1 & 2-digit) tasks. A multivariate analysis with practice repetition as between-subject factor on the four standardized control measures revealed that participants that repeated the practice session scored significantly lower in three out of four dependent measures. These results suggest that the immediate understanding (i.e. practice items solved correctly on the first try) of our task, requiring deductive reasoning and an abstract, format-independent representation of quantity, is able to differentiate between high and low performers on standardized measures of basic math competence non-verbally at an early stage of learning. Implications and limitations will be discussed. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 87 (5 UL)
Full Text
Peer Reviewed
See detailA Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs
Bezzaoucha, Souad UL; Voos, Holger UL; Davila, Jorge et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea ... [more ▼]

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea consists in defining a state and unknown input transformations in order to divide the state vector into two parts, a measurable part and an observable one (decoupled from the unknown input). A classical Luenberger observer to estimate the unmeasurable part is then designed and given in terms of Linear Matrix Inequalities (LMIs) conditions. A numerical example is also presented in order to illustrate the proposed approach. [less ▲]

Detailed reference viewed: 45 (3 UL)
See detailZusammenarbeit mit den Eltern und Valorisieren der Familiensprachen mit der App iTEO.
Kirsch, Claudine UL

Scientific Conference (2018, June 26)

Detailed reference viewed: 10 (2 UL)
See detailKommentar zu DIN EN 1994-1-1, Verbundtragwerke aus Stahl und BEton
Schäfer, Markus UL; Hanswile, Gerhard

Scientific Conference (2018, June 22)

Design of Composite Structures in steel and concrete according to EN 1994-1-1, presentation of special requirements and boundary conditions for the design of composite beams and columns.

Detailed reference viewed: 13 (0 UL)
Peer Reviewed
See detailEmergent Multilinguals Learning Languages with the iPad app iTEO
Aleksic, Gabrijela UL; Kirsch, Claudine UL

Scientific Conference (2018, June 22)

This presentation showed the results of a small-scale study led by Ass. Prof. Claudine Kirsch that investigated language learning in primary schools in Luxembourg and the ways in which this process is ... [more ▼]

This presentation showed the results of a small-scale study led by Ass. Prof. Claudine Kirsch that investigated language learning in primary schools in Luxembourg and the ways in which this process is mediated by peers and the iPad app iTEO. This study draws its data from the larger longitudinal qualitative research project iTEO (2013–2017) and is based on 10 hours of audio and video-recordings. The participants were 6–7-year-olds learning German and French. The presentation focused on the ways in which the emergent multilingual primary school children scaffold each other’s learning of French while collaboratively producing oral texts on iTEO. The findings show that the children’s language learning was mediated by peers, the task and the app. The children used a range of learning and teaching strategies while completing tasks framed by their teacher. iTEO and the task together mobilised the children’s resources, encouraged autonomy and promoted discussion about language. The presentation linked the results with the other projects during the COST DigitLitey meeting. For example, the link was made with the work with robots in early childhood education and the use of Cubetto, a robot toy teaching kids code and programming and encouraging collaboration and storytelling. The presentation was followed by a discussion on the use of digital tools in early childhood education settings. Keywords: The iPad app, iTEO, peers, language learning, mediation, primary school Source: Kirsch, C. & Bes Izuel, A. (2016). Emergent multilinguals learning languages with the IPad app iTEO: a study in primary schools in Luxembourg, The Language Learning Journal, 2016. https://doi.org/10.1080/09571736.2016.1258721 This work was funded by the University of Luxembourg under Grant PUL R-AGR-0222; Ministry of National Education, Childhood and Youth under SCRIPT. [less ▲]

Detailed reference viewed: 11 (1 UL)
See detailFlachdecken in Verbundbauweise Bemessung und Konstruktion von Slim-Floor-Trägern
Schäfer, Markus UL

Scientific Conference (2018, June 22)

Presentation of basic information for design of slim-floor beams and presentation of executed projects

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailOn bisymmetric and quasitrivial operations
Devillet, Jimmy UL

Scientific Conference (2018, June 21)

See attachment

Detailed reference viewed: 14 (0 UL)
Peer Reviewed
See detailExploring Multilingual Pedagogies: Forced Migrants’ Learning Experiences in Luxembourg
Kalocsanyiova, Erika UL

Scientific Conference (2018, June 20)

While most societies are structured around diverse flows of people and complex linguistic repertoires, (language) education schemes are still dominated by monolingual instructional practices. This paper ... [more ▼]

While most societies are structured around diverse flows of people and complex linguistic repertoires, (language) education schemes are still dominated by monolingual instructional practices. This paper aims to contribute to current discussions on the affordances of multilingual pedagogies in contexts of forced migration. It draws on a range of linguistic ethnographic data (Copland & Creese, 2015) that was collected over the period of 2016-2017 in diverse settings of language learning and socialization. Our research sites in Luxembourg included language courses in French, English and German, mathematics courses, application and web development training, and diverse leisure activities. Having followed the learning trajectory of five asylum applicants, we explored how they built on their old and newly-acquired language resources. Our findings confirm that in order to make their voices heard, the learners often drew upon elements from multiple languages, including those local languages they had no extensive competence in. This multilingual orientation enabled them to see the local languages as new functional resources in their growing repertoires (Kalocsányiová, 2017). This is of special relevance in contexts of forced migration, where learners need to become users of the languages they are learning from the first day onward. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailHighway Network Block with Gates Constraints for Training Very Deep Networks
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop, June 18-22, 2018 (2018, June 19)

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth ... [more ▼]

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth. Gate constraints are duly employed to improve optimization, latent representations and parameterization usage in order to efficiently learn hierarchical feature transformations which are crucial for the success of any deep network. One of the earliest very deep models with over 30 layers that was successfully trained relied on highway network blocks. Although, highway blocks suffice for alleviating optimization problem via improved information flow, we show for the first time that further in training such highway blocks may result into learning mostly untransformed features and therefore a reduction in the effective depth of the model; this could negatively impact model generalization performance. Using the proposed approach, 15-layer and 20-layer models are successfully trained with one gate and a 32-layer model using three gates. This leads to a drastic reduction of model parameters as compared to the original highway network. Extensive experiments on CIFAR-10, CIFAR-100, Fashion-MNIST and USPS datasets are performed to validate the effectiveness of the proposed approach. Particularly, we outperform the original highway network and many state-ofthe- art results. To the best our knowledge, on the Fashion-MNIST and USPS datasets, the achieved results are the best reported in literature. [less ▲]

Detailed reference viewed: 97 (8 UL)
Full Text
Peer Reviewed
See detailPose Encoding for Robust Skeleton-Based Action Recognition
Demisse, Girum UL; Papadopoulos, Konstantinos UL; Aouada, Djamila UL et al

in CVPRW: Visual Understanding of Humans in Crowd Scene, Salt Lake City, Utah, June 18-22, 2018 (2018, June 18)

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for ... [more ▼]

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for filtering linear noise transformations, but neglect to address potential nonlinear transformations. In this paper, we present an unsupervised learning approach for estimating nonlinear noise transformations in pose estimates. Our approach starts by decoupling linear and nonlinear noise transformations. While the linear transformations are modelled explicitly the nonlinear transformations are learned from data. Subsequently, we use an autoencoder with L2-norm reconstruction error and show that it indeed does capture nonlinear noise transformations, and recover a denoised pose estimate which in turn improves performance significantly. We validate our approach on a publicly available dataset, NW-UCLA. [less ▲]

Detailed reference viewed: 79 (25 UL)
See detailThe implementation of Circular Economy policies: A challenge for institutions and practices
Hild, Paula UL

Scientific Conference (2018, June 14)

Since 2014, the Grand Duchy of Luxembourg’s national policy aims at transitioning the national economy from a linear to a circular model. However, we do not know so far how the different socio-economic ... [more ▼]

Since 2014, the Grand Duchy of Luxembourg’s national policy aims at transitioning the national economy from a linear to a circular model. However, we do not know so far how the different socio-economic actors in the country deal with this new political vision. Thus, the overall aim of the CIRCULUX research project is to analyse the effectiveness of the circular economy policy in Luxembourg by studying institutions and practices in businesses. In this way, we follow authors who claim for the systematic inclusion of institutions into the analysis of policy effectiveness (Glückler and Lenz, 2016). We assume that institutions explain sectoral differences in the efficacy of circular economy policies, in analogy to Bathelt and Glückler (2014) who state that in a comparative study, institutions enable to clarify regional differences. Focusing on two different industries, the building sector and the automotive supply industry, we hope to explore the variety of circular economy practices, and therefore as well theoretical and pragmatic implications between the United Nations Sustainable Development Goals 9 (Industry, Innovation, and Infrastructure) and 12 (Responsible Consumption and Production). The research follows a qualitative research approach, including documentary analysis, up to 20 exploratory and around 50 semi-structured expert interviews. We intend to capture different dimensions of the motivations and barriers of companies for shifting towards circularity, by triangulation of these three datasets. In the analysis of data, we consider different levels and emphasise on three points highlighted by various authors for a need for further consideration. The first aspect focus on the socio-cultural specificities of Luxembourg and related challenges for the implementation of a circular economy (e.g., the mix of technical standards, multilingualism, corporate cultures). The second aspect covers the internal dynamics of actor networks and hybrid organisations that aim to bring circular economy theory into practice (Schulz and Preller, 2016). Moreover, the third aspect deals with the articulation between sustainability effectiveness and the cost from the perspectives of various stakeholders (Ruparathna and Hewage, 2015). The preliminary results put forward the interdependence of the actors’ perception of what would mean a circular economy model for Luxembourg. They also reveal the firm’s specific role in this system. The decision of a business actor to implement a circular economy practice depends primarily on its return on investment, the general regulatory pressure and the maturity of the industry and the company. In general, the hindrance for circularity is not the absence of a technological or technical solution. Interviews with experts from the business sector reveal that notably economic factors are hindering circularity in companies. Besides, the maturity of the firm given its awareness for concepts like the circular economy, sustainable development, or sustainability shapes its vision for the future in this field actively. As a push for action, interviewees suggested a regulatory framework for circularity. [less ▲]

Detailed reference viewed: 64 (0 UL)
See detailSoftening and melting modeling of iron ore particles using a discrete - continuous coupling method
Baniasadi, Mehdi UL; Baniasadi, Maryam; Peters, Bernhard UL

Scientific Conference (2018, June 13)

The blast furnace iron making is the main method to produce liquid iron. A blast furnace is charged with ore and coke from the top along with a preheated gas introduced to the furnace through the tuyeres ... [more ▼]

The blast furnace iron making is the main method to produce liquid iron. A blast furnace is charged with ore and coke from the top along with a preheated gas introduced to the furnace through the tuyeres in the lower part. The combustion of coke generates reducing gas ascending through the blast furnace to reduce iron-bearing materials. The reduced iron-bearing particles start softening and melting because of the weight of burden above and the high temperature in the middle of the blast furnace so-called cohesive zone. In this region, as particles are softened, the void space between particles decreases. As the temperature increases further, the softened particles start melting and generate two different liquids: molten iron and slag. Then the generated liquids trickle down to the lower part of the blast furnace. The softening and melting process forms the impermeable ferrous layers forcing gas to flow horizontally through the permeable coke windows. This causes a high-pressure drop. Softening and melting has a big effect on the operation of the blast furnace and since it is not possible to interrupt the blast furnace to investigate details of the phenomena occurring inside, the numerical simulation becomes more practical. In this contribution, the eXtended Discrete Element Method (XDEM) [1] as an advanced numerical tool based on the Eulerian-Lagrangian framework, is used. Within this platform, the gas and liquid phases are described by computational fluid dynamics (CFD) and the soft-sphere discrete element approach (DEM) is used for the coke and iron ore particles. Continuous phases are coupled to the discrete entities through mass, momentum, and energy exchange. Moreover, the internal temperature distribution of the particles is described. Therefore, the XDEM is able to model multiphase and multiscale phenomena as can occur in the cohesive zone. The particle's deformation, temperature, melting, and shrinking along with gas and liquids pressure, temperature and velocity patterns are examined using the XDEM method. [less ▲]

Detailed reference viewed: 36 (1 UL)
Full Text
See detailEBC network
Lehnert, Thorsten UL

Scientific Conference (2018, June 12)

Detailed reference viewed: 17 (0 UL)
Peer Reviewed
See detailDetecting Public Health crises: APC-Detrended methodology and residuals in a 25-country, 35-year mortality matrix
Chauvel, Louis UL; Leist, Anja UL; Smith, Herbert

Scientific Conference (2018, June 09)

Background. Mortality-by-cause analyses as done in the Global Burden of Disease 2016 update are helpful to monitor progress of public health improvements within and across countries. However, separate ... [more ▼]

Background. Mortality-by-cause analyses as done in the Global Burden of Disease 2016 update are helpful to monitor progress of public health improvements within and across countries. However, separate analyses by cause and country miss larger patterns of public health crises that are restricted to certain cohorts and periods. Those public health crises may go unnoticed even if they affect several countries and thus come with some threat potential. We propose a new method to detect cohorts with increased mortality at certain ages and periods. Method. We develop an analytical and visualizing technique based on established Age-Period-Cohort-Detrended (APCD) methodology (Chauvel and Schröder 2014). After detecting all-cause mortality increases, plotting the resulting age-period coefficients and APCD residuals in equilateral Lexis diagrams, mortality patterns can be distinguished as age, period, or cohort trends and fluctuations. Age-period interactions are plotted as ‘big red spots’. We employ the new technique in data from the Human Mortality Database, spanning 25-60 years of age, calendar years 1975-2010, and 25 countries. Results. We detect age-period interactions of young-adult cohorts in the early 1990s in Spain, other southern European countries and the U.S. Additional analyses with WHO mortality data show that mortality increases are mostly due to increased HIV/AIDS mortality. Discussion. Country-specific explanations, such as political frustrations in Spain, have been proposed to explain the 1990s increases in HIV/AIDS mortality. However, the new technique suggests that increases in HIV/AIDS mortality were more likely to be due to specific behaviors of cohorts of certain ages in a certain period. We discuss limitations of the method, such as detecting social class mortality differences of affected cohorts. Altogether, the new technique offers intuitive and efficient handling of large amounts of age-country-year mortality information. The method can further be applied in the fields of education, longevity, and demography at large. [less ▲]

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailDesigning personalized, interactive materials for presentation skills
Deroey, Katrien UL

Scientific Conference (2018, June 09)

In this talk I demonstrate how we can design and adapt materials for presentation skills to build on students’ individual needs and disciplinary backgrounds in an interactive way. The context for this is ... [more ▼]

In this talk I demonstrate how we can design and adapt materials for presentation skills to build on students’ individual needs and disciplinary backgrounds in an interactive way. The context for this is a conference skills course I’ve designed and successfully taught for several years. The PhD students on this course vary greatly in their presentation skills, experience and disciplinary background. After an overview of the course content and format, I illustrate how students’ own presentations and research can be integrated so as to enhance personal relevance and interactivity. Aspects of this personalized, interactive course design include filming student presentations, structured peer feedback and reflection, a pre-course questionnaire, and tasks requiring them to work with their conference calls, research, texts, visuals and experiences. I conclude with a summary of course feedback, highlighting what students reported as being particularly useful and what they would add or change. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailGovernance and Price Jumps
Lehnert, Thorsten UL

Scientific Conference (2018, June 07)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailAlternative Actors in the Foodscape: Enabling Policies and Politics of Contested Claims for Social and Environmental Justice
Reckinger, Rachel UL

Scientific Conference (2018, June 07)

Recently, a number of resourceful community-driven initiatives for local food production and retail have arisen in Luxembourg, where low organic agricultural rates are paired with high consumer demands ... [more ▼]

Recently, a number of resourceful community-driven initiatives for local food production and retail have arisen in Luxembourg, where low organic agricultural rates are paired with high consumer demands for organic produce, leading to a largely imported organic market. As an encompassing reaction, a niche of social innovators are combining agro-ecological land use and food production with locavorousness and circular economy. Based on qualitative interviews and participant observation, we expand on four case studies of fruit and vegetable production as well as unpackaged and/or socially responsible food retail in today’s Luxembourg. One has been established since the 1980s with over 200 employees, partly in social insertion measures, producing and importing organic fruit and vegetables. Since 2014, three significantly smaller initiatives with higher citizen involvement have emerged, with a cooperative governance structure, a claimed community-supported agricultural outlook, a dynamic presence on social media and regular hands-on workshops and activities. These recent initiatives are more radical in their agro-ecological and/or permaculture practices. In a renewed enacting of circular economy precepts, they focus on local production without relying on imports, as a politicized step further than (possibly industrialized) organic production. Grounded in heterodox experiences of alternative actors in food production and retail niches, we analyse ethical entrepreneurship and the governmentality at its core, political enabling or disabling structures and regulations, as well as commodification and upscaling issues. Therefore, this paper touches on governance interrelations between food policies and politics the politics of contested claims for, and practices of, social and environmental justice. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailOn biselective operations
Devillet, Jimmy UL; Kiss, Gergely UL

Scientific Conference (2018, June 07)

See attached file

Detailed reference viewed: 33 (4 UL)
Full Text
Peer Reviewed
See detailFoodscapes in Transition: Policies and Politics Advancing Sustainable Development and Social Justice
Reckinger, Rachel UL; Wahlen, Stefan

Scientific Conference (2018, June 07)

In this session, we would like to discuss the impact, risks and motivations of producers and consumers altering foodscapes. Of particular interest are enabling types of governance that improve ecological ... [more ▼]

In this session, we would like to discuss the impact, risks and motivations of producers and consumers altering foodscapes. Of particular interest are enabling types of governance that improve ecological balance and social justice in policies of governmental regulation and institutions but also in the politics of for example alternative food movements. The main impact that heterodox actors can have seems to be, on one hand, the creation of resourcefulness from innovative niches, not designed to be upscaled but spread by ubiquitous networking and, on the other hand, the exemplification of heterodox economic practices that reduce the current deskilling of producers and consumers and the depletion of natural resources. The risk associated with heterodox initiatives is, besides basic economic viability, territorial competition over land and resources, as well as – more insidiously – the potential of co-option by neoliberal corporate agendas. The motivations of actors involved in such social movements, albeit diverse, tend to stem from a stance of care and ethical (self)government, often using community self-organisation-tools. Such an analysis of food value chain practices focuses on negotiations and struggles among actors in a multifaceted foodscape, where some block and some enhance transitions. Viewing the relationships, interconnectedness and agency of niche innovations and regime hegemonies opens up the perspective of contested knowledge claims. Additionally, the ways in which actors in the regulatory field advance transitions by policy measures and initiatives need to be considered, and in particular the processes of politicization as interdependencies between movement actors and the public sphere. Yet, the daily practices stay embedded in social, cultural and economic constraints and in routines, which are built on tacit knowledge, collective learning and engrained practices; even though repetitive, they can account for both reproduction and innovation. Which types of governance at all levels have shown themselves to be effective in supporting and empowering such bottom-up changes in “knowing and growing food in a contested arena” (Goodman, DuPuis, Goodman, 2014)? [less ▲]

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailCompetition and Workplace Bullying. The moderating role of passive avoidant leadership style.
Sischka, Philipp UL; Steffgen, Georges UL

Scientific Conference (2018, June 06)

It has been argued that an organizational climate that is characterized by competition and envy may increase workplace bullying (Salin, 2003, 2015; Vartia, 1996). Employees may be tempted to gain a ... [more ▼]

It has been argued that an organizational climate that is characterized by competition and envy may increase workplace bullying (Salin, 2003, 2015; Vartia, 1996). Employees may be tempted to gain a relative advantage over their colleagues by setting them under pressure, isolating them, undermining or sabotaging their work (Kohn, 1992; Ng, 2017, Salin, 2003), in sum trying to bully them. This should be especially true, when supervisor exhibit a passive avoidant leadership style that is when supervisor are physically in post but fail to carry out their duties (Hoel, Glasø, Hetland, Cooper, & Einarsen, 2010). Therefore, the aim of our study was to test if competition is a potential risk factor for workplace bullying and if this association depends on the level of passive avoidant leadership style. We proposed that competition and passive avoidant leadership style are positive related to workplace bullying victimization and perpetration. Furthermore, we hypothesized that the effect of competition on workplace bullying victimization and perpetration is moderated through passive avoidant leadership style. Amazon Mechanical Turk was used to recruited employees. We followed recent recommendations using MTurk as participant recruiting system (Keith et al., 2017), e.g., prescreening for desired target population, fair payment (i.e. US$0.10 per estimated minute of participation; Chandler & Shapiro, 2016) and data screening methods for insufficient effort responding (McGonagle, Huang, & Walsh, 2016). The final sample consists of 1,411 respondents (56.6% females, n = 798). Respondents age ranged from 20 to 73 (M = 37.3; SD = 10.4). As the self-labelling method and the behavioral method to assess workplace bullying both have its shortcomings (Nielsen, Notelaers, & Einarsen, 2011), both approaches were used. Hierarchical regression analyses showed that competition and passive avoidant leadership style are important predictor for workplace bullying victimization and perpetration. Furthermore, the results indicated that the effect of competition on workplace bullying victimization (measured via behavioral method) and self-labelled workplace bullying victimization and perpetration is moderated through passive avoidant leadership style. However, for workplace bullying perpetration (measured via behavioral method) no moderation effect was found. These findings have important implications for employers that seek to end workplace bullying in their organization. The present study contributes to the workplace bullying literature in at least two ways. First, while recent research has focused on the main effects of competition (e.g., Salin, 2003) and passive avoidant leadership (e.g., Skogstad et al., 2007) on workplace bullying, the present study sheds light on the moderation effect of passive avoidant leadership style on the effect of competition on workplace bullying. Second, not only workplace bullying victimization but also perpetration is considered, that is still an under-researched topic. [less ▲]

Detailed reference viewed: 37 (2 UL)