References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 44 (1 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 53 (10 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 169 (6 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 292 (4 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 151 (19 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 69 (3 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 125 (18 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 51 (9 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 120 (6 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 28 (10 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Core Concept Identification in Learning Resources
Manrique, Rubén; Grevisse, Christian UL; Mariño, Olga et al

in 8th Joint International Conference, JIST 2018, Awaji, Japan, November 26–28, 2018, Proceedings (2018, December)

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support ... [more ▼]

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support systems. We present a set of strategies for core concept identification on the basis of a semantic representation built using the open and available knowledge in the so-called Knowledge Graphs (KGs). Different unsupervised weighting strategies, as well as a supervised method that operates on the semantic representation, were implemented for core concept identification. In order to test the effectiveness of the proposed strategies, a human-expert annotated dataset of 96 learning resources extracted from MOOCs was built. In our experiments, we show the capacity of the semantic representation for the core-concept identification task as well as the superiority of the supervised method. [less ▲]

Detailed reference viewed: 310 (4 UL)
Full Text
Peer Reviewed
See detailCollaborative Data Delivery for Smart City-oriented Mobile Crowdsensing Systems
Vitello, Piergiorgio; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 2018 (2018, December)

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing ... [more ▼]

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing infrastructures. In typical MCS systems, sensing tasks are allocated and reported on individual-basis. In this paper, we investigate on collaboration among users for data delivery as it brings a number of benefits for both users and sensing campaign organizers and leads to better coordination and use of resources. By taking advantage from proximity, users can employ device-to-device (D2D) communications like Wi-Fi Direct that are more energy efficient than 3G/4G technology. In such scenario, once a group is set, one of its member is elected to be the owner and perform data forwarding to the collector. The efficiency of forming groups and electing suitable owners defines the efficiency of the whole collaborative-based system. This paper proposes three policies optimized for MCS that are compliant with current Android implementation of Wi-Fi Direct. The evaluation results, obtained using CrowdSenSim simulator, demonstrate that collaborative-based approaches outperform significantly individual-based approaches. [less ▲]

Detailed reference viewed: 64 (9 UL)
Full Text
Peer Reviewed
See detailOsiris: Hunting for Integer Bugs in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Schütte, Julian; State, Radu UL

in 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018 (2018, December)

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed ... [more ▼]

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed once deployed to the blockchain. They typically implement the business logic of distributed apps and carry billions of dollars worth of coins. In that respect, it is imperative that smart contracts are correct and have no vulnerabilities or bugs. However, research has identified different classes of vulnerabilities in smart contracts, some of which led to prominent multi-million dollar fraud cases. In this paper we focus on vulnerabilities related to integer bugs, a class of bugs that is particularly difficult to avoid due to some characteristics of the Ethereum Virtual Machine and the Solidity programming language. In this paper we introduce Osiris – a framework that combines symbolic execution and taint analysis, in order to accurately find integer bugs in Ethereum smart contracts. Osiris detects a greater range of bugs than existing tools, while providing a better specificity of its detection. We have evaluated its performance on a large experimental dataset containing more than 1.2 million smart contracts. We found that 42,108 contracts contain integer bugs. Be- sides being able to identify several vulnerabilities that have been reported in the past few months, we were also able to identify a yet unknown critical vulnerability in a couple of smart contracts that are currently deployed on the Ethereum blockchain. [less ▲]

Detailed reference viewed: 157 (5 UL)
Full Text
Peer Reviewed
See detailPower and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks
Lei, Lei UL; You, Lei; Yang, Yang UL et al

in IEEE Global Communications Conference (GLOBECOM) 2018 (2018, December)

Detailed reference viewed: 44 (9 UL)
Full Text
Peer Reviewed
See detailBlockPGP: A Blockchain-based Framework for PGP Key Servers
Yakubov, Alexander UL; Shbair, Wazen UL; State, Radu UL

in The Sixth International Symposium on Computing and Networking (2018, November 28)

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the ... [more ▼]

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the correspondent in information exchange as well as the information integrity. It implements asymmetric encryption with certificates shared through a network of PGP key servers. Many recent breaches show that certificate infrastructure can be compromised as well as exposed to operational errors. In this paper, we propose a new PGP management framework with the key server infrastructure implemented using blockchain technology. Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk. We also provided user access right control where only the certificate holder can change information related to the certificate. We designed and developed a prototype for key server deployment on permissioned Ethereum blockchain. Permissioned blockchain should allow to control the costs of PGP key server infrastructure maintenance at the present level. [less ▲]

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailA Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels
Bandi, Ashok UL

in Bandi, Ashok; Shankar, Bhavani; maleki, Sina (Eds.) et al 6th IEEE Global Conference on Signal and Information Processing, November 26–29, 2018 Anaheim, California, USA (2018, November 26)

Detailed reference viewed: 51 (15 UL)
Full Text
Peer Reviewed
See detailFAST: A MapReduce Consensus for High Performance Blockchains
Khan, Nida UL

in Khan, Nida (Ed.) Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems (2018, November 04)

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their ... [more ▼]

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their throughput in terms of processed transactions, limit their applicability in such environments in a decentralized way as the underlying network is unable to sustain high workloads. In this paper a fully decentralized high performance consensus mechanism, named FAST, is proposed for a public blockchain. FAST is based on mapreduce paradigm for aggregating and adding transactions on blockchain blocks. FAST was implemented and evaluated in a basic blockchain prototype. A light client for FAST using IPFS, was developed to bring about a reduction in the data stored locally. The obtained results from tests conducted on the prototype depict that FAST exceeds the performance of not just other existing blockchain platforms but comes very close to the throughput of traditional electronic payment networks such as Visa. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailVisualizing the Learning Progress of Self-Driving Cars
Mund, Sandro; Frank, Raphaël UL; Varisteas, Georgios UL et al

in 21st International Conference on Intelligent Transportation Systems (2018, November 02)

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models ... [more ▼]

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models perform so well. In order for them to become a commercially viable solution, it first needs to be understood why a certain behavior is triggered and how and what those networks learn from human-generated driving data to ensure safety. One research direction is to visualize what the network sees by highlighting regions of an image that influence the outcome of the model. In this vein, we propose a generic visualization method using Attention Heatmaps (AHs) to highlight what a given Convolutional Neural Network (CNN) learns over time. To do so, we rely on a novel occlusion technique to mask different regions of an input image to observe the effect on a predicted steering signal. We then gradually increase the amount of training data and study the effect on the resulting Attention Heatmaps, both in terms of visual focus and temporal behavior. [less ▲]

Detailed reference viewed: 50 (9 UL)
Full Text
Peer Reviewed
See detailRevisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Atashpendar, Arash UL; Policharla, Guru Vamsi; Roenne, Peter UL et al

in Secure IT Systems, 23rd Nordic Conference, NordSec 2018 (2018, November 02)

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily ... [more ▼]

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange. [less ▲]

Detailed reference viewed: 115 (29 UL)
Full Text
Peer Reviewed
See detailAdvancing the Security of Trustworthy Self-IoT (Position Paper)
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Ladid, Latif UL et al

in International Conference on Smart Applications, Communications and Networking (SmartNets) (2018, November)

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a ... [more ▼]

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. [less ▲]

Detailed reference viewed: 161 (8 UL)
Full Text
Peer Reviewed
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex UL; Udovenko, Aleksei UL

in Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018 (2018, November)

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation ... [more ▼]

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces. Structure hiding must provide protection against circuit analysis attacks. In this paper we focus on developing the value hiding component. It includes protection against the DCA attack by Bos et al. and protection against a new attack called algebraic attack. We present a provably secure first-order protection against the new al- gebraic attack. The protection is based on small gadgets implementing secure masked XOR and AND operations. Furthermore, we give a proof of compositional security allowing to freely combine secure gadgets. We derive concrete security bounds for circuits built using our construction. [less ▲]

Detailed reference viewed: 569 (8 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 93 (6 UL)
Full Text
Peer Reviewed
See detailDeformation-Based Abnormal Motion Detection using 3D Skeletons
Baptista, Renato UL; Demisse, Girum UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA) (2018, November)

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a ... [more ▼]

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a sequence, based on few joints of a 3D skeleton, and a deformation-based distance function. We further introduce a time-variation model that is specifically designed for assessing the quality of a motion; we refer to a distance function that is based on such a model as~\emph{motion quality distance}. The overall advantages of the proposed approach are 1) lower dimensional yet representative sequence representation and 2) a distance function that emphasizes time variation, the motion quality distance, which is a particularly important property for quality assessment. We validate our approach using a publicly available dataset, SPHERE-StairCase2014 dataset. Qualitative and quantitative results show promising performance. [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailAn Approach to Incorporate Emotions in a Chatbot with Seq2Seq Model
Zheng, Yaqiong; Guo, Siwen UL; Schommer, Christoph UL

in Benelux Conference on Artificial Intelligence, ‘s-Hertogenbosch 8-9 November 2018 (2018, November)

Detailed reference viewed: 23 (9 UL)
Full Text
Peer Reviewed
See detailPrésences de souverains dans l'espace du "regnum Lotharii": Itinéraires, lieux de pouvoir et fidélités "Lotharingiennes" (869-936)
Pettiau, Hérold UL

in Pettiau, Hérold; Margue, Michel (Eds.) La Lotharingie en question. Identités, oppositions, intégration. LOtharingische Identitäten im Spannungsfeld zwischen integrativen und partikularen Kräften. Actes des 14es Journées Lotharingiennes (2018, October 25)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailForward Secrecy for SPAKE2
Lopez Becerra, José Miguel UL; Ostrev, Dimiter UL; Skrobot, Marjan

in Baek, Joonsang; Willy, Susilo (Eds.) Provable Security (2018, October 25)

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3 ... [more ▼]

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3. Although it has been proven secure in the Find-then-Guess model of Bellare, Pointcheval and Rogaway (EUROCRYPT 2000), whether it satisfies some notion of forward secrecy remains an open question. In this work, we prove that the SPAKE2 protocol satisfies the so-called weak forward secrecy introduced by Krawczyk (CRYPTO 2005). Furthermore, we demonstrate that the incorporation of key-confirmation codes in SPAKE2 results in a protocol that provably satisfies the stronger notion of perfect forward secrecy. As forward secrecy is an explicit requirement for cipher suites supported in the TLS handshake, we believe this work could fill the gap in the literature and facilitate the adoption of SPAKE2 in the recently approved TLS 1.3. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailSoLeMiO: Semantic Integration of Learning Material in Office
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Proceedings of E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2018 (2018, October 15)

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information ... [more ▼]

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information might be required by the learner. However, leaving the study context to search for related material may lead to distraction or even abandonment of the learning task. Furthermore, traditional learning resources do not foster active learning. In this paper, we present SoLeMiO, a plugin for Office applications, which identifies key concepts in a document and thereby integrates related, heterogeneous resources from an open corpus. We employ concept recognition tools to determine concepts from different domains. Thereupon, resources from different repositories are suggested to the learner and can be consulted from within the current document. Aside from traditional learning resources, active learning is fostered through gamification activities. We showcase the applicability of our approach in multiple disciplines with concrete examples. [less ▲]

Detailed reference viewed: 36 (7 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 133 (20 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 154 (29 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailIoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Engel, Thomas UL

in IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks (2018, October)

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the ... [more ▼]

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for IoT are well recognised, to allow a smooth integration of M2M and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for MQTT and CoAP, identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2M-Satellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailDas Palux-Projekt in Luxemburg: Forschungsdesign und erste Ergebnisse einer Pilotstudie
Eckelt, Melanie UL; Hutmacher, Djenna UL; Steffgen, Georges UL et al

in Bartsch, Fabienne; Mombeck, Mona; Müller, Merle (Eds.) et al Tägliche Herausforderungen meistern - Sportlehrkräfte im Fokus (2018, October)

Detailed reference viewed: 35 (6 UL)
Full Text
Peer Reviewed
See detailMesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content
Sobon-Muehlenbrock, Elena UL; Greger, Manfred UL; Schlienz, Markus UL

in Mesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content (2018, October)

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of ... [more ▼]

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of synthetic kitchen waste, further called model kitchen waste (MKW) with the same amounts of carbohydrates, fats and proteins. In this study the anaerobic degradation of this MKW (named MKW1; 23 % rapeseed oil) was investigated under mesophilic and thermophilic conditions at 2 different loadings. Additional experiments were performed with lower (MKW2; 14.7 %) and higher (MKW3; 27.2 %) rapeseed oil content at the expense of starch. An organic loading of 5 gVS/l leads to a fast and undisturbed degradation under mesophilic conditions. The volatile fatty acids (mainly acetic acid) appeared only during the first 3 days. Finally the amount of biogas been produced is weakly correlated with the oil content. Under thermophilic conditions the biogas production was retarded and the concentrations of the volatile fatty acids were generally higher whereas acetic acid was present for a period of 10 days. The final biogas amount was higher than compared to mesophilc conditions. At a higher loading of 25 gVS/l a strong retardation of biogas production was observed which correlates with very high concentrations of volatile fatty acids over the whole runtime period of 50 days. [less ▲]

Detailed reference viewed: 23 (3 UL)
Full Text
Peer Reviewed
See detailMoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies
Li, Li; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2018, October)

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailSemi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
Jhawar, Ravi UL; Lounis, Karim UL; Mauw, Sjouke UL et al

in Katsikas, Sokratis; Alcaraz, Cristina (Eds.) Security and Trust Management. STM 2018. (2018, October)

Detailed reference viewed: 14 (2 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 55 (8 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Teacher Support for Learning Material Authoring
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Advances in Computing - CCC 2018 (2018, September 26)

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning ... [more ▼]

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning material in popular authoring software. As teachers create their learning material, SoLeMiO identifies the concepts they want to address. In order to identify relevant concepts in a reliable, automatic and unambiguous way, we employ state of the art concept recognition and entity linking tools. From the recognized concepts, we build a semantic representation by exploiting additional information from Open Knowledge Graphs through expansion and filtering strategies. These concepts and the semantic representation of the learning material support the authoring process in two ways. First, teachers will be recommended related, heterogeneous resources from an open corpus, including digital libraries, domain-specific knowledge bases, and MOOC platforms. Second, concepts are proposed for semi-automatic tagging of the newly authored learning resource, fostering its reuse in different e-learning contexts. Our approach currently supports resources in English, French, and Spanish. An evaluation of concept identification in lecture video transcripts and a user study based on the quality of tag and resource recommendations yielded promising results concerning the feasibility of our technique. [less ▲]

Detailed reference viewed: 29 (6 UL)
Full Text
Peer Reviewed
See detailSparsity-Aided Low-Implementation cost based On-Board beamforming Design for High Throughput Satellite Systems
Bandi, Ashok UL

in Bandi, Ashok; Joroughi, Vahid; Shankar, Bhavani (Eds.) et al 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC),Berlin, Sept. 10-12, 2018 (2018, September 10)

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailParticularities for plastic design of composite beams with deep plastic neutral axis
Schäfer, Markus UL; Zhang, Qingjie UL

in 12th Japanese-German Bridge Symposium (2018, September 04)

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the ... [more ▼]

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the moment resistance for composite beams follows the rules stated in EN 1994-1-1. Based on the slenderness c/t of the compressed parts of the steel-section, composite cross-sections are classified into four cross-section classes. This classification indirectly reflects the rotation capacity and susceptibility to local buckling. For class 1 and 2 cross-sections, the plastic moment resistance of the crosssection may be considered. Otherwise, an elastic design (for class 3) or an elastic design considering local buckling effects (for class 4) is necessary. If the plastic resistance of the cross-section is assumed, it is considered that each cross-section fibre may plastify without limitation of the strain values. For normal composite beams subjected to the sagging moments and with a high plastic neutral axis, the real moment resistance is quite greater than one obtained by the method of the plastic design. For sections with a large compression zone, xpl, a concrete failure in the compression zone can happen before the plastic moment resistance of the composite cross-section, Mpl,Rd, is reached. Strain limit design, therefore, becomes critical. EN 1994-1-1 provides a limitation of the plastic design resistance only for sections with steel grades S420 and S460. However, there is no guidance given for lower steel grades or the determination of the corresponding concrete compression force. This paper points out, that the rotation capacity of a composite section is dependent on the slenderness of steel crosssection parts and on the behaviour of the concrete part. A comparison of plastic and strain limited moment resistances as well as the analysis of partial shear diagram-based strain limited design results in new findings for the limits of plastic design methods. [less ▲]

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailComparison of Design Codes for Composite Beams of Steel and Concrete in Europe and China
Zhang, Qingjie UL; Schäfer, Markus UL; Santos-Ferreira, Katia

in 12th Japanese-German Bridge Symposium (2018, September 04)

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a ... [more ▼]

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a part of the Eurocodes, which are European harmonized design codes for buildings and bridges. In this paper, the equivalent Chinese codes are compared to the structure and contents of Eurocodes. EN1994-1-1, which is the first part of Eurocode 4 for general buildings, and JGJ138-2016 have similar design scopes, both cover topics of composite beams, columns, slabs, and connections. JGJ138-2016 also covers the design of composite shear walls and seismic design, while EN1994-1-1 considers more about durability and time effects. For the more technical comparison, the general design bases such as safety concept and design action effects are alike. The material property values by the two codes are mostly similar except for concrete. For structural members, the focus here is mainly on the comparison of composite beams in steel and concrete. The comparisons are explained with the help of parameter studies and theoretical comparisons. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailOntology Coverage Tool and Document Browser for Learning Material Exploration
Grevisse, Christian UL; Meder, Jeff Alphonse Antoine UL; Botev, Jean UL et al

in 2018 Thirteenth International Conference on Digital Information Management (ICDIM) (2018, September)

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and ... [more ▼]

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and semantic information. Implicit links between documents are hardly understood without a proper visualization. On the other hand, it is difficult for teachers to keep track of the topics covered by a large collection. In this paper, we present an ontology coverage tool and document browser for learning material exploration. Both learners and teachers can benefit from a visualization of an ontology and the documents related to the comprised concepts, overcoming the limitations of traditional file explorers. Guiding users through a visual query process, learners can quickly pinpoint relevant learning material. The visualization, which has been implemented as a web application using the D3.js JavaScript library, can be integrated into different e-learning applications to further enhance the workflow of learners. Finally, teachers are provided an overview of topic coverage within the collection. [less ▲]

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 16 (3 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (2018, September)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 103 (5 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 85 (21 UL)
Full Text
Peer Reviewed
See detailA Temporal Model for Interactive Diagnosis of Adaptive Systems
Mouline, Ludovic UL; Benelallam, Amine; Fouquet, François UL et al

in Mouline, Ludovic; Benelallam, Amine; Fouquet, François (Eds.) et al 2018 IEEE International Conference on Autonomic Computing (ICAC) (2018, September)

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or ... [more ▼]

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or suboptimal system states. Developers thus need diagnosis support that trace system states to the previous circumstances –targeted requirements, input context– that had resulted in these decisions. However, the lack of efficient temporal representation limits the tracing ability of current approaches. To tackle this problem, we first propose a knowledge formalism to define the concept of a decision. Second, we describe a novel temporal data model to represent, store and query decisions as well as their relationship with the knowledge (context, requirements, and actions). We validate our approach through a use case based on the smart grid at Luxembourg. We also demonstrate its scalability both in terms of execution time and consumed memory. [less ▲]

Detailed reference viewed: 22 (3 UL)
Full Text
Peer Reviewed
See detailModellierung und Validierung von Simulationsansätzen für die aussenliegende Lufttemperierung
Schmidt, Christoph Wilhelm; Scholzen, Frank UL; Maas, Stefan UL et al

in Tagungsband BauSim 2018 (2018, September)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailHybrid MPI+OpenMP Implementation of eXtended Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

in Proc. of the 9th Workshop on Applications for Multi-Core Architectures (WAMCA'18), part of 30th Intl. Symp. on Computer Architecture and High Performance Computing (SBAC-PAD 2018) (2018, September)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material), by additional properties such as the chemical composition, thermodynamic state, stress/strain for each particle. It has been applied successfully to numerous industries involving the processing of granular materials such as sand, rock, wood or coke [16], [17]. In this context, computational simulation with (X)DEM has become a more and more essential tool for researchers and scientific engineers to set up and explore their experimental processes. However, increasing the size or the accuracy of a model requires the use of High Performance Computing (HPC) platforms over a parallelized implementation to accommodate the growing needs in terms of memory and computation time. In practice, such a parallelization is traditionally obtained using either MPI (distributed memory computing), OpenMP (shared memory computing) or hybrid approaches combining both of them. In this paper, we present the results of our effort to implement an OpenMP version of XDEM allowing hybrid MPI+OpenMP simulations (XDEM being already parallelized with MPI). Far from the basic OpenMP paradigm and recommendations (which simply summarizes by decorating the main computation loops with a set of OpenMP pragma), the OpenMP parallelization of XDEM required a fundamental code re-factoring and careful tuning in order to reach good performance. There are two main reasons for those difficulties. Firstly, XDEM is a legacy code devel- oped for more than 10 years, initially focused on accuracy rather than performance. Secondly, the particles in a DEM simulation are highly dynamic: they can be added, deleted and interaction relations can change at any timestep of the simulation. Thus this article details the multiple layers of optimization applied, such as a deep data structure profiling and reorganization, the usage of fast multithreaded memory allocators and of advanced process/thread-to-core pinning techniques. Experimental results evaluate the benefit of each optimization individually and validate the implementation using a real-world application executed on the HPC platform of the University of Luxembourg. Finally, we present our Hybrid MPI+OpenMP results with a 15%-20% performance gain and how it overcomes scalability limits (by increasing the number of compute cores without dropping of performances) of XDEM-based pure MPI simulations. [less ▲]

Detailed reference viewed: 56 (9 UL)
Full Text
Peer Reviewed
See detailRevisiting Gaussian Mixture Models for Driver Identification
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (2018, September)

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼]

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲]

Detailed reference viewed: 33 (8 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 184 (25 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 87 (13 UL)
Full Text
Peer Reviewed
See detailSymbol-Level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata 25-28 June 2018 (2018, August 27)

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the ... [more ▼]

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the distance preserving constructive interference regions (DPCIR) are always polyhedral angles (shifted pointed cones) for any given constellation point with unbounded decision region. Then we prove that any signal in a given unbounded DPCIR has a norm larger than the norm of the corresponding vertex if and only if the convex hull of the constellation contains the origin. Using these properties, we show that the power of the noiseless received signal lying on an unbounded DPCIR is an strictly increasing function of two parameters. This allows us to reformulate the originally non-convex SLP max-min SINR as a convex optimization problem. We discuss the loss due to our proposed convex reformulation and provide some simulation results. [less ▲]

Detailed reference viewed: 31 (10 UL)
Full Text
See detailA Dynamic Associative Memory for Distant Reading
Kamlovskaya, Ekaterina UL; Schommer, Christoph UL; Sirajzade, Joshgun UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 31 (6 UL)
Full Text
See detailMind and Language. AI in an Example of Similar Patterns of Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems
Lei, Lei UL; Chang, Zheng; Hu, Yun et al

in IEEE/CIC International Conference on Communications in China (ICCC 2018) (2018, August)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailEnergy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers
Franck, Christian UL; Groszschädl, Johann UL; Le Corre, Yann UL et al

in Awan, Irfan; Younas, Muhammad; Portela, Filipe (Eds.) Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops (W-FICLOUD 2018) (2018, August)

The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing ... [more ▼]

The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a "lightweight" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of "long" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 5.1 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Extraction of Semantic Legal Metadata Using Natural Language Processing
Sleimi, Amin UL; Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL et al

in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal ... [more ▼]

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal requirements. [Objectives] Our work is motivated by two observations: (1) The existing requirements engineering (RE) literature does not provide a harmonized view on the semantic metadata types that are useful for legal requirements analysis. (2) Automated support for the extraction of semantic legal metadata is scarce, and further does not exploit the full potential of natural language processing (NLP). Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the semantic legal metadata types proposed in RE. Subsequently, we conduct a qualitative study aimed at investigating how the identified metadata types can be extracted automatically. [Results and Conclusions] We propose (1) a harmonized conceptual model for the semantic metadata types pertinent to legal requirements analysis, and (2) automated extraction rules for these metadata types based on NLP. We evaluate the extraction rules through a case study. Our results indicate that the rules generate metadata annotations with high accuracy. [less ▲]

Detailed reference viewed: 153 (21 UL)
Full Text
Peer Reviewed
See detailBlockchain-Based, Decentralized Access Control for IPFS
Steichen, Mathis UL; Fiz Pontiveros, Beltran UL; Norvill, Robert UL et al

in The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (2018, July 30)

Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the ... [more ▼]

Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the blockchain is replicated on many nodes, a lot of storage space is required without serving an immediate purpose, especially if the node operator does not need to view every file that is stored on the blockchain. It furthermore leads to an increase in the price of operating blockchain nodes because more data needs to be processed, transferred and stored. IPFS is a file sharing system that can be leveraged to more efficiently store and share large files. It relies on cryptographic hashes that can easily be stored on a blockchain. Nonetheless, IPFS does not permit users to share files with selected parties. This is necessary, if sensitive or personal data needs to be shared. Therefore, this paper presents a modified version of the InterPlanetary Filesystem (IPFS) that leverages Ethereum smart contracts to provide access controlled file sharing. The smart contract is used to maintain the access control list, while the modified IPFS software enforces it. For this, it interacts with the smart contract whenever a file is uploaded, downloaded or transferred. Using an experimental setup, the impact of the access controlled IPFS is analyzed and discussed. [less ▲]

Detailed reference viewed: 142 (19 UL)
Full Text
Peer Reviewed
See detailWind Music and Terminology. A Critical Review of an Immanent Phenomenon
Sagrillo, Damien UL

in Sagrillo, Damien (Ed.) Conference Guide (2018, July 20)

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A ... [more ▼]

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A band is a Band is Band”. However, he seemed to hesitate because he referred to Joseph Manfredo who, in his awarded dissertation, asked: “What is a Band?” In my lecture, I will bring this topic to the fore again and deal with the terminology used to designate a group of wind instruments, and I will come up with some suggestions for definitions. I will try to find an answer to questions such as: When is a band a symphonic band, or even a symphonic wind ensemble or “only” a community band? When I say: “I will try to find an answer”, I must admit that I cannot guarantee to find an acceptable one: Are these terms filled with a substance – what makes the difference? – or are they simply a grandiloquent absurdity? Do pretentious terms refer to “better” musicians or music? I will present my paper in English, but I will also deal with band designations in German, in French and my native language – Luxembourgish. [less ▲]

Detailed reference viewed: 105 (3 UL)
Full Text
Peer Reviewed
See detailStochastic Optimum Energy Management for Advanced Transportation Network
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (2018, July 19)

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced ... [more ▼]

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced driver assistance system which predictively plans for a safe and energy-efficient cruising velocity profile autonomously for battery electric vehicles. However, high entropy in transportation network leads to a challenging task to derive a computationally efficient and tractable model to predict the traffic flow. Stochastic optimal control has been developed to systematically find an optimal decision with the aim of performance improvement. However, most of the developed methods are not real-time algorithms. Moreover, they are mainly risk-neutral for safety-critical systems. This paper investigates on the real-time risk-sensitive nonlinear optimal control design subject to safety and ecological constraints. This system improves the efficiency of the transportation network at the microscopic level. Obtained results demonstrate the effectiveness of the proposed method in terms of states regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 45 (4 UL)
Full Text
Peer Reviewed
See detailConclusions générales: La Cour Constitutionnelle en tant qu'autorité de dialogue
Gerkrath, Jörg UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: Trop jeune pour mourir? (2018, July 17)

Detailed reference viewed: 45 (4 UL)
Full Text
Peer Reviewed
See detaildeveloping early number competencies through games played in school and at home
Tinnes-Vigne, Mélanie UL; Poncelet, Débora UL; de Chambrier, Anne-Françoise et al

in Bergqvist, Ewa; Österholm, Magnus; Granberg, Carina (Eds.) et al Proceedings of the 42nd Conference of the International Group for the Psychology of Mathematics Education (2018, July 07)

Most research studies show that initial number knowledge constitutes the basis for understanding several major principles of mathematics. Moreover, early number competencies are considered as strong ... [more ▼]

Most research studies show that initial number knowledge constitutes the basis for understanding several major principles of mathematics. Moreover, early number competencies are considered as strong predictors of mathematics outcomes at the end of the first grade and even later on (Jordan, Kaplan, Ramineni & Locuniak, 2009). In preschool, the development of these competencies should obviously not give rise to formal learning but is developed through significant activities. However, while everyday situations offer significant contexts, they are still not sufficient to develop the basic number competencies necessary for first grade children (Cannon & Ginsburg, 2008). Adults have to create opportunities to learn mathematical competencies. Mathematical games can meet this requirement. The MathPlay project aims to develop early number competencies through games implemented in school and/or at home. According to the literature, early number competencies consist in counting, conservation ability, magnitude comparison, and (de)composition of numbers. To develop these competencies, we decided to adapt 8 well-known family games. To evaluate the effect of this play-based approach on the development of number competencies, an instrument was created and validated. A quasi-experimental research design (pre/post-test) was implemented in four countries: Luxembourg, Belgium, France and Switzerland. Seven hundred and twenty-five children from all these countries participated in this study. They were divided into one control group and one experimental group with two treatment conditions, X1 (with games at school), and X2 (with games both at school and at home). The post-test was administrated at two moments: just after the intervention and eight weeks later. Data is currently being analysed. This communication will present the first outcomes and will answer our research question: what is the immediate and deferred effect of this play-based approach (X1-X2) on students’ number competencies? [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailInterference Localization On-Board the Satellite Using Drift Induced Virtual Array
Arora, Aakash UL; Maleki, Sina; Shankar, Bhavani UL et al

in Proc. 2018 International Conference on Signal Processing and Communications (SPCOM) (2018, July)

Herein, we investigate the interference received from other wireless networks into a satellite communication (SATCOM) link, and review approaches to identify the interference location using on-board ... [more ▼]

Herein, we investigate the interference received from other wireless networks into a satellite communication (SATCOM) link, and review approaches to identify the interference location using on-board satellite processing. Interference is an increasing problem for satellite communication links, and while receiving signals from gateways or user terminals, the uplink is prone to disturbance by interference due to jammers or unintentional transmissions. In this paper, our aim is to localize unknown interference sources present on the ground by estimating direction of arrival (DOA) information using onboard processing (OBP) in the satellite, and the satellite drift inducing a virtual array. In this work, the signal sampled by the drifting single antenna feed is modeled as using an arbitrary array. Building on this model, we perform the 2-D DOA (azimuth and elevation) estimation. The key challenges in such a design include single snapshot based DOA estimation with low complexity and robustness, arising out of limited on-board computational complexity as well as uncertainty in parameters like the drift speed. Employing realistic satellite drift patterns, the paper illustrates the performance of the proposed technique highlighting the accuracy in localization under adverse environments. We provide numerical simulations to show the effectiveness of our methodology. [less ▲]

Detailed reference viewed: 61 (20 UL)
Full Text
Peer Reviewed
See detailCILAP-Architecture for Simultaneous Position- and Force-Control in Constrained Manufacturing Tasks
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in ICINCO 2018 Proceedings of the 15th International Conference on Informatics in Control, Automation and Robotics Volume 2 (2018, July)

This paper presents a parallel control concept for automated constrained manufacturing tasks, i.e. for simultaneous position- and force-control of industrial robotic manipulators. The manipulator’s ... [more ▼]

This paper presents a parallel control concept for automated constrained manufacturing tasks, i.e. for simultaneous position- and force-control of industrial robotic manipulators. The manipulator’s interaction with its environment results in a constrained non-linear switched system. In combination with internal and external uncertainties and in the presence of friction, the stable system performance is impaired. The aim is to mimic a human worker’s behaviour encoded as lists of successive desired positions and forces obtained from the records of a human performing the considered task operating the lightweight robot arm in gravity compensation mode. The suggested parallel control concept combines a model-free position- and a model-free torque-controller. These separate controllers combine conventional PID- and PI-control with adaptive neuro-inspired algorithms. The latter use concepts of a reward-like incentive, a learning system and an actuator-inhibitor-interplay. The elements Conventional controller, Incentive, Learning system and Actuator-Preventer interaction form the CILAP-concept. The main contribution of this work is a biologically inspired parallel control architecture for simultaneous position- and force-control of continuous in contrast to discrete manufacturing tasks without having recourse to visual inputs. The proposed control-method is validated on a surface finishing process-simulation. It is shown that it outperforms a conventional combination of PID- and PI-controllers. [less ▲]

Detailed reference viewed: 17 (3 UL)
Full Text
Peer Reviewed
See detailPRESENCE: Performance Metrics Models for Cloud SaaS Web Services
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Wasim, Umer; Varrette, Sébastien UL et al

in Proc. of the 11th IEEE Intl. Conf. on Cloud Computing (CLOUD 2018) (2018, July)

Detailed reference viewed: 18 (4 UL)
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (2018, July)

Detailed reference viewed: 170 (22 UL)
Full Text
Peer Reviewed
See detailInstilling teacher agency in professional development: an international outlook. Enabling teachers in Luxembourg to implement inclusive practice
Pit-Ten Cate, Ineke UL

in Sibilio, Maurizio; Aiello, Paola (Eds.) Lo sviluppo professionale dei docenti. Ragionare di agentività per una scuola inclusiva (2018, July)

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion ... [more ▼]

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion of students with special educational needs (SEN) in regular classrooms. Over the last decades, Luxembourg has invested significant effort in providing training to teachers and other professionals to improve educational services for students with SEN. The recent School Law (Summer 2017) stipulates how the inclusion of students with SEN can be facilitated. Although these changes all aim to facilitate the successful implementation of inclusive educational practice, it will be important to continue to investigate and interpret teachers’ attitudes and perceived competence and efficacy in the context of the educational system. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
See detailPeut-on se moquer de tout ? L'étendue de la liberté d'expression face au sentiment religieux
Gerkrath, Jörg UL

in Institut Grand Ducal (Ed.) Actes de la Section des sciences morales et politiques (2018, July)

Detailed reference viewed: 88 (33 UL)
Full Text
Peer Reviewed
See detailSome basic reflections on voice-controlled natural language human-Siri talk: Hey Siri, you are challenging the interface between the oral and the written.
Arend, Béatrice UL; Fixmer, Pierre UL

in Proceedings 10th International Conference on Education and New Learning Technologies (2018, July)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailTest Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a ... [more ▼]

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (near-)operational environment. Acceptance testing of a CPS often necessitates that the test cases be prioritized, as there are usually too many scenarios to consider given time constraints. CPS acceptance testing is further complicated by the uncertainty in the environment and the impact of testing on hardware. We propose an automated test case prioritization approach for CPS acceptance testing, accounting for time budget constraints, uncertainty, and hardware damage risks. Our approach is based on multi-objective search, combined with a test case minimization algorithm that eliminates redundant operations from an ordered sequence of test cases. We evaluate our approach on a representative case study from the satellite domain. The results indicate that, compared to test cases that are prioritized manually by satellite engineers, our automated approach more than doubles the number of test cases that fit into a given time frame, while reducing to less than one third the number of operations that entail the risk of damage to key hardware components. [less ▲]

Detailed reference viewed: 183 (19 UL)
Full Text
Peer Reviewed
See detailEfficient Minimum-Energy Scheduling with Machine-Learning based Predictions for Multiuser MISO Systems
Lei, Lei UL; Vu, Thang Xuan UL; You, Lei et al

in 2018 IEEE International Conference on Communications (ICC) (2018, July)

Detailed reference viewed: 19 (2 UL)
Full Text
See detailPush-out tests on demountable shear connectors of steel-concrete composite structures
Kozma, Andras UL; Odenbreit, Christoph UL; Braun, Matthias Volker UL et al

in Proceedings of the 12th International Conference on Advances in Steel-Concrete Composite Structures (2018, June 27)

The deconstruction of steel-concrete composite structures in buildings and the later separation of the materials is a labour- and cost intensive work. The shear studs are welded on the steel beam and ... [more ▼]

The deconstruction of steel-concrete composite structures in buildings and the later separation of the materials is a labour- and cost intensive work. The shear studs are welded on the steel beam and imbedded in the concrete deck and a large amount of cutting work becomes necessary. As a result, recycling is difficult and the potential for reusing entire elements is lost. The carbon footprint of composite structures could be decreased by application of the principles of “design for deconstruction and reuse”. This paper presents a desk top study and corresponding laboratory experiments on demountable shear connectors that facilitate recyclability and even provide the potential for reusing complete structural elements. In the Laboratory of Steel and Composite Structures of the University of Luxembourg 15 push-out tests have been carried out using different bolted connection systems suitable for multiple uses in order to verify their performance focusing on shear strength, stiffness, slip capacity, ductility and ability of demounting. The investigated systems included pre-stressed and epoxy resin injection bolts, solid slabs and composite slabs with profiled decking. The results showed that the tested demountable shear connections could provide higher shear resistance than conventional shear connections. The critical failure mode is shear failure of the bolts, while there was no visible damage observed on the connected members. Most of the tested connections could fulfil the ductility requirement according to by Eurocode 4. The application of epoxy resin in the hole clearance resulted in lower slip capacity. The outcome provides an important basis for the justification of the forthcoming enhancement and validation of numerical models of the demountable shear connections. The failure behaviour, the observed damages and the resulting ability of the elements for re-use are discussed in detail. [less ▲]

Detailed reference viewed: 74 (4 UL)
Full Text
Peer Reviewed
See detailComparison of design for composite columns in steel and concrete according to Eurocode 4 and Chinese design codes
Zhang, Qingjie UL; Schäfer, Markus UL

in Romero, Manuel (Ed.) Proceedings of the 12th International Conference on Advances in Steel-Concrete Composite Structures (ASCCS 2018) (2018, June 27)

This paper compares the design of composite columns in steel and concrete based on EN1994-1-1 and Chinese JGJ138-2016. First, the application ranges of the codes are pointed out. Both codes contain the ... [more ▼]

This paper compares the design of composite columns in steel and concrete based on EN1994-1-1 and Chinese JGJ138-2016. First, the application ranges of the codes are pointed out. Both codes contain the design of fully encased composite sections and concrete filled rectangular and circular tubes. However, there are different limitations on cross-section sizes, material strength classes, and others. JGJ138 has three separate chapters for the designs related to the three different types of columns. Eurocode 4 gives three different design methods: one general method based on nonlinear calculation, and two simplified methods based on European buckling curves or N-M iteration curves. For the materials, mechanical properties, such as design strength values, are compared based on the same material grade. For axial compression resistance and eccentrically compressive resistance, the two simplified methods from Eurocode 4 are compared with the design method according to JGJ138-2016 through theoretical and parameter studies. The influences of related parameters such as long-term effects, the buckling curves, and N-M iteration curves are also compared. For shear design, JGJ138-2016 considers mainly transverse shear resistances, while Eurocode 4 further considers shear connection and load introduction. The design transverse shear resistance is compared through theory. [less ▲]

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailO-MI/O-DF vs. MQTT: a performance analysis
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL et al

in O-MI/O-DF vs. MQTT: a performance analysis (2018, June 21)

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as ... [more ▼]

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as well as Industry 4.0 environments, look more like a collection of isolated “Intranets of Things”, also referred to as “vertical silos”, rather than a federated infrastructure. Breaking down these silos is a key challenge in both the IoT and Industry 4.0 communities. This paper is intended to present and discuss two open and standardised mes- saging protocols designed for IoT applications, namely: MQTT and O-MI/O-DF. First, a traffic load’s analytical model derived from the MQTT standard specifications is presented. Second, a comparison study between MQTT and O-MI/O-DF standards is carried out based on a real-life industrial implementation. This study brings a deep understanding of the extent to which these protocols are performant (from a traffic load perspective) and how they can impact on future architectural designs. [less ▲]

Detailed reference viewed: 62 (5 UL)
Full Text
Peer Reviewed
See detailHighway Network Block with Gates Constraints for Training Very Deep Networks
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop, June 18-22, 2018 (2018, June 19)

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth ... [more ▼]

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth. Gate constraints are duly employed to improve optimization, latent representations and parameterization usage in order to efficiently learn hierarchical feature transformations which are crucial for the success of any deep network. One of the earliest very deep models with over 30 layers that was successfully trained relied on highway network blocks. Although, highway blocks suffice for alleviating optimization problem via improved information flow, we show for the first time that further in training such highway blocks may result into learning mostly untransformed features and therefore a reduction in the effective depth of the model; this could negatively impact model generalization performance. Using the proposed approach, 15-layer and 20-layer models are successfully trained with one gate and a 32-layer model using three gates. This leads to a drastic reduction of model parameters as compared to the original highway network. Extensive experiments on CIFAR-10, CIFAR-100, Fashion-MNIST and USPS datasets are performed to validate the effectiveness of the proposed approach. Particularly, we outperform the original highway network and many state-ofthe- art results. To the best our knowledge, on the Fashion-MNIST and USPS datasets, the achieved results are the best reported in literature. [less ▲]

Detailed reference viewed: 119 (10 UL)
Full Text
Peer Reviewed
See detailPose Encoding for Robust Skeleton-Based Action Recognition
Demisse, Girum UL; Papadopoulos, Konstantinos UL; Aouada, Djamila UL et al

in CVPRW: Visual Understanding of Humans in Crowd Scene, Salt Lake City, Utah, June 18-22, 2018 (2018, June 18)

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for ... [more ▼]

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for filtering linear noise transformations, but neglect to address potential nonlinear transformations. In this paper, we present an unsupervised learning approach for estimating nonlinear noise transformations in pose estimates. Our approach starts by decoupling linear and nonlinear noise transformations. While the linear transformations are modelled explicitly the nonlinear transformations are learned from data. Subsequently, we use an autoencoder with L2-norm reconstruction error and show that it indeed does capture nonlinear noise transformations, and recover a denoised pose estimate which in turn improves performance significantly. We validate our approach on a publicly available dataset, NW-UCLA. [less ▲]

Detailed reference viewed: 105 (36 UL)
Full Text
Peer Reviewed
See detailA Dyadic Deontic Logic in HOL
Benzmüller, Christoph UL; Farjami, Ali UL; Parent, Xavier UL

in Broersen, Jan; Condoravdi, Cleo; Nair, Shyam (Eds.) et al Deontic Logic and Normative Systems --- 14th International Conference, DEON 2018, Utrecht, The Netherlands, 3-6 July, 2018 (2018, June 11)

A shallow semantical embedding of a dyadic deontic logic by Carmo and Jones in classical higher-order logic is presented. This embedding is proven sound and complete, that is, faithful. The work presented ... [more ▼]

A shallow semantical embedding of a dyadic deontic logic by Carmo and Jones in classical higher-order logic is presented. This embedding is proven sound and complete, that is, faithful. The work presented here provides the theoretical foundation for the implementation and automation of dyadic deontic logic within off-the-shelf higher-order theorem provers and proof assistants. [less ▲]

Detailed reference viewed: 22 (11 UL)
Full Text
Peer Reviewed
See detailThe influence of a thin weak soil layer on the pile bearing capacity.
Rica, Shilton UL; Van Baars, Stefan UL

in International Conference on Deep Foundations and Ground Improvement, Urbanization and Infrastructure Development: Future Challenges (2018, June 05)

Most pile design methods for estimating the pile bearing capacity, are based on data from the cone penetration tests (CPT), such as the Dutch (Koppejan) method, the Belgium (De Beer) method or the French ... [more ▼]

Most pile design methods for estimating the pile bearing capacity, are based on data from the cone penetration tests (CPT), such as the Dutch (Koppejan) method, the Belgium (De Beer) method or the French (Bustamante & Gianeselli) method. In all these methods, the unit cone resistance of the CPT has to be averaged within an influence zone around the pile tip, in order to be able to calculate the pile tip bearing capacity. The influence zone is defined as the zone in which the parameters of the soil have an influence on the pile tip bearing capacity. For the French method this zone is between 1.5 times the pile diameter, D, above and below the pile tip; while for the Dutch method this zone is between 8 D above to a maximum of 4 D below the pile tip. Numerical simulations on piles installed in homogeneous sandy soil, show that these definitions of the influence zone are not accurate. The simulations show an influence zone from 1 or 2 D above, to 5 or 6 D below the pile tip, depending on the soil parameters. In this research, also the influence of a weak thin soil layer on the pile bearing capacity has been studied. All simulations are made for two different thicknesses of the thin soil layer. Also the soil strength parameters and soil stiffness parameters have been varied, in order to show the influence of this thin soil layer. This influence zone has been confirmed by laboratory tests. [less ▲]

Detailed reference viewed: 71 (17 UL)
Full Text
Peer Reviewed
See detailPRESEnCE: A Framework for Monitoring, Modelling and Evaluating the Performance of Cloud SaaS Web Services
Ibrahim, Abdallah Ali Zainelabden Abdallah UL

in 48th Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks Workshops (DNS'18) (2018, June)

Cloud Services Providers (CSPs) provide cloud services to the cloud customers in the pay-per-use model and use the Service Level Agreements (SLAs) to define the quality of the provided services. SLAs are ... [more ▼]

Cloud Services Providers (CSPs) provide cloud services to the cloud customers in the pay-per-use model and use the Service Level Agreements (SLAs) to define the quality of the provided services. SLAs are just a contract which characterizing the performance and quality of the CSPs’ services. Unfortunately, There is not an automatic and standard mechanism to verify and assure that delivered services satisfy the signed SLA agreement. In this context, this work aimed at developing an automatic framework called PRESENCE, to evaluate the Quality of Service (QoS) for the deployment of the Software-as-a-Service (SaaS) Web Services (WSS) offered across several CSPs. This performance evaluation will be used to verify and check on the SLA contraventions. PRESENCE aims at quantifying in a fair and by stealth way the performance and scalability of the delivered WS. By stealthiness, we refer to the capacity of evaluating a given Cloud service through multiple workload patterns that makes them indistinguishable from a regular user traffic from the provider point of view. PRESENCE introduces a definition for the set of Common performance metrics for measuring the behavior of cloud applications on top of a given CSP. This framework opens a novel perspectives for SLA contraventions assessment, monitoring, modeling the performance metrics for SaaS WSs. [less ▲]

Detailed reference viewed: 42 (7 UL)
Full Text
Peer Reviewed
See detailOn Verifying and Assuring the Cloud SLA by Evaluating the Performance of SaaS Web Services Across Multi-cloud Providers
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in 48th Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks Workshops (DNS'18) (2018, June)

Detailed reference viewed: 14 (6 UL)
Full Text
Peer Reviewed
See detailA Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints
Tessaro Lunardi, Willian UL; Cherri, Luiz Henrique; Voos, Holger UL

in 17th International Conference on Artificial Intelligence and Soft Computing, Zakopane, Poland, June 3-7, 2018 (2018, June)

Manufacturing scheduling strategies have historically ignored the availability of the machines. The more realistic the schedule, more accurate the calculations and predictions. Availability of machines ... [more ▼]

Manufacturing scheduling strategies have historically ignored the availability of the machines. The more realistic the schedule, more accurate the calculations and predictions. Availability of machines will play a crucial role in the Industry 4.0 smart factories. In this paper, a mixed integer linear programming model (MILP) and a discrete firefly algorithm (DFA) are proposed for an extended multi-objective FJSP with availability constraints (FJSP-FCR). Several standard instances of FJSP have been used to evaluate the performance of the model and the algorithm. New FJSP-FCR instances are provided. Comparisons among the proposed methods and other state-of-the-art reported algorithms are also presented. Alongside the proposed MILP model, a Genetic Algorithm is implemented for the experiments with the DFA. Extensive investigations are conducted to test the performance of the proposed model and the DFA. The comparisons between DFA and other recently published algorithms shows that it is a feasible approach for the stated problem. [less ▲]

Detailed reference viewed: 119 (22 UL)
Full Text
Peer Reviewed
See detailExperience report: How to extract security protocols’ specifications from C libraries
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (2018, June)

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code ... [more ▼]

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code, and with little or no help from the developers to better understand it. Security protocols implementations frequently use services provided by libraries coded in the C programming language; automatic tools for codelevel reverse engineering offer good support to comprehend the behavior of code in object-oriented languages but are ineffective to deal with libraries in C. Here we propose a systematic, yet human-dependent approach, which combines the capabilities of state-of-the-art tools in order to help the analyst to retrieve, step by step, the security protocol specifications from a library in C. Those specifications can then be used to create the formal model needed to carry out the analysis. [less ▲]

Detailed reference viewed: 50 (17 UL)
Full Text
Peer Reviewed
See detailModel Predictive Control for Aerial Collision Avoidance in dynamic environments
Castillo Lopez, Manuel UL; Sajadi Alamdari, Seyed Amin UL; Sanchez Lopez, Jose Luis UL et al

in 26th Mediterranean Conference on Control and Automation (MED), Zadar, Croatia, 19-22 June 2018 (2018, June)

Autonomous navigation in unknown environments populated by humans and other robots is one of the main challenges when working with mobile robots. In this paper, we present a new approach to dynamic ... [more ▼]

Autonomous navigation in unknown environments populated by humans and other robots is one of the main challenges when working with mobile robots. In this paper, we present a new approach to dynamic collision avoidance for multi-rotor unmanned aerial vehicles (UAVs). A new nonlinear model predictive control (NMPC) approach is proposed to safely navigate in a workspace populated by static and/or moving obstacles. The uniqueness of our approach lies in its ability to anticipate the dynamics of multiple obstacles, avoiding them in real-time. Exploiting active set algorithms, only the obstacles that affect to the UAV during the prediction horizon are considered at each sample time. We also improve the fluency of avoidance maneuvers by reformulating the obstacles as orientable ellipsoids, being less prone to local minima and allowing the definition of a preferred avoidance direction. Finally, we present two real-time implementations based on simulation. The former demonstrates that our approach outperforms its analog static formulation in terms of safety and efficiency. The latter shows its capability to avoid multiple dynamic obstacles. [less ▲]

Detailed reference viewed: 31 (10 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in International Conference on Communications (ICT), Saint-Malo, France, June 2018. (2018, June)

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailMega columns with several reinforced steel profiles - experimental and numerical investigations
Bogdan, Teodora; Chrzanowski, Maciej UL

in Proceedings of the ASCCS 2018 Conference, Valencia, Spain, June 27-29, 2018 (2018, June)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailThe bearing capacity of shallow foundations on slopes
Van Baars, Stefan UL

in Proceedings of NUMGE 2018 9th European Conference on Numerical Methods in Geotechnical Engineering (2018, June)

In 1920 Prandtl published an analytical solution for the bearing capacity of a soil under a strip load. Over the years, extensions have been made for a surrounding surcharge, the soil weight, the shape of ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a soil under a strip load. Over the years, extensions have been made for a surrounding surcharge, the soil weight, the shape of the footing, the inclination of the load, and also for a slope. In order to check the current extensions of a loaded strip footing next to a slope, many finite element calculations have been made, showing that these extensions are often inaccurate. Therefore new factors have been proposed, which are for both the soil-weight and the surcharge slope bearing capacity, based on the numerical calculations, and for the cohesion slope bearing capacity, also on an analytical solution. [less ▲]

Detailed reference viewed: 69 (0 UL)
Full Text
Peer Reviewed
See detailDutch field tests validating the bearing capacity of Fundex piles
Van Baars, Stefan UL; Rica, Shilton UL; De Nijs, G.A. et al

in Proceedings of CPT’18 – International Symposium on Cone Penetration Testing (2018, June)

In 1939, Boonstra was the first to base the tip bearing capacity of foundation piles on the CPT cone resistance. Since then, many engineers and scientists have proposed improved design methods for the ... [more ▼]

In 1939, Boonstra was the first to base the tip bearing capacity of foundation piles on the CPT cone resistance. Since then, many engineers and scientists have proposed improved design methods for the bearing capacity of foundation piles, such as the Dutch Koppejan method. This method holds a mistake in the qc-averaging method. Its tip resistance is based on the cone resistance of an assumed zone between 8D above the tip and 4D below the tip, while several researchers show that this should be in a zone between 2D above the tip and 8D below the tip. In the Netherlands, Belgium and France a field test has been performed indicating that the currently used design method in the Netherlands (the Koppejan Method) was about 30% too high for the tip resistance. This, and also the current qc-averaging method, conflict with the findings of Boonstra, Plantema, Huizinga and White & Bolton. Besides, in the field test, the residual stresses in the piles after installation were completely ignored, in fact, not even measured. Nevertheless, the Dutch Norm Commission Geo-Engineering decided to reduce the bearing capacity of foundation piles in the Netherlands, unless other field tests prove otherwise. Since this reduction is very drastic and since no serious problems due to the use of the unreduced bearing capacity were recorded, the geotechnical contracting company Funderingstechnieken Verstraeten BV has performed field tests on six Fundex piles, and asked the engineering company BMNED to assist with these tests and the design. The aim was to prove that, at least for Fundex piles, a reduction of 30% is too much. The Fundex Pile Tests in Terneuzen show that, especially for the grouted Fundex piles, the pile type factor should not be reduced in combination with the current qc-averaging method. [less ▲]

Detailed reference viewed: 38 (4 UL)
Full Text
Peer Reviewed
See detailThe failure mechanism of pile foundations in non-cohesive soils
Van Baars, Stefan UL

in Proceedings of NUMGE 2018 9th European Conference on Numerical Methods in Geotechnical Engineering (2018, June)

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space, based on a so-called Prandtl-wedge failure mechanism ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space, based on a so-called Prandtl-wedge failure mechanism. Meyerhof and Koppejan extended the logarithmic spiral part of the Prandtl-wedge and presented this as the failure mechanism for the tip of a foundation pile in non-cohesive soils. The numerical calculations made in this article show however that the failure zone (plastic zone) below a pile tip, is far wider and deeper than the Prandtl-wedge and that there is failure both in and out of the standard x-y plane, but most of the failure is due to an out-of-plane, circumferential or cleaving failure mechanism. Therefore, this failure mechanism is differ-ent from the Prandtl-wedge failure mechanism. Around the pile tip, there are circular thin zones with no out-of-plane failure. In these thin zones, the tangential (out-of-plane) [less ▲]

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Data Acquisition in Mobile Crowdsensing Systems
Capponi, Andrea UL

in 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece, 2018 (2018, June)

Mobile Crowdsensing (MCS) is one of the most promising paradigms for monitoring phenomena in urban environments. The success of a MCS campaign relies on large participation of citizens, who may be ... [more ▼]

Mobile Crowdsensing (MCS) is one of the most promising paradigms for monitoring phenomena in urban environments. The success of a MCS campaign relies on large participation of citizens, who may be reluctant in joining a campaign due to sensing and reporting costs they sustain. Hence, it is fundamental to propose efficient data collection frameworks (DCFs). In the first stages of our work, we proposed an energyefficient DCF that aims to minimize energy consumption while maximizing the utility of contributed data. Then, we developed an Android application and proposed a methodology to compare several DCFs, performing energy- and network-related measures with Power Monitor and Wireshark. Currently, we are investigating collaborative data delivery as a more efficient solution than the individual one. The key idea is to form groups of users and elect a responsible for aggregated data delivery. To this end, it is crucial to analyze device to device (D2D) communications and propose efficient policies for group formation and owner election. To evaluate the performance in realistic urban environments we exploit CrowdSenSim, which runs large-scale simulations in citywide scenarios. [less ▲]

Detailed reference viewed: 47 (3 UL)
Full Text
Peer Reviewed
See detailPOSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
Adamsky, Florian UL; Retunskaia, Tatiana UL; Schiffner, Stefan UL et al

in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June)

Detailed reference viewed: 153 (11 UL)
Full Text
Peer Reviewed
See detailDevelopment of an innovative type of shear connector dedicated to fully embedded steel-concrete composite columns - experimental and numerical investigations
Chrzanowski, Maciej UL; Odenbreit, Christoph UL; Obiala, Renata et al

in Proceedings of the ASCCS 2018 Conference, Valencia, Spain, June 27-29, 2018 (2018, June)

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis of CoAP under Satellite Link Disruption
Giotti, Domenico UL; Lamorte, Luca UL; Soua, Ridha UL et al

in Performance Analysis of CoAP under Satellite Link Disruption (2018, June)

Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to ... [more ▼]

Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to support well IoT applications, when terrestrial networks are no longer available (e.g., in remote not habitable areas, in the occurrence of calamities). Subsequently, the only way forward is to transmit IoT data over satellite. The integrated satellite-terrestrial networks are emerging as a promising solution to ensure ubiquitous IoT connectivity, higher throughput and reliability. Being different by design, IoT protocols’ tuning is needed to integrate terrestrial and satellite segments. In the current paper, we evaluate the performances of CoAP, the well-known lightweight application protocol for IoT in an integrated scenario, taking into account the satellite link disruption. The key findings of our study, conducted using the OpenSAND simulator, show that decreasing the value of congestion control parameters proposed by the standard [1], mainly ACK_TIMEOUT and ACK_RANDOM_FACTOR, is crucial to achieve lower end-to-end delays and higher packet delivery ratio. [less ▲]

Detailed reference viewed: 105 (16 UL)
Full Text
Peer Reviewed
See detailORBIT - Overcoming Breakdowns in Teams with Interactive Tabletops
Sunnen, Patrick UL; Arend, Béatrice UL; Maquil, Valérie

in Kay, Judy; Luckin, Rose (Eds.) Rethinking Learning in the Digital Age: Making the Learning Sciences Count, 13th International Conference of the Learning Sciences (ICLS) 2018 (2018, June)

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns ... [more ▼]

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns. The design and the research process relies on user-centered design methods and on an ethnomethodological conversation analytic framework. The project will generate scientific knowledge on participants’ collaboration methods and create a powerful collaborative learning tool. [less ▲]

Detailed reference viewed: 94 (17 UL)
Full Text
Peer Reviewed
See detailKey-Skeleton Based Feedback Tool for Assisting Physical Activity
Baptista, Renato UL; Ghorbel, Enjie UL; Shabayek, Abd El Rahman UL et al

in 2018 Zooming Innovation in Consumer Electronics International Conference (ZINC), 30-31 May 2018 (2018, May 31)

This paper presents an intuitive feedback tool able to implicitly guide motion with respect to a reference movement. Such a tool is important in multiple applications requiring assisting physical ... [more ▼]

This paper presents an intuitive feedback tool able to implicitly guide motion with respect to a reference movement. Such a tool is important in multiple applications requiring assisting physical activities as in sports or rehabilitation. Our proposed approach is based on detecting key skeleton frames from a reference sequence of skeletons. The feedback is based on the 3D geometry analysis of the skeletons by taking into account the key-skeletons. Finally, the feedback is illustrated by a color-coded tool, which reflects the motion accuracy. [less ▲]

Detailed reference viewed: 51 (4 UL)
Full Text
Peer Reviewed
See detailFaCoY - A Code-to-Code Search Engine
Kim, Kisub UL; Kim, Dongsun UL; Bissyande, Tegawendé François D Assise UL et al

in International Conference on Software Engineering (ICSE 2018) (2018, May 27)

Code search is an unavoidable activity in software development. Various approaches and techniques have been explored in the literature to support code search tasks. Most of these approaches focus on ... [more ▼]

Code search is an unavoidable activity in software development. Various approaches and techniques have been explored in the literature to support code search tasks. Most of these approaches focus on serving user queries provided as natural language free-form input. However, there exists a wide range of use-case scenarios where a code-to-code approach would be most beneficial. For example, research directions in code transplantation, code diversity, patch recommendation can leverage a code-to-code search engine to find essential ingredients for their techniques. In this paper, we propose FaCoY, a novel approach for statically finding code fragments which may be semantically similar to user input code. FaCoY implements a query alternation strategy: instead of directly matching code query tokens with code in the search space, FaCoY first attempts to identify other tokens which may also be relevant in implementing the functional behavior of the input code. With various experiments, we show that (1) FaCoY is more effective than online code-to-code search engines; (2) FaCoY can detect more semantic code clones (i.e., Type-4) in BigCloneBench than the state-of-theart; (3) FaCoY, while static, can detect code fragments which are indeed similar with respect to runtime execution behavior; and (4) FaCoY can be useful in code/patch recommendation. [less ▲]

Detailed reference viewed: 56 (8 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte (2018, May 23)

Detailed reference viewed: 45 (1 UL)