References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 38 (13 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 140 (6 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 32 (4 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 58 (11 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 45 (9 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 234 (3 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 92 (6 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 15 (0 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailExperimental design trade-offs for gene regulatory network inference: an in silico study of the yeast Saccharomyces cerevisiae cell cycle
Markdahl, Johan UL; Colombo, Nicolo UL; Thunberg, Johan UL et al

in Proceedings of the 56th IEEE Conference on Decision and Control (in press)

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a ... [more ▼]

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a set of quantitative guidelines that prescribe the minimal number of samples required to infer a reliable GRN model. We study the temporal resolution of data vs.quality of GRN inference in order to ultimately overcome this deficit. The evolution of a Markovian jump process model for the Ras/cAMP/PKA pathway of proteins and metabolites in the G1 phase of the Saccharomyces cerevisiae cell cycle is sampled at a number of different rates. For each time-series we infer a linear regression model of the GRN using the LASSO method. The inferred network topology is evaluated in terms of the area under the precision-recall curve (AUPR). By plotting the AUPR against the number of samples, we show that the trade-off has a, roughly speaking, sigmoid shape. An optimal number of samples corresponds to values on the ridge of the sigmoid. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 52 (5 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 56 (3 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 89 (8 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (in press)

Detailed reference viewed: 125 (12 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 95 (9 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in AUEIRC Proceeedings (in press)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 198 (15 UL)
Full Text
Peer Reviewed
See detailOn the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics software
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in AIP Conference Proceedings ICNAAM 2017 (in press)

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]

Detailed reference viewed: 56 (24 UL)
Peer Reviewed
See detailORBIT - Overcoming Breakdowns in Teams with Interactive Tabletops
Sunnen, Patrick UL; Arend, Béatrice UL; Maquil, Valérie

Poster (2018, June)

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns ... [more ▼]

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns. The design and the research process relies on user-centered design methods and on an ethnomethodological conversation analytic framework. The project will generate scientific knowledge on participants’ collaboration methods and create a powerful collaborative learning tool. [less ▲]

Detailed reference viewed: 11 (3 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Design of Pedestrian Mobility for Smart City Simulators
Vitello, Piergiorgio; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018 (2018, May)

The unprecedented growth of the population living in urban environments calls for a rational and sustainable urban development. Smart cities can fill this gap by providing the citizens with high-quality ... [more ▼]

The unprecedented growth of the population living in urban environments calls for a rational and sustainable urban development. Smart cities can fill this gap by providing the citizens with high-quality services through efficient use of Information and Communication Technology (ICT). To this end, active citizen participation with mobile crowdsensing (MCS) techniques is a becoming common practice. As MCS systems require wide participation, the development of large scale real testbeds is often not feasible and simulations are the only alternative solution. Modeling the urban environment with high precision is a key ingredient to obtain effective results. However, currently existing tools like OpenStreetMap (OSM) fail to provide sufficient levels of details. In this paper, we apply a procedure to augment the precision (AOP) of the graph describing the street network provided by OSM. Additionally, we compare different mobility models that are synthetic and based on a realistic dataset originated from a well known MCS data collection campaign (ParticipAct). For the dataset, we propose two arrival models that determine the users’ arrivals and match the experimental contact distribution. Finally, we assess the scalability of AOP for different cities, verify popular metrics for human mobility and the precision of different arrival models. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailTime to Clean Your Test Objectives
Marcozzi, Michaël; Bardin, Sébastien; Kosmatov, Nikolai et al

in 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden (2018, May)

Detailed reference viewed: 9 (0 UL)
Peer Reviewed
See detailDark Souls like "Dark Souls": Personality Characteristics and Preference for Violent Video Games
Melzer, André UL; Engelberg, Elisabeth

Scientific Conference (2018, May)

Detailed reference viewed: 7 (1 UL)
Peer Reviewed
See detailHow to threaten male gamers: The effects of stereotype threat on video game performance
Wagener, Gary L.; Melzer, André UL

Poster (2018, May)

A total of 70 participants (47.1% men) took part in a lab experiment that manipulated stereotype threat (i.e., the risk of confirming a negative stereotype about one’s group) between playing a video game ... [more ▼]

A total of 70 participants (47.1% men) took part in a lab experiment that manipulated stereotype threat (i.e., the risk of confirming a negative stereotype about one’s group) between playing a video game (Bejeweled 3). Participants performed generally worse after reading a fictitious article on gaming research that women would still play less and perform worse in games than men (ST condition). In contrast to males, however, female participants reported greater frustration from reading this article than their colleagues who read that women and men no longer differ in terms of playing frequency and performance skills (no ST condition). Interestingly, a reverse pattern of results was obtained for male participants, who reported a stronger negative effect of the article in the no ST condition on their ability to show their best gaming performance. Apparently, stereotype threat may affect video game performance both for women and men, but for different reasons. [less ▲]

Detailed reference viewed: 30 (2 UL)
See detailBilderbücher als Medium zum Valorisieren der Familiensprachen im Précoce
Andersen, Katja Natalie UL; Reuland, Claudine; Rios-Ney, Jessica

Scientific Conference (2018, April 26)

Detailed reference viewed: 6 (2 UL)
Full Text
Peer Reviewed
See detailDesigning Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid; Shankar, Bhavani UL; Maleki, Sina UL et al

in IEEE WCNC 2018 (2018, April 18)

This paper aims to design joint on-ground precoding and on-board beamforming of a multiple gateway multibeam satellite system in a hybrid space-ground mode where full frequency reuse pattern is considered ... [more ▼]

This paper aims to design joint on-ground precoding and on-board beamforming of a multiple gateway multibeam satellite system in a hybrid space-ground mode where full frequency reuse pattern is considered among the beams. In such an architecture, each gateway serves a cluster of adjacent beams such that the adjacent clusters are served through a set of gateways that are located at different geographical areas. However, such a system brings in two challenges to overcome. First, the inter-beam interference is the bottleneck of the whole system and applying interference mitigation techniques becomes necessary. Second, as the data demand increases, the ground and space segments should employ extensive bandwidth resources in the feeder link accordingly. This entails embedding an extra number of gateways aiming to support a fair balance between the increasing demand and the corresponding required feeder link resources. To solve these problems, this study investigates the impact of employing a joint multiple gateway architecture and on-board beamforming scheme. It is shown that by properly designing the on-board beamforming scheme, the number of gateways can be kept affordable even if the data demand increases. Moreover, Zero Forcing (ZF) precoding technique is considered to cope with the inter-beam interference where each gateway constructs a part of block ZF precoding matrix. The conceived designs are evaluated with a close-to-real beam pattern and the latest broadband communication standard for satellite communications. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailA parallel best-response algorithm with exact line search for nonconvex sparsity-regularized rank minimization
Yang, Yang UL; Pesavento, Marius

in Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal (2018, April)

Detailed reference viewed: 76 (31 UL)
Full Text
Peer Reviewed
See detailOptimization of weighted individual energy efficiencies in interference networks
Matthiesen, Bho; Yang, Yang UL; Jorswieck, Eduard

in Proc. IEEE Wireless Communications and Networking Conference (2018, April)

Detailed reference viewed: 56 (3 UL)
Full Text
Peer Reviewed
See detailEnergy efficiency in MIMO interference channels: Social optimality and max-min fairness
Yang, Yang UL; Pesavento, Marius

in Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal (2018, April)

Detailed reference viewed: 33 (6 UL)
Full Text
Peer Reviewed
See detailComparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization
Tessaro Lunardi, Willian UL; Voos, Holger UL

in 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018 (2018, April)

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be ... [more ▼]

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be processed by several different machines. The FJSP contains two sub-problems, namely machine assignment problem and operation sequencing problem. In this paper, we propose and compare a discrete firefly algorithm (FA) and a genetic algorithm (GA) for the multi-objective FJSP. Three minimization objectives are considered, the maximum completion time, workload of the critical machine and total workload of all machines. Five well-known instances of FJSP have been used to evaluate the performance of the proposed algorithms. Comparisons among our methods and state-of-the-art algorithms are also provided. The experimental results demonstrate that the FA and GA have achieved improvements in terms of efficiency. Solutions obtained by both algorithms are comparable to those obtained by algorithms with local search. In addition, based on our initial experiments, results show that the proposed discrete firefly algorithm is feasible, more effective and efficient than our proposed genetic algorithm for solving multi-objective FJSP. [less ▲]

Detailed reference viewed: 134 (44 UL)
Full Text
Peer Reviewed
See detailProfiling Energy Efficiency of Mobile Crowdsensing Data Collection Frameworks for Smart City Applications
Tomasoni, Mattia; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in The 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2018) (2018, March)

Mobile crowdsensing (MCS) has emerged in the last years and has become one of the most prominent paradigms for urban sensing. In MCS, citizens actively participate in the sensing process by contributing ... [more ▼]

Mobile crowdsensing (MCS) has emerged in the last years and has become one of the most prominent paradigms for urban sensing. In MCS, citizens actively participate in the sensing process by contributing data with their smartphones, tablets, wearables and other mobile devices to a collector. As citizens sustain costs while contributing data, i.e., the energy spent from the batteries for sensing and reporting, devising energy efficient data collection frameworks (DCFs) is essential. In this work, we compare the energy efficiency of several DCFs through CrowdSenSim, which allows to perform large-scale simulation experiments in realistic urban environments. Specifically, the DCFs under analysis differ one with each other by the data reporting mechanism implemented and the signaling between users and the collector needed for sensing and reporting decisions. Results reveal that the key criterion differentiating DCFs' energy consumption is the data reporting mechanism. In principle, continuous reporting to the collector should be more energy consuming than probabilistic reporting. However, DCFs with continuous reporting that implement mechanisms to block sensing and data delivery after a certain amount of contribution are more effective in harvesting data from the crowd. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailNon-intrusive Distracted Driving Detection Based on Driving Sensing Data
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

Scientific Conference (2018, March)

Nowadays Internet-enabled phones have become ubiquitous, and we all witness the flood of information that often arrives with a notification. Most of us immediately divert our attention to our phones even ... [more ▼]

Nowadays Internet-enabled phones have become ubiquitous, and we all witness the flood of information that often arrives with a notification. Most of us immediately divert our attention to our phones even when we are behind the wheel. Statistics show that drivers use their phone on 88% of their trips and on 2015 in the UnitedKingdom 25% of the fatal accidents were caused by distraction or impairment. Therefore there is need to tackle this issue. However, most of the distraction detection methods either use expensive dedicated hardware and/or they make use of intrusive or uncomfortable sensors. We propose distracted driving detection mechanism using non-intrusive vehicle sensor data. In the proposed method 9 driving signals are used. The data is collected, then two sets of statistical and cepstral features are extracted using a sliding window process, further a classifier makes a prediction for each window frame, lastly, a decision function takes the last l predictions and makes the final prediction. We evaluate the subject independent performance of the proposed mechanism using a driving dataset consisting of 13 drivers. We show that performance increases as the decision window become larger.We achieve the best results using a Gradient Boosting classifier with a decision window of total duration 285seconds which yield ROC AUC of 98.7%. [less ▲]

Detailed reference viewed: 15 (3 UL)
Peer Reviewed
See detailFourth-graders' competence beliefs in mathematics
Villanyi, Denise UL; Wollschlaeger, Rachel UL; Martin, Romain UL et al

Poster (2018, February 15)

Detailed reference viewed: 18 (4 UL)
Peer Reviewed
See detailLa référence à l’Alsace-Lorraine dans le rattachement et l’intégration d’Eupen-Malmedy à la Belgique (1918-1925)
Brüll, Christoph UL

Scientific Conference (2018, February 09)

En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des ... [more ▼]

En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des « frères de race et de langue, exilés et emprisonnés en Prusse. » Le 20 septembre 1920, ce Kreis ainsi que celui d’Eupen, presque exclusivement germanophone, sont rattachés à la Belgique, suite au traité de Versailles et à un simulacre de consultation populaire. Dans notre contribution qui traitera de la période qui s’étend de l’occupation de la région par des troupes belges en août 1919 à la fin du régime transitoire en mars 1925, nous voudrions nous interroger sur la signification de la référence à l’Alsace-Lorraine pendant cette phase du changement de la nationalité. Des indices donnent à penser que cette référence n’est pas limitée aux discours de légitimation de l’annexion du territoire par la Belgique, mais que les autorités belges ont, à certaines occasions (comme l’introduction du service militaire), contacté leurs homologues français afin de connaître la politique d’intégration menée en Alsace-Lorraine. En revanche, il n’y a jamais eu d’étude systématique de cette référence idéelle et pratique. Notre proposition voudrait combler cette lacune et constituerait également une contribution à une histoire comparée de la transition étatique dans les deux territoires. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailIdentification and Characterization of Variant Intolerant Sites across Human Protein 3-Dimensional Structures
Iqbal, Sumaiya; Berg Jespersen, Jakob; Perez-Palma, Eduardo et al

in Biophysical Journal (2018, February 02), 114(3, Suppl. 1), 664

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish ... [more ▼]

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish pathogenic variants from benign rare variants. This lack of statistical and bioinformatics analyses, accompanied by an ever-increasing number of identified variants in biomedical research and clinical applications, has become a major challenge. Established methods to predict the functional effect of genetic variation use the degree of amino acid conservation across species in linear protein sequence alignment. More recent methods include the spatial distribution pattern of known patient and control variants. Here, we propose to combine the linear conservation and spatial constrained based scores to devise a novel score that incorporates 3-dimensional structural properties of amino acid residues, such as the solvent-accessible surface area, degree of flexibility, secondary structure propensity and binding tendency, to quantify the effect of amino acid substitutions. For this study, we develop a framework for large-scale mapping of established linear sequence-based paralog and ortholog conservation scores onto the tertiary structures of human proteins. This framework can be utilized to map the spatial distribution of mutations on solved protein structures as well as homology models. As a proof of concept, using a homology model of the human Nav1.2 voltage-gated sodium channel structure, we observe spatial clustering in distinct domains of mutations, associated with Autism Spectrum Disorder (>20 variants) and Epilepsy (>100 variants), that exert opposing effects on channel function. We are currently characterizing all variants (>300k individuals) found in ClinVar, the largest disease variant database, as well as variants identified in >140k individuals from general population. The variant mapping framework and our score, informed with structural information, will be useful in identifying structural motifs of proteins associated with disease risk. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Fejoz, Loïc; Regnier, Bruno; Miramont, Philippe et al

Scientific Conference (2018, February 02)

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise ... [more ▼]

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise understanding of TTE’s functioning and its performances in nominal and error conditions. This holds especially true for the clock synchronization algorithm, the cornerstone of time-triggered communication in TTE, which involves complex distributed algorithms. In this study, we use both an experimental platform and fault-injection on a simulation model to gain quantified insights in these questions. We first describe a fine-grained simulation model of TTE model and discuss how it has been validated against communication traces recorded on the TTE platform. We then present experiments that evaluate the accuracy of the clock synchronization in TTE in the fault-free case as well as considering permanent link failure and transient transmission errors. Finally, we discuss what we have learned during the project in terms of development process and programming language support for complex simulation models used in the design of critical systems. [less ▲]

Detailed reference viewed: 33 (6 UL)
Full Text
Peer Reviewed
See detailInsights on the Performance and Configuration of AVB and TSN in Automotive Ethernet Networks
Migge, Jörn; Villanueva, Josetxo; Navet, Nicolas UL et al

Scientific Conference (2018, February 02)

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of ... [more ▼]

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In this work, the basic questions that we investigate on a case-study with diverse and demanding communication requirements is what can we expect from the various protocols aimed at providing a better timing Quality of Service on top of Ethernet? And how to use them? Especially how to use them in a combined manner. We will focus on the Credit-Based Shaper of AVB, the Time-Aware Shaper of TSN and the use of priorities as defined in IEEE802.1Q. The performance metrics considered are the distributions of the communication latencies, obtained by simulation, as well as upper bounds on these quantities obtained by worst-case schedulability analysis. If there have been over the last 5 years numerous studies on the performance of AVB CBS, the literature on comparing AVB to TSN and other candidate protocols is still sparse. To the best of our knowledge, this empirical study is the first to consider most protocols currently considered in the automotive domain, with the aim to gain insights into the different technological, design and configurations alternatives. In particular, an objective of this study is to identify key problems that need to be solved in order to further automate network design and configuration. [less ▲]

Detailed reference viewed: 39 (2 UL)
Peer Reviewed
See detailUn outil sur tablette tactile facilitant l'autuévaluation à l'école primaire
Villanyi, Denise UL; Martin, Romain UL; Sonnleitner, Philipp UL et al

Scientific Conference (2018, January 11)

Detailed reference viewed: 16 (3 UL)
Peer Reviewed
See detailSurmonter les barrières linguistiques avec « MaGrid » - un outil de formation de pré-mathématiques pour un contexte scolaire multilingue
Cornu, Véronique UL; Pazouki, Tahereh UL; Schiltz, Christine UL et al

Scientific Conference (2018, January 11)

Le contexte scolaire luxembourgeois est caractérisé par le multilinguisme et une population scolaire hétérogène, ce qui nécessite la mise en place de pratiques pédagogiques qui prennent en compte ... [more ▼]

Le contexte scolaire luxembourgeois est caractérisé par le multilinguisme et une population scolaire hétérogène, ce qui nécessite la mise en place de pratiques pédagogiques qui prennent en compte l’hétérogénéité des élèves. Dans le domaine des mathématiques, qui semble être non-verbal à première vue, des résultats scientifiques montrent que les enfants dont la langue maternelle est différente de la langue d’instruction, atteignent sur des tests d’aptitudes pré-mathématiques des résultats significativement inférieurs à ceux de leurs camarades natifs. Ceci est d’autant plus inquiétant, sachant que ces aptitudes pré-mathématiques sont prédictives des apprentissages ultérieurs. Par conséquent, nous avons développé l’outil de formation de pré-mathématiques non-verbale « MaGrid ». « MaGrid » permet à chaque enfant de bénéficier pleinement d’une instruction préscolaire en mathématiques, indépendamment de ses compétences langagières. Cet outil se caractérise par sa nature visuelle et il est implémenté sur tablette tactile. Jusqu’à présent, nous avons implémenté et évalué « MaGrid » lors de deux études scientifiques. Les résultats quantitatifs des évaluations empiriques sont prometteurs, comme ils montrent des effets positifs sur les habilités entraînées chez les enfants ayant utilisé cet outil comparé à un groupe contrôle. Dans une première étude, l’outil a été utilisé auprès de cinq classes durant 10 semaines, comprenant deux séances de 20 minutes par semaine. Les résultats lors de petites épreuves spécifiques ont été comparés aux résultats d’élèves de cinq classes n’ayant pas d’entraînement spécifique, et des effets d’intervention ont été observés. Dans une deuxième étude, nous nous sommes focalisés sur un groupe d’enfants de langue minoritaire (le portugais). « MaGrid » a été utilisé lors d’un programme d’intervention de pré-mathématiques s’étendant sur les deux années scolaires de l’école préscolaire. Les analyses préliminaires ont abouti à des résultats positifs. Des effets bénéfiques se sont manifestés sur différentes mesures de pré-mathématiques chez les enfants ayant suivi notre programme par rapport aux enfants du groupe contrôle. [less ▲]

Detailed reference viewed: 46 (8 UL)
Full Text
See detailEvaluation à l’ère du numérique: continuité ou rupture?
Reuter, Bob UL; Meyers, Christian UL; Busana, Gilbert UL

Scientific Conference (2018, January 10)

Face aux nouveaux défis qui se posent à la société-monde du 21e siècle, les « techno-prophètes » présagent que la numérisation nous aidera à améliorer l’éducation des futures générations (Dräger & Müller ... [more ▼]

Face aux nouveaux défis qui se posent à la société-monde du 21e siècle, les « techno-prophètes » présagent que la numérisation nous aidera à améliorer l’éducation des futures générations (Dräger & Müller-Eiselt, 2015 ; Khan, 2013 ; Cuban, 2003). L’évaluation des apprentissages assistée par ordinateur deviendrait notamment plus efficiente, plus pratique, plus flexible, plus rapide, plus objective, plus accessible, plus sécurisée, plus juste et plus économe. Par contre celle-ci reste souvent dans la continuité de pratiques existantes (Substitution ou Augmentation dans le modèle SAMR de Ruben Puentedura, 2006), donc limitée à la reproduction de connaissances déclaratives et de procédures fixes. Les ordinateurs sont en effet mieux aptes à rapidement corriger les réponses des apprenants à des tests standardisés et fermés. De plus, pour nous la révolution numérique incarne plus un grand défi qu’une solution miracle pour l’évaluation des apprentissages (scolaires ou autres). En effet, dans un monde où la numérisation mène à une croissance exponentielle et à une diffusion ultra-rapide des informations et à leur accès de plus en plus libre et facile, il ne suffit plus d’accumuler des connaissances, ni de simplement les reproduire. Mais il faut être capable de savoir où aller chercher des informations, comment juger leur crédibilité et utilité et comment les utiliser pour résoudre des problèmes. L’évaluation des apprentissages ne pourra donc plus se limiter à mesurer la capacité des élèves à mémoriser et à reproduire des informations mais devra s’aligner sur les nouveaux objectifs d’une éducation préparant les futures générations à affronter les défis d’un monde globalisé et connecté (cf. modèle des 21st century skills; Trilling & Fadel, 2009). La question fondamentale qui se posera pour l’évaluation des apprentissages sera celle de savoir comment évaluer des compétences (savoir, savoir-faire et savoir-être) complexes, dynamiques et changeantes. La question de l’utilisation des technologies numériques à des fins d’évaluation nous semble donc secondaire par rapport à la question de la transformation de l’évaluation afin qu’elle nous permette de répondre aux défis de la révolution civilisationnelle provoquée par la présence des technologies numériques et leur expansion irrémédiable dans nos pratiques culturelles, sociales, économiques, politiques et pédagogiques quotidiennes. Dans cette communication nous ne viserons pas nécessairement à fournir des réponses toutes faites, mais à stimuler le débat sur les relations mutuelles entre révolution numérique et évaluation en milieu scolaire, en termes d’innovations évolutives ou disruptives (Christensen, Johnson & Horn, 2008). [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
See detailUsing higher-order adjoints to accelerate the solution of UQ problems with random fields
Hale, Jack UL; Hauseux, Paul UL; Bordas, Stéphane UL

Poster (2018, January 08)

A powerful Monte Carlo variance reduction technique introduced in Cao and Zhang 2004 uses local derivatives to accelerate Monte Carlo estimation. This work aims to: develop a new derivative-driven ... [more ▼]

A powerful Monte Carlo variance reduction technique introduced in Cao and Zhang 2004 uses local derivatives to accelerate Monte Carlo estimation. This work aims to: develop a new derivative-driven estimator that works for SPDEs with uncertain data modelled as Gaussian random fields with Matérn covariance functions (infinite/high-dimensional problems) (Lindgren, Rue, and Lindström, 2011), use second-order derivative (Hessian) information for improved variance reduction over our approach in (Hauseux, Hale, and Bordas, 2017), demonstrate a software framework using FEniCS (Logg and Wells, 2010), dolfin-adjoint (Farrell et al., 2013) and PETSc (Balay et al., 2016) for automatic acceleration of MC estimation for a wide variety of PDEs on HPC architectures. [less ▲]

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailNon-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling
Charlier, Jérémy Henri J. UL; State, Radu UL; Hilger, Jean

in Charlier, Jeremy; State, Radu; Hilger, Jean (Eds.) 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (2018, January)

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and ... [more ▼]

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and transaction costs reduction. The Ethereum Virtual Machine performs smart contracts runs, where the execution of each contract is limited to the amount of gas required to execute the operations described in the code. Each gas unit must be paid using Ether, the crypto-currency of the platform. Due to smart contracts interactions evolving over time, analyzing the behavior of smart contracts is very challenging. We address this challenge in our paper. We develop for this purpose an innovative approach based on the nonnegative tensor decomposition PARATUCK2 combined with long short-term memory (LSTM) to assess if predictive analysis can forecast smart contracts interactions over time. To validate our methodology, we report results for two use cases. The main use case is related to analyzing smart contracts and allows shedding some light into the complex interactions among smart contracts. In order to show the generality of our method on other use cases, we also report its performance on video on demand recommendation. [less ▲]

Detailed reference viewed: 20 (4 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 38 (7 UL)
Full Text
Peer Reviewed
See detailÉvaluations numériques: quel rôle pour l’expérience utilisateur ?
Pere, Maxime UL; Lallemand, Carine UL; Koenig, Vincent UL

Scientific Conference (2018, January)

Detailed reference viewed: 48 (14 UL)
Full Text
Peer Reviewed
See detailPERSEUS: A Personalization Framework for Sentiment Categorization with Recurrent Neural Network
Guo, Siwen UL; Höhn, Sviatlana; Xu, Feiyu et al

in International Conference on Agents and Artificial Intelligence , Funchal 16-18 January 2018 (2018, January)

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between ... [more ▼]

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between individuals and certain consistency in each individual is the cornerstone of the framework. We focus on relations between documents for user-sensitive predictions. Individual’s lexical choices act as indicators for individuality, thus we use a concept-based system which utilizes neural networks to embed concepts and associated topics in text. Furthermore, a recurrent neural network is used to memorize the history of user’s opinions, to discover user-topic dependence, and to detect implicit relations between users. PERSEUS also offers a solution for data sparsity. At the first stage, we show the benefit of inquiring a user-specified system. Improvements in performance experimented on a combined Twitter dataset are shown over generalized models. PERSEUS can be used in addition to such generalized systems to enhance the understanding of user’s opinions. [less ▲]

Detailed reference viewed: 55 (24 UL)
Full Text
Peer Reviewed
See detailA Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together ... [more ▼]

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together with indistinguishable decoy words so when an intruder steals the file, retrieves the words, and tries to log-in, he does not know which one is the password. By guessing one from the decoy words, he may not be lucky and reveal the leak. Juels and Rivest left a problem open: how to make the system secure even when the intruder corrupted the login server’s code. In this paper we study and solve the problem. However, since “code corruption” is a powerful attack, we first define rigorously the threat and set a few assumptions under which the problem is still solvable, before showing meaningful attacks against the original Honeywords System. Then we elicit a fundamental security requirement, implementing which, we are able to restore the honeywords System’s security despite a corrupted login service. We verify the new protocol’s security formally, using ProVerif for this task. We also implement the protocol and test its performance. Finally, at the light of our findings, we discuss whether it is still worth using a fixed honeywords-based system against such a powerful threat, or whether it is better, in order to be resilient against code corruption attacks, to design afresh a completely different password-based authentication solution. [less ▲]

Detailed reference viewed: 91 (15 UL)
See detailLa libertas, strumento ideologico dell’espansione territoriale del comune di Firenze nel XIV secolo
Abeles, Solal UL

in Zorzi, Andrea (Ed.) La libertà nelle città comunali e signorili italiane (2018)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 94 (7 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 79 (10 UL)
Full Text
Peer Reviewed
See detailComparison of Several RANS Modelling for the Pavia TRIGA Mark II Research Reactor
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in Journal of Nuclear Engineering and Radiation Science (2018)

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the ... [more ▼]

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the channel thermal-hydraulics of the TRIGA Mark II reactor. Only the steady state behaviour (i.e. the full power stationary operational conditions) of the reactor has been considered. To this end, the RAS (Reynolds-Averaged Simulation) models available in the open source CFD software OpenFOAM have been applied to the most internal channel of the TRIGA and assessed against a Large Eddy Simulation (LES) model. The results of the latter approach, expressed in terms of axial velocity, turbulent viscosity, turbulent kinetic energy, and temperature have been compared with the results obtained by the RAS models available in OpenFOAM (k − ε, k − ω and Reynolds Stress Transport). Heat transfer is taken into account as well by means of the turbulent energy diffusivity parameter. The simulation results demonstrate how, amongst the RAS models, the k − ω SST is the one whose results are closer to the LES simulation. This model seems to be the best one for the treatment of turbulent flow within the TRIGA subchannel, offering a good compromise between accuracy and computational requirements. Since it is much less expensive than an LES model, it can be applied even to full core calculation, in order to obtain accurate results with less computational effort. [less ▲]

Detailed reference viewed: 33 (3 UL)
Full Text
Peer Reviewed
See detailTesting Vision-Based Control Systems Using Learnable Evolutionary Algorithms
Ben Abdessalem (helali), Raja UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 40th International Conference on Software Engineering (ICSE 2018) (2018)

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We ... [more ▼]

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We propose an automated testing algorithm that builds on learnable evolutionary algorithms. These algorithms rely on machine learning or a combination of machine learning and Darwinian genetic operators to guide the generation of new solutions (test scenarios in our context). Our approach combines multiobjective population-based search algorithms and decision tree classification models to achieve the following goals: First, classification models guide the search-based generation of tests faster towards critical test scenarios (i.e., test scenarios leading to failures). Second, search algorithms refine classification models so that the models can accurately characterize critical regions (i.e., the regions of a test input space that are likely to contain most critical test scenarios). Our evaluation performed on an industrial automotive vision-based control system shows that: (1) Our algorithm outperforms a baseline evolutionary search algorithm and generates 78% more distinct, critical test scenarios compared to the baseline algorithm. (2) Our algorithm accurately characterizes critical regions of the system under test, thus identifying the conditions that likely to lead to system failures. [less ▲]

Detailed reference viewed: 167 (38 UL)
See detailDénationaliser le passé, désétatiser le politique : les apports d'un dialogue nouveau entre historiographies française et italienne des formations politiques de la fin du Moyen Âge
Abeles, Solal UL

in Genet, Jean-Philippe (Ed.) Les vecteurs de l'idéel, vi, Mutations des sociétés politiques et systèmes de communication (2018)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailAre Mutation Scores Correlated with Real Fault Detection? A Large Scale Empirical study on the Relationship Between Mutants and Real Faults
Papadakis, Mike UL; Shin, Donghwan; Yoo, Shin et al

in 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden (2018)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Generation of Constraints from Use Case Specifications to Support System Testing
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification (2018)

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements ... [more ▼]

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements. Unfortunately, since requirements are typically written in natural language, significant engineering effort is required to derive test cases from requirements. In such a context, automated support for generating system test cases from requirements specifications written in natural language would be highly beneficial. Unfortunately, existing approaches have limited applicability. For example, some of them require that software engineers provide formal specifications that capture some of the software behavior described using natural language. The effort needed to define such specifications is usually a significant deterrent for software developers. This paper proposes an approach, OCLgen, which largely automates the generation of the additional formal specifications required by an existing test generation approach named UMTG. More specifically, OCLgen relies on semantic analysis techniques to automatically derive the pre- and post-conditions of the activities described in use case specifications. The generated conditions are used by UMTG to identify the test inputs that cover all the use case scenarios described in use case specifications. In practice, the proposed approach enables the automated generation of test cases from use case specifications while avoiding most of the additional modeling effort required by UMTG. Results from an industrial case study show that the approach can automatically and correctly generate more than 75% of the pre- and post-conditions characterizing the activities described in use case specifications. [less ▲]

Detailed reference viewed: 94 (13 UL)
Full Text
Peer Reviewed
See detailSecure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Seo, Hwajeong; Liu, Zhe UL; Park, Taehwan et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 30)

Detailed reference viewed: 7 (0 UL)
See detailAn elementary proof of the formal rigidity of the Witt and Virasoro algebra
Schlichenmaier, Martin UL

Scientific Conference (2017, December 19)

Detailed reference viewed: 10 (0 UL)
Peer Reviewed
See detailThe Missing Risk Premium in Exchange Rates
Penasse, Julien UL

Scientific Conference (2017, December 15)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailTemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 41 (6 UL)
Full Text
Peer Reviewed
See detailOn the Risk of Tool Over-tuning in Runtime Verification Competitions
Bianculli, Domenico UL; Krstic, Srdan

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 34 (8 UL)
See detailHealth Behaviour in School-aged Children - Studienergebnisse der HBSC-Erhebung 2014
Heinz, Andreas UL

Scientific Conference (2017, December 13)

Detailed reference viewed: 20 (0 UL)
Full Text
See detailFirst Vertical Land Movement Estimates on South Georgia Island: An Impact Study on Sea Level Change from Tide Gauge and Altimetry Measurements
Teferle, Felix Norman UL; Hunegnaw, Addisu UL; Abraha, Kibrom Ebuy UL et al

Poster (2017, December 11)

South Georgia Island in the Southern Atlantic Ocean has been a key location for the seismic, geomagnetic and oceanic global monitoring networks. However, no permanent geodetic monitoring station had been ... [more ▼]

South Georgia Island in the Southern Atlantic Ocean has been a key location for the seismic, geomagnetic and oceanic global monitoring networks. However, no permanent geodetic monitoring station had been established there despite the lack of observations from this region within, for example, the International GNSS Service (IGS) network of Global Navigation Satellite System (GNSS) stations. Then, in 2013 the King Edward Point (KEP) Geodetic Observatory was established with a focus on sea level studies and in support of general geoscience applications. Currently, this observatory located roughly half-way along the main island and along its northern coastline, consists of two GNSS stations (KEPA and KRSA) with local benchmark networks, allowing the height determinations from the GNSS antennas to be transferred to the KEP tide gauge (GLOSS ID 187) and forming a height reference within the International Terrestrial Reference Frame. In late 2014, three additional GNSS stations (SG01, SG02 and SG03) were established, all on small islands at the perimeter of the main island. Together the stations provide the best possible opportunity to study various geophysical processes in the region. With the GNSS-derived position time series partly reaching over 4.5 years in length, it has become possible to provide first estimates of vertical land movements for the island and KEP with its surrounding area. Together with four precise levelling campaigns of the benchmark network in 2013, 2014 and two in 2017, it has also been possible to investigate the very local character of the vertical motions, ie. the stability of the jetty upon which the tide gauge is mounted. Our measurements show that while South Georgia Island and the area around KEP are rising, the jetty and tide gauge are subsiding. In this study, we will present the preliminary results from the GNSS and levelling measurements and will discuss their impact on the sea level record from the KEP tide gauge which is ideally situated in a mid-ocean location for satellite altimetry calibration over the Southern Atlantic and Southern Oceans. [less ▲]

Detailed reference viewed: 54 (8 UL)
Peer Reviewed
See detailZugangsbarrieren im Gesundheitssystem - Ein Ländervergleich
Heinz, Andreas UL

Scientific Conference (2017, December 08)

In der international vergleichenden Forschung zu Gesundheitssystemen spielt der Zugang zu Gesundheitsleistungen eine zentrale Rolle. Entsprechende Typologien klassifizieren Gesundheitssysteme u.a. danach ... [more ▼]

In der international vergleichenden Forschung zu Gesundheitssystemen spielt der Zugang zu Gesundheitsleistungen eine zentrale Rolle. Entsprechende Typologien klassifizieren Gesundheitssysteme u.a. danach, ob Patienten Zuzahlungen leisten müssen, ob sie sich bei Hausärzten einschreiben müssen und nach welchen Regeln sie einen Facharzt konsultieren können (z.B. Reibling 2010, Wendt 2009, Böhm et al 2013). In der Typologie von Wendt gehört Österreich zum „Health service provision-oriented type“, der fast der gesamten Bevölkerung einen einfachen Zugang zu Gesundheitsleistungen bei geringen Zuzahlungen und freier Arztwahl ermöglicht (2009). Diese Typologien basieren jedoch auf den gesetzlichen Zugangsregeln in einem Land, nicht auf den subjektiven Erfahrungen der Bevölkerung mit Zugangsbarrieren. Im aktuellen European Social Survey (ESS) wurde nach diesen Barrieren gefragt: Haben Befragte medizinische Behandlungen nicht bekommen und was waren die Gründe (z.B. Kosten, Behandlung nicht erhältlich, Warteliste zu lang)? Der Vortrag stellt die Ergebnisse des ESS vor und geht auf folgende Fragen ein: • Wie häufig stoßen Kranke in Österreich und in anderen europäischen Ländern auf Zugangsbarrieren? • Welche Personen in Österreich sind besonders von Zugangsbarrieren betroffen? Die vorläufigen Ergebnisse deuten darauf hin, dass es durchaus nennenswerte Zugangsbarrieren im Gesundheitssystem Österreichs gibt und dass ohnehin benachteiligte Personen häufiger als andere auf Zugangsbarrieren stoßen. Für die wissenschaftliche Theorie stellt sich die Frage, ob die gängigen Typologien von Gesundheitssystemen um die subjektiven Erfahrungen ergänzt werden müssen. Für die Praxis stellt sich die Frage, wie schädlich Zugangsbarrieren sind und wie sie abgebaut werden können. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailDiscovery and pathogenicity assessment of neuropathology-associated gene variants
Neupert, Lisa-Marie; May, Patrick UL; Kobow, Katja et al

in Epilepsia (2017, December 08), 58(Suppl.5), 174

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term ... [more ▼]

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term epilepsy associated tumors (LEAT). However, evaluation of identified neuropathology associated variants in genetic screens is complex since not all observed variants contribute to the etiology of neuropathologies not even in genuinely disease-associated genes. Here, we critically reevaluated the pathogenicity of 12 previously published disease-related genes and of 79 neuropathology-associated missense variants listed in the PubMed and ClinVar databases. We (1) assessed the evolutionary gene constraint using the pLI and the missense z score, (2) used the latest American College of Medical Genetics and Genomics (ACMG) guidelines, and (3) performed bioinformatic variant pathogenicity prediction analyses using PolyPhen-2, CADD and GERP. Constraint analysis classified only seven out of 12 genes to be likely disease-associated. Furthermore, 78 (89%) of 88 neuropathology-associated missense variants were classified as being of unknown significance (VUS) and only 10 (11%) as being likely pathogenic (LPII). Pathogenicity prediction yielded a discrimination between LPII variants and a discrimination for VUS compared with rare variant scores from individuals present in the Genome Aggregation Database (gnomAD). In summary, our results demonstrate that interpretation of variants associated with neuropathologies is complex while the application of current ACMG guidelines including bioinformatic pathogenicity prediction can help improving variant evaluation. Furthermore, we will augment this set of literature-identified variants at the conference by results from our variant screen using self-generated deep sequencing data in >150 candidate genes in >50 patients not yet analyzed. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
See detailBlockchain Technology - Arsenal for a Shariah-Compliant Financial Ecosystem
Lacasse, Rcihard-Marc; Lambert, Berthe; Khan, Nida UL

Scientific Conference (2017, December 05)

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors ... [more ▼]

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors mandate intermediaries (agents) to transfer their contributions to social causes according to the Shariah; in principle, Islamic financial institutions must create value for their stakeholders by offering Shariah-compliant products and services. An underlying assumption of agency theory is that agents attempt to maximize their personal welfare and compensation, but such behaviour may not always be in the best interests of other stakeholders, and an analysis of the agent’s agenda can help explain how agents can fall off the pedestal of altruism. Relationships between Islamic banks and three key stakeholders (contributors, beneficiaries and regulators) are also explored via a complexity-aware monitoring process. Contributors provide funds to an Islamic bank (agent), and in return, the agent should be accountable to the contributors, but the form and degree of accountability can vary depending on the organization’s mission. There are many unanswered questions regarding the monitoring process. One objective of the article is to consider whether agents act in the best interests of the stakeholders. Finally, the authors explore the following question: Can blockchain technology and smart contracts support and enhance the transparency feature, which is the core underlying principle of all transactions in the Islamic Finance industry? A qualitative research framework was adopted because of the constraints of the enigmatic, secretive Islamic Finance culture. [less ▲]

Detailed reference viewed: 160 (10 UL)
Full Text
Peer Reviewed
See detailTightly-Secure PAK(E)
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in Cryptology and Network Security (2017, December 02)

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete ... [more ▼]

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world. [less ▲]

Detailed reference viewed: 36 (6 UL)
Full Text
Peer Reviewed
See detailFast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Xinwei, Gao; Li, Lin; Jintai, Ding et al

in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

Detailed reference viewed: 9 (0 UL)
Peer Reviewed
See detailOntologically stepping-up: A model for refugee entrepreneurship
Heilbrunn, Sibylle; Iannone, Rosa Lisa UL

Scientific Conference (2017, December 01)

This paper is a first attempt at proposing an integrated conceptual model that would bridge this gap in our knowledge of refugee entrepreneurship. Such a model might then enable for the understanding of ... [more ▼]

This paper is a first attempt at proposing an integrated conceptual model that would bridge this gap in our knowledge of refugee entrepreneurship. Such a model might then enable for the understanding of the super-diverse entrepreneurial strategies being employed by super-diverse refugees, within complex and super-diverse socio-economic and political settings – thereby, ontologically stepping-up our theoretical approaches and empirical insights into the phenomenon. [less ▲]

Detailed reference viewed: 53 (1 UL)
Full Text
See detailPreparing Future Teachers for Strategic Uses of Educational Technology: A Project-Based Approach
Reuter, Bob UL; Busana, Gilbert UL

Scientific Conference (2017, December 01)

Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses ... [more ▼]

Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses of ICT in education in Luxembourgish schools, the self-declared lack of competencies and the low confidence of teachers when it comes to teaching with ICT (Reuter, Busana & Linckels, 2016), we have designed, implemented and tested a project-based approach to the development of practice- oriented TPACK in pre-service teachers. Future teacher students are instructed to define an educational problem they want to solve, to explore existing pedagogical and technological solutions and to design an original solution that involves the strategic use of ICT (theoretically grounded and practically meaningful). They then have to implement the designed learning & teaching scenario in a classroom, to document the teaching & learning processes, to analyse, evaluate and to critically reflect them. Finally, they are required to write a structured report about their project and to present it to their peers and to interested teachers from schools. Overall, we observe that while most students become able to design and implement relatively meaningful educational technology practices, they still tend to feel that they are not ready to teach with technology in a more general sense, because their work was focused on one or two tools and does not give them access to a broader range of meaningful ICT-enriched teaching scenarios for their later professional career. [less ▲]

Detailed reference viewed: 32 (2 UL)
Full Text
Peer Reviewed
See detailEvaluating the Impact of Juice Filming Charging Attack in Practical Environments
Meng, Weizhi; Lee, Wanghao; Liu, Zhe UL et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailCombined Use of Lifecycle Management and IoT in Smart Cities
Hefnawy, Ahmed; Elhariri, Taha; Bouras, Abdelaziz et al

in Combined Use of Lifecycle Management and IoT in Smart Cities (2017, December)

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailCache-Assisted Hybrid Satellite-Terrestrial Backhauling for 5G Cellular Networks
Kalantari, Ashkan; Fittipaldi, Marilena; Chatzinotas, Symeon UL et al

in Proceedings of IEEE Global Communications Conference (2017, December)

Fast growth of Internet content and availability of electronic devices such as smart phones and laptops has created an explosive content demand. As one of the 5G technology enablers, caching is a ... [more ▼]

Fast growth of Internet content and availability of electronic devices such as smart phones and laptops has created an explosive content demand. As one of the 5G technology enablers, caching is a promising technique to off-load the network backhaul and reduce the content delivery delay. Satellite communications provides immense area coverage and high data rate, hence, it can be used for large-scale content placement in the caches. In this work, we propose using hybrid mono/multi-beam satellite-terrestrial backhaul network for off-line edge caching of cellular base stations in order to reduce the traffic of terrestrial network. The off-line caching approach is comprised of content placement and content delivery phases. The content placement phase is performed based on local and global content popularities assuming that the content popularity follows Zipf-like distribution. In addition, we propose an approach to generate local content popularities based on a reference Zipf-like distribution to keep the correlation of content popularity. Simulation results show that the hybrid satellite-terrestrial architecture considerably reduces the content placement time while sustaining the cache hit ratio quite close to the upper-bound compared to the satellite-only method. [less ▲]

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailNeuro-Inspired Reward-Based Tracking Control for Robotic Manipulators with Unknown Dynamics
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in Proceedings of the 2017 2nd International Conference on Robotics and Automation Engineering (ICRAE) (2017, December)

Tracking control for robotic manipulators is required for numerous automation tasks in manufacturing engineering. For this purpose, model-free PD-controllers are largely implemented by default in ... [more ▼]

Tracking control for robotic manipulators is required for numerous automation tasks in manufacturing engineering. For this purpose, model-free PD-controllers are largely implemented by default in commercially available robot arms and provide satisfactory performance for simple path following applications. Ever more complex automation tasks however ask for novel intelligent and adaptive tracking control strategies. In surface finishing processes, discontinuous freeform paths as well as changing constraints between the robotic end-effector and its surrounding environment affect the tracking control by undermining the stable system performance. The lacking knowledge of industrial robot dynamic parameters presents an additional challenge for the tracking control algorithms. In this paper the control problem of robotic manipulators with unknown dynamics and varying constraints is addressed. A robust sliding mode controller is combined with an RBF (Radial Basis Function) Neural Network-estimator and an intelligent, biomimetic BELBIC (Brain Emotional Learning-Based Intelligent Control) term to approximate the nonlinear robot dynamics function and achieve a robust and adaptive tracking performance. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailOn low complexity detection for QAM isomorphic constellations
Kayhan, Farbod UL

in Kayhan, Farbod (Ed.) On low compelxity detection for QAM isomorphic constellations (2017, December)

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we ... [more ▼]

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we investigate the low complexity detection for a family of QAM isomorphic constellations. These constellations are known to perform very close to the peak-power limited capacity, outperforming the DVB-S2X standard constellations. The proposed strategy is to first remap the received signals to the QAM constellation using the existing isomorphism and then break the log likelihood ratio computations to two one dimensional PAM constellations. Gains larger than 0.6 dB with respect to QAM can be obtained over the peak power limited channels without any increase in detection complexity. Our scheme also provides a systematic way to design constellations with low complexity one dimensional detectors. Several open problems are discussed at the end of the paper. [less ▲]

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailEnergy efficient transmission in MIMO interference channels with QoS constraints
Yang, Yang UL; Pesavento, Marius

in Proc. 8th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (2017, December)

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailFacing the Safety-Security Gap in RTES: the Challenge of Timeliness
Volp, Marcus UL; Kozhaya, David UL; Verissimo, Paulo UL

Scientific Conference (2017, December)

Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that ... [more ▼]

Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that could render the control system’s behaviour hazardous to the physical world. To ensure predictability and timeliness, developers follow a rigorous process, which essentially ensures real-time properties a priori, in all but the most unlikely combinations of circumstances. However, we have seen the complexity of both real-time applications, and the environments they run on, increase. If this is matched with the also increasing sophistication of attacks mounted to RTES systems, the case for ensuring both safety and security through aprioristic predictability loses traction, and presents an opportunity, which we take in this paper, for discussing current practices of critical realtime system design. To this end, with a slant on low-level task scheduling, we first investigate the challenges and opportunities for anticipating successful attacks on real-time systems. Then, we propose ways for adapting traditional fault- and intrusiontolerant mechanisms to tolerate such hazards. We found that tasks which typically execute as analyzed under accidental faults, may exhibit fundamentally different behavior when compromised by malicious attacks, even with interference enforcement in place. [less ▲]

Detailed reference viewed: 25 (2 UL)
Full Text
Peer Reviewed
See detailSchNet: A continuous-filter convolutional neural network for modeling quantum interactions
Schütt, Kristof T.; Kindermans, P. J.; Sauceda, Huziel E. et al

in 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA (2017, December)

Detailed reference viewed: 13 (0 UL)
Peer Reviewed
See detailValue-Added Modelling in Primary and Secondary School: An Integrative Review of 674 Publications
Levy, Jessica UL; Keller, Ulrich UL; Brunner, Martin et al

Scientific Conference (2017, December)

Detailed reference viewed: 33 (15 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 70 (16 UL)
Full Text
Peer Reviewed
See detailJoint and competitive caching designs in large-scale multi-tier wireless multicasting networks
Wang, Zitian; Cao, Zhehan; Cui, Ying et al

in Proc. 60th IEEE Global Communications Conference (2017, December)

Detailed reference viewed: 40 (6 UL)
Full Text
Peer Reviewed
See detailModel-Driven Interaction Design for Social Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL

in 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017 (2017, December)

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project ... [more ▼]

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project specifications. The devel-opment of a human-robot interaction is a complex task and involves different ex-perts, for example, the need for human-robot interaction (HRI) specialists, whoknow about the psychological impact of the robot’s movements during the in-teraction in order to design the best possible user experience. In this paper, wepresent a new project that aims to provide exactly this. Focusing on the interac-tion flow and movements of a robot for human-robot interactions we aim to pro-vide a set of modelling languages for human-robot interaction which serves as acommon, more formal, discussion point between the different stakeholders. Thisis a new project and the main topics of this publication are the scenario descrip-tion, the analysis of the different stakeholders, our experience as robot applicationdevelopers for our partner, as well as the future work we plan to achieve. [less ▲]

Detailed reference viewed: 39 (13 UL)
Full Text
Peer Reviewed
See detailProbabilistic Analysis of Low-Criticality Execution
Küttler, Martin; Roitzsch, Michael; Hamann, Claude-Joachim et al

Scientific Conference (2017, December)

The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research ... [more ▼]

The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research efforts in the mixed-criticality field, guarantees provided to the highest criticality level are well understood. However, lower-criticality job execution depends on the condition that all high-criticality jobs complete within their more optimistic low-criticality execution time bounds. Otherwise, no guarantees are made. In this paper, we add to the mixed-criticality toolbox by providing a probabilistic analysis method for low-criticality tasks. While deterministic models reduce task behavior to constant numbers, probabilistic analysis captures varying runtime behavior. We introduce a novel algorithmic approach for probabilistic timing analysis, which we call symbolic scheduling. For restricted task sets, we also present an analytical solution. We use this method to calculate per-job success probabilities for low-criticality tasks, in order to quantify, how low-criticality tasks behave in case of high-criticality jobs overrunning their optimistic low-criticality reservation. [less ▲]

Detailed reference viewed: 22 (2 UL)