References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailO-MI/O-DF vs. MQTT: a performance analysis
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL et al

in O-MI/O-DF vs. MQTT: a performance analysis (in press)

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as ... [more ▼]

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as well as Industry 4.0 environments, look more like a collection of isolated “Intranets of Things”, also referred to as “vertical silos”, rather than a federated infrastructure. Breaking down these silos is a key challenge in both the IoT and Industry 4.0 communities. This paper is intended to present and discuss two open and standardised mes- saging protocols designed for IoT applications, namely: MQTT and O-MI/O-DF. First, a traffic load’s analytical model derived from the MQTT standard specifications is presented. Second, a comparison study between MQTT and O-MI/O-DF standards is carried out based on a real-life industrial implementation. This study brings a deep understanding of the extent to which these protocols are performant (from a traffic load perspective) and how they can impact on future architectural designs. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 130 (18 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 154 (6 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 90 (15 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 62 (3 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 38 (1 UL)
Full Text
See detailUne cour constitutionnelle différente des autres. Etendue, raisons & avenir de l'originalité de la Cour constitutionnelle luxembourgeoise
Heuschling, Luc UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: trop jeune pour mourir? (in press)

Detailed reference viewed: 83 (10 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailA Natural Language Programming Approach for Requirements-based Security Testing
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Göknil, Arda UL et al

in Mai, Xuan Phu; Pastore, Fabrizio; Göknil, Arda (Eds.) et al A Natural Language Programming Approach for Requirements-based Security Testing (in press)

To facilitate communication among stakeholders, software security requirements are typically written in natural language and capture both positive requirements (i.e., what the system is supposed to do to ... [more ▼]

To facilitate communication among stakeholders, software security requirements are typically written in natural language and capture both positive requirements (i.e., what the system is supposed to do to ensure security) and negative requirements (i.e., undesirable behavior undermining security). In this paper, we tackle the problem of automatically generat- ing executable security test cases from security requirements in natural language (NL). More precisely, since existing approaches for the generation of test cases from NL requirements verify only positive requirements, we focus on the problem of generating test cases from negative requirements. We propose, apply and assess Misuse Case Programming (MCP), an approach that automatically generates security test cases from misuse case specifications (i.e., use case specifications capturing the behavior of malicious users). MCP relies on natural language processing techniques to extract the concepts (e.g., inputs and activities) appearing in requirements specifications and generates executable test cases by matching the extracted concepts to the members of a provided test driver API. MCP has been evaluated in an industrial case study, which provides initial evidence of the feasibility and benefits of the approach. [less ▲]

Detailed reference viewed: 68 (3 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 113 (16 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 53 (10 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (in press)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 272 (4 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 28 (1 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 22 (9 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 111 (6 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 60 (5 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 91 (20 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 27 (5 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 53 (10 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 124 (18 UL)
Full Text
Peer Reviewed
See detailAutomated Extraction of Semantic Legal Metadata Using Natural Language Processing
Sleimi, Amin UL; Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL et al

in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal ... [more ▼]

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal requirements. [Objectives] Our work is motivated by two observations: (1) The existing requirements engineering (RE) literature does not provide a harmonized view on the semantic metadata types that are useful for legal requirements analysis. (2) Automated support for the extraction of semantic legal metadata is scarce, and further does not exploit the full potential of natural language processing (NLP). Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the semantic legal metadata types proposed in RE. Subsequently, we conduct a qualitative study aimed at investigating how the identified metadata types can be extracted automatically. [Results and Conclusions] We propose (1) a harmonized conceptual model for the semantic metadata types pertinent to legal requirements analysis, and (2) automated extraction rules for these metadata types based on NLP. We evaluate the extraction rules through a case study. Our results indicate that the rules generate metadata annotations with high accuracy. [less ▲]

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailWind Music and Terminology. A Critical Review of an Immanent Phenomenon
Sagrillo, Damien UL

in Sagrillo, Damien (Ed.) Conference Guide (2018, July 20)

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A ... [more ▼]

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A band is a Band is Band”. However, he seemed to hesitate because he referred to Joseph Manfredo who, in his awarded dissertation, asked: “What is a Band?” In my lecture, I will bring this topic to the fore again and deal with the terminology used to designate a group of wind instruments, and I will come up with some suggestions for definitions. I will try to find an answer to questions such as: When is a band a symphonic band, or even a symphonic wind ensemble or “only” a community band? When I say: “I will try to find an answer”, I must admit that I cannot guarantee to find an acceptable one: Are these terms filled with a substance – what makes the difference? – or are they simply a grandiloquent absurdity? Do pretentious terms refer to “better” musicians or music? I will present my paper in English, but I will also deal with band designations in German, in French and my native language – Luxembourgish. [less ▲]

Detailed reference viewed: 92 (1 UL)
Full Text
Peer Reviewed
See detailStochastic Optimum Energy Management for Advanced Transportation Network
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (2018, July 19)

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced ... [more ▼]

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced driver assistance system which predictively plans for a safe and energy-efficient cruising velocity profile autonomously for battery electric vehicles. However, high entropy in transportation network leads to a challenging task to derive a computationally efficient and tractable model to predict the traffic flow. Stochastic optimal control has been developed to systematically find an optimal decision with the aim of performance improvement. However, most of the developed methods are not real-time algorithms. Moreover, they are mainly risk-neutral for safety-critical systems. This paper investigates on the real-time risk-sensitive nonlinear optimal control design subject to safety and ecological constraints. This system improves the efficiency of the transportation network at the microscopic level. Obtained results demonstrate the effectiveness of the proposed method in terms of states regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailConclusions générales: La Cour Constitutionnelle en tant qu'autorité de dialogue
Gerkrath, Jörg UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: Trop jeune pour mourir? (2018, July 17)

Detailed reference viewed: 38 (4 UL)
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (2018, July)

Detailed reference viewed: 133 (17 UL)
Full Text
See detailPeut-on se moquer de tout ? L'étendue de la liberté d'expression face au sentiment religieux
Gerkrath, Jörg UL

in Institut Grand Ducal (Ed.) Actes de la Section des sciences morales et politiques (2018, July)

Detailed reference viewed: 76 (33 UL)
Full Text
Peer Reviewed
See detailTest Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a ... [more ▼]

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (near-)operational environment. Acceptance testing of a CPS often necessitates that the test cases be prioritized, as there are usually too many scenarios to consider given time constraints. CPS acceptance testing is further complicated by the uncertainty in the environment and the impact of testing on hardware. We propose an automated test case prioritization approach for CPS acceptance testing, accounting for time budget constraints, uncertainty, and hardware damage risks. Our approach is based on multi-objective search, combined with a test case minimization algorithm that eliminates redundant operations from an ordered sequence of test cases. We evaluate our approach on a representative case study from the satellite domain. The results indicate that, compared to test cases that are prioritized manually by satellite engineers, our automated approach more than doubles the number of test cases that fit into a given time frame, while reducing to less than one third the number of operations that entail the risk of damage to key hardware components. [less ▲]

Detailed reference viewed: 133 (14 UL)
Full Text
Peer Reviewed
See detailInstilling teacher agency in professional development: an international outlook. Enabling teachers in Luxembourg to implement inclusive practice
Pit-Ten Cate, Ineke UL

in Sibilio, Maurizio; Aiello, Paola (Eds.) Lo sviluppo professionale dei docenti. Ragionare di agentività per una scuola inclusiva (2018, July)

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion ... [more ▼]

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion of students with special educational needs (SEN) in regular classrooms. Over the last decades, Luxembourg has invested significant effort in providing training to teachers and other professionals to improve educational services for students with SEN. The recent School Law (Summer 2017) stipulates how the inclusion of students with SEN can be facilitated. Although these changes all aim to facilitate the successful implementation of inclusive educational practice, it will be important to continue to investigate and interpret teachers’ attitudes and perceived competence and efficacy in the context of the educational system. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailSome basic reflections on voice-controlled natural language human-Siri talk: Hey Siri, you are challenging the interface between the oral and the written.
Arend, Béatrice UL; Fixmer, Pierre UL

in Proceedings 10th International Conference on Education and New Learning Technologies (2018, July)

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailHighway Network Block with Gates Constraints for Training Very Deep Networks
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop, June 18-22, 2018 (2018, June 19)

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth ... [more ▼]

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth. Gate constraints are duly employed to improve optimization, latent representations and parameterization usage in order to efficiently learn hierarchical feature transformations which are crucial for the success of any deep network. One of the earliest very deep models with over 30 layers that was successfully trained relied on highway network blocks. Although, highway blocks suffice for alleviating optimization problem via improved information flow, we show for the first time that further in training such highway blocks may result into learning mostly untransformed features and therefore a reduction in the effective depth of the model; this could negatively impact model generalization performance. Using the proposed approach, 15-layer and 20-layer models are successfully trained with one gate and a 32-layer model using three gates. This leads to a drastic reduction of model parameters as compared to the original highway network. Extensive experiments on CIFAR-10, CIFAR-100, Fashion-MNIST and USPS datasets are performed to validate the effectiveness of the proposed approach. Particularly, we outperform the original highway network and many state-ofthe- art results. To the best our knowledge, on the Fashion-MNIST and USPS datasets, the achieved results are the best reported in literature. [less ▲]

Detailed reference viewed: 97 (8 UL)
Full Text
Peer Reviewed
See detailPose Encoding for Robust Skeleton-Based Action Recognition
Demisse, Girum UL; Papadopoulos, Konstantinos UL; Aouada, Djamila UL et al

in CVPRW: Visual Understanding of Humans in Crowd Scene, Salt Lake City, Utah, June 18-22, 2018 (2018, June 18)

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for ... [more ▼]

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for filtering linear noise transformations, but neglect to address potential nonlinear transformations. In this paper, we present an unsupervised learning approach for estimating nonlinear noise transformations in pose estimates. Our approach starts by decoupling linear and nonlinear noise transformations. While the linear transformations are modelled explicitly the nonlinear transformations are learned from data. Subsequently, we use an autoencoder with L2-norm reconstruction error and show that it indeed does capture nonlinear noise transformations, and recover a denoised pose estimate which in turn improves performance significantly. We validate our approach on a publicly available dataset, NW-UCLA. [less ▲]

Detailed reference viewed: 79 (25 UL)
Full Text
Peer Reviewed
See detailThe influence of a thin weak soil layer on the pile bearing capacity.
Rica, Shilton UL; Van Baars, Stefan UL

in International Conference on Deep Foundations and Ground Improvement, Urbanization and Infrastructure Development: Future Challenges (2018, June 05)

Most pile design methods for estimating the pile bearing capacity, are based on data from the cone penetration tests (CPT), such as the Dutch (Koppejan) method, the Belgium (De Beer) method or the French ... [more ▼]

Most pile design methods for estimating the pile bearing capacity, are based on data from the cone penetration tests (CPT), such as the Dutch (Koppejan) method, the Belgium (De Beer) method or the French (Bustamante & Gianeselli) method. In all these methods, the unit cone resistance of the CPT has to be averaged within an influence zone around the pile tip, in order to be able to calculate the pile tip bearing capacity. The influence zone is defined as the zone in which the parameters of the soil have an influence on the pile tip bearing capacity. For the French method this zone is between 1.5 times the pile diameter, D, above and below the pile tip; while for the Dutch method this zone is between 8 D above to a maximum of 4 D below the pile tip. Numerical simulations on piles installed in homogeneous sandy soil, show that these definitions of the influence zone are not accurate. The simulations show an influence zone from 1 or 2 D above, to 5 or 6 D below the pile tip, depending on the soil parameters. In this research, also the influence of a weak thin soil layer on the pile bearing capacity has been studied. All simulations are made for two different thicknesses of the thin soil layer. Also the soil strength parameters and soil stiffness parameters have been varied, in order to show the influence of this thin soil layer. This influence zone has been confirmed by laboratory tests. [less ▲]

Detailed reference viewed: 52 (17 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Data Acquisition in Mobile Crowdsensing Systems
Capponi, Andrea UL

in 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece, 2018 (2018, June)

Mobile Crowdsensing (MCS) is one of the most promising paradigms for monitoring phenomena in urban environments. The success of a MCS campaign relies on large participation of citizens, who may be ... [more ▼]

Mobile Crowdsensing (MCS) is one of the most promising paradigms for monitoring phenomena in urban environments. The success of a MCS campaign relies on large participation of citizens, who may be reluctant in joining a campaign due to sensing and reporting costs they sustain. Hence, it is fundamental to propose efficient data collection frameworks (DCFs). In the first stages of our work, we proposed an energyefficient DCF that aims to minimize energy consumption while maximizing the utility of contributed data. Then, we developed an Android application and proposed a methodology to compare several DCFs, performing energy- and network-related measures with Power Monitor and Wireshark. Currently, we are investigating collaborative data delivery as a more efficient solution than the individual one. The key idea is to form groups of users and elect a responsible for aggregated data delivery. To this end, it is crucial to analyze device to device (D2D) communications and propose efficient policies for group formation and owner election. To evaluate the performance in realistic urban environments we exploit CrowdSenSim, which runs large-scale simulations in citywide scenarios. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailPOSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
Adamsky, Florian UL; Retunskaia, Tatiana UL; Schiffner, Stefan UL et al

in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June)

Detailed reference viewed: 93 (11 UL)
Full Text
Peer Reviewed
See detailDutch field tests validating the bearing capacity of Fundex piles
Van Baars, Stefan UL; Rica, Shilton UL; De Nijs, G.A. et al

in Proceedings of CPT’18 – International Symposium on Cone Penetration Testing (2018, June)

In 1939, Boonstra was the first to base the tip bearing capacity of foundation piles on the CPT cone resistance. Since then, many engineers and scientists have proposed improved design methods for the ... [more ▼]

In 1939, Boonstra was the first to base the tip bearing capacity of foundation piles on the CPT cone resistance. Since then, many engineers and scientists have proposed improved design methods for the bearing capacity of foundation piles, such as the Dutch Koppejan method. This method holds a mistake in the qc-averaging method. Its tip resistance is based on the cone resistance of an assumed zone between 8D above the tip and 4D below the tip, while several researchers show that this should be in a zone between 2D above the tip and 8D below the tip. In the Netherlands, Belgium and France a field test has been performed indicating that the currently used design method in the Netherlands (the Koppejan Method) was about 30% too high for the tip resistance. This, and also the current qc-averaging method, conflict with the findings of Boonstra, Plantema, Huizinga and White & Bolton. Besides, in the field test, the residual stresses in the piles after installation were completely ignored, in fact, not even measured. Nevertheless, the Dutch Norm Commission Geo-Engineering decided to reduce the bearing capacity of foundation piles in the Netherlands, unless other field tests prove otherwise. Since this reduction is very drastic and since no serious problems due to the use of the unreduced bearing capacity were recorded, the geotechnical contracting company Funderingstechnieken Verstraeten BV has performed field tests on six Fundex piles, and asked the engineering company BMNED to assist with these tests and the design. The aim was to prove that, at least for Fundex piles, a reduction of 30% is too much. The Fundex Pile Tests in Terneuzen show that, especially for the grouted Fundex piles, the pile type factor should not be reduced in combination with the current qc-averaging method. [less ▲]

Detailed reference viewed: 37 (4 UL)
Full Text
Peer Reviewed
See detailExperience report: How to extract security protocols’ specifications from C libraries
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (2018, June)

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code ... [more ▼]

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code, and with little or no help from the developers to better understand it. Security protocols implementations frequently use services provided by libraries coded in the C programming language; automatic tools for codelevel reverse engineering offer good support to comprehend the behavior of code in object-oriented languages but are ineffective to deal with libraries in C. Here we propose a systematic, yet human-dependent approach, which combines the capabilities of state-of-the-art tools in order to help the analyst to retrieve, step by step, the security protocol specifications from a library in C. Those specifications can then be used to create the formal model needed to carry out the analysis. [less ▲]

Detailed reference viewed: 28 (3 UL)
Full Text
Peer Reviewed
See detailORBIT - Overcoming Breakdowns in Teams with Interactive Tabletops
Sunnen, Patrick UL; Arend, Béatrice UL; Maquil, Valérie

in Kay, Judy; Luckin, Rose (Eds.) Rethinking Learning in the Digital Age: Making the Learning Sciences Count, 13th International Conference of the Learning Sciences (ICLS) 2018 (2018, June)

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns ... [more ▼]

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns. The design and the research process relies on user-centered design methods and on an ethnomethodological conversation analytic framework. The project will generate scientific knowledge on participants’ collaboration methods and create a powerful collaborative learning tool. [less ▲]

Detailed reference viewed: 79 (10 UL)
Full Text
Peer Reviewed
See detailA Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints
Tessaro Lunardi, Willian UL; Cherri, Luiz Henrique; Voos, Holger UL

in 17th International Conference on Artificial Intelligence and Soft Computing, Zakopane, Poland, June 3-7, 2018 (2018, June)

Manufacturing scheduling strategies have historically ignored the availability of the machines. The more realistic the schedule, more accurate the calculations and predictions. Availability of machines ... [more ▼]

Manufacturing scheduling strategies have historically ignored the availability of the machines. The more realistic the schedule, more accurate the calculations and predictions. Availability of machines will play a crucial role in the Industry 4.0 smart factories. In this paper, a mixed integer linear programming model (MILP) and a discrete firefly algorithm (DFA) are proposed for an extended multi-objective FJSP with availability constraints (FJSP-FCR). Several standard instances of FJSP have been used to evaluate the performance of the model and the algorithm. New FJSP-FCR instances are provided. Comparisons among the proposed methods and other state-of-the-art reported algorithms are also presented. Alongside the proposed MILP model, a Genetic Algorithm is implemented for the experiments with the DFA. Extensive investigations are conducted to test the performance of the proposed model and the DFA. The comparisons between DFA and other recently published algorithms shows that it is a feasible approach for the stated problem. [less ▲]

Detailed reference viewed: 101 (19 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in International Conference on Communications (ICT), Saint-Malo, France, June 2018. (2018, June)

Detailed reference viewed: 36 (3 UL)
Full Text
Peer Reviewed
See detailThe failure mechanism of pile foundations in non-cohesive soils
Van Baars, Stefan UL

in Proceedings of NUMGE 2018 9th European Conference on Numerical Methods in Geotechnical Engineering (2018, June)

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space, based on a so-called Prandtl-wedge failure mechanism ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space, based on a so-called Prandtl-wedge failure mechanism. Meyerhof and Koppejan extended the logarithmic spiral part of the Prandtl-wedge and presented this as the failure mechanism for the tip of a foundation pile in non-cohesive soils. The numerical calculations made in this article show however that the failure zone (plastic zone) below a pile tip, is far wider and deeper than the Prandtl-wedge and that there is failure both in and out of the standard x-y plane, but most of the failure is due to an out-of-plane, circumferential or cleaving failure mechanism. Therefore, this failure mechanism is differ-ent from the Prandtl-wedge failure mechanism. Around the pile tip, there are circular thin zones with no out-of-plane failure. In these thin zones, the tangential (out-of-plane) [less ▲]

Detailed reference viewed: 45 (2 UL)
Full Text
Peer Reviewed
See detailThe bearing capacity of shallow foundations on slopes
Van Baars, Stefan UL

in Proceedings of NUMGE 2018 9th European Conference on Numerical Methods in Geotechnical Engineering (2018, June)

In 1920 Prandtl published an analytical solution for the bearing capacity of a soil under a strip load. Over the years, extensions have been made for a surrounding surcharge, the soil weight, the shape of ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a soil under a strip load. Over the years, extensions have been made for a surrounding surcharge, the soil weight, the shape of the footing, the inclination of the load, and also for a slope. In order to check the current extensions of a loaded strip footing next to a slope, many finite element calculations have been made, showing that these extensions are often inaccurate. Therefore new factors have been proposed, which are for both the soil-weight and the surcharge slope bearing capacity, based on the numerical calculations, and for the cohesion slope bearing capacity, also on an analytical solution. [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis of CoAP under Satellite Link Disruption
Giotti, Domenico UL; Lamorte, Luca UL; Soua, Ridha UL et al

in Performance Analysis of CoAP under Satellite Link Disruption (2018, June)

Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to ... [more ▼]

Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to support well IoT applications, when terrestrial networks are no longer available (e.g., in remote not habitable areas, in the occurrence of calamities). Subsequently, the only way forward is to transmit IoT data over satellite. The integrated satellite-terrestrial networks are emerging as a promising solution to ensure ubiquitous IoT connectivity, higher throughput and reliability. Being different by design, IoT protocols’ tuning is needed to integrate terrestrial and satellite segments. In the current paper, we evaluate the performances of CoAP, the well-known lightweight application protocol for IoT in an integrated scenario, taking into account the satellite link disruption. The key findings of our study, conducted using the OpenSAND simulator, show that decreasing the value of congestion control parameters proposed by the standard [1], mainly ACK_TIMEOUT and ACK_RANDOM_FACTOR, is crucial to achieve lower end-to-end delays and higher packet delivery ratio. [less ▲]

Detailed reference viewed: 56 (9 UL)
Full Text
Peer Reviewed
See detailLe changement de rôle des patients de maladie Chronique dans l'organisation des soins
Odero, Angela UL; Bucki, Barbara; Baumann, Michèle UL

in Pratiques et interventions en santé (2018, June)

Introduction: Les patients sont de plus en plus impliqués dans les soins qui exigent leur engagement dans la surveillance, la prévention des risques, l'auto-éducation et l'auto-traitement. Les ... [more ▼]

Introduction: Les patients sont de plus en plus impliqués dans les soins qui exigent leur engagement dans la surveillance, la prévention des risques, l'auto-éducation et l'auto-traitement. Les professionnels, quant à eux, ils sont plus enclins à adopter avec leurs patients des modèles d'interaction équitable. Sur le plan théorique, une Approche Patient Partenaire de Soins (APPS) a été proposée par des chercheurs canadiens. Pour clarifier ce que représente l’APPS, une étude qualitative a tenté d’analyser les facteurs culturels et psychosociaux qui interviennent dans la mise en place d’une APPS. Méthode : Avec l’appui des associations luxembourgeoises, six focus groupes ont été organisés avec 30 patients. A partir des retranscriptions, une analyse de contenu thématique catégorielle a été réalisée avec l’aide de N’Vivo 12 Résultats: Parmi les obstacles qui freinent une APPS, des divergences culturelles entre patients et professionnels de santé sont évoqués. Des patients préfèrent en effet rester en harmonie avec leurs valeurs et refusent de partager les prises de décision, pour eux seuls les professionnels doivent les prendre. Les échanges avec les professionnels restent compliqués car des positions dominantes et autoritaires demeurent. Parmi les facteurs favorisants APPS, on peut retenir le fait que les patients estiment avoir une connaissance de leur corps, et qu’ils ressentent l’impact que peut avoir les effets secondaires des traitements ; ceci à condition qu’ils soient capables de les verbaliser. Enfin l'accent est mis sur une confiance réciproque. Conclusion: Une éducation des patients devrait être développée pour leur permettre d’acquérir un «Capital Culturel en Santé» ; une connaissance de base favorisant la compréhension des soins et facilitant les relations avec les professionnels de santé. De même, une formation médicale et une pratique infirmière plus soutenues par des «Compétences Culturelles» permettaient aux professionnels de mieux reconnaître l'impact socioculturel que peut avoir leur identité lors de leurs relations avec les patients. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailKey-Skeleton Based Feedback Tool for Assisting Physical Activity
Baptista, Renato UL; Ghorbel, Enjie UL; Shabayek, Abd El Rahman UL et al

in 2018 Zooming Innovation in Consumer Electronics International Conference (ZINC), 30-31 May 2018 (2018, May 31)

This paper presents an intuitive feedback tool able to implicitly guide motion with respect to a reference movement. Such a tool is important in multiple applications requiring assisting physical ... [more ▼]

This paper presents an intuitive feedback tool able to implicitly guide motion with respect to a reference movement. Such a tool is important in multiple applications requiring assisting physical activities as in sports or rehabilitation. Our proposed approach is based on detecting key skeleton frames from a reference sequence of skeletons. The feedback is based on the 3D geometry analysis of the skeletons by taking into account the key-skeletons. Finally, the feedback is illustrated by a color-coded tool, which reflects the motion accuracy. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs
Di Maio, Antonio UL; Soua, Ridha UL; Palattella, Maria Rita UL et al

in ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs (2018, May 23)

The increasing demand for bandwidth by applications in Vehicular Ad-Hoc Networks (VANETs), combined with the increasing number of their users, stresses the importance of data dissemination schemes that ... [more ▼]

The increasing demand for bandwidth by applications in Vehicular Ad-Hoc Networks (VANETs), combined with the increasing number of their users, stresses the importance of data dissemination schemes that strike a balance between network throughput and user fairness. Ensuring this balance is challenging in vehicular networks, which are characterized by a high dynamism of the network topology, volatility of intervehicular links, and heterogeneity of the exchanged content. For these reasons, we hereby introduce ROADNET, a cooperative content dissemination scheme for VANETs. Leveraging on the Software Defined Networking (SDN) paradigm, ROADNET provides a trade-off between network throughput and user fairness by exploiting the logical centralized control of SDN and the multichannel operation of the IEEE 1609.4 standard. Realistic simulation results show that our scheme outperforms prior works in terms of both throughput (≈ 36%) and fairness (≈ 6%), providing high channel load balance (σ ≈ 1%). [less ▲]

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte (2018, May 23)

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailA method for function integrity diagnosis and documentation: FIDD
Wichmann, Robert; Gericke, Kilian UL; Eisenbart, Boris et al

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

This paper introduces a method to perform systematic diagnosis of function integrity. The proposed method advances the Integrated Function Modelling framework to extend its application to risk ... [more ▼]

This paper introduces a method to perform systematic diagnosis of function integrity. The proposed method advances the Integrated Function Modelling framework to extend its application to risk identification and documentation tasks. By analyzing the system model of interdisciplinary designs, this method guides the designer to explore function vulnerability by systematic decoupling of inherent design entities. Thereby it provides unique opportunities for failure mode identification in complex, interdisciplinary systems. The motivation for this method is ensuring system function integrity. [less ▲]

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailMargins lead to overcapacity
Jones, Darren; Eckert, Claudia; Gericke, Kilian UL

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

This paper categorises and describes the design stages, stakeholders and decision processes of an overcapacity boiler upgrade that came about from the excessive use of design margins. Using a hospital ... [more ▼]

This paper categorises and describes the design stages, stakeholders and decision processes of an overcapacity boiler upgrade that came about from the excessive use of design margins. Using a hospital case study, the reason behind the overcapacity and excessive margins is explored using semi-structured interviews, document analysis and process modelling. Design margins arise from a lack of systemic thinking during the design and installation phases. It is likely that margins are added as a matter of habit with no real thought to their applicability, calling into question the design process. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailEight key strategies for successful stakeholder involvement in design
Manrique, Sebastián; Simons, Daria; Eisenbart, Boris et al

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

Design professionals work often in multi-stakeholder environments. This research aims to understand how design practitioners deal with challenges resulting from stakeholder involvement in design ... [more ▼]

Design professionals work often in multi-stakeholder environments. This research aims to understand how design practitioners deal with challenges resulting from stakeholder involvement in design activities. In this exploratory study, ten interviews were conducted with design practitioners from design agencies in the Netherlands. Eight key strategies were identified that are considered for successful stakeholder involvement. The findings can help the field of DTM to develop methods and tools that fit better with the needs of design professionals. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailTime to Clean Your Test Objectives
Marcozzi, Michaël; Bardin, Sébastien; Kosmatov, Nikolai et al

in 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden (2018, May)

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailAn exploratory study on the use of new design methods in design consultancies
Filippi, Anna; Suarez Madrigal, Antonio; Eisenbart, Boris et al

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

This paper explores the uptake of design methods in design consultancies. Our results show that new methods are primarily used in the initial phases of the design process for specific problems. The main ... [more ▼]

This paper explores the uptake of design methods in design consultancies. Our results show that new methods are primarily used in the initial phases of the design process for specific problems. The main motive for doing so is to enhance creativity and understanding of the user. Many participants modify methods to fit specific needs or develop own methods. These findings highlight the need to improve the link between industry and academia in order to increase method awareness and use. Potential ways to improve this include better descriptions of methods and the be­nefits provided. [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Design of Pedestrian Mobility for Smart City Simulators
Vitello, Piergiorgio; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018 (2018, May)

The unprecedented growth of the population living in urban environments calls for a rational and sustainable urban development. Smart cities can fill this gap by providing the citizens with high-quality ... [more ▼]

The unprecedented growth of the population living in urban environments calls for a rational and sustainable urban development. Smart cities can fill this gap by providing the citizens with high-quality services through efficient use of Information and Communication Technology (ICT). To this end, active citizen participation with mobile crowdsensing (MCS) techniques is a becoming common practice. As MCS systems require wide participation, the development of large scale real testbeds is often not feasible and simulations are the only alternative solution. Modeling the urban environment with high precision is a key ingredient to obtain effective results. However, currently existing tools like OpenStreetMap (OSM) fail to provide sufficient levels of details. In this paper, we apply a procedure to augment the precision (AOP) of the graph describing the street network provided by OSM. Additionally, we compare different mobility models that are synthetic and based on a realistic dataset originated from a well known MCS data collection campaign (ParticipAct). For the dataset, we propose two arrival models that determine the users’ arrivals and match the experimental contact distribution. Finally, we assess the scalability of AOP for different cities, verify popular metrics for human mobility and the precision of different arrival models. [less ▲]

Detailed reference viewed: 61 (5 UL)
Full Text
Peer Reviewed
See detailPAPR Minimization through Spatio-temporal Symbol-level Precoding for the Non-linear Multi-user MISO Channel
Spano, Danilo UL; Alodeh, Maha; Chatzinotas, Symeon UL et al

in 2018 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018) (2018, April 19)

Symbol-level precoding (SLP) is a promising technique which allows to constructively exploit the multi-user interference in the downlink of multiple antenna systems. Recently, this approach has also been ... [more ▼]

Symbol-level precoding (SLP) is a promising technique which allows to constructively exploit the multi-user interference in the downlink of multiple antenna systems. Recently, this approach has also been used in the context of non-linear systems for reducing the instantaneous power imbalances among the antennas. However, previous works have not exploited SLP to improve the dynamic properties of the waveforms in the temporal dimension, which are fundamental for non-linear systems. To fill this gap, this paper proposes a novel precoding method, referred to as spatio-temporal SLP, which minimizes the peak-to-average power ratio of the transmitted waveforms both in the spatial and in the temporal dimensions, while at the same time exploiting the constructive interference effect. Numerical results are presented to highlight the enhanced performance of the proposed scheme with respect to state of the art SLP techniques, in terms of power distribution and symbol error rate over non-linear channels. [less ▲]

Detailed reference viewed: 42 (5 UL)
Full Text
Peer Reviewed
See detailDesigning Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid; Shankar, Bhavani UL; Maleki, Sina UL et al

in IEEE WCNC 2018 (2018, April 18)

This paper aims to design joint on-ground precoding and on-board beamforming of a multiple gateway multibeam satellite system in a hybrid space-ground mode where full frequency reuse pattern is considered ... [more ▼]

This paper aims to design joint on-ground precoding and on-board beamforming of a multiple gateway multibeam satellite system in a hybrid space-ground mode where full frequency reuse pattern is considered among the beams. In such an architecture, each gateway serves a cluster of adjacent beams such that the adjacent clusters are served through a set of gateways that are located at different geographical areas. However, such a system brings in two challenges to overcome. First, the inter-beam interference is the bottleneck of the whole system and applying interference mitigation techniques becomes necessary. Second, as the data demand increases, the ground and space segments should employ extensive bandwidth resources in the feeder link accordingly. This entails embedding an extra number of gateways aiming to support a fair balance between the increasing demand and the corresponding required feeder link resources. To solve these problems, this study investigates the impact of employing a joint multiple gateway architecture and on-board beamforming scheme. It is shown that by properly designing the on-board beamforming scheme, the number of gateways can be kept affordable even if the data demand increases. Moreover, Zero Forcing (ZF) precoding technique is considered to cope with the inter-beam interference where each gateway constructs a part of block ZF precoding matrix. The conceived designs are evaluated with a close-to-real beam pattern and the latest broadband communication standard for satellite communications. [less ▲]

Detailed reference viewed: 85 (2 UL)
See detailLongitudinal Shaer in Composite Beams
Zhang, Qingjie UL; Schäfer, Markus UL

in Young Engineers Colloquium Munich 2018 (2018, April 13)

Longitudinal shear has important influences on the performance of composite beams. According to Eurocode 4, with cross-section class 1 and 2 in combination with ductile shear connectors, a plastic method ... [more ▼]

Longitudinal shear has important influences on the performance of composite beams. According to Eurocode 4, with cross-section class 1 and 2 in combination with ductile shear connectors, a plastic method, considering redistribution of longitudinal shear force is allowed. The conditions therefore are full development of plastic moment resistance and sufficient slip at interface to reach the plateau of P-δ curve of the shear connectors. However, for slim-floor beams, it is to question if the above-mentioned method can be applied. To answer it, related topics still need further investigation, which is the focus of the author’s Ph.D work. This paper presents part of the first stage results on the theoretical analysis of longitudinal shear, considering the influence of plasticity of the beam. For composite beams with rigid shear connectors, non-linear shear stress distribution appears in the plastic region, which influences the shear connector arrangement. However, detailed theoretical research is still hard to be found. In this work, based on a simple beam partly in plastic zone, mathematical equations are developed to calculate the plastic zone height and longitudinal shear stress distribution. Benchmarks with ANSYS and existing tests are performed. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
See detailAnalysis and Comparison of Eurocodes and Chinese codes of Design
Santos Ferreira, Katia UL; Zhang, Qingjie UL; Schäfer, Markus UL

in Young Engineers Colloquium Munich 2018 (2018, April 13)

Eurocodes (EC) which were published in 2007 are one of the most advanced standards for structure design in the world. Today, Eurocodes are not only used in EU or EFTA countries, but also many other ... [more ▼]

Eurocodes (EC) which were published in 2007 are one of the most advanced standards for structure design in the world. Today, Eurocodes are not only used in EU or EFTA countries, but also many other countries use Eurocodes or align their National standards with them, which gives Eurocodes global influence. Chinese codes of practise, on the other hand, benefit from the recent fast developed construction industry and have a vast application base. In the recent years, half of the new building floor area worldwide is built in China. Thus, it is interesting to compare Eurocodes (one of the most used codes worldwide) with the Chinese codes of design (with which most buildings were recently built). [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailA parallel best-response algorithm with exact line search for nonconvex sparsity-regularized rank minimization
Yang, Yang UL; Pesavento, Marius

in Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal (2018, April)

Detailed reference viewed: 137 (42 UL)
Full Text
Peer Reviewed
See detailEnergy efficiency in MIMO interference channels: Social optimality and max-min fairness
Yang, Yang UL; Pesavento, Marius

in Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal (2018, April)

Detailed reference viewed: 111 (13 UL)
Full Text
Peer Reviewed
See detailVelisarios: Byzantine Fault-Tolerant Protocols Powered by Coq
Rahli, Vincent UL; Vukotic, Ivana UL; Volp, Marcus UL et al

in ESOP 2018 (2018, April)

Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these ... [more ▼]

Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these systems. Byzantine fault-tolerant state-machine replication (BFT-SMR) provides a way to harden such systems. It ensures that they maintain correctness and availability in an application-agnostic way, provided that the replication protocol is correct and at least n-f out of n replicas survive arbitrary faults. This paper presents Velisarios a logic-of-events based framework implemented in Coq, which we developed to implement and reason about BFT-SMR protocols. As a case study, we present the first machine-checked proof of a crucial safety property of an implementation of the area's reference protocol: PBFT. [less ▲]

Detailed reference viewed: 176 (18 UL)
Full Text
Peer Reviewed
See detailComparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization
Tessaro Lunardi, Willian UL; Voos, Holger UL

in 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018 (2018, April)

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be ... [more ▼]

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be processed by several different machines. The FJSP contains two sub-problems, namely machine assignment problem and operation sequencing problem. In this paper, we propose and compare a discrete firefly algorithm (FA) and a genetic algorithm (GA) for the multi-objective FJSP. Three minimization objectives are considered, the maximum completion time, workload of the critical machine and total workload of all machines. Five well-known instances of FJSP have been used to evaluate the performance of the proposed algorithms. Comparisons among our methods and state-of-the-art algorithms are also provided. The experimental results demonstrate that the FA and GA have achieved improvements in terms of efficiency. Solutions obtained by both algorithms are comparable to those obtained by algorithms with local search. In addition, based on our initial experiments, results show that the proposed discrete firefly algorithm is feasible, more effective and efficient than our proposed genetic algorithm for solving multi-objective FJSP. [less ▲]

Detailed reference viewed: 265 (69 UL)
Full Text
Peer Reviewed
See detailOptimization of weighted individual energy efficiencies in interference networks
Matthiesen, Bho; Yang, Yang UL; Jorswieck, Eduard

in Proc. IEEE Wireless Communications and Networking Conference (2018, April)

Detailed reference viewed: 103 (4 UL)
Full Text
Peer Reviewed
See detailEnabling lock-free concurrent workers over temporal graphs composed of multiple time-series
Fouquet, Francois; Hartmann, Thomas UL; Mosser, Sébastien et al

in 33rd Annual ACM Symposium on Applied Computing (SAC'18) (2018, April)

Time series are commonly used to store temporal data, e.g., sensor measurements. However, when it comes to complex analytics and learning tasks, these measurements have to be combined with structural ... [more ▼]

Time series are commonly used to store temporal data, e.g., sensor measurements. However, when it comes to complex analytics and learning tasks, these measurements have to be combined with structural context data. Temporal graphs, connecting multiple time- series, have proven to be very suitable to organize such data and ultimately empower analytic algorithms. Computationally intensive tasks often need to be distributed and parallelized among different workers. For tasks that cannot be split into independent parts, several workers have to concurrently read and update these shared temporal graphs. This leads to inconsistency risks, especially in the case of frequent updates. Distributed locks can mitigate these risks but come with a very high-performance cost. In this paper, we present a lock-free approach allowing to concurrently modify temporal graphs. Our approach is based on a composition operator able to do online reconciliation of concurrent modifications of temporal graphs. We evaluate the efficiency and scalability of our approach compared to lock-based approaches. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailProfiling Energy Efficiency of Mobile Crowdsensing Data Collection Frameworks for Smart City Applications
Tomasoni, Mattia; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in The 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2018) (2018, March)

Mobile crowdsensing (MCS) has emerged in the last years and has become one of the most prominent paradigms for urban sensing. In MCS, citizens actively participate in the sensing process by contributing ... [more ▼]

Mobile crowdsensing (MCS) has emerged in the last years and has become one of the most prominent paradigms for urban sensing. In MCS, citizens actively participate in the sensing process by contributing data with their smartphones, tablets, wearables and other mobile devices to a collector. As citizens sustain costs while contributing data, i.e., the energy spent from the batteries for sensing and reporting, devising energy efficient data collection frameworks (DCFs) is essential. In this work, we compare the energy efficiency of several DCFs through CrowdSenSim, which allows to perform large-scale simulation experiments in realistic urban environments. Specifically, the DCFs under analysis differ one with each other by the data reporting mechanism implemented and the signaling between users and the collector needed for sensing and reporting decisions. Results reveal that the key criterion differentiating DCFs' energy consumption is the data reporting mechanism. In principle, continuous reporting to the collector should be more energy consuming than probabilistic reporting. However, DCFs with continuous reporting that implement mechanisms to block sensing and data delivery after a certain amount of contribution are more effective in harvesting data from the crowd. [less ▲]

Detailed reference viewed: 93 (4 UL)
Full Text
Peer Reviewed
See detailExtracting Statistical Graph Features for Accurate and Efficient Time Series Classification
Li, Daoyuan UL; Lin, Jessica; Bissyande, Tegawendé François D Assise UL et al

in 21st International Conference on Extending Database Technology (2018, March)

This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to ... [more ▼]

This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to find global similarities in time series databases (eg., Nearest Neighbor with Dynamic Time Warping distance) or methods specializing in locating local patterns/subsequences (eg., shapelets), we extract solely statistical features from graphs that are generated from time series. Specifically, we augment time series by means of their multiscale approximations, which are further transformed into a set of visibility graphs. After extracting probability distributions of small motifs, density, assortativity, etc., these features are used for building highly accurate classification models using generic classifiers (eg., Support Vector Machine and eXtreme Gradient Boosting). Thanks to the way how we transform time series into graphs and extract features from them, we are able to capture both global and local features from time series. Based on extensive experiments on a large number of open datasets and comparison with five state-of-the-art TSC algorithms, our approach is shown to be both accurate and efficient: it is more accurate than Learning Shapelets and at the same time faster than Fast Shapelets. [less ▲]

Detailed reference viewed: 190 (7 UL)
Full Text
See detailRetrouver le rapport à l’histoire et à l’Europe
Poirier, Philippe UL; Hartog, François

in Herzog, Philippe (Ed.) Europe 21 (2018, February 28)

L’Europe n’a de sens et de fondement que si les gens peuvent acquérir une conscience commune, former des projets communs, générer un affectio societatis. Ce n’est pas le cas aujourd’hui. Nous voulons donc ... [more ▼]

L’Europe n’a de sens et de fondement que si les gens peuvent acquérir une conscience commune, former des projets communs, générer un affectio societatis. Ce n’est pas le cas aujourd’hui. Nous voulons donc mettre la culture au cœur de l’espace public européen, au cœur de chaque action, et pour cela faire appel à toutes les sources d’inspiration en conjuguant foi et raison. La formation d’acteurs de la société civile capables de mettre les populations en relation et de porter des projets par-delà les frontières est essentielle. Ceci exige de dépasser les barrières nationales, psychiques et institutionnelles, et implique une culture de l’altérité afin que l’Europe puisse répondre positivement aux défis internes et externes de la mondialisation [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailIMPROVING THE CAPACITY OF VERY DEEP NETWORKS WITH MAXOUT UNITS
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (2018, February 21)

Deep neural networks inherently have large representational power for approximating complex target functions. However, models based on rectified linear units can suffer reduction in representation ... [more ▼]

Deep neural networks inherently have large representational power for approximating complex target functions. However, models based on rectified linear units can suffer reduction in representation capacity due to dead units. Moreover, approximating very deep networks trained with dropout at test time can be more inexact due to the several layers of non-linearities. To address the aforementioned problems, we propose to learn the activation functions of hidden units for very deep networks via maxout. However, maxout units increase the model parameters, and therefore model may suffer from overfitting; we alleviate this problem by employing elastic net regularization. In this paper, we propose very deep networks with maxout units and elastic net regularization and show that the features learned are quite linearly separable. We perform extensive experiments and reach state-of-the-art results on the USPS and MNIST datasets. Particularly, we reach an error rate of 2.19% on the USPS dataset, surpassing the human performance error rate of 2.5% and all previously reported results, including those that employed training data augmentation. On the MNIST dataset, we reach an error rate of 0.36% which is competitive with the state-of-the-art results. [less ▲]

Detailed reference viewed: 113 (19 UL)
Full Text
Peer Reviewed
See detailPERSEUS: A Personalization Framework for Sentiment Categorization with Recurrent Neural Network
Guo, Siwen UL; Höhn, Sviatlana; Xu, Feiyu et al

in International Conference on Agents and Artificial Intelligence , Funchal 16-18 January 2018 (2018, January)

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between ... [more ▼]

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between individuals and certain consistency in each individual is the cornerstone of the framework. We focus on relations between documents for user-sensitive predictions. Individual’s lexical choices act as indicators for individuality, thus we use a concept-based system which utilizes neural networks to embed concepts and associated topics in text. Furthermore, a recurrent neural network is used to memorize the history of user’s opinions, to discover user-topic dependence, and to detect implicit relations between users. PERSEUS also offers a solution for data sparsity. At the first stage, we show the benefit of inquiring a user-specified system. Improvements in performance experimented on a combined Twitter dataset are shown over generalized models. PERSEUS can be used in addition to such generalized systems to enhance the understanding of user’s opinions. [less ▲]

Detailed reference viewed: 160 (47 UL)
Full Text
Peer Reviewed
See detailNon-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling
Charlier, Jérémy Henri J. UL; State, Radu UL; Hilger, Jean

in Charlier, Jeremy; State, Radu; Hilger, Jean (Eds.) 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (2018, January)

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and ... [more ▼]

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and transaction costs reduction. The Ethereum Virtual Machine performs smart contracts runs, where the execution of each contract is limited to the amount of gas required to execute the operations described in the code. Each gas unit must be paid using Ether, the crypto-currency of the platform. Due to smart contracts interactions evolving over time, analyzing the behavior of smart contracts is very challenging. We address this challenge in our paper. We develop for this purpose an innovative approach based on the nonnegative tensor decomposition PARATUCK2 combined with long short-term memory (LSTM) to assess if predictive analysis can forecast smart contracts interactions over time. To validate our methodology, we report results for two use cases. The main use case is related to analyzing smart contracts and allows shedding some light into the complex interactions among smart contracts. In order to show the generality of our method on other use cases, we also report its performance on video on demand recommendation. [less ▲]

Detailed reference viewed: 112 (20 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 110 (12 UL)
Full Text
Peer Reviewed
See detailPRESENCE: Toward a Novel Approach for Performance Evaluation of Mobile Cloud SaaS Web Services
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in Proc. of the 32nd IEEE Intl. Conf. on Information Networking (ICOIN 2018) (2018, January)

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailDéveloppement d’un test de compétences numériques précoces destiné à mesurer les effets d’une intervention mise en place auprès d’élèves de 4 à 6 ans
de Chambrier, Anne-Françoise; Vlassis, Joëlle UL; Fagnant, Annick et al

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailMesurer les croyances des enseignants du préscolaire à propos des mathématiques
Vlassis, Joëlle UL; Dierendonck, Christophe UL; Tinnes, Mélanie UL et al

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailBesoins des apprenants en matière de pensée algébrique et connaissances pour enseigner cette pensée : évaluation diagnostique des acquis des enseignants à la transition école-collège
Demonty, Isabelle; Vlassis, Joëlle UL; Fagnant, Annick

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailDetecting Malicious Authentication Events Trustfully
Kaiafas, Georgios UL; Varisteas, Georgios UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Varisteas, Georgios; Lagraa, Sofiane (Eds.) et al IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World (2018)

Detailed reference viewed: 57 (14 UL)
Full Text
Peer Reviewed
See detailRecent Trends in Software Testing Education: A Systematic Literature Review
Lauvås, Per; Arcuri, Andrea UL

in UDIT (The Norwegian Conference on Didactics in IT education) (2018)

Testing is a critical aspect of software development. Far too often software is released with critical faults. However, testing is often considered tedious and boring. Unfortunately, many graduates might ... [more ▼]

Testing is a critical aspect of software development. Far too often software is released with critical faults. However, testing is often considered tedious and boring. Unfortunately, many graduates might join the work force without having had any education in software testing, which exacerbates the problem even further. Therefore, teaching software testing as part of a university degree in software engineering and is very important. But it is an open challenge how to teach software testing in an effective way that can successfully motivate students. In this paper, we have carried out a systematic literature review on the topic of teaching software testing. We analysed and reviewed 30 papers that were published between 2013 and 2017. The review points out to a few different trends, like the use of gamification to make the teaching of software testing less tedious. [less ▲]

Detailed reference viewed: 45 (1 UL)
Full Text
Peer Reviewed
See detailA Search-based Approach for Accurate Identification of Log Message Formats
Messaoudi, Salma UL; Panichella, Annibale UL; Bianculli, Domenico UL et al

in Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18) (2018)

Many software engineering activities process the events contained in log files. However, before performing any processing activity, it is necessary to parse the entries in a log file, to retrieve the ... [more ▼]

Many software engineering activities process the events contained in log files. However, before performing any processing activity, it is necessary to parse the entries in a log file, to retrieve the actual events recorded in the log. Each event is denoted by a log message, which is composed of a fixed part-called (event) template-that is the same for all occurrences of the same event type, and a variable part, which may vary with each event occurrence. The formats of log messages, in complex and evolving systems, have numerous variations, are typically not entirely known, and change on a frequent basis; therefore, they need to be identified automatically. The log message format identification problem deals with the identification of the different templates used in the messages of a log. Any solution to this problem has to generate templates that meet two main goals: generating templates that are not too general, so as to distinguish different events, but also not too specific, so as not to consider different occurrences of the same event as following different templates; however, these goals are conflicting. In this paper, we present the MoLFI approach, which recasts the log message identification problem as a multi-objective problem. MoLFI uses an evolutionary approach to solve this problem, by tailoring the NSGA-II algorithm to search the space of solutions for a Pareto optimal set of message templates. We have implemented MoLFI in a tool, which we have evaluated on six real-world datasets, containing log files with a number of entries ranging from 2K to 300K. The experiments results show that MoLFI extracts by far the highest number of correct log message templates, significantly outperforming two state-of-the-art approaches on all datasets. [less ▲]

Detailed reference viewed: 369 (41 UL)
Full Text
Peer Reviewed
See detailVerifiability of Helios Mixnet
Smyth, Benjamin UL

in Voting'18: 3rd Workshop on Advances in Secure Electronic Voting (2018)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailAttacks against GSMA's M2M Remote Provisioning
Meyer, Maxime; Quaglia, Elizabeth A.; Smyth, Benjamin UL

in FC'18: 22nd International Conference on Financial Cryptography and Data Security (2018)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailGraph Similarity based on Graph Fourier Distances
Lagunas, Eva UL; Marques, Antonio G.; Chatzinotas, Symeon UL et al

in European Signal Processing Conference (EUSIPCO), Rome, Italy, 3-7 September 2018 (2018)

Detailed reference viewed: 23 (3 UL)
Full Text
Peer Reviewed
See detailAuthentication with weaker trust assumptions for voting systems
Quaglia, Elizabeth A.; Smyth, Benjamin UL

in AFRICACRYPT'18: 10th International Conference on Cryptology in Africa (2018)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailContext-aware and Attribute-based Access Control Applying Proactive Computing to IoT System
Picard, Noé UL; Colin, Jean-Noël; Zampunieris, Denis UL

in Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018) (2018)

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its ... [more ▼]

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its sensors connected to the real world, allowing for context-awareness. However, the ABAC model alone does not include proposals for implementing security policies based on verified and/or meaningful values rather than on raw data flowing from the sensors. Nor does it allow to implement immediate action on the system when some security flaw is detected, while this possibility technically exists if the system is equipped with actuators next to its sensors. We show how to circumvent these limitations by adding a proactive engine to the ABAC components, that runs rule-based scenarios devoted to sensor data pre-processing, to higher-level information storage in the PIP, and to real-time, automatic reaction on the system through its actuators when required. [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailTesting Autonomous Cars for Feature Interaction Failures using Many-Objective Search
Ben Abdessalem (helali), Raja UL; Panichella, Annibale; Nejati, Shiva UL et al

in Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018) (2018)

Complex systems such as autonomous cars are typically built as a composition of features that are independent units of functionality. Features tend to interact and impact one another’s behavior in unknown ... [more ▼]

Complex systems such as autonomous cars are typically built as a composition of features that are independent units of functionality. Features tend to interact and impact one another’s behavior in unknown ways. A challenge is to detect and manage feature interactions, in particular, those that violate system requirements, hence leading to failures. In this paper, we propose a technique to detect feature interaction failures by casting our approach into a search-based test generation problem. We define a set of hybrid test objectives (distance functions) that combine traditional coverage-based heuristics with new heuristics specifically aimed at revealing feature interaction failures. We develop a new search-based test generation algorithm, called FITEST, that is guided by our hybrid test objectives. FITEST extends recently proposed many-objective evolutionary algorithms to reduce the time required to compute fitness values. We evaluate our approach using two versions of an industrial self-driving system. Our results show that our hybrid test objectives are able to identify more than twice as many feature interaction failures as two baseline test objectives used in the software testing literature (i.e., coverage-based and failure-based test objectives). Further, the feedback from domain experts indicates that the detected feature interaction failures represent real faults in their systems that were not previously identified based on analysis of the system features and their requirements. [less ▲]

Detailed reference viewed: 86 (10 UL)
Full Text
See detailPlaidoyer pour le maintien d’une Cour constitutionnelle (de cas échéant) réformée
Kinsch, Patrick UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour constitutionnelle : Trop jeune pour mourir ? (2018)

Detailed reference viewed: 29 (3 UL)
Full Text
Peer Reviewed
See detailTesting Vision-Based Control Systems Using Learnable Evolutionary Algorithms
Ben Abdessalem (helali), Raja UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 40th International Conference on Software Engineering (ICSE 2018) (2018)

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We ... [more ▼]

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We propose an automated testing algorithm that builds on learnable evolutionary algorithms. These algorithms rely on machine learning or a combination of machine learning and Darwinian genetic operators to guide the generation of new solutions (test scenarios in our context). Our approach combines multiobjective population-based search algorithms and decision tree classification models to achieve the following goals: First, classification models guide the search-based generation of tests faster towards critical test scenarios (i.e., test scenarios leading to failures). Second, search algorithms refine classification models so that the models can accurately characterize critical regions (i.e., the regions of a test input space that are likely to contain most critical test scenarios). Our evaluation performed on an industrial automotive vision-based control system shows that: (1) Our algorithm outperforms a baseline evolutionary search algorithm and generates 78% more distinct, critical test scenarios compared to the baseline algorithm. (2) Our algorithm accurately characterizes critical regions of the system under test, thus identifying the conditions that likely to lead to system failures. [less ▲]

Detailed reference viewed: 416 (101 UL)
Full Text
Peer Reviewed
See detailA Revisit of Action Detection using Improved Trajectories
Papadopoulos, Konstantinos UL; Antunes, Michel; Aouada, Djamila UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, Alberta, Canada, 15–20 April 2018 (2018)

In this paper, we revisit trajectory-based action detection in a potent and non-uniform way. Improved trajectories have been proven to be an effective model for motion description in action recognition ... [more ▼]

In this paper, we revisit trajectory-based action detection in a potent and non-uniform way. Improved trajectories have been proven to be an effective model for motion description in action recognition. In temporal action localization, however, this approach is not efficiently exploited. Trajectory features extracted from uniform video segments result in significant performance degradation due to two reasons: (a) during uniform segmentation, a significant amount of noise is often added to the main action and (b) partial actions can have negative impact in classifier's performance. Since uniform video segmentation seems to be insufficient for this task, we propose a two-step supervised non-uniform segmentation, performed in an online manner. Action proposals are generated using either 2D or 3D data, therefore action classification can be directly performed on them using the standard improved trajectories approach. We experimentally compare our method with other approaches and we show improved performance on a challenging online action detection dataset. [less ▲]

Detailed reference viewed: 84 (16 UL)
Full Text
Peer Reviewed
See detailTagvisor: A privacy advisor for sharing hashtags
Zhang, Yang; Humbert, Mathias; Rahman, Tahleen et al

in Proceedings of The Web Conference 2018 (WWW'18) (2018)

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailBlockchain Orchestration and Experimentation Framework: A Case Study of KYC
Shbair, Wazen UL; Steichen, Mathis Georges UL; François, Jérôme UL et al

in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018 (2018)

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public ... [more ▼]

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public testnets (e.g. Rinkeby Ethereum) can be used for testing, however, we cannot adjust their parameters (e.g. Gas limit, Mining difficulty) to further the understanding of the application in question and of the employed blockchain. This paper proposes an easy to use orchestration framework over the Grid'5000 platform. Grid'5000 is a highly reconfigurable and controllable large-scale testbed. We developed a tool that facilitates nodes reservation, deployment and blockchain configuration over the Grid'5000 platform. In addition, our tool can fine-tune blockchain and network parameters before and between experiments. The proposed framework offers insights for private and consortium blockchain developers to identify performance bottlenecks and to assess the behavior of their applications in different circumstances. [less ▲]

Detailed reference viewed: 160 (3 UL)
Full Text
Peer Reviewed
See detailMachine Learning for Reliable Network Attack Detection in SCADA Systems
Lopez Perez, Rocio; Adamsky, Florian UL; Soua, Ridha UL et al

in 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (2018)

Detailed reference viewed: 100 (13 UL)
Full Text
Peer Reviewed
See detailEvoSuite at the SBST 2018 Tool Competition
Fraser, Gordon; Rojas, Jose; Arcuri, Andrea UL

in 2018 ACM/IEEE 11th International Workshop on Search-Based Software Testing (2018)

EvoSuite is a search-based tool that automatically generates executable unit tests for Java code (JUnit tests). This paper summarises the results and experiences of EvoSuite’s participation at the sixth ... [more ▼]

EvoSuite is a search-based tool that automatically generates executable unit tests for Java code (JUnit tests). This paper summarises the results and experiences of EvoSuite’s participation at the sixth unit testing competition at SBST 2018, where EvoSuite achieved the highest overall score (687 points) for the fifth time in six editions of the competition. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailKardiale Modulation der Schreckreaktion bei hoher gegenüber niedriger Symptombelastung: afferente Signalübermittlung auf der Hirn-Körper-Achse beein usst frühe Stimulus-Verarbeitung bei hoher Symptombelastung
Dierolf, Angelika UL; Rost, Silke; Lutz, Annika UL et al

in Hennig, J.; Stark, R. (Eds.) Abstractband Psychologie und Gehirn 2018 (2018)

Somatische Belastungsstörungen (SBS) sind oftmals durch andauernde medizinisch- unerklärte Symptome gekennzeichnet, deren Entstehung größtenteils ungeklärt ist. Diese Studie hatte zum Ziel, die empirisch ... [more ▼]

Somatische Belastungsstörungen (SBS) sind oftmals durch andauernde medizinisch- unerklärte Symptome gekennzeichnet, deren Entstehung größtenteils ungeklärt ist. Diese Studie hatte zum Ziel, die empirisch bislang unbeantwortete Frage zu klären, ob Symptomentstehung auf veränderte Signalübermittlung auf der Hirn-Körper-Achse zurückzuführen ist. Zunächst wurden 486 Personen aus der Allgemeinbevölkerung anhand des SOMS-2 in Personen mit hoher Symptombelastung (HSB; unterstes Perzentil) und niedriger Symptombelastung (NSB; oberstes Perzentil) unterteilt. Personen mit HSB stellen eine besondere Risikogruppe für SBS dar. 28 HSB- und 31 NSB-Personen durchliefen ein Paradigma der kardialen Modulation der Schreckreaktion (CMS), ein Verfahren, das kardio-afferente Signalübermittlung prä-attentiv abbilden kann. Ihnen wurden je zehn akustische Schreckreize (105 dB) in sechs Zeitpunkten nach der kardialen R-Zacke (0, 100, 200, 300, 400, 500 ms) präsentiert. Als Indikator für die Schreckreaktion wurden die N1- und P2-Amplitude der auditorisch-evozierten Potenziale über Cz gemessen, da der Effekt der Hirn-Körper-Signalübermittlung im Kortex abgebildet werden sollte. Es zeigten sich geringere N1-Amplituden auf die Schreckreize, die während der systolischen Phase (200, 300 ms) im Vergleich zur diastolischen Phase (0 ms) präsentiert wurden (p=.0002), was für das Vorliegen eines CMS-Effekts spricht. Die HSB-Gruppe zeigte höhere P2-Amplituden als die NSB-Gruppe. Es zeigte sich außerdem, dass der CMS-Effekt bezüglich der N1-Komponente in der HSB-Gruppe geringer ist (p=.035), jedoch bezüglich der P2-Komponente stärker ist als in der NSB-Gruppe (p=.031). Afferente Signalübermittlung auf der Hirn-Körper-Achse könnte bei Personen mit HSB bereits frühe, automatischeWahrnehmungsprozesse verändern, die durch späte, aufmerksamkeits-gesteuerte Prozesse kompensiert werden. Diese prä-attentive Beeinflussung der Stimulus-Verarbeitung könnte ein Mechanismus der Symptomentstehung bei Personen mit HSB und SBS sein. [less ▲]

Detailed reference viewed: 13 (2 UL)
Full Text
Peer Reviewed
See detailSensing Your Body: Interoceptive Awareness and Medically Unexplained Symptoms
Flasinski, Tabea UL; Dierolf, Angelika UL; Voderholzer, Ulrich et al

in Abtracts of the 32nd Annual Conference of the European Health Psychology Society (2018)

According to contemporary theories of medically unexplained symptoms (MUS), alterations in interoception play a major role in symptom development and maintenance. Nevertheless, the mechanisms underlying ... [more ▼]

According to contemporary theories of medically unexplained symptoms (MUS), alterations in interoception play a major role in symptom development and maintenance. Nevertheless, the mechanisms underlying this relationship remains unclear. To address this unresolved issue, we investigated whether individuals with varying degrees of MUS differ in different facets of interoceptive awareness as assessed with the Multidimensional Assessment of Interoceptive Awareness (MAIA) questionnaire. In study 1, 486 individuals were screened with an online version of the Screening for Somatoform Disorders (SOMS-2). Individuals with a SOMS index below 5 (low reporter, n=32) and above 20 (high reporter, n=32) were invited to fill in the MAIA. High symptom reporter had lower scores on the Not-Distracting, Not-Worrying, and Trusting subscales, and higher scores on the Emotional Awareness subscale (Cohen´s d=.70–1.16). In study 2, individuals with DSM-IV somatoform disorder (SFD; n=25) were compared to individuals with major depressive disorder (MDD; n=24) and healthy controls (HC; n=25). The SFD and MDD groups had lower scores on the Not-Distracting, Attention Regulation, Self-Regulation, and Trusting subscales than HC. The MDD group had lower scores than the SFD and HC groups on the Body Listening subscale (partial eta-squared=.18-.26). No differences with regard to Noticing of bodily sensations were found. Groups with subclinical SFD, SFD and MDD do not differ from healthy individuals in terms of actual body perception, whereas cognitive facets of interoception, such as distraction or self-regulation are differentially affected. This highlights the necessity of including specifically targeted mindfulness-based interventions [less ▲]

Detailed reference viewed: 47 (3 UL)