References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 25 (2 UL)
Full Text
Peer Reviewed
See detailPrivate API Access and Functional Mocking in Automated Unit Test Generation
Arcuri, Andrea UL; Fraser, Gordon; Just, Rene

in Private API Access and Functional Mocking in Automated Unit Test Generation (in press)

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailCustomary international law in the legal order of the European Union
Neframi, Eleftheria UL

in Lopez Escudero, Manuel (Ed.) THE EUROPEAN UNION'S EXTERNAL ACTION IN TIME OF CRISIS (in press)

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the ... [more ▼]

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the exercise of competences with the view to attain an ultimate, constitutional objective of being a credible actor in the international scene. [less ▲]

Detailed reference viewed: 81 (14 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailA Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications
Jan, Sadeeq UL; Nguyen, Duy Cu UL; Andrea, Arcuri UL et al

in 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017 (in press)

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to ... [more ▼]

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection attacks that target SOAP communications. In this paper, we present a novel, search-based approach used to generate test data for a web application in an attempt to deliver malicious XML messages to web services. <br />Our goal is thus to detect XML injection vulnerabilities in web applications. The proposed approach is evaluated on two studies, including an industrial web application with millions of users. Results show that we are able to effectively generate test data (e.g., input values in an HTML form) that detect such vulnerabilities. [less ▲]

Detailed reference viewed: 116 (11 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 102 (5 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 61 (6 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 49 (3 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 35 (9 UL)
Full Text
Peer Reviewed
See detailIncroci autobiografici nel Lussemburgo antifascista
Levi, Fabio; Barenghi, Mario; Cuoghi, Sibilla et al

in Malvetti, Massimo, Neri, Francesco (Ed.) Primo Levi et la chimie des mots (in press)

Detailed reference viewed: 48 (10 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 206 (3 UL)
Full Text
Peer Reviewed
See detailAn Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application
Almasi, Moein; Hemmati, Hadi; Fraser, Gordon et al

in International Conference on Software Engineering (ICSE) (in press)

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at ... [more ▼]

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at detecting faults, but how effective and applicable are they in an industrial application? In this paper, we investigate this question using a life insurance and pension products calculator engine owned by SEB Life & Pension Holding AB Riga Branch. To study fault-finding effectiveness, we extracted 25 real faults from the version history of this software project, and applied two up-to-date unit test generation tools for Java, EvoSuite and Randoop, which implement search-based and feedback-directed random test generation, respectively. Automatically generated test suites detected up to 56.40% (EvoSuite) and 38.00% (Randoop) of these faults. The analysis of our results demonstrates challenges that need to be addressed in order to improve fault detection in test generation tools. In particular, classification of the undetected faults shows that 97.62% of them depend on either “specific primitive values” (50.00%) or the construction of “complex state configuration of objects” (47.62%). To study applicability, we surveyed the developers of the application under test on their experience and opinions about the test generation tools and the generated test cases. This leads to insights on requirements for academic prototypes for successful technology transfer from academic research to industrial practice, such as a need to integrate with popular build tools, and to improve the readability of the generated tests. [less ▲]

Detailed reference viewed: 91 (3 UL)
Full Text
Peer Reviewed
See detailIntegration of Learning Material into an Advanced Project-Based Learning Support Platform
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in INTED2017 Proceedings (in press)

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time ... [more ▼]

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time-intensive task, reusability in different contexts is desirable. In this paper, we propose to move from a material-centric to a student-centric approach, integrating learning material in an advanced project-based learning support platform. Our ecosystem, relying on semantic web technologies, comprises plugins for common authoring and project realization tools. [less ▲]

Detailed reference viewed: 28 (8 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 64 (6 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL et al

in An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption (2017, May 28)

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage ... [more ▼]

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and fault-revelation remains unknown, yielding uncertainty and controversy. Most previous studies rely on the Clean Program Assumption, that a test suite will obtain similar coverage for both faulty and fixed (‘clean’) program versions. This assumption may appear intuitive, especially for bugs that denote small semantic deviations. However, we present evidence that the Clean Program Assumption does not always hold, thereby raising a critical threat to the validity of previous results. We then conducted a study using a robust experimental methodology that avoids this threat to validity, from which our primary finding is that strong mutation testing has the highest fault revelation of four widely-used criteria. Our findings also revealed that fault revelation starts to increase significantly only once relatively high levels of coverage are attained. [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detailCost analysis of Smart Lighting Solutions for Smart Cities
Cacciatore, Giuseppe; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in IEEE International Conference on Communications (ICC), Paris, France, 2017 (2017, May)

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose ... [more ▼]

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose heuristics and devise a comparison methodology for new smart lighting solutions in next generation smart cities. The proposed smart lighting techniques make use of Internet of Things (IoT) augmented lamppost, which save energy by turning off or dimming the light according to the presence of citizens. Assessing costs and benefits in adopting the new smart lighting solutions is a pillar step for municipalities to foster real implementation. For evaluation purposes, we have developed a custom simulator which enables the deployment of lampposts in realistic urban environments. The citizens travel on foot along the streets and trigger activation of the lampposts according to the proposed heuristics. For the city of Luxembourg, the results highlight that replacing all existing lamps with LEDs and dimming light intensity according to the presence of users nearby the lampposts is convenient and provides an economical return already after the first year of deployment. [less ▲]

Detailed reference viewed: 63 (6 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Maleki, Sina UL; Lei, Lei UL et al

in ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017 (2017, May)

Detailed reference viewed: 13 (2 UL)
Full Text
Peer Reviewed
See detailA Guided Genetic Algorithm for Automated Crash Reproduction
Soltani, Mozhan; Panichella, Annibale UL; van Deursen, Arie

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution ... [more ▼]

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution, mutation analysis, and directed model checking as underling techniques for post-failure analysis of crash stack traces. However, existing approaches still cannot reproduce many real-world crashes due to such limitations as environment dependencies, path explosion, and time complexity. To address these challenges, we present EvoCrash, a post-failure approach which uses a novel Guided Genetic Algorithm (GGA) to cope with the large search space characterizing real-world software programs. Our empirical study on three open-source systems shows that EvoCrash can replicate 41 (82%) of real-world crashes, 34 (89%) of which are useful reproductions for debugging purposes, outperforming the state-of-the-art in crash replication. [less ▲]

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailSearch-driven String Constraint Solving for Vulnerability Detection
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world ... [more ▼]

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world programs typically contain complex string operations that challenge vulnerability detection. State-of-the-art string constraint solvers support only a limited set of string operations and fail when they encounter an unsupported one; this leads to limited effectiveness in finding vulnerabilities. In this paper we propose a search-driven constraint solving technique that complements the support for complex string operations provided by any existing string constraint solver. Our technique uses a hybrid constraint solving procedure based on the Ant Colony Optimization meta-heuristic. The idea is to execute it as a fallback mechanism, only when a solver encounters a constraint containing an operation that it does not support. We have implemented the proposed search-driven constraint solving technique in the ACO-Solver tool, which we have evaluated in the context of injection and XSS vulnerability detection for Java Web applications. We have assessed the benefits and costs of combining the proposed technique with two state-of-the-art constraint solvers (Z3-str2 and CVC4). The experimental results, based on a benchmark with 104 constraints derived from nine realistic Web applications, show that our approach, when combined in a state-of-the-art solver, significantly improves the number of detected vulnerabilities (from 4.7% to 71.9% for Z3-str2, from 85.9% to 100.0% for CVC4), and solves several cases on which the solver fails when used stand-alone (46 more solved cases for Z3-str2, and 11 more for CVC4), while still keeping the execution time affordable in practice. [less ▲]

Detailed reference viewed: 424 (46 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing (2017, May)

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile ... [more ▼]

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile Crowdsensing (MCS), citizens participate in the sensing process contributing data with their mobile devices such as smartphones, tablets and wearables. To be effective, MCS systems require a large number of users to contribute data. While several studies focus on developing efficient incentive mechanisms to foster user participation, data collection policies still require investigation. In this paper, we propose a novel distributed and energy-efficient framework for data collection in opportunistic MCS architectures. Opportunistic sensing systems require minimal intervention from the user side as sensing decisions are application- or device-driven. The proposed framework minimizes the cost of both sensing and reporting, while maximizing the utility of data collection and, as a result, the quality of contributed information. We evaluate performance of the framework with simulations, performed in a real urban environment and with a large number of participants. The simulation results verify cost-effectiveness of the framework and assess efficiency of the data generation process. [less ▲]

Detailed reference viewed: 47 (4 UL)
Full Text
Peer Reviewed
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun UL; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs UL; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the ... [more ▼]

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to maximize its pay- o while ensuring the desired level of integrity for the out- sourced computation. We de ne two Stackelberg games and analyze the optimal setting's sensitivity for the parameters of the model. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailSensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ... [more ▼]

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more concerned with their privacy in buildings, explicit sensing techniques can lead to uncomfortableness and resistance from occupants. In this paper, we adapt a sensing by proxy paradigm that monitors building status and coarse occupant activities through agglomerative clustering of indoor temperature movements. Through extensive experimentation on 86 classrooms, offices and labs in a five-story school building in western Europe, we prove that indoor temperature movements can be leveraged to infer latent information about indoor environments, especially about rooms' relative physical locations and rough type of occupant activities. Our results evidence a cost-effective approach to extending commercial building control systems and gaining extra relevant intelligence from such systems. [less ▲]

Detailed reference viewed: 47 (12 UL)
Full Text
Peer Reviewed
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

in Iacobescu, Remus Ion; Malfliet, Annelies (Eds.) Proceedings of the 5th International Slag Valorisation Symposium (2017, April)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA
Liu, Zhengxuan; Kang, Guixia; Lei, Lei UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), 2017 (2017, March 19)

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ ... [more ▼]

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ achievable data rate and network throughput are analysed under three transmission schemes: 1) all users’ signals are jointly transmitted by coordinated base stations (BSs); 2) only cell-edge users’ signals are jointly transmitted by coordinated BSs; 3) each user’s signals are transmitted by only one BS. Next, we formulate EE maximization problems for the three schemes under the constraints of minimum users’ data rate and maximum BS transmit power. The considered problem is non-convex and hard to tackle. To address it, an iterative sub-optimal algorithm is proposed by adopting fractional programming and difference of convex programming. Numerical results show that the near optimality performance of EE can be achieved by using the proposed algorithm with advantages of fast convergence and low complexity. Three transmission schemes of NOMA have superior EE performance compared with conventional orthogonal multiple access scheme in the same CoMP networks. [less ▲]

Detailed reference viewed: 53 (25 UL)
Full Text
See detailSystem Testing of Timing Requirements based on Use Cases and Timed Automata
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by ... [more ▼]

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing requirements, following a methodology aiming at minimizing modeling overhead. We automate the generation of executable test cases using a test strategy based on maximizing test suite diversity and building over the UPPAAL model checker. Initial empirical results based on an industrial case study provide evidence of the effectiveness of the approach. [less ▲]

Detailed reference viewed: 173 (15 UL)
Full Text
Peer Reviewed
See detailMusic and Social Health
Sagrillo, Damien UL

in Devosa, Iván; Maródi, Ágnes; Buzás, Zsuzsanna (Eds.) et al International HEART 2017 Conference Health – Economy – Art (2017, March 08)

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans ... [more ▼]

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans Günter Bastian found out that common music practice and extended music education can lead to more social competence. In my lecture, I will give three examples of how music making cannot only avoid violence and criminality, but can also contribute to well-being among like-minded people. 1) The movie The Choir (les choristes) is a perfect demonstration, how common singing is able to weld together an initial heterogenous group of difficult educable children living in institutions of care 2) El Sistema is a famous programme for children in Venezuela financed by the state with the main objective that “music has to be recognised as an agent of social development” as José Antonio Abreu, its initiator highlights. 3) In my last year’s lecture, I presented my mail choir with an age average beyond 70 years. Recently I published a study on interviews conducted with the choristers to find out their views of social well-being." [less ▲]

Detailed reference viewed: 2 (0 UL)
Full Text
Peer Reviewed
See detailIncremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL et al

in 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (2017, March)

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use ... [more ▼]

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use cases are central development artifacts for requirements engineering and system testing. In such contexts, use case configurators can play a significant role to capture variable and common requirements in Product Line (PL) use case models and to generate Product Specific (PS) use case models for each new customer in a product family. [Question/Problem] Although considerable research has been devoted to use case configurators, little attention has been paid to supporting the incremental reconfiguration of use case models with evolving configuration decisions. [Principal ideas/results] We propose, apply, and assess an incremental reconfiguration approach to support evolving configuration decisions in PL use case models. PS use case models are incrementally reconfigured by focusing only on the changed decisions and their side effects. In our prior work, we proposed and applied Product line Use case modeling Method (PUM) to support variability modeling in PL use case diagrams and specifications. We also developed a use case configurator, PUMConf, which interactively collects configuration decisions from analysts to generate PS use case models from PL models. Our approach is built on top of PUM and PUMConf. [Contributions] We provide fully automated tool support for incremental configuration as an extension of PUMConf. Our approach has been evaluated in an industrial case study in the automotive domain, which provided evidence it is practical and beneficial. [less ▲]

Detailed reference viewed: 100 (47 UL)
Full Text
Peer Reviewed
See detailFaster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels
Alodeh, Maha UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (2017, March)

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailLightweight Detection of Android-specific Code Smells: the aDoctor Project
Palomba, Fabio; Di Nucci, Dario; Panichella, Annibale UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, February 21)

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising ... [more ▼]

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising approaches for detecting the traditional code smells defined by Fowler, little knowledge and support is available for an emerging category of Mobile app code smells. Recently, Reimann etal proposed a new catalogue of Android-specific code smells that may be a threat for the maintainability and the efficiency of Android applications. However, current tools working in the context of Mobile apps provide limited support and, more importantly, are not available for developers interested in monitoring the quality of their apps. To overcome these limitations, we propose a fully automated tool, coined aDoctor, able to identify 15 Android-specific code smells from the catalogue by Reimann et al. An empirical study conducted on the source code of 18 Android applications reveals that the proposed tool reaches, on average, 98% of precision and 98% of recall. We made aDoctor publicly available. [less ▲]

Detailed reference viewed: 42 (16 UL)
Full Text
Peer Reviewed
See detailSoftware-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable?
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017, February 21)

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and ... [more ▼]

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and software-based techniques to approximate the actual energy profile. However, all these solutions present their own advantages and disadvantages. Hardware-based tools are highly precise, but at the same time their use is bound to the acquisition of costly hardware components. Model-based tools require the calibration of parameters needed to correctly create a model on a specific hardware device. Software-based approaches do not need any hardware components, but they rely on battery measurements and, thus, they are hardware-assisted. These tools are cheaper and easier to use than hardware-based tools, but they are believed to be less precise. In this paper, we take a deeper look at the pros and cons of software-based solutions investigating to what extent their measurements depart from hardware-based solutions. To this aim, we propose a software-based tool named PETRA that we compare with the hardware-based MONSOON toolkit on 54 Android apps. The results show that PETRA performs similarly to MONSOON despite not using any sophisticated hardware components. In fact, in all the apps the mean relative error with respect to MONSOON is lower than 0.05. Moreover, for 95% of the analyzed methods the estimation error is within 5% of the actual values measured using the hardware-based toolkit. [less ▲]

Detailed reference viewed: 54 (20 UL)
Full Text
Peer Reviewed
See detailIntegration of sparse electrophysiological measurements with preoperative MRI using 3D surface estimation in deep brain stimulation surgery
Husch, Andreas Dominik UL; Gemmar, Peter; Thunberg, Johan UL et al

in Webster, Robert; Fei, Baowei (Eds.) Medical Imaging 2017: Image-Guided Procedures, Robotic Interventions, and Modeling (2017, February 14)

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the ... [more ▼]

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the subthalamic nucleus (STN) to suppress the symptoms of Parkinson’s Disease. The standard approach is to use an array of up to five MER electrodes in a fixed configuration. Interpretation of the recorded signals yields a spatiallyvery sparse set of information about the morphology of the respective brain structures in the targeted area. However, no aid is currently available for surgeons to intraoperatively integrate this information with other data available on the patient’s individual morphology (e.g. MR imaging data used for surgical planning). This integration might allow surgeons to better determine the most probable position of the electrodes within the target structure during surgery. This paper suggests a method for reconstructing a surface patch from the sparse MER dataset utilizing additional a-priori knowledge about the geometrical configuration of the measurement electrodes. The conventional representation of MER measurements as intervals of target region/non-target region is therefore transformed into an equivalent boundary set representation, allowing efficient point-based calculations. Subsequently, the problem is to integrate the resulting patch with a preoperative model of the target structure, which can be formulated as registration problem minimizing a distance measure between the two surfaces. When restricting this registration procedure to translations, which is reasonable given certain geometric considerations, the problem can be solved globally by employing an exhaustive search with arbitrary precision in polynomial time. The proposed method is demonstrated using bilateral STN/Substantia Nigra segmentation data from preoperative MRIs of 17 Patients with simulated MER electrode placement. When using simulated data of heavily perturbed electrodes and subsequent MER measuremen [less ▲]

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailHow representative are EAP listening books of real lectures?
Deroey, Katrien UL

in Kemp, Jenny (Ed.) Proceedings of the 2015 BALEAP Conference. EAP in a rapidly changing landscape: Issues, challenges and solutions (2017)

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is ... [more ▼]

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is arguably whether it prepares students for lectures. In this regard, the availability of spoken academic corpora (e.g. BASE, MICASE, ELFA) and the research arising from these provides insights into lecture discourse that could be usefully integrated in such materials. However, as I will here show, the integration of corpus findings in EAP course books is surprisingly limited, raising the question of whether training based on such materials forms an adequate preparation for the demands of real lectures. I illustrate the gap between authentic lecture discourse and various current listening books by comparing the treatment of importance markers (e.g. the important point is; remember; I want to emphasize this) with their realisation in a lecture corpus. (Deroey and Taverniers 2012; Deroey 2013). Since these discourse organisational signals alert students to key points, being able to identify these markers may facilitate lecture comprehension and note-taking. Importance markers were retrieved from all 160 lectures of the British Academic Spoken English corpus using corpus-driven and corpus-based methods. The investigation revealed that while listening books typically highlight the importance of identifying the lecturer’s main points, students are either not or inadequately trained to recognise importance markers. Where examples of such markers are included, they are few and prototypical (e.g. the important point is). However, in the lecture corpus prototypical markers are relatively uncommon; instead less explicit, multifunctional markers such as ‘the thing is’ and ‘remember’ predominate. The findings suggest that much remains to be done to make lecture listening books more representative of real lectures. References Deroey, K. L. B. and Taverniers, M. 2012. “‘Just remember this’: Lexicogrammatical relevance markers in lectures”. English for Specific Purposes 31 (4): 221-233. Deroey, K. L. B. (2015). Marking importance in lectures: Interactive and textual orientation. Applied Linguistics, 36(1), 51-72. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailAutomata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation
Devroey, Xavier; Perrouin, Gilles UL; Papadakis, Mike UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017) (2017)

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailImproving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models
Liu, Bing UL; Lucia, Lucia; Nejati, Shiva UL et al

in 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017)

One promising way to improve the accuracy of fault localization based on statistical debugging is to increase diversity among test cases in the underlying test suite. In many practical situations, adding ... [more ▼]

One promising way to improve the accuracy of fault localization based on statistical debugging is to increase diversity among test cases in the underlying test suite. In many practical situations, adding test cases is not a cost-free option because test oracles are developed manually or running test cases is expensive. Hence, we require to have test suites that are both diverse and small to improve debugging. In this paper, we focus on improving fault localization of Simulink models by generating test cases. We identify three test objectives that aim to increase test suite diversity. We use these objectives in a search-based algorithm to generate diversified but small test suites. To further minimize test suite sizes, we develop a prediction model to stop test generation when adding test cases is unlikely to improve fault localization. We evaluate our approach using three industrial subjects. Our results show (1) the three selected test objectives are able to significantly improve the accuracy of fault localization for small test suite sizes, and (2) our prediction model is able to maintain almost the same fault localization accuracy while reducing the average number of newly generated test cases by more than half. [less ▲]

Detailed reference viewed: 135 (7 UL)
Full Text
Peer Reviewed
See detailUnsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion
Goncalves Almeida Antunes, Michel UL; Barreto, Joao P.; Aouada, Djamila UL et al

in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017 (2017)

The article concerns the automatic calibration of a camera with radial distortion from a single image. It is known that, under the mild assumption of square pixels and zero skew, lines in the scene ... [more ▼]

The article concerns the automatic calibration of a camera with radial distortion from a single image. It is known that, under the mild assumption of square pixels and zero skew, lines in the scene project into circles in the image, and three lines suffice to calibrate the camera up to an ambiguity between focal length and radial distortion. The calibration results highly depend on accurate circle estimation, which is hard to accomplish, because lines tend to project into short circular arcs. To overcome this problem, we show that, given a short circular arc edge, it is possible to robustly determine a line that goes through the center of the corresponding circle. These lines, henceforth called Lines of Circle Centres (LCCs), are used in a new method that detects sets of parallel lines and estimates the calibration parameters, including the center and amount of distortion, focal length, and camera orientation with respect to the Manhattan frame. Extensive experiments in both semi-synthetic and real images show that our algorithm outperforms state- of-the-art approaches in unsupervised calibration from a single image, while providing more information. [less ▲]

Detailed reference viewed: 46 (5 UL)
Full Text
Peer Reviewed
See detailDistilling Provider-Independent Data for General Detection of Non-Technical Losses
Meira, Jorge Augusto UL; Glauner, Patrick UL; State, Radu UL et al

in Power and Energy Conference, Illinois 23-24 February 2017 (2017)

Non-technical losses (NTL) in electricity distribution are caused by different reasons, such as poor equipment maintenance, broken meters or electricity theft. NTL occurs especially but not exclusively in ... [more ▼]

Non-technical losses (NTL) in electricity distribution are caused by different reasons, such as poor equipment maintenance, broken meters or electricity theft. NTL occurs especially but not exclusively in emerging countries. Developed countries, even though usually in smaller amounts, have to deal with NTL issues as well. In these countries the estimated annual losses are up to six billion USD. These facts have directed the focus of our work to the NTL detection. Our approach is composed of two steps: 1) We compute several features and combine them in sets characterized by four criteria: temporal, locality, similarity and infrastructure. 2) We then use the sets of features to train three machine learning classifiers: random forest, logistic regression and support vector vachine. Our hypothesis is that features derived only from provider-independent data are adequate for an accurate detection of non-technical losses. [less ▲]

Detailed reference viewed: 47 (10 UL)
Full Text
Peer Reviewed
See detailMehrsprachigkeit in der juristischen Ausbildung an der Universität Luxemburg. Rechtswissenschaft trifft Mehrsprachigkeitsforschung
Uwera, Francine UL; Heuschling, Luc UL

in Warto, Patrick; Zumbach, Jörg; Lagodny, Otto (Eds.) et al Rechtdidaktik - Pflicht oder Kür? (2017)

Detailed reference viewed: 102 (29 UL)
Full Text
Peer Reviewed
See detailA Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons
Galetzka, Michael; Glauner, Patrick UL

in Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP (2017)

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special ... [more ▼]

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special cases to be considered. This holds true in particular for complex polygons whose edges intersect each other creating holes. In this paper we present a simple even-odd algorithm to solve this problem for complex polygons in linear time and prove its correctness for all possible points and polygons. We furthermore provide examples and implementation notes for this algorithm. [less ▲]

Detailed reference viewed: 49 (8 UL)
Full Text
Peer Reviewed
See detailControlled Homomorphic Encryption: Definition and Construction
Desmedt, Yvo; Iovino, Vincenzo UL; Persiano, Giuseppe et al

in FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (2017)

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE ... [more ▼]

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE) to homomorphically evaluate a ciphertext Ct = Enc(m) and a circuit C therefore obtaining Enc(C(m)) but only if (similarly to a FunctE) a token for C has been received from the owner of the secret key. We discuss difficulties in constructing a CHES and then show a construction based on any FunctE. As a byproduct our CHES also represents a FunctE supporting the re-encryption functionality and in that respect improves existing solutions. [less ▲]

Detailed reference viewed: 24 (6 UL)
Full Text
Peer Reviewed
See detailWeak Interference Detection with Signal Cancellation in Satellite Communications
Politis, Christos UL; Maleki, Sina UL; Tsinos, Christos UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017 (2017)

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference ... [more ▼]

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference efficiently. While there are efficient techniques to monitor strong interference in SATCOM, weak interference is not so easily detected because of its low interference to signal and noise ratio (ISNR). To address this issue, this paper proposes and develops a technique which takes place on-board the satellite by decoding the desired signal, removing it from the total received signal and applying an Energy Detector (ED) in the remaining signal for the detection of interference. Different from the existing literature, this paper considers imperfect signal cancellation, examining how the decoding errors affect the sensing performance, derives the expressions for the probability of false alarm and provides a set of simulations results, verifying the efficiency of the technique. [less ▲]

Detailed reference viewed: 84 (11 UL)
See detailDie deutschsprachige Übersetzung der Dalimil-Chronik. Ein Versuch der politischen Legitimation der städtischen Eliten im Böhmen der Luxemburger?
Vomacka, Eloïse UL

in Sieburg, Heinz (Ed.) Prag in der Zeit der Luxemburger. Literatur, religiöse Ideen und Herrschaftskulturen zwischen Bereicherung und Behauptung (2017)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailShould We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study
Wang, Jingyi; Sun, Jun; Yuan, Qixia UL et al

in Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (2017)

Detailed reference viewed: 20 (3 UL)
Full Text
Peer Reviewed
See detailTowards Security-aware Mutation Testing
Loise, Thomas; Devroey, Xavier; Perrouin, Gilles et al

in The 12th International Workshop on Mutation Analysis (Mutation 2017) (2017)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailThe Justification of Tyrannicide in the Chronicle of Dalimil. The Czech Nobility as the “Mystical Body” of the Realm.
Vomacka, Eloïse UL

in Valdoliso, Covadonga (Ed.) Debuerit habere regnum. Deposing and Proclaiming Kings in the Middle Ages (2017)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailThe Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study
Glauner, Patrick UL; Du, Manxing UL; Paraschiv, Victor et al

in Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017) (2017)

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we ... [more ▼]

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we revisit this question from a quantitative perspective. Concretely, we collect 54K abstracts of papers published between 2007 and 2016 in leading machine learning journals and conferences. We then use machine learning in order to determine the top 10 topics in machine learning. We not only include models, but provide a holistic view across optimization, data, features, etc. This quantitative approach allows reducing the bias of surveys. It reveals new and up-to-date insights into what the 10 most prolific topics in machine learning research are. This allows researchers to identify popular topics as well as new and rising topics for their research. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailVideo-Based Feedback for Assisting Physical Activity
Baptista, Renato UL; Goncalves Almeida Antunes, Michel UL; Aouada, Djamila UL et al

in 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2017)

In this paper, we explore the concept of providing feedback to a user moving in front of a depth camera so that he is able to replicate a specific template action. This can be used as a home based ... [more ▼]

In this paper, we explore the concept of providing feedback to a user moving in front of a depth camera so that he is able to replicate a specific template action. This can be used as a home based rehabilitation system for stroke survivors, where the objective is for patients to practice and improve their daily life activities. Patients are guided in how to correctly perform an action by following feedback proposals. These proposals are presented in a human interpretable way. In order to align an action that was performed with the template action, we explore two different approaches, namely, Subsequence Dynamic Time Warping and Temporal Commonality Discovery. The first method aims to find the temporal alignment and the second one discovers the interval of the subsequence that shares similar content, after which standard Dynamic Time Warping can be used for the temporal alignment. Then, feedback proposals can be provided in order to correct the user with respect to the template action. Experimental results show that both methods have similar accuracy rate and the computational time is a decisive factor, where Subsequence Dynamic Time Warping achieves faster results. [less ▲]

Detailed reference viewed: 79 (27 UL)
Full Text
Peer Reviewed
See detailAssessing and Improving the Mutation Testing Practice of PIT
Laurent, Thomas; Papadakis, Mike UL; Kintis, Marinos UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (2017)

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailFormally Verified Differential Dynamic Logic
Bohrer, Brandon; Rahli, Vincent UL; Vukotic, Ivana UL et al

in CPP 2017 (2017)

Detailed reference viewed: 49 (14 UL)
Full Text
Peer Reviewed
See detail"Communauté du royaume" et affirmation de la noblesse dans les pays tchèques (XIIIe-XIVe siècles)
Vomacka, Eloïse UL

in Lachaud, Frédérique (Ed.) La « communauté du royaume » (Angleterre, Écosse, France, Empire, Scandinavie), de la fin du Xe siècle au début du XIVe siècle, théories et pratiques, Nancy – 6 novembre / 8 novembre 2014 (2017)

Detailed reference viewed: 18 (2 UL)
See detailLuxemburg, Brabant und die Karolinger. Versuch einer Neubewertung der Selbstdarstellung der beiden ersten Kaiser aus dem Hause Luxemburg
Vomacka, Eloïse UL; Margue, Michel UL

in Dolezalova, Eva (Ed.) Ověnčený slávou, láskou i pohrdáním. Jan Lucemburský a Karel IV. v historické paměti (2017)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis
Huynen, Jean-Louis UL; Lenzini, Gabriele UL

in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied ... [more ▼]

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodology works also retrospectively. It assists analysts in retrieving the causes of an observed socio-technical attack, guiding them to understand where the information security management of the system has failed. The methodology is tuned to find causes that root in the human-related factors that an attacher can exploit to execute its intrusion. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailWhen An Educational Ideology Travels: The Experience Of The New Math Reform In Luxembourg
Nadimi Amiri, Shaghayegh UL

in Mathematics Education and Life at Times of Crisis (2017)

Detailed reference viewed: 10 (4 UL)
Full Text
Peer Reviewed
See detail"... weil die meisten Comics einfach zu schwer sind!" - Zur Kategorie der Einfachheit beim Einsatz von Bandes dessinées im Fremdsprachenunterricht Französisch
Morys, Nancy UL

in Burwitz-Melzer, Eva; O´Sullivan, Emer (Eds.) Einfachheit in der Kinder- und Jugendliteratur - Ein Gewinn für den Fremdsprachenunterricht (2016, December 18)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailConnected Motorized Riders - A Smart Mobility System to Connect Two and Three-wheelers
Sundharam, Sakthivel Manikandan UL; Fejoz, Loic; Navet, Nicolas UL

in Proceedings of 6th Intentional Symposium on Embedded computing & system Design (ISED 2016) (2016, December 15)

The Smart Cities Mission has been launched in India in 2015 to develop 100 cities, with smart mobility being one of the main topics in the mission. As urban areas are flooded with two (motorcycles) and ... [more ▼]

The Smart Cities Mission has been launched in India in 2015 to develop 100 cities, with smart mobility being one of the main topics in the mission. As urban areas are flooded with two (motorcycles) and three wheelers (auto-rickshaws), introducing smart control of such vehicles may reduce the congestion on the roads and the number of accidents. Indeed, over-speeding and drunken driving are common traffic violations. In this project we propose an IoT-based smart mobility system which tracks data, such as the vehicle location, vehicle speed, alcohol level of the driver, etc. efficiently over the internet. Our system has been conceived with CPAL, a high-level language meant to simulate and execute Cyber Physical Systems including IoT applications. A prototype running on ARM mbed IoT hardware, shows the feasibility of our concept. We believe that more efficient and interactive traffic management, more disciplined driving behaviors, reduction in accident rate, more controlled pollution, increased passenger safety can be achieved if systems like the one prototyped in this work deployed contributing to smarter cities. [less ▲]

Detailed reference viewed: 48 (17 UL)
Full Text
Peer Reviewed
See detailA Model-Based Development Environment for Rapid-Prototyping of Latency-Sensitive Automotive Control Software
Sundharam, Sakthivel Manikandan UL; Havet, Lionel; Altmeyer, Sebastian et al

in Proceedings of 6th Intentional Symposium on Embedded computing & system Design (ISED 2016) (2016, December 15)

The innovation in the field of automotive embedded systems has been increasingly relying on software-implemented functions. The control laws of these functions typically assume deterministic sampling ... [more ▼]

The innovation in the field of automotive embedded systems has been increasingly relying on software-implemented functions. The control laws of these functions typically assume deterministic sampling rates and constant delays from input to output. However, on the target processors, the execution times of the software will depend on many factors such as the amount of interferences from other tasks, resulting in varying delays from sensing to actuating. Three approaches supported by tools, namely TrueTime, T-Res, and SimEvents, have been developed to facilitate the evaluation of how timing latencies affect control performance. However, these approaches support the simulation of control algorithms, but not their actual implementation. In this paper, we present a model interpretation engine running in a co-simulation environment to study control performances while considering the run-time delays in to account. Introspection features natively available facilitate the implementation of self-adaptive and fault-tolerance strategies to mitigate and compensate the run-time latencies. A DC servo controller is used as a supporting example to illustrate our approach. Experiments on controller tasks with injected delays show that our approach is on par with the existing techniques with respect to simulation. We then discuss the main benefits of our development approach that are the support for rapid-prototyping and the re-use of the simulation model at run-time, resulting in productivity and quality gains. [less ▲]

Detailed reference viewed: 102 (30 UL)
Full Text
Peer Reviewed
See detailUsing Virtual Desktop Infrastructure to Improve Power Efficiency in Grinfy System
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Kliazovich, Dzmitry UL; Bouvry, Pascal UL et al

in IEEE 8th International Conference on Cloud Computing Technology and Science(CloudCom), Luxembourg 2016 (2016, December 13)

Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a ... [more ▼]

Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a new shape of delivering operating systems remotely. Operating systems are executing in a cloud data center. Users desktops and applications can be accessed by using thin client devices. Thin client device is consisting of screen attached with small CPU. VDI has benefits in terms of cost reduction and energy saving. In this paper, we increase the power saved by Grinfy system. Without VDI, Grinfy can save at least 30% of energy consumption to its users companies. By integrating VDI in computing systems and using Grinfy, the power efficiency and saving can be improved and save more than 30%. The improving and increasing of energy saving features of VDI are also illustrated by experiment and will be integrated to Grinfy system to increase percentage of energy saved. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailA Probabilistic View of Neighborhood-based Recommendation Methods
Wang, Jun UL; Tang, Qiang

in ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE (2016, December 12)

Probabilistic graphic model is an elegant framework to compactly present complex real-world observations by modeling uncertainty and logical flow (conditionally independent factors). In this paper, we ... [more ▼]

Probabilistic graphic model is an elegant framework to compactly present complex real-world observations by modeling uncertainty and logical flow (conditionally independent factors). In this paper, we present a probabilistic framework of neighborhood-based recommendation methods (PNBM) in which similarity is regarded as an unobserved factor. Thus, PNBM leads the estimation of user preference to maximizing a posterior over similarity. We further introduce a novel multi-layer similarity descriptor which models and learns the joint influence of various features under PNBM, and name the new framework MPNBM. Empirical results on real-world datasets show that MPNBM allows very accurate estimation of user preferences. [less ▲]

Detailed reference viewed: 18 (6 UL)
Full Text
Peer Reviewed
See detailIoT-based Smart Parking System for Sporting Event Management
Kubler, Sylvain UL; Robert, Jérémy UL; Hefnawy, Ahmed et al

in Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2016, December 01)

By connecting devices, people, vehicles and infrastructures everywhere in a city, governments and their partners can improve community wellbeing and other economic and financial aspects (e.g., cost and ... [more ▼]

By connecting devices, people, vehicles and infrastructures everywhere in a city, governments and their partners can improve community wellbeing and other economic and financial aspects (e.g., cost and energy savings). Nonetheless, smart cities are complex ecosystems that comprise many different stakeholders (network operators, managed service providers, logistic centers...) who must work together to provide the best services and unlock the commercial potential of the IoT. This is one of the major challenges that faces today's smart city movement, and more generally the IoT as a whole. Indeed, while new smart connected objects hit the market every day, they mostly feed "vertical silos" (e.g., vertical apps, siloed apps...) that are closed to the rest of the IoT, thus hampering developers to produce new added value across multiple platforms. Within this context, the contribution of this paper is twofold: (i) present the EU vision and ongoing activities to overcome the problem of vertical silos; (ii) introduce recent IoT standards used as part of a recent Horizon 2020 IoT project to address this problem. The implementation of those standards for enhanced sporting event management in a smart city/government context (FIFA World Cup 2022) is developed, presented, and evaluated as a proof-of-concept. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailGame-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications
Pouryazdan, Maryam; Fiandrino, Claudio UL; Kantarci, Burak et al

in IEEE Global Communications Conference (GLOBECOM) Workshops: Fifth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA) (2016, December)

Widespread use of connected smart devices that are equipped with various built-in sensors has introduced the mobile crowdsensing concept to the IoT-driven information and communication applications ... [more ▼]

Widespread use of connected smart devices that are equipped with various built-in sensors has introduced the mobile crowdsensing concept to the IoT-driven information and communication applications. Mobile crowdsensing requires implicit collaboration between the crowdsourcer/recruiter platforms and users. Additionally, users need to be incentivized by the crowdsensing platform because each party aims to maximize their utility. Due to the participatory nature of data collection, trustworthiness and truthfulness pose a grand challenge in crowdsensing systems in the presence of malicious users, who either aim to manipulate sensed data or collaborate unfaithfully with the motivation of maximizing their income. In this paper, we propose a game-theoretic approach for trustworthiness-driven user recruitment in mobile crowdsensing systems that consists of three phases: i) user recruitment, ii) collaborative decision making on trust scores, and iii) badge rewarding. Our proposed framework incentivizes the users through a sub-game perfect equilibrium (SPE) and gamification techniques. Through simulations, we show that the platform utility can be improved by up to the order of 50\% while the average user utility can be increased by at least 15\% when compared to fully-distributed and user-centric trustworthy crowdsensing. [less ▲]

Detailed reference viewed: 67 (7 UL)
Full Text
Peer Reviewed
See detailReliability problems and Pareto-optimality in cognitive radar (Invited paper)
Soltanalian, M.; Mysore, R.B.S.; Ottersten, Björn UL

in Signal Processing Conference (EUSIPCO), 2016 24th European (2016, December)

Cognitive radar refers to an adaptive sensing system exhibiting high degree of waveform adaptivity and diversity enabled by intelligent processing and exploitation of information from the environment. The ... [more ▼]

Cognitive radar refers to an adaptive sensing system exhibiting high degree of waveform adaptivity and diversity enabled by intelligent processing and exploitation of information from the environment. The next generation of radar systems are characterized by their application to scenarios exhibiting non-stationary scenes as well as interference caused by use of shared spectrum. Cognitive radar systems, by their inherent adaptivity, seem to be the natural choice for such applications. However, adaptivity opens up reliability issues due to uncertainties induced in the information gathering and processing. This paper lists some of the reliability aspects foreseen for cognitive radar systems and motivates the need for waveform designs satisfying different metrics simultaneously towards enhancing the reliability. An iterative framework based on multi-objective optimization is proposed to provide Pareto-optimal waveform designs. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailLaw and Religion at the Workplace: Luxembourg
Poirier, Philippe UL; Papastathis, Konstantinos UL

in Rodriguez Blanco, Miguel (Ed.) Law and religion in the Workplace (2016, December)

This volume contains the proceedings of the XXVIIth Annual Meeting of the European Consortium for Church and State Research, held in Alcalá de Henares during the days 12-15 November 2015, about the topic ... [more ▼]

This volume contains the proceedings of the XXVIIth Annual Meeting of the European Consortium for Church and State Research, held in Alcalá de Henares during the days 12-15 November 2015, about the topic “Law and Religion in the Workplace”. The conference was divided in five working sessions. Each session was introduced by a paper, making a comparative pan-European analysis, and suggesting themes for group discussion. These papers are published in the first part ot this book: 1) Religious freedom at work; 2) Religious ministers and labour law; 3) Autonomy of churches and human rights of the workers; 4) Religion in the workplace in the case-law of the European Court of Human Rights; 5) Indirect discrimination and reasonable accommodation in the manifestations of religion in the workplace. The second part of the book contains the national reports delivered from participants from the European Union countries. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailAn Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify ... [more ▼]

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker’s mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities. [less ▲]

Detailed reference viewed: 107 (13 UL)
Full Text
Peer Reviewed
See detailAssessing Performance of Internet of Things-based Mobile Crowdsensing Systems for Sensing as a Service Applications in Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Franck, Christian UL et al

in 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December)

The Internet of Things (IoT) paradigm makes the Internet more pervasive. IoT devices are objects equipped with computing, storage and sensing capabilities and they are interconnected with communication ... [more ▼]

The Internet of Things (IoT) paradigm makes the Internet more pervasive. IoT devices are objects equipped with computing, storage and sensing capabilities and they are interconnected with communication technologies. Smart cities exploit the most advanced information technologies to improve public services. For being effective, smart cities require a massive amount of data, typically gathered from sensors. The application of the IoT paradigm to smart cities is an excellent solution to build sustainable Information and Communication Technology (ICT) platforms and to produce a large amount of data following Sensing as a Service (S^2aaS) business models. Having citizens involved in the process through mobile crowdsensing (MCS) techniques unleashes potential benefits as MCS augments the capabilities of existing sensing platforms. To this date, it remains an open challenge to quantify the costs the users sustain to contribute data with IoT devices such as the energy from the batteries and the amount of data generated at city-level. In this paper, we analyze existing solutions, we provide guidelines to design a large-scale urban level simulator and we present preliminary results from a prototype. [less ▲]

Detailed reference viewed: 90 (21 UL)
Full Text
Peer Reviewed
See detailLinear identification of nonlinear systems: A lifting technique based on the Koopman operator
Mauroy, Alexandre UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state ... [more ▼]

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state space, we obtain a novel linear identification technique by recasting the problem in the infinite-dimensional space of observables. This technique can be described in two main steps. In the first step, similar to a component of the Extended Dynamic Mode Decomposition algorithm, the data are lifted to the infinite-dimensional space and used for linear identification of the Koopman operator. In the second step, the obtained Koopman operator is “projected back” to the finite-dimensional state space, and identified to the nonlinear vector field through a linear least squares problem. The proposed technique is efficient to recover (polynomial) vector fields of different classes of systems, including unstable, chaotic, and open systems. In addition, it is robust to noise, well-suited to model low sampling rate datasets, and able to infer network topology and dynamics. [less ▲]

Detailed reference viewed: 44 (6 UL)
See detailErinnerungen an die Zwangsrekrutierung im Großherzogtum Luxemburg
Klos, Eva Maria UL

in Stroh, Frédéric; Quadflieg, Peter M. (Eds.) L’incorporation de force dans les territoires annexés par le IIIe Reich. Die Zwangsrekrutierung in den vom Dritten Reich annektierten Gebieten 1939-1945 (2016, December)

Detailed reference viewed: 38 (6 UL)
Full Text
Peer Reviewed
See detailIndoor positioning and floor plan based ground truth: Can you really click where you are?
Popleteev, Andrei UL

in 15th International Conference on Mobile and Ubiquitious Multimedia (MUM-2016) (2016, December)

The increasing accuracy of indoor positioning systems requires an appropriately accurate evaluation, which compares system outputs with the known coordinates of test locations --- the ground truth ... [more ▼]

The increasing accuracy of indoor positioning systems requires an appropriately accurate evaluation, which compares system outputs with the known coordinates of test locations --- the ground truth. Although ground truth data are rarely (if ever) tested, they are traditionally assumed to be perfectly accurate. However, even small errors introduced by inaccurate ground truth need to be taken into account for fair evaluation and comparison between modern high-resolution positioning systems. In this paper we analyze the quality of ground truth data provided by clicking on an interactive floor plan (a method employed by such classical systems as RADAR and Horus). Experimental results show that this method has high precision but low accuracy, and high systematic errors make it unsuitable for evaluation of fine-grained localization systems. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailBehavior Profiling for Mobile Advertising
Du, Manxing UL; State, Radu UL; Brorsson, Mats et al

in Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (2016, December)

Detailed reference viewed: 17 (4 UL)
Full Text
Peer Reviewed
See detailSociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms
Fiandrino, Claudio UL; Kantarci, Burak; Anjomshoa, Fazel et al

in IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2016 (2016, December)

The Internet of Things (IoT) paradigm makes the Internet more pervasive, interconnecting objects of everyday life, and is a promising solution for the development of next- generation services. Smart ... [more ▼]

The Internet of Things (IoT) paradigm makes the Internet more pervasive, interconnecting objects of everyday life, and is a promising solution for the development of next- generation services. Smart cities exploit the most advanced information technologies to improve and add value to existing public services. Applying the IoT paradigm to smart cities is fundamental to build sustainable Information and Communication Technology (ICT) platforms. Having citizens involved in the process through mobile crowdsensing (MCS) techniques unleashes potential benefits as MCS augments the capabilities of the platform without additional costs. Recruitment of participants is a key challenge when MCS systems assign sensing tasks to the users. Proper recruitment both minimizes the cost and maximizes the return, such as the number and the accuracy of accomplished tasks. In this paper, we propose a novel user recruitment policy for data acquisition in mobile crowdsensing systems. The policy can be employed in two modes, namely sociability-driven mode and distance-based mode. Sociability stands for the willingness of users in contributing to sensing tasks. Furthermore, we propose a novel metric to assess the efficiency of any recruitment policy in terms of the number of users contacted and the ones actually recruited. Performance evaluation, conducted in a real urban environment for a large number of participants, reveals the effectiveness of sociability-driven user recruitment as the average number of recruited users improves by at least a factor of two. [less ▲]

Detailed reference viewed: 141 (21 UL)
Full Text
Peer Reviewed
See detailPer-antenna Power Minimization in Symbol-Level Precoding
Spano, Danilo UL; Alodeh, Maha UL; Chatzinotas, Symeon UL et al

in IEEE GLOBECOM 2016 (2016, December)

This paper investigates the problem of the interference among multiple simultaneous transmissions in the downlink channel of a multi-antenna wireless system. A symbol-level precoding scheme is considered ... [more ▼]

This paper investigates the problem of the interference among multiple simultaneous transmissions in the downlink channel of a multi-antenna wireless system. A symbol-level precoding scheme is considered, where the data information is used, along with the channel state information, in order to exploit the multi-user interference and transform it into useful power at the receiver side. In this framework, it is important to consider the power limitations individually for each transmitting antenna, since a common practice in multi-antenna systems is the use of separate per-antenna amplifiers. Thus, herein the problem of per-antenna power minimization in symbol-level precoding is formulated and solved, under Quality-of-Service constraints. In the proposed approach, the precoding design is optimized in order to control the instantaneous power transmitted by the antennas, and more specifically to limit the power peaks, while guaranteeing some specific target signal-to-noise ratios at the receivers. Numerical results are presented to show the effectiveness of the proposed scheme, which outperforms the existing state of the art techniques in terms of reduction of the power peaks and of the peak-to-average power ratio across the transmitting antennas. [less ▲]

Detailed reference viewed: 80 (15 UL)
Full Text
Peer Reviewed
See detailVirtual Desktop Infrastructures: architecture, survey and green aspects proof of concept
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Bouvry, Pascal UL; Kliazovich, Dzmitry UL et al

in 7th INTERNATIONAL GREEN and SUSTAINABLE COMPUTING CONFERENCE (1st RE-HPC workshop), Hangzhou, China (November 2016) (2016, November 07)

Virtual Desktop Infrastructure (VDI) is a new generation of cloud service in which users operating systems execute in a cloud data center. Users can access their desktops and applications by using thin ... [more ▼]

Virtual Desktop Infrastructure (VDI) is a new generation of cloud service in which users operating systems execute in a cloud data center. Users can access their desktops and applications by using thin client devices. This thin client is consisting of only a screen attached with low power CPU. This new paradigm of delivering remote desktop provides benefits in terms of flexibility, cost reduction, data security and energy saving which are the green benefits from using VDI. VDI becomes an important technology in green computing and energy saving. In this paper, we present and review the green benefits for using VDI in large and small organizations. The usefulness and energy-saving features of VDI are also illustrated by some experiments. [less ▲]

Detailed reference viewed: 57 (9 UL)
Full Text
Peer Reviewed
See detailBELBIC-Sliding Mode Control of Robotic Manipulators with Uncertainties and Switching Constraints
Klecker, Sophie UL; Plapper, Peter UL

in Proceedings of the ASME 2016 International Mechanical Engineering Congress and Exposition (2016, November)

This paper addresses the control problem for trajectory tracking of a class of robotic manipulators presenting uncertainties and switching constraints using a biomimetic approach. Uncertainties, system ... [more ▼]

This paper addresses the control problem for trajectory tracking of a class of robotic manipulators presenting uncertainties and switching constraints using a biomimetic approach. Uncertainties, system-inherent as well as environmental disturbances deteriorate the performance of the system. A change in constraints between the robot’s end-effector and the environment resulting in a switched nonlinear system, undermines the stable system performance. In this work, a robust adaptive controller combining sliding mode control and BELBIC (Brain Emotional Learning-Based Intelligent Control) is suggested to remediate the expected impacts on the overall system tracking performance and stability. The controller is based on an interplay of inputs relating to environmental information through error-signals of position and sliding surfaces and of emotional signals regulating the learning rate and adapting the future behaviour based on prior experiences. The proposed control algorithm is designed to be applicable to discontinuous freeform geometries. Its stability is proven theoretically and a simulation, performed on a two-link manipulator verifies its efficacy. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailTowards legal compliance by correlating Standards and Laws with a semi-automated methodology
Bartolini, Cesare UL; Lenzini, Gabriele UL; Robaldo, Livio UL

in Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC) (2016, November)

Since legal regulations do not generally provide clear parameters to determine when their requirements are met, achieving legal compliance is not trivial. If there were a clear correspondence between the ... [more ▼]

Since legal regulations do not generally provide clear parameters to determine when their requirements are met, achieving legal compliance is not trivial. If there were a clear correspondence between the provisions of a specific standard and the regulation’s requirements, one could implement the standard to claim a presumption of compliance. However, finding those correspondences is a complex process; additionally, correlations may be overridden in time, for instance, because newer court decisions change the interpretation of certain provisions. To help solve this problem, we present a framework that supports legal experts in recognizing correlations between provisions in a standard and requirements in a given law. The framework relies on state-of-the-art Natural Language Semantics techniques to process the linguistic terms of the two documents, and maintains a knowledge base of the logic representations of the terms, together with their defeasible correlations, both formal and substantive. An application of the framework is shown by comparing a provision of the European General Data Protection Regulation against the ISO/IEC 27018:2014 standard. [less ▲]

Detailed reference viewed: 38 (5 UL)
Full Text
Peer Reviewed
See detailCondition assessment and damage localisation for bridges by use of the Deformation Area Difference Method (DAD-Method)
Erdenebat, Dolgion UL; Waldmann, Danièle UL

in Beushausen, Hans (Ed.) Performance-based approaches for concrete structures (2016, November)

Already today, a huge number of bridges are in an ailing condition due to their increasing age and due to an increased traffic volume, especially of heavy transport vehicles. To assess their load bearing ... [more ▼]

Already today, a huge number of bridges are in an ailing condition due to their increasing age and due to an increased traffic volume, especially of heavy transport vehicles. To assess their load bearing capacity and subsequently predict their remaining life span, every bridge needs to be analysed by con-dition assessment. The consequences of unreliable condition assessment should not be underestimated, as most bridge constructions constitute cost intensive and indispensable infrastructures. Thus, modern condition assessment methods, easy and obvious in their application, are needed in order to reduce future investigations. To offer an easy handling alternative to evaluate the condition of bridges, the Deformation Area Dif-ference Method has been developed. Hereby, the accruing deformation of bridges under a static load will be analysed with the help of modern measurement equipment. Therefore, the resulting defor-mation curves like the deflection, the inclination angle and the curvature curves, will be analysed in one diagram together with the results out of initial measurements or theoretically calculated defor-mation curves. The DAD-Method is then applied on the surface difference area between those two curves for the deflection, the inclination and the curvature. It will be demonstrated that a localisation of damage is possible, independent from the degree of damage. In this study, the applicability of the DAD-Method including the comparison of innovative measure-ment techniques using a laboratory specimen is investigated. For further explanation of the back-ground of the DAD-Method, the results from a FE-calculation are presented. [less ▲]

Detailed reference viewed: 97 (42 UL)
Full Text
Peer Reviewed
See detailPUMConf: A Tool to Configure Product Specific Use Case and Domain Models in a Product Line
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL et al

in 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (2016, November)

We present PUMConf, a tool for supporting configuration that currently focuses on requirements and enables effective product line management in the context of use case-driven development. By design, it ... [more ▼]

We present PUMConf, a tool for supporting configuration that currently focuses on requirements and enables effective product line management in the context of use case-driven development. By design, it relies exclusively on variability modeling for artifacts that are commonly used in such contexts (i.e., use case diagram, specifications and domain model). For given Product Line (PL) use case and domain models, PUMConf checks the consistency of the models, interactively receives configuration decisions from analysts, automatically checks decision consistency, and generates Product Specific (PS) use case and domain models from the PL models and decisions. It has been evaluated on an industrial case study in the automotive domain. [less ▲]

Detailed reference viewed: 72 (35 UL)
Full Text
Peer Reviewed
See detailConcept to predict crack initiation and crack development in fairfaced concrete screeds
Weiler, Michael UL; Waldmann, Danièle UL

in Beushausen, Hans (Ed.) Performance-based approaches for concrete structures (2016, November)

Within a research project of the Laboratory of Solid Structures of the University of Luxemburg, a design concept to predict cracks in various concrete structures will be developed. The current paper ... [more ▼]

Within a research project of the Laboratory of Solid Structures of the University of Luxemburg, a design concept to predict cracks in various concrete structures will be developed. The current paper presents the numerical investigation of crack initiation and crack development of an unreinforced cementitious fairfaced concrete floor. Thereby cracking of concrete is divided into cracking of an early stage and into cracking of a later stage. The present study deals with cracking of an early stage. Taking into account shrinkage and the chronological strength development of the used C20/25 concrete and with the use of the Element Failure Method (EFM) it will be possible to predict, within a Finite Element Analysis, a possible crack path spatial as well as temporal. For this purpose a finite element model, based on a commercial FE-Software is developed. The program is tested on H-shaped concrete specimen with an unfavorable size ratio between surface and volume. Besides, shrinkage on this specimen is hindered so that unplanned restrain forces has to occur. Using an algorithm the finite element program is able to calculate the model gradually for several load steps within a loop. Furthermore the net dependency of the EFM can be excluded by the use of suitable load steps. [less ▲]

Detailed reference viewed: 66 (28 UL)
Full Text
Peer Reviewed
See detailA Survey of Cooperative ITS for Next Generation Public Transport Systems
Seredynski, Marcin; Viti, Francesco UL

in Intelligent Transportation Systems (ITSC), 2016 IEEE 19th International Conference on (2016, November)

Detailed reference viewed: 19 (4 UL)
Full Text
Peer Reviewed
See detailSupporting Change in Product Lines within the Context of Use Case-Driven Development and Testing
Hajri, Ines UL

in 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (DS@FSE 2016) (2016, November)

Product Line Engineering (PLE) is becoming a common practice in industry to enhance product quality, to reduce development costs, and to improve time-to-market. At the same time, many development contexts ... [more ▼]

Product Line Engineering (PLE) is becoming a common practice in industry to enhance product quality, to reduce development costs, and to improve time-to-market. At the same time, many development contexts are use case-driven and this strongly influences their requirements engineering and system testing practices. In this PhD project, we aim to achieve automated and effective change management in a product family within the context of use case-driven development and system testing. To this end, we first provide a modeling method for capturing variability information explicitly in Product Line (PL) use case and domain models. Then, we propose an automated configuration approach to automatically generate Product Specific (PS) use case and domain models from PL models. In addition, we plan to provide a change impact analysis approach for PL use case and domain models and automated regression test selection for system test cases derived from PL use case models. [less ▲]

Detailed reference viewed: 64 (33 UL)
Full Text
Peer Reviewed
See detailA Framework to Reason about the Legal Compliance of Security Standards
Bartolini, Cesare UL; Giurgiu, Andra UL; Lenzini, Gabriele UL et al

in Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN) (2016, November)

Achieving compliance with legal regulations is no easy task. Normally, laws state general requirements but do not provide clear parameters to determine when such requirements are met. On a different level ... [more ▼]

Achieving compliance with legal regulations is no easy task. Normally, laws state general requirements but do not provide clear parameters to determine when such requirements are met. On a different level, industrial standards and best practices define specific objectives that can be certified by means of auditing procedures from qualified bodies. Implementing a standard does not per se guarantee legal compliance, with the rare exception when the standard is also endorsed by the law itself. But standards and laws in the same domain may have overlaps and correlations, so adopting the former may provide an argument to demonstrate that adequate measures were taken to achieve legal compliance. In this paper, we introduce a framework that, using state-of-the-art Natural Language Semantics techniques, helps process legal documents and standards to build a knowledge base to store their logic representations, and the correlations between them. The knowledge base will help legal experts assess what requirements of the law are met by the standard and, consequently, recognize what requirements still need to be implemented to fill the remaining gaps. An application of the framework is exemplified by comparing a provision of the European General Data Protection Regulation against the ISO/IEC 27001:2013 standard. [less ▲]

Detailed reference viewed: 71 (7 UL)
Full Text
Peer Reviewed
See detailMax-min transmit beamforming via iterative regularization
Gharanjik, Ahmad UL; Shankar, Bhavani UL; Soltanalian, Mojtaba et al

in 50th Asilomar Conference on Signals, Systems and Computers, November 2016 (2016, November)

This paper introduces an iterative optimization framework to tackle the multi-group multicast Max-Min transmit beamforming problem. In each iteration, the optimization problem is decomposed into four sub ... [more ▼]

This paper introduces an iterative optimization framework to tackle the multi-group multicast Max-Min transmit beamforming problem. In each iteration, the optimization problem is decomposed into four sub-problems, all of which can be solved using computationally efficient algorithms. The advantage of proposed method lies in its ability to handle different types of signal constraints like total power and unimodularity; a feature not exhibited by other techniques. The proposed technique outperforms the well-known semidefinite relaxation method in terms of quality of solutions [less ▲]

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailA Rule-based Approach for Evolution of AADL Models based on Changes in Functional Requirements
Göknil, Arda UL; Kurtev, Ivan; van den Berg, Klaas

in The workshop on Sustainable Architecture: Global Collaboration, Requirements, Analysis (SAGRA) at the 10th European Conference on Software Architecture (ECSA) (2016, November)

The increasing complexity of software systems makes change management costly and time consuming. To ensure the cost-effective system longevity and endurance, it is crucial to apply change management in ... [more ▼]

The increasing complexity of software systems makes change management costly and time consuming. To ensure the cost-effective system longevity and endurance, it is crucial to apply change management in the early stages of software development. In this paper, we introduce a rule-based approach to make software architecture evolving based on counter examples provided by a model checker for violated, changing functional requirements. The approach works on software architecture in AADL and is based on verifying functional requirements using Maude model checker. Our goal is to provide guidelines to the architect about potential changes. Using an industrial example, we show how our approach helps in determining changes to produce a new version of the architecture. [less ▲]

Detailed reference viewed: 23 (7 UL)
Full Text
Peer Reviewed
See detailFrom Random Process to Chaotic Behavior in Swarms of UAVs
Rosalie, Martin UL; Danoy, Grégoire UL; Chaumette, Serge et al

in DIVANet '16 Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (2016, November)

Unmanned Aerial Vehicles (UAVs) applications have seen an important increase in the last decade for both military and civilian applications ranging from fire and high seas rescue to military surveillance ... [more ▼]

Unmanned Aerial Vehicles (UAVs) applications have seen an important increase in the last decade for both military and civilian applications ranging from fire and high seas rescue to military surveillance and target detection. While this technology is now mature for a single UAV, new methods are needed to operate UAVs in swarms, also referred to as fleets. This work focuses on the mobility management of one single autonomous swarm of UAVs which mission is to cover a given area in order to collect information. Several constraints are applied to the swarm to solve this problem due to the military context. First, the UAVs mobility must be as unpredictable as possible to prevent any UAV tracking. However the Ground Control Station (GCS) operator(s) still needs to be able to forecast the UAVs paths. Finally, the UAVs are autonomous in order to guarantee the mission continuity in a hostile environment and the method must be distributed to ensure fault-tolerance of the system. To solve this problem, we introduce the Chaotic Ant Colony Optimization to Coverage (CACOC) algorithm that combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC permits to obtain a deterministic but unpredictable system. Its performance is compared to other state-of-the art models from the literature using several coverage-related metrics, i.e. coverage rate, recent coverage and fairness. Numerical results obtained by simulation underline the performance of our CACOC method: a deterministic method with unpredictable UAV trajectories that still ensures a high area coverage. [less ▲]

Detailed reference viewed: 46 (2 UL)
Full Text
Peer Reviewed
See detailA network-wide assessment of local signal control policies’ performance in practical implementations
Cantelmo, Guido UL; Viti, Francesco UL; Rinaldi, Marco UL

in Intelligent Transportation Systems (ITSC), 2016 IEEE 19th International Conference on (2016, November)

Detailed reference viewed: 13 (3 UL)
Full Text
Peer Reviewed
See detailSmall-scale positioning using digital compasses
Popleteev, Andrei UL; Arshadaghghaleh, Hossein UL; Lutkovski, Vladimir

in International Congress on Computer Science: Information Systems and Technologies (CSIST-2016) (2016, October 25)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailMulticast multigroup precoding for frame-based multi-gateway satellite communications
Christopoulos, Dimitrios UL; Pennanen, Harri UL; Chatzinotas, Symeon UL et al

in Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), 2016 8th (2016, October 24)

The present work focuses on the forward link of fixed multibeam broadband satellite systems which employ aggressive frequency reuse patterns in the user-link. For such scenarios, the state-of-the art ... [more ▼]

The present work focuses on the forward link of fixed multibeam broadband satellite systems which employ aggressive frequency reuse patterns in the user-link. For such scenarios, the state-of-the art frame based precoding methods can improve the system performance, exploiting the super framing structure of the latest physical layer evolutions in satellite communications. Nevertheless, the limitations of feeder link need to be considered. Since the increase of the user link capacity leads to a proportional increase in the capacity requirements of the point-to-point feeder link, the deployment of multiple gateways to feed the satellite is examined. The main concept lies in each earth station being dedicated to serve a cluster of beams. In this context, the performance degradation due to inter-cluster interference is quantified. Since inter-cluster interference is expected to primarily affect cluster-edge users, the chosen performance metric is system fairness. Next, coordination between the multiple gateways is proposed as a means to mitigate interference between the different clusters and thus increase the minimum SINR over the coverage. Consequently, the gains in terms of system availability, a crucial metric in satellite communications, are exhibited via numerical system level simulations. The energy efficiency of the proposed system is also presented. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailPeak Power Minimization in Symbol-level Precoding for Cognitive MISO Downlink Channels
Alodeh, Maha UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in IEEE Digital Signal Processing Conference (2016, October 16)

This paper proposes a new symbol-level precoding scheme at the cognitive transmitter that jointly utilizes the data and channel information to reduce the effect of nonlinear amplifiers, by reducing the ... [more ▼]

This paper proposes a new symbol-level precoding scheme at the cognitive transmitter that jointly utilizes the data and channel information to reduce the effect of nonlinear amplifiers, by reducing the maximum antenna power under quality of service constraint at the cognitive receivers. In practice, each transmit antenna has a separate amplifier with individual characteristics. In the proposed approach, the precoding design is optimized in order to control the instantaneous power transmitted by the antennas, and more specifically to limit the power peaks, while guaranteeing some specific target signal-to-noise ratios at the receivers and respecting the interference temperature constraint imposed by the primary system. Numerical results show the effectiveness of the proposed scheme, which outperforms the existing state of the art techniques in terms of reduction of the power peaks. [less ▲]

Detailed reference viewed: 389 (15 UL)
Full Text
Peer Reviewed
See detailHIPS: Human-based indoor positioning system
Popleteev, Andrei UL

in Proceedings of the 7th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2016) (2016, October)

Detailed reference viewed: 11 (2 UL)
Full Text
Peer Reviewed
See detailIndoor positioning using ambient radio signals: Data acquisition platform for a long-term study
Popleteev, Andrei UL

in Proceedings of the IEEE 13th Workshop on Positioning, Navigation and Communications (WPNC-2016) (2016, October)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailDSCo-NG: A Practical Language Modeling Approach for Time Series Classification
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 15th International Symposium on Intelligent Data Analysis (2016, October)

The abundance of time series data in various domains and their high dimensionality characteristic are challenging for harvesting useful information from them. To tackle storage and processing challenges ... [more ▼]

The abundance of time series data in various domains and their high dimensionality characteristic are challenging for harvesting useful information from them. To tackle storage and processing challenges, compression-based techniques have been proposed. Our previous work, Domain Series Corpus (DSCo), compresses time series into symbolic strings and takes advantage of language modeling techniques to extract from the training set knowledge about different classes. However, this approach was flawed in practice due to its excessive memory usage and the need for a priori knowledge about the dataset. In this paper we propose DSCo-NG, which reduces DSCo’s complexity and offers an efficient (linear time complexity and low memory footprint), accurate (performance comparable to approaches working on uncompressed data) and generic (so that it can be applied to various domains) approach for time series classification. Our confidence is backed with extensive experimental evaluation against publicly accessible datasets, which also offers insights on when DSCo-NG can be a better choice than others. [less ▲]

Detailed reference viewed: 84 (11 UL)
Full Text
Peer Reviewed
See detailCo-evolutionary approach based on constraint decomposition
Kieffer, Emmanuel UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in Co-evolutionary approach based on constraint decomposition (2016, October)

Detailed reference viewed: 28 (4 UL)
Full Text
Peer Reviewed
See detailAccessing Inaccessible Android APIs: An Empirical Study
Li, Li UL; Bissyande, Tegawendé François D Assise UL; Le Traon, Yves UL et al

in The 32nd International Conference on Software Maintenance and Evolution (ICSME) (2016, October)

As Android becomes a de-facto choice of development platform for mobile apps, developers extensively leverage its accompanying Software Development Kit to quickly build their apps. This SDK comes with a ... [more ▼]

As Android becomes a de-facto choice of development platform for mobile apps, developers extensively leverage its accompanying Software Development Kit to quickly build their apps. This SDK comes with a set of APIs which developers may find limited in comparison to what system apps can do or what framework developers are preparing to harness capabilities of new generation devices. Thus, developers may attempt to explore in advance the normally “inaccessible” APIs for building unique API-based functionality in their app. The Android programming model is unique in its kind. Inaccessible APIs, which however are used by developers, constitute yet another specificity of Android development, and is worth investigating to understand what they are, how they evolve over time, and who uses them. To that end, in this work, we empirically investigate 17 important releases of the Android framework source code base, and we find that inaccessible APIs are commonly implemented in the Android framework, which are further neither forward nor backward compatible. Moreover, a small set of inaccessible APIs can eventually become publicly accessible, while most of them are removed during the evolution, resulting in risks for such apps that have leveraged inaccessible APIs. Finally, we show that inaccessible APIs are indeed accessed by third-party apps, and the official Google Play store has tolerated the proliferation of apps leveraging inaccessible API methods. [less ▲]

Detailed reference viewed: 137 (8 UL)
Full Text
Peer Reviewed
See detailSmart Probabilistic Fingerprinting for Indoor Localization over Fog Computing Platforms
Sciarrone, Andrea; Fiandrino, Claudio UL; Bisio, Igor et al

in IEEE 5th International Conference on Cloud Networking (CloudNet), Pisa, Italy (2016, October)

Indoor navigation and localization are becoming fundamental services nowadays. WiFi-based solutions such as FingerPrinting (FP) are the most widely adopted techniques for positioning and provide better ... [more ▼]

Indoor navigation and localization are becoming fundamental services nowadays. WiFi-based solutions such as FingerPrinting (FP) are the most widely adopted techniques for positioning and provide better results if compared to other approaches. It requires to compare WiFi Received Signal Strength (RSS) with an pre-computed radio map called fingerprint. The recently proposed Smart Probabilistic FingerPrinting (P-FP) algorithm reduces the computational complexity of the traditional FP approach without any accuracy detriment. On the other hand, fog computing has emerged as a new promising paradigm in the recent years, which extends traditional mobile cloud computing capabilities towards the edge of the network and enables location- aware services. In this paper we propose to offload Smart P-FP computation over a fog platform exploiting a novel distributed algorithm. Performance evaluation validates the effectiveness of the proposed approach with the analysis of: i) the amount of power saved and ii) the efficiency of candidate selection process for offloading. Having 2 or more devices in the vicinity contributing to the computation makes offloading beneficial from a power standpoint. The offloading effectiveness increases with the number of devices willing to contribute and the amount of data to be transferred. Power savings can be as high as 80% if compared with local computation. [less ▲]

Detailed reference viewed: 231 (23 UL)
Full Text
Peer Reviewed
See detailNumerical investigation of bridges with the aim of condition assessment in applying the Deformation Area Difference method (DAD-method) and selecting appropriate measurement techniques
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

in 5th International Symposium on Life-Cycle Civil Engineering (IALCCE 2016), Delft (2016, October)

Condition assessment of existing road bridges gains ever increasing importance today as bridges are getting older and the inflow of heavy traffic is constantly increasing. The further development of ... [more ▼]

Condition assessment of existing road bridges gains ever increasing importance today as bridges are getting older and the inflow of heavy traffic is constantly increasing. The further development of recognized techniques and the development of new methods for early and accurate detection of damage to the structure are made possible by means of innovative technological progress. In this contribution, the principles of Defor-mation Area Difference Method (DAD-Method) for condition assessment of bridges are presented. This method is based on the further processing of measured and computed deformation values. The application of the DAD-Method requires a precise recording of the deflection of a load-deflection test. On the basis of theoretical cal-culations, this method has allowed to identify as well as to localise damage to a structure. The DAD-Method is independent of a reference measurement and insensitive to global influences such as temperature fluctuations. For precise detection of deformations, the most modern measuring instruments and methods like photogram-metry, total stations, displacement sensors, strain gauges and levelling are compared to each other. In collabo-ration with the appropriate measurement technology, the localisation of damage in bridges becomes possible. [less ▲]

Detailed reference viewed: 74 (31 UL)
Full Text
Peer Reviewed
See detailTESMA : Towards the Development of a Tool for Specification, Management and Assessment of Teaching Programs
Guelfi, Nicolas UL; Jahic, Benjamin UL; Ries, Benoît UL

in Pyshkin, Evgeny; Vazhenin, Alexander; Klyuev, Vitaly (Eds.) Proceeding of the 2nd International Conference on Applications in Information Technology (2016, October)

Defining and managing teaching programs at university or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when ... [more ▼]

Defining and managing teaching programs at university or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. In this paper, we present an on-going project called TESMA whose objective is to provide an open-source tool dedicated to the specification and management (including certification) of teaching programs. This tool has been engineered using a development method called Messir for its requirements elicitations and introduces a domain-specific language dedicated to the teaching domain. This paper presents the current status of this project and the future activities planned. [less ▲]

Detailed reference viewed: 101 (51 UL)
Full Text
Peer Reviewed
See detailThe sudden eagerness to consult the luxemburgish people on constitutional change
Gerkrath, Jörg UL

in Contiades, Xenophon; Fotadiou, Alkmene (Eds.) Participatory Constitutional Change: The people as amenders of the Constitution (2016, October)

Recent examples of constitutional amendments in Iceland and Ireland and the current debates in Scotland and Catalonia regarding referendums on regional autonomy have stimulated a renewal in academic ... [more ▼]

Recent examples of constitutional amendments in Iceland and Ireland and the current debates in Scotland and Catalonia regarding referendums on regional autonomy have stimulated a renewal in academic research on the involvement of the people in constitution making and constitutional amendment including the question - raised recently in Switzerland – how to avoid that referendums bring about unlawful restrictions to fundamental rights. This raises a more general question of how to reconcile the basic principles of (direct) democracy, the rule of law and fundamental rights. Such questions are also relevant for the legal situation in Luxembourg marked by the ongoing procedure of constitutional restatement, which was initiated in April 2009. The government decided indeed to submit several questions to a consultative referendum in 2015 before pursuing the parliamentary procedure and come to a final, decisive, referendum on the amendment proposal in 2016. This develop is part of a broader tendency to introduce, in Luxembourg and elsewhere, elements of direct democracy such as referendums, citizens’ initiatives and online petitions into political systems organized as representative democracies. The roundtable aims to identify and discuss the main procedural, legal and theoretical problems raised in general by popular consent in the field of constitutional change. [less ▲]

Detailed reference viewed: 52 (9 UL)