References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 108 (9 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 66 (6 UL)
Full Text
Peer Reviewed
See detailAre mutants really natural? A study on how “naturalness” helps mutant selection
Jimenez, Matthieu UL; Titcheu Chekam, Thierry UL; Cordy, Maxime UL et al

in 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18) (2018, October 11)

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling ... [more ▼]

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling techniques. Such models promise to capture the program semantics and identify source code parts that `smell', i.e., they are strange, badly written and are generally error-prone (likely to be defective). Aims: We investigate the use of natural language modelling techniques in mutation testing (a testing technique that uses artificial faults). We thus, seek to identify how well artificial faults simulate real ones and ultimately understand how natural the artificial faults can be. %We investigate this question in a fault revelation perspective. Our intuition is that natural mutants, i.e., mutants that are predictable (follow the implicit coding norms of developers), are semantically useful and generally valuable (to testers). We also expect that mutants located on unnatural code locations (which are generally linked with error-proneness) to be of higher value than those located on natural code locations. Method: Based on this idea, we propose mutant selection strategies that rank mutants according to a) their naturalness (naturalness of the mutated code), b) the naturalness of their locations (naturalness of the original program statements) and c) their impact on the naturalness of the code that they apply to (naturalness differences between original and mutated statements). We empirically evaluate these issues on a benchmark set of 5 open-source projects, involving more than 100k mutants and 230 real faults. Based on the fault set we estimate the utility (i.e. capability to reveal faults) of mutants selected on the basis of their naturalness, and compare it against the utility of randomly selected mutants. Results: Our analysis shows that there is no link between naturalness and the fault revelation utility of mutants. We also demonstrate that the naturalness-based mutant selection performs similar (slightly worse) to the random mutant selection. Conclusions: Our findings are negative but we consider them interesting as they confute a strong intuition, i.e., fault revelation is independent of the mutants' naturalness. [less ▲]

Detailed reference viewed: 21 (4 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 98 (13 UL)
Full Text
Peer Reviewed
See detailVisual emulation for Ethereum's virtual machine
Norvill, Robert UL; Fiz Pontiveros, Beltran UL; State, Radu UL et al

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018, July 09)

In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we ... [more ▼]

In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we are able to display the program's control flow graph, opcodes and stack for each step of contract execution. This tool is designed to aid the user's understanding of the Etheruem Virtual Machine as well as aid the analysis of any given smart contract. As such, it functions as both an analysis and a learning tool. It allows the user to view the code in each block of a smart contract and follow possible control flow branches. It is able to detect loops and suggest optimisation candidates. It is possible to step through a contract one opcode at a time. E-EVM achieved an average of 85.6% code coverage when tested. [less ▲]

Detailed reference viewed: 6 (2 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 107 (6 UL)
Full Text
Peer Reviewed
See detailA Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs
Bezzaoucha, Souad UL; Voos, Holger UL; Davila, Jorge et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea ... [more ▼]

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea consists in defining a state and unknown input transformations in order to divide the state vector into two parts, a measurable part and an observable one (decoupled from the unknown input). A classical Luenberger observer to estimate the unmeasurable part is then designed and given in terms of Linear Matrix Inequalities (LMIs) conditions. A numerical example is also presented in order to illustrate the proposed approach. [less ▲]

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailA UX Approach to Privacy and Security: the Impact of User, Contextual and System-Related Factors
Distler, Verena UL; Lallemand, Carine UL; Koenig, Vincent UL

in CHI Workshop Exploring Individual Diffferences in Privacy (2018, April)

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We ... [more ▼]

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We advocate using UX design methods in order to study interindividual differences, system-related and contextual factors involved in privacy and security attitudes and behaviors. These results will contribute to user-tailored and personalized privacy initiatives and guide the design of future technologies. [less ▲]

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailAcceptability and Acceptance of Autonomous Mobility on Demand: The Impact of an Immersive Experience
Distler, Verena UL; Lallemand, Carine UL; Thierry, Bellet

in CHI Conference Proceedings (2018, April)

Autonomous vehicles have the potential to fundamentally change existing transportation systems. Beyond legal concerns, these societal evolutions will critically depend on user acceptance. As an emerging ... [more ▼]

Autonomous vehicles have the potential to fundamentally change existing transportation systems. Beyond legal concerns, these societal evolutions will critically depend on user acceptance. As an emerging mode of public transportation [7], Autonomous mobility on demand (AMoD) is of particular interest in this context. The aim of the present study is to identify the main components of acceptability (before first use) and acceptance (after first use) of AMoD, following a user experience (UX) framework. To address this goal, we conducted three workshops (N=14) involving open discussions and a ride in an experimental autonomous shuttle. Using a mixed-methods approach, we measured pre-immersion acceptability before immersing the participants in an on-demand transport scenario, and eventually measured post-immersion acceptance of AMoD. Results show that participants were reassured about safety concerns, however they perceived the AMoD experience as ineffective. Our findings highlight key factors to be taken into account when designing AMoD experiences. [less ▲]

Detailed reference viewed: 26 (3 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (2018, March 18), 113

Detailed reference viewed: 181 (14 UL)
Full Text
Peer Reviewed
See detailInvestigating Siri as a virtual assistant in a learning context
Arend, Béatrice UL

in Proceedings of 12th annual International Technology, Education and Development Conference 2018 (2018, March)

Detailed reference viewed: 33 (2 UL)
Full Text
Peer Reviewed
See detailIdentification and Characterization of Variant Intolerant Sites across Human Protein 3-Dimensional Structures
Iqbal, Sumaiya; Berg Jespersen, Jakob; Perez-Palma, Eduardo et al

in Biophysical Journal (2018, February 02), 114(3, Suppl. 1), 664

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish ... [more ▼]

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish pathogenic variants from benign rare variants. This lack of statistical and bioinformatics analyses, accompanied by an ever-increasing number of identified variants in biomedical research and clinical applications, has become a major challenge. Established methods to predict the functional effect of genetic variation use the degree of amino acid conservation across species in linear protein sequence alignment. More recent methods include the spatial distribution pattern of known patient and control variants. Here, we propose to combine the linear conservation and spatial constrained based scores to devise a novel score that incorporates 3-dimensional structural properties of amino acid residues, such as the solvent-accessible surface area, degree of flexibility, secondary structure propensity and binding tendency, to quantify the effect of amino acid substitutions. For this study, we develop a framework for large-scale mapping of established linear sequence-based paralog and ortholog conservation scores onto the tertiary structures of human proteins. This framework can be utilized to map the spatial distribution of mutations on solved protein structures as well as homology models. As a proof of concept, using a homology model of the human Nav1.2 voltage-gated sodium channel structure, we observe spatial clustering in distinct domains of mutations, associated with Autism Spectrum Disorder (>20 variants) and Epilepsy (>100 variants), that exert opposing effects on channel function. We are currently characterizing all variants (>300k individuals) found in ClinVar, the largest disease variant database, as well as variants identified in >140k individuals from general population. The variant mapping framework and our score, informed with structural information, will be useful in identifying structural motifs of proteins associated with disease risk. [less ▲]

Detailed reference viewed: 51 (2 UL)
Full Text
Peer Reviewed
See detailRecycling Smart Contracts: Compression of the Ethereum Blockchain.
Fiz Pontiveros, Beltran UL; Norvill, Robert UL; State, Radu UL

in Proceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018 (2018, February)

Detailed reference viewed: 24 (4 UL)
Full Text
Peer Reviewed
See detailA Model for Regulating of Ethical Preferences in Machine Ethics
Baniasadi, Zohreh UL; Parent, Xavier UL; Max, Charles UL et al

in Proceedings of International Conference on Human-Computer Interaction (2018)

Detailed reference viewed: 23 (4 UL)
Full Text
See detailUnderstanding human need fulfilment to support the design of secure experiences
Distler, Verena UL

in Proceedings of NordiCHI' 18 Doctoral Consortium (2018)

Detailed reference viewed: 8 (4 UL)
Full Text
Peer Reviewed
See detailReversing social gradient: Impact of patients’ communication with their practitioners on adherence to preventive behaviours
Baumann, Michèle UL; Bucki, Barbara; Tchicaya, Anastase et al

in Health Psychology across the Lifespan: Uniting Research, Practice and Policy (2018)

Good communication with a physician has positive effects on the patients’ adopting preventive behaviours. Knowing social inequalities in health, we aimed at analysing in what extent financial situation ... [more ▼]

Good communication with a physician has positive effects on the patients’ adopting preventive behaviours. Knowing social inequalities in health, we aimed at analysing in what extent financial situation influences the associations between quality of communication and improved secondary preventive behaviours and limited risk factors - in cardiovascular diseases: hypertension, overweight, obesity, hypercholesterolemia, diabetes. Methods: 1,289 patients who underwent a coronary angiography in Luxembourg completed a self-administered questionnaire in 2008/09 and 2013/14. The association between improving each preventive eating behaviour (decrease of salt, sugar, fat consumption; increase of fruits/vegetables) and the quality of physician-patient communication (5-items scale) was evaluated using logistic regression models. Perceived financial situation (difficult, easy, and very easy) was introduced in interaction with the communication score. Findings: Patients declared in a difficult or easy financial situation had a higher probability of decreasing their salt intake when physician-patient communication quality was higher (OR [95% CI] respectively: 1.139 [1.045; 1.240], 1.105 [1.032; 1.182]). The pattern was similar for increased consumption of fruits/vegetables in patients with hypertension, diabetes, overweight and hypercholesterolemia. Reduced sugar consumption was associated with communication quality in hypercholesterolemia patients in financial difficulty (OR [95% CI]: 1.095 [1.009; 1.189]). Discussion: The quality of communication has a higher impact on adopting healthy behaviours in patients declaring themselves in financial difficulty. These findings raise awareness on the importance, in patients with perceived financial difficulties, of physician-patient quality to improve adherence to the secondary preventive recommendations. Across the lifespan, it highlights the role of physicians in reversing their patients’ social gradient. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailA Parallel Multiscale DEM-VOF Method For Large-Scale Simulations Of Three-Phase Flows
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in Proceedings of ECCM-ECFD 2018 (2018)

A parallel dual-grid multiscale DEM-VOF coupling is here investigated. Dual- grid multiscale couplings have been recently used to address different engineering problems involving the interaction between ... [more ▼]

A parallel dual-grid multiscale DEM-VOF coupling is here investigated. Dual- grid multiscale couplings have been recently used to address different engineering problems involving the interaction between granular phases and complex fluid flows. Nevertheless, previous studies did not focus on the parallel performance of such a coupling and were, therefore, limited to relatively small applications. In this contribution, we propose an insight into the performance of the dual-grid multiscale DEM-VOF method for three- phase flows when operated in parallel. In particular,we focus on a famous benchmark case for three-phase flows and assess the influence of the partitioning algorithm on the scalability of the dual-grid algorithm. [less ▲]

Detailed reference viewed: 31 (13 UL)
Full Text
Peer Reviewed
See detailCognitive biases in pain: current challenges, future directions and treatment opportunities
van Ryckeghem, Dimitri UL

in Canadian journal of Pain (2018)

Cognitive biases are a core component of contemporary cognitive-affective models that try to explain pain experience, distress and disability in children and adults experiencing pain. The idea that ... [more ▼]

Cognitive biases are a core component of contemporary cognitive-affective models that try to explain pain experience, distress and disability in children and adults experiencing pain. The idea that children and adults with pain show cognitive biases for pain-related information, i.e. they selectively attend to pain-related information at the cost of other information (attentional bias), interpret ambiguous stimuli as pain-related (interpretation bias) or have biased memories for painful events (memory bias), has been particularly influential in this context. Notwithstanding the considerable progress made in the understanding of cognitive biases related to pain and threat, a number of questions remains unanswered and future challenges linger. A first challenge is to further delineate the characteristics of cognitive biases, including their content specificity and dynamics. A second challenge relates to the understanding of how cognitive biases interrelate with each other and possibly reinforce one another. A third challenge relates to the translation of findings on cognitive biases for pain into clear strategies and recommendations to optimize and evaluate pain treatment programs. Presenters in this symposium will address each of the above-mentioned lingering challenges by both critically reviewing the available evidence on cognitive biases in children and/ or adults experiencing pain and presenting novel research using innovative study set-ups and unique methods for assessing and modifying cognitive biases in children and adults experiencing pain. [less ▲]

Detailed reference viewed: 24 (4 UL)
Full Text
Peer Reviewed
See detailMonitoring the transaction selection policy of Bitcoin mining pools
Fiz Pontiveros, Beltran UL; Norvill, Robert UL; State, Radu UL

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)

Mining pools are collection of workers that work together as a group in order to collaborate in the proof of work and reduce the variance of their rewards when mining. In order to achieve this, Mining ... [more ▼]

Mining pools are collection of workers that work together as a group in order to collaborate in the proof of work and reduce the variance of their rewards when mining. In order to achieve this, Mining pools distribute amongst the workers the task of finding a block so that each worker works on a different subset of the candidate solutions. In most mining pools the selection of transactions to be part of the next block is performed by the pool manager and thus becomes more centralized. A mining Pool is expected to give priority to the most lucrative transactions in order to increase the block reward however changes to the transaction policy done without notification of workers would be difficult to detect. In this paper we treat the transaction selection policy performed by miners as a classification problem; for each block we create a dataset, separate them by mining pool and apply feature selection techniques to extract a vector of importance for each feature. We then track variations in feature importance as new blocks arrive and show using a generated scenario how a change in policy by a mining pool could be detected. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
See detailLe droit commun et l'avenir du droit luxembourgeois
Kinsch, Patrick UL

in Actes de la Section des sciences morales et politiques (2018), XXI

Le droit commun est un ensemble de règles ordinaires, censées être équilibrées, qui évite le spectaculaire, l’exorbitant, les privilèges. En droit privé, c’est (pour faire bref et un peu inexact) le droit ... [more ▼]

Le droit commun est un ensemble de règles ordinaires, censées être équilibrées, qui évite le spectaculaire, l’exorbitant, les privilèges. En droit privé, c’est (pour faire bref et un peu inexact) le droit du Code civil ; au-delà du droit civil, il existe du droit commun dans toutes les branches du droit, même en droit fiscal. Ne sous-estimons pas le droit commun ; il est précieux. Mais a-t-il un véritable avenir au Luxembourg ? Il a quelques alliés, il est vrai : le contrôle de la constitutionnalité des lois, et le contrôle des clauses abusives dans les contrats. Deux puissants facteurs jouent cependant contre lui : 1° le manque, paradoxal mais réel, de ressources qui permettraient de faire évoluer le droit commun, en particulier sur le plan législatif ; 2° le souhait de le remplacer par du droit dérogatoire (et compétitif dans le marché international des normes), qui n’a aucune des caractéristiques, rappelées ci-dessus, du droit commun. [less ▲]

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailDevelopment of a Data-Driven Approach based on Kalman filtering for CFD Reactor Analysis
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in PHYSOR 2018 (2018)

In the last several years, computer-based simulation has become an important analysis and design tool in many engineering fields. The common practice involves the use of low-fidelity models, which in most ... [more ▼]

In the last several years, computer-based simulation has become an important analysis and design tool in many engineering fields. The common practice involves the use of low-fidelity models, which in most cases are able to provide fairly accurate results while maintaining a low computational cost. However, for complex systems such as nuclear reactors, more detailed models are required for the in-depth analysis of the problem at hand, due for example to the complex geometries of the physical domain. Nevertheless, such models are affected by potentially critical uncertainties and inaccuracies. In this context, the use of data assimilation methods such as the Kalman filter to integrate local experimental data witihin the numerical model looks very promising as a high-fidelity analysis tool. In this work, the focus is the application of such methods to the problem of fluid-dynamics analysis of the reactor. Indeed, in terms of nuclear reactor investigation, a detailed characterization of the coolant behaviour within the reactor core is of manda- tory importance in order to understand, among others, the operating conditions of the system, and the potential occurrence of accident scenarios. In this context, the use of data assimilation methods allows the extraction of information of the thermo-dynamics state of the system in a benchmarked transitory in order to increase the fidelity of the com- putational model. Conversely to the current application of control-oriented black-box in the nuclear energy community, in this work the integration of the data-driven paradigm into the numerical formulation of the CFD problem is proposed. In particular, the al- gorithm outlined embeds the Kalman filter into a segregated predictor-corrector formu- lation, commonly adopted for CFD analysis. Due to the construction of the developed method, one of the main challenges achieved is the preservation of mass-conservation for the thermo-dynamics state during each time instant. As a preliminary verification, the proposed methodology is validated on a benchmark of the lid-driven cavity. The obtained results highlight the efficiency of the proposed method with respect to the state-of-art low fidelity approach. [less ▲]

Detailed reference viewed: 45 (1 UL)
Full Text
See detailChancen und Barrieren Inklusiver Bildung im Vergleich: Lernen von Anderen
Powell, Justin J W UL

in Schriftenreihe Eine für Alle — Die inklusive Schule für die Demokratie (2018), 3

Das Menschenrecht auf Inklusive Bildung als globale Norm – und als Thema der Bildungsforschung in Deutschland. Die hohe und gestiegene Bedeutung Inklusiver Bildung für Gesellschaften und Individuen wird ... [more ▼]

Das Menschenrecht auf Inklusive Bildung als globale Norm – und als Thema der Bildungsforschung in Deutschland. Die hohe und gestiegene Bedeutung Inklusiver Bildung für Gesellschaften und Individuen wird global, national, regional und lokal von verschiedensten Akteur*innen hervorgehoben und medial sehr breit rezipiert—und zunehmend auch wissenschaftlich multidisziplinär diskutiert. Durch Initiativen wie „Education for All“ (UNESCO, 2015), die Konvention über die Rechte von Menschen mit Behinderung der Vereinten Nationen (UN-BRK, seit 2006), welche inklusive Bildung als Menschenrecht verankert, oder die UN Millennium Development Goals (www.un.org/millenniumgoals) wird das Thema Inklusion verstärkt in Bildungspolitik und -praxis aufgegriffen. Innerhalb einer Dekade haben über 170 Länder die UN-BRK ratifiziert (United Nations, 2017). Artikel 24 definiert Inklusive Bildung als Menschenrecht: „Die Vertragsstaaten (sichern)... den Zugang zu einem inklusiven, hochwertigen und unentgeltlichen Unterricht“ (Art. 24, UN-BRK). Damit wird inklusive Bildung zur globalen Norm und zum einklagbaren Recht entlang des Lebenslaufs. In diesem Beitrag wird anhand ausgewählter Vergleiche aufgezeigt, wie sich die Expansion und Persistenz der schulischen Segregation anstatt der Ausweitung der Inklusion vollzieht. Dabei wurde ein langsamer Wandel statt Transformation dieser komplexen Bildungssysteme konstatiert. Im Ländervergleich wurden immer wieder markante Divergenzen festgestellt, wonach die unterschiedlichen „institutionellen Logiken“ dieser Systeme sichtbar wurden. Abschließend lässt sich festhalten, dass die Förderquote wohl weiter steigen wird wegen größerem Bedarf (oder wahrgenommenen Förderbedarfs), erhöhter Standards und gesteigerter Rechenschaftspflicht als Teile der Governance von Bildung. Sonderpädagogische Förderung nimmt seit Jahrzehnten weltweit zu, oft in Sonderschulen oder -klassen. Es mag paradox erscheinen, dass gleichzeitig sowohl segregierende als auch inklusive Lernumwelten expandieren. Der Grund: Die Verflechtung und Wechselwirkungen zwischen sonderpädagogischen Fördersystemen, allgemeiner Bildung und anderen Institutionen sowie die Interessen der beteiligten Professionen verhindern die Transformation hin zur schulischen Inklusion für alle. Gleichzeitig schreitet dennoch auch in den Bildungssystemen, die hochgradig selektiv und segregiert sind, Inklusive Bildung voran. Vergleichende Forschung verdeutlicht vielfältige Grenzen, aber auch Facilitatoren der Inklusion auf unterschiedlichen Ebenen. Die Ratifizierung der UN-BRK in Deutschland hat die Notwendigkeit unterstrichen, die Bildungssysteme auf Länder- und lokaler Ebene umzubauen und den Wandel zu erforschen. Die UN-BRK stärkt Advokaten der Inklusiven Bildung nachhaltig. Auch aufgrund des Bil- dungsföderalismus wird die Implementierung weiterhin ein schrittweiser, pfadabhängiger Prozess und keine fundamentale Transformation sein. Gerade in föderalen Ländern wie Deutschland und den USA gibt es eine Persistenz einzelstaatlicher Disparitäten trotz (inter-)nationaler Ziele, Normen und völkerrechtlicher Verträge, die es weiter zu untersuchen und zu implementieren gilt. Die Chance, die solche Systeme bieten, ist die Kontrastierung der diversen Pfade hin zur Inklusiven Bildung und die Chance zur Politik der Vielfalt, die zu einer Schule für alle und zur Pädagogik der Vielfalt passt. [less ▲]

Detailed reference viewed: 72 (6 UL)
Full Text
Peer Reviewed
See detailComparison of Several RANS Modelling for the Pavia TRIGA Mark II Research Reactor
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in Journal of Nuclear Engineering and Radiation Science (2018)

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the ... [more ▼]

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the channel thermal-hydraulics of the TRIGA Mark II reactor. Only the steady state behaviour (i.e. the full power stationary operational conditions) of the reactor has been considered. To this end, the RAS (Reynolds-Averaged Simulation) models available in the open source CFD software OpenFOAM have been applied to the most internal channel of the TRIGA and assessed against a Large Eddy Simulation (LES) model. The results of the latter approach, expressed in terms of axial velocity, turbulent viscosity, turbulent kinetic energy, and temperature have been compared with the results obtained by the RAS models available in OpenFOAM (k − ε, k − ω and Reynolds Stress Transport). Heat transfer is taken into account as well by means of the turbulent energy diffusivity parameter. The simulation results demonstrate how, amongst the RAS models, the k − ω SST is the one whose results are closer to the LES simulation. This model seems to be the best one for the treatment of turbulent flow within the TRIGA subchannel, offering a good compromise between accuracy and computational requirements. Since it is much less expensive than an LES model, it can be applied even to full core calculation, in order to obtain accurate results with less computational effort. [less ▲]

Detailed reference viewed: 73 (7 UL)
Full Text
Peer Reviewed
See detailDiscovery and pathogenicity assessment of neuropathology-associated gene variants
Neupert, Lisa-Marie; May, Patrick UL; Kobow, Katja et al

in Epilepsia (2017, December 08), 58(Suppl.5), 174

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term ... [more ▼]

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term epilepsy associated tumors (LEAT). However, evaluation of identified neuropathology associated variants in genetic screens is complex since not all observed variants contribute to the etiology of neuropathologies not even in genuinely disease-associated genes. Here, we critically reevaluated the pathogenicity of 12 previously published disease-related genes and of 79 neuropathology-associated missense variants listed in the PubMed and ClinVar databases. We (1) assessed the evolutionary gene constraint using the pLI and the missense z score, (2) used the latest American College of Medical Genetics and Genomics (ACMG) guidelines, and (3) performed bioinformatic variant pathogenicity prediction analyses using PolyPhen-2, CADD and GERP. Constraint analysis classified only seven out of 12 genes to be likely disease-associated. Furthermore, 78 (89%) of 88 neuropathology-associated missense variants were classified as being of unknown significance (VUS) and only 10 (11%) as being likely pathogenic (LPII). Pathogenicity prediction yielded a discrimination between LPII variants and a discrimination for VUS compared with rare variant scores from individuals present in the Genome Aggregation Database (gnomAD). In summary, our results demonstrate that interpretation of variants associated with neuropathologies is complex while the application of current ACMG guidelines including bioinformatic pathogenicity prediction can help improving variant evaluation. Furthermore, we will augment this set of literature-identified variants at the conference by results from our variant screen using self-generated deep sequencing data in >150 candidate genes in >50 patients not yet analyzed. [less ▲]

Detailed reference viewed: 56 (2 UL)
Full Text
Peer Reviewed
See detailContinuous Improvement of Complex Process Flows by Means of StreaM as the “Standardized Cross-Enterprise Value Stream Management Method”
Oberhausen, Christof UL; Minoufekr, Meysam UL; Plapper, Peter UL

in Proceedings of 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (2017, December)

In numerous sectors and industries worldwide, there is a trend towards an intercompany and often international division of value creation and related work tasks. To overcome the challenges of complex ... [more ▼]

In numerous sectors and industries worldwide, there is a trend towards an intercompany and often international division of value creation and related work tasks. To overcome the challenges of complex cross-enterprise supply chain networks, innovative approaches to visualize, assess and enhance value streams are sought. The StreaM method, which is described in this paper, enables a comprehensive analysis, design and planning of cross-company product and information flows on different levels of value stream detail. At the same time, the entire methodology is based on a common understanding of key symbols, parameters and calculation procedures. In addition, the use of the developed StreaM method and the associated model in a case study proves its practical applicability in an industrial setting. In further validation projects, the transfer of the “Standardized cross-enterprise Value Stream Management Method” to other industry sectors is envisaged to continuously improve energy, trade or service processes. [less ▲]

Detailed reference viewed: 45 (7 UL)
Full Text
Peer Reviewed
See detailCache-Assisted Hybrid Satellite-Terrestrial Backhauling for 5G Cellular Networks
Kalantari, Ashkan; Fittipaldi, Marilena; Chatzinotas, Symeon UL et al

in Proceedings of IEEE Global Communications Conference (2017, December)

Fast growth of Internet content and availability of electronic devices such as smart phones and laptops has created an explosive content demand. As one of the 5G technology enablers, caching is a ... [more ▼]

Fast growth of Internet content and availability of electronic devices such as smart phones and laptops has created an explosive content demand. As one of the 5G technology enablers, caching is a promising technique to off-load the network backhaul and reduce the content delivery delay. Satellite communications provides immense area coverage and high data rate, hence, it can be used for large-scale content placement in the caches. In this work, we propose using hybrid mono/multi-beam satellite-terrestrial backhaul network for off-line edge caching of cellular base stations in order to reduce the traffic of terrestrial network. The off-line caching approach is comprised of content placement and content delivery phases. The content placement phase is performed based on local and global content popularities assuming that the content popularity follows Zipf-like distribution. In addition, we propose an approach to generate local content popularities based on a reference Zipf-like distribution to keep the correlation of content popularity. Simulation results show that the hybrid satellite-terrestrial architecture considerably reduces the content placement time while sustaining the cache hit ratio quite close to the upper-bound compared to the satellite-only method. [less ▲]

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailComputationally Efficient Symbol-Level Precoding Communications Demonstrator
Merlano Duncan, Juan Carlos UL; Krivochiza, Jevgenij UL; Andrenacci, Stefano UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2017, October)

We present a precoded multi-user communication test-bed to demonstrate forward link interference mitigation techniques in a multi-beam satellite system scenario which will enable a full frequency reuse ... [more ▼]

We present a precoded multi-user communication test-bed to demonstrate forward link interference mitigation techniques in a multi-beam satellite system scenario which will enable a full frequency reuse scheme. The developed test-bed provides an end-to-end precoding demonstration, which includes a transmitter, a multi-beam satellite channel emulator and user receivers. Each of these parts can be reconfigured accordingly to the desired test scenario. Precoded communications allow full frequency reuse in multiple-input multiple-output (MIMO) channel environments, where several coordinated antennas simultaneously transmit to a number of independent receivers. The developed real-time transmission test-bed assist in demonstrating, designing and benchmarking of the new Symbol-Level Precoding (SLP) techniques, where the data information is used, along with the channel state information, in order to exploit the multi-user interference and transform it into useful power at the receiver side. The demonstrated SLP techniques are designed in order to be computationally efficient, and can be generalized to others multi-channel interference scenarios. [less ▲]

Detailed reference viewed: 85 (20 UL)
Full Text
Peer Reviewed
See detailHow Could an Intranet be Like a Friend to Me?: Why Standardized UX Scales Don't Always Fit
Lallemand, Carine UL; Koenig, Vincent UL

in Proceedings of the European Conference on Cognitive Ergonomics 2017 (2017, October)

"I hope that this survey is a joke because it made me laugh so much". This quote is just one example of many negative respondents' reactions gathered during a large-scale user experience (UX) study ... [more ▼]

"I hope that this survey is a joke because it made me laugh so much". This quote is just one example of many negative respondents' reactions gathered during a large-scale user experience (UX) study. Unfortunately, the survey was no joke, rather a well-constructed and validated standardized UX scale. This paper critically reflects on the use and relevance of standardized UX scales for the evaluation of UX in business contexts. We report on a real-world use case where the meCUE questionnaire has been used to assess employees' experience (N=263) with their organization's intranet. Strong users' reactions to the survey's items and statistical analyses both suggest that the scale is unsuitable for the evaluation of business-oriented systems. Drawing on the description of this inadequacy, we discuss the quality of academic UX tools, calling into question the relevance for practice of academic methods. [less ▲]

Detailed reference viewed: 84 (10 UL)
Full Text
Peer Reviewed
See detailEstimating Urban Road Traffic States Using Mobile Network Signaling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Viti, Francesco UL et al

in Abstract book of the 20th International Conference on Intelligent Transportation Systems (2017, October)

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]

Detailed reference viewed: 190 (16 UL)
Full Text
Peer Reviewed
See detailDiscretisation and Model Selection for Interface Problems in Mechanics
Bordas, Stéphane UL

in International Journal of Computational Methods (2017, August 04)

Detailed reference viewed: 60 (6 UL)
Full Text
Peer Reviewed
See detailQuery-able Kafka: An agile data analytics pipeline for mobile wireless networks
Falk, Eric UL; Gurbani, Vijay K.; State, Radu UL

in Proceedings of the 43rd International Conference on Very Large Data Bases 2017 (2017, August), 10

Due to their promise of delivering real-time network insights, today's streaming analytics platforms are increasingly being used in the communications networks where the impact of the insights go beyond ... [more ▼]

Due to their promise of delivering real-time network insights, today's streaming analytics platforms are increasingly being used in the communications networks where the impact of the insights go beyond sentiment and trend analysis to include real-time detection of security attacks and prediction of network state (i.e., is the network transitioning towards an outage). Current streaming analytics platforms operate under the assumption that arriving traffic is to the order of kilobytes produced at very high frequencies. However, communications networks, especially the telecommunication networks, challenge this assumption because some of the arriving traffic in these networks is to the order of gigabytes, but produced at medium to low velocities. Furthermore, these large datasets may need to be ingested in their entirety to render network insights in real-time. Our interest is to subject today's streaming analytics platforms --- constructed from state-of-the art software components (Kafka, Spark, HDFS, ElasticSearch) --- to traffic densities observed in such communications networks. We find that filtering on such large datasets is best done in a common upstream point instead of being pushed to, and repeated, in downstream components. To demonstrate the advantages of such an approach, we modify Apache Kafka to perform limited \emph{native} data transformation and filtering, relieving the downstream Spark application from doing this. Our approach outperforms four prevalent analytics pipeline architectures with negligible overhead compared to standard Kafka. [less ▲]

Detailed reference viewed: 53 (6 UL)
Full Text
Peer Reviewed
See detailMulti-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networks
Merlano Duncan, Juan Carlos UL; Krishna Sharma, Shree; Chatzinotas, Symeon UL et al

in Proceedings of IEEE International Conference on Communications (ICC) 2017 (2017, July 31)

Cognitive Radio (CR) communication has been considered as one of the promising technologies to enable dynamic spectrum sharing in the next generation of wireless networks. Among several possible enabling ... [more ▼]

Cognitive Radio (CR) communication has been considered as one of the promising technologies to enable dynamic spectrum sharing in the next generation of wireless networks. Among several possible enabling techniques, Spectrum Sensing (SS) is one of the key aspects for enabling opportunistic spectrum access in CR Networks (CRN). From practical perspectives, it is important to design low-complexity wideband CR receiver having low resolution Analog to Digital Converter (ADC) working at a reasonable sampling rate. In this context, this paper proposes a novel spatio-temporal wideband SS technique by employing multiple antennas and one-bit quantization at the CR node, which subsequently enables the use of a reasonable sampling rate. In our analysis, we show that for the same sensing performance requirements, the proposed wideband receiver can have lower power consumption than the conventional CR receiver equipped with a single-antenna and a high-resolution ADC. Furthermore, the proposed technique exploits the spatial dimension by estimating the direction of arrival of Primary User (PU) signals, which is not possible by the conventional SS methods and can be of a significant benefit in a CRN. Moreover, we evaluate the performance of the proposed technique and analyze the effects of one-bit quantization with the help of numerical results. [less ▲]

Detailed reference viewed: 44 (7 UL)
Full Text
Peer Reviewed
See detailOn the Unknown Input Functional Observer Design via Polytopic Lyapunov Function: Application to a Quadrotor Aerial Robots Landing
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in IFAC-PapersOnLine (2017, July)

In this paper, a constructive procedure to design functional unknown input observer for nonlinear continuous time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems ... [more ▼]

In this paper, a constructive procedure to design functional unknown input observer for nonlinear continuous time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems) is proposed. Applying the Lyapunov theory, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain observer design matrices. To reject the effect of unknown input, classical approach of decoupling the unknown input for the linear case is used. A comparative study between single and Polytopic Lyapunov function is made in order to prove the relaxation effect of the Multiple functions. A solver based solution is then proposed. It will be shown through applicative example (a Quadrotor Aerial Robots Landing) that even if the proposed LMIs solver based solution may look conservative, an adequate choice of the solver makes it suitable for the application of the proposed approach. [less ▲]

Detailed reference viewed: 32 (6 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial?
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in Proceedings of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2017, July)

Detailed reference viewed: 74 (18 UL)
Full Text
Peer Reviewed
See detailEffectiveness of the Two-Step Dynamic Demand Estimation model on large networks
Cantelmo, Guido UL; Viti, Francesco UL; Derrmann, Thierry UL

in Proceedings of 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS) (2017, June 28)

In this paper, the authors present a Two-Step approach that sequentially adjusts generation and distribution values of the (dynamic) OD matrix. While the proposed methodology already provided excellent ... [more ▼]

In this paper, the authors present a Two-Step approach that sequentially adjusts generation and distribution values of the (dynamic) OD matrix. While the proposed methodology already provided excellent results for updating demand flows on a motorway, the aim of this paper is to validate this conclusion on a real network: Luxembourg City. This network represents the typical middle-sized European city in terms of network dimension. Moreover, Luxembourg City has the typical structure of a metropolitan area, composed of a city centre, ring, and suburb areas. An innovative element of this paper is to use mobile network data to create a time-dependent profile of the generated demand inside and outside the ring. To support the claim that the model is ready for practical implementation, it is interfaced with PTV Visum, one of the most widely adopted software tools for traffic analysis. Results of these experiments provide a solid empirical ground in order to further develop this model and to understand if its assumptions hold for urban scenarios. [less ▲]

Detailed reference viewed: 66 (11 UL)
Full Text
Peer Reviewed
See detailRare variant analysis of the PPMI dataset to uncover the complex genetic architecture of Parkinson’s disease
Bobbili, Dheeraj Reddy UL; May, Patrick UL; Krüger, Rejko UL

in Movement Disorders : Official Journal of the Movement Disorder Society (2017, June 02), 322(Supplement S2), 405

Objective: To unravel the genetic factors that play a role in PD we used the whole exome sequencing data available as a part of Parkinson Progression Markers Initiative (PPMI). Background: Parkinson’s ... [more ▼]

Objective: To unravel the genetic factors that play a role in PD we used the whole exome sequencing data available as a part of Parkinson Progression Markers Initiative (PPMI). Background: Parkinson’s disease (PD) is a complex disease. Besides variants in high-risk genes such as LRRK2 and PARK2, multiple genes associated to sporadic PD were discovered via genome-wide association studies. Yet, there is a large number of genetic factors that need to be deciphered. Methods: To unravel the genetic factors that play a role in PD we used the whole exome sequencing data available as a part of Parkinson Progression Markers Initiative (PPMI). The dataset comprised of 435 PD cases and 162 ethnically matched controls, respectively. We performed burden tests at single variant, gene and geneset levels on common and rare exonic and splice-variants. We also looked for severity of rare highly deleterious variants (CADD phred score>30) using the CADD score as well as singleton (variants seen in only one individual across cases and controls) rare variants. Additionally, we performed the functional enrichment analysis with the genes harboring rare highly deleterious variants (case uniq genes) that are only present in cases. Results: We observed an increased mutational burden of singleton variants in PD cases compared to the controls in nonsynonymous+LOF variants (empirical P-value 0.005) but not in the synonymous variants (empirical P-value 0.09). We observed a higher significant burden (P-value 0.028) as well as higher significant severity (empirical P-value 0.027) of rare, highly deleterious nonsynonymous variants, but not in the synonymous variants of the candidate genes (P-value 0.686, empirical P-value 0.556 for burden and severity respectively). The network analysis of genes having deleterious variants only present in cases (Case uniq) showed a significant increase in connectivity compared to random networks (P-value 0.0002). Pathway analysis of those genes showed a significant enrichment of pathways and biological process implicated in the nervous system functioning and the etiology of PD. Conclusions: Our study supports the complex disease notion of PD by highlighting the convoluted architecture of PD where case uniq genes including LRRK2 are implicated in several biological processes and pathways related to PD. The main finding of this study is to discover the complex genetics of PD at an exome wide level. [less ▲]

Detailed reference viewed: 160 (26 UL)
Full Text
Peer Reviewed
See detailSpectral-Efficient Model for Multiuser Massive MIMO: Exploiting User Velocity
Vu, Thang Xuan UL; Trinh, Anh Vu; Chatzinotas, Symeon UL et al

in IEEE international Conference on Communications (2017, May)

Detailed reference viewed: 40 (2 UL)
Full Text
Peer Reviewed
See detailOn the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE International Conference on Communications (2017, May)

Detailed reference viewed: 36 (3 UL)
Full Text
Peer Reviewed
See detailA contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017) (2017, May)

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection ... [more ▼]

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection attacks, is used for controller synthesis. Based on the classical fault tolerant detection (FTD) tools, a residual generator for attack/fault detection based on observers is proposed. An event-triggered and Bilinear Matrix Inequality (BMI) implementation is proposed in order to achieve novel and better security strategy. The purpose in using this implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. It is important to note that the main contribution of this paper is to establish the adequate event-triggered and BMI-based methodology so that the particular structure of the mixed attacked/faulty structure can be re-formulated within the classical FTD paradigm. Experimental results are given to illustrate the developed approach efficiency on a pilot three-tank system. The plant model is presented and the proposed control design is applied to the system. [less ▲]

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailAutomatically Locating Malicious Packages in Piggybacked Android Apps
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

in Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017) (2017, May)

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼]

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. [less ▲]

Detailed reference viewed: 177 (22 UL)
Full Text
Peer Reviewed
See detailUnknown Input Functional Observers Design for Polytopic Discrete Time Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohemed

in Proceedings of 6th IEEE International Conference on Systems and Control (ICSC) 2017 (2017, May)

In this paper, a step by step algorithm is given to design functional unknown input observer for nonlinear discrete time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models ... [more ▼]

In this paper, a step by step algorithm is given to design functional unknown input observer for nonlinear discrete time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems). Applying the Lyapunov theory and the L2 attenuation, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain observer design matrices. To reject the effect of unknown input, classical approach of decoupling the unknown input for the linear case is used. A solver based solution is proposed. The novelty of the proposed approach consists in solving simultaneously both structural constraints and LMIs, which ensure a mean for the efficient design of the gains of the observers. To illustrate the proposed theoretical results, an application example of model reference tracking control applied to an electro-mechanical model of a motor with a time varying parameter is discussed. [less ▲]

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailDetecting the "Big Red Spot" of age-period excess mortality in 25 countries: Age-period-cohort residual analysis
Chauvel, Louis UL; Leist, Anja UL; Smith, Herbert

in PAA Server (2017, April 28)

In times of wide availability of yearly mortality information of age and period groups all over the world, we lack in tools that detect and graph fine-grained deviations from mortality trends. We provide ... [more ▼]

In times of wide availability of yearly mortality information of age and period groups all over the world, we lack in tools that detect and graph fine-grained deviations from mortality trends. We provide a new age-period-cohort based methodology, combining information from age-period (AP) and APC-Detrended (APCD) analyses to detect all-cause mortality increases. Plotting the resulting AP coefficients and APCD residuals in equilateral Lexis diagrams, mortality patterns can easily be distinguished as age, period, or cohort trends and fluctuations. Additionally, we detect abnormalities as interactions of age and period (‘big red spots’). We then investigate the ‘red spots’ of mortality of young-adult cohorts in the early 1990s in Spain, other southern European countries and the U.S. to delineate their simultaneously occurring public health crises. Additional analyses with WHO mortality data show that mortality increases are mostly due to increased HIV/AIDS mortality. We discuss possible applications of the new method. [less ▲]

Detailed reference viewed: 139 (8 UL)
Full Text
Peer Reviewed
See detailToward an in-depth understanding of binge-watching behavior: a qualitative approach with focus group
Flayelle, Maèva UL; Maurage, Pierre; Billieux, Joël

in Journal of behavioral addictions (2017, March), 6 (Suppl.1)

Detailed reference viewed: 116 (6 UL)
Full Text
Peer Reviewed
See detailCoping with turn-taking:Investigating breakdowns in human-robot interaction from a Conversation Analysis (CA) perspective
Arend, Béatrice UL; Sunnen, Patrick UL

in Proceedings: The 8th International Conference on Society and Information Technologies (2017, March)

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailDiskursivität und Einheit des Bewusstseins bei Kant
Heidemann, Dietmar UL

in Kant-Studien (2017)

Im ersten Abschnitt des Beitrags wird der Zusammenhang von Kantischer Begriffslehre und Theorie des transzendentalen Selbstbewusstseins transparent gemacht. Die Einheit des Bewusstseins, so wird die ... [more ▼]

Im ersten Abschnitt des Beitrags wird der Zusammenhang von Kantischer Begriffslehre und Theorie des transzendentalen Selbstbewusstseins transparent gemacht. Die Einheit des Bewusstseins, so wird die Rekonstruktion dieses Zusammenhanges ergeben, gründet in der Theorie des diskursiven Begriffs. Die dabei herausgearbeitete Konzeption der diskursiven Identität wird dann im zweiten Abschnitt anhand des dritten Paralogismus der ersten Auflage der Kritik der reinen Vernunft mit dem Begriff der personalen Identität kontrastiert, um zu zeigen, warum der auch hier bestehende konstitutive Zusammenhang zwischen kognitiver Einheit und Identität des Bewusstseins zu keiner spezifischen Erkenntnis hinsichtlich des Bewusstseins führt. Während die transzendentale Deduktion die Theorie nichtzeitlicher, logischer Einheit und diskursiver Identität der transzendentalen Apperzeption entfaltet, thematisiert der dritte Paralogismus das mentale Phänomen kontingenter, temporaler Einheit und damit personaler Identität. Über die prinzipiellen Bedeutungsunterschiede dieser beiden Konzeptionen von Einheit und Identität im Bereich des Mentalen ist Klarheit zu schaffen. Der Schlussteil widmet sich einigen naheliegenden Einwänden gegen den in diesem Beitrag entwickelten Interpretationsvorschlag. Insbesondere wird eine Kritik an der hier verteidigten Diskursivitätsthese diskutiert, derzufolge die Einheit des Bewusstseins in der Diskursivität des Verstandes bzw. Begriffs und nicht umgekehrt die Diskursivität des Verstandes bzw. des Begriffs in der Einheit des Bewusstseins gründet [less ▲]

Detailed reference viewed: 277 (8 UL)
Full Text
Peer Reviewed
See detailStationary Wavelet Transform for denoising Pulsed Thermography data: optimization of wavelet parameters for enhancing defects detection
Revel, Gian Marco; Copertaro, Edoardo UL; Chiariotti, Paolo et al

in Quantitative Infra Red Thermography Journal (2017)

Innovative denoising techniques based on Stationary Wavelet Transform (SWT) have started being applied to Pulsed Thermography (PT) sequences, showing marked potentialities in improving defect detection ... [more ▼]

Innovative denoising techniques based on Stationary Wavelet Transform (SWT) have started being applied to Pulsed Thermography (PT) sequences, showing marked potentialities in improving defect detection. In this contribution, a SWT-based denoising procedure is performed on high and low resolution PT sequences. Samples under test are two composite panels with known defects. The denoising procedure undergoes an optimization step. An innovative criterion for selecting the optimal decomposition level in multi-scale SWT-based denoising is proposed. The approach is based on a comparison, in the wavelet domain, of the information content in the thermal image with noise propagated. The optimal wavelet basis is selected according to two performance indexes, respectively based on the probability distribution of the information content of the denoised frame, and on the Energy-to-Shannon Entropy ratio. After the optimization step, denoising is applied on the whole thermal sequence. The approximation coefficients at the optimal level are moved to the frequency domain, then low-pass filtered. Linear Minimum Mean Square Error (LMMSE) is applied to detail coefficients at the optimal level. Finally, Pulsed Phase Thermography (PPT) is performed. The performance of the optimized denoising method in improving the defect detection capability respect to the non-denoised case is quantified using the Contrast Noise Ratio (CNR) criterion. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailAn comprehensive and cost-efficient approach in assessing WWTP's degradation performance of xenobiotics
Köhler, Christian; Gallé, Tom; Bayerle, Michael et al

in Proceeding of 10th Micropol & Ecohazard Conference 2017 (2017)

Detailed reference viewed: 53 (22 UL)
Full Text
Peer Reviewed
See detailNovel C-ITS support for Electric Buses with Opportunity Charging
Seredynski, Marcin; Viti, Francesco UL

in Proceedings of IEEE-ITS Conference (2017)

Detailed reference viewed: 33 (4 UL)
Full Text
Peer Reviewed
See detailSimiDroid: Identifying and Explaining Similarities in Android Apps
Li, Li UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2017)

App updates and repackaging are recurrent in the Android ecosystem, filling markets with similar apps that must be identified and analysed to accelerate user adoption, improve development efforts, and ... [more ▼]

App updates and repackaging are recurrent in the Android ecosystem, filling markets with similar apps that must be identified and analysed to accelerate user adoption, improve development efforts, and prevent malware spreading. Despite the existence of several approaches to improve the scalability of detecting repackaged/cloned apps, researchers and practitioners are eventually faced with the need for a comprehensive pairwise comparison to understand and validate the similarities among apps. This paper describes the design of SimiDroid, a framework for multi-level comparison of Android apps. SimiDroid is built with the aim to support the understanding of similarities/changes among app versions and among repackaged apps. In particular, we demonstrate the need and usefulness of such a framework based on different case studies implementing different analysing scenarios for revealing various insights on how repackaged apps are built. We further show that the similarity comparison plugins implemented in SimiDroid yield more accurate results than the state-of-the-art. [less ▲]

Detailed reference viewed: 109 (7 UL)
Full Text
Peer Reviewed
See detailBoard Game Prototyping to Co-Design a Better Location-Based Digital Game
Jones, Catherine UL; Liapis; Lykourentzou, Ioanna et al

in Abstract book of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '17 (2017)

In this case study we describe the iterative process of paper prototyping, using a board game, to co-design a location-based mobile application. The end goal of the application is to motivate reflection ... [more ▼]

In this case study we describe the iterative process of paper prototyping, using a board game, to co-design a location-based mobile application. The end goal of the application is to motivate reflection on historical topics about migration. The board game serves to capture the core concerns of this application by simulating movement through the city. Three play tests highlighted the users' interest and issues with the historical content, the way this content is represented, and the players' responses to the interactions and motivating mechanisms of the application. Results show that the board game helped capture important design preferences and problems, ensuring the improvement of our scenario. This feedback can help reduce development effort and implement a future technology prototype closer to the needs of our end users. [less ▲]

Detailed reference viewed: 35 (4 UL)
Full Text
Peer Reviewed
See detailLanguage ecology as a centripetal force for the multilingual workplace
Ehrhart, Sabine UL

in Bulletin Suisse de Linguistique Appliquée (2017)

In this contribution, I will present examples of common practice to overcome barriers, bridge boundaries and deconstruct borders at the workplace; these are centripetal or democratizing forces as they try ... [more ▼]

In this contribution, I will present examples of common practice to overcome barriers, bridge boundaries and deconstruct borders at the workplace; these are centripetal or democratizing forces as they try to reduce the distance between people of different origins by creating inclusive spaces. My contribution to a comparative perspective comes from the field of ecolinguistics, a rather new discipline which tries to combine various interdisciplinary approaches in the field of communication, especially in complex environments, with a high diversity of linguistic systems [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailConfirmation Delay Prediction of Transactions in the Bitcoin Network
Fiz Pontiveros, Beltran UL; Hommes, Stefan UL; State, Radu UL

in Advances in Computer Science and Ubiquitous Computing (2017)

Bitcoin is currently the most popular digital currency. It operates on a decentralised peer-to-peer network using an open source cryptographic protocol. In this work, we create a model of the selection ... [more ▼]

Bitcoin is currently the most popular digital currency. It operates on a decentralised peer-to-peer network using an open source cryptographic protocol. In this work, we create a model of the selection process performed by mining pools on the set of unconfirmed transactions and then attempt to predict if an unconfirmed transaction will be part of the next block by treating it as a supervised classification problem. We identified a vector of features obtained through service monitoring of the Bitcoin transaction network and performed our experiments on a publicly available dataset of Bitcoin transaction. [less ▲]

Detailed reference viewed: 25 (4 UL)
Full Text
Peer Reviewed
See detailEntwicklung einer Regelungsstrategie eines PVT-basierten Wärmepumpensystems auf der Basis von CO2 Direktverdampfung
Rullof, Johannes UL; Lambers, Klaus Jürgen; Blieske, Ulf et al

in Proceedings of Deutsche Kälte- und Klimatagung (DKV) (2017)

Bereits Ende der 1970iger Jahre wurden Wärmepumpen in Kombination mit glykolbasierten großflächigen kombinierten Strahlungs-Umweltwärme-Absorber als Verdampfer entwickelt, welche sich im Vergleich zu ... [more ▼]

Bereits Ende der 1970iger Jahre wurden Wärmepumpen in Kombination mit glykolbasierten großflächigen kombinierten Strahlungs-Umweltwärme-Absorber als Verdampfer entwickelt, welche sich im Vergleich zu zwangskonvektions-basierten Luft-Wärmepumpen nicht nur die Umgebungsenergie, sondern auch die Solar-energie als Energiequelle zu Nutze machen. Aufgrund der nach der Ölkrise fallenden Ölpreise, der meist noch nicht wirtschaftlichen Anlagentechnik und der benötigten großen Absorberflächen konnten sich diese Anlagen nicht durchsetzen. Durch die starke Reduzierung des Heizwärmebedarfs eines Neubaus werden heutzutage deutlich kleinere Absorberflächen in Kombination mit einer Wärmepumpe benötigt, was die Systemkombination aus Wärmepumpe und Absorber aktuell wieder interessant werden lässt. Vor allem die Kombination aus thermi-schem Absorber, basierend auf freier Konvektion und Strahlung, und Photovoltaik (PV) in einem Modul (PVT-Modul) kann aufgrund der Reduzierung des Heizwärmebedarfs von Gebäuden und des verstärkten Betriebs von Wärmepumpen während der solarstrombedingten Niedrigstrompreiszeiten am Tage und dem damit verbunde-nen höheren Strahlungsanteil der Umweltwärme zukünftig eine Alternative zu zwangskonvektions-basierten Luft-Wärmepumpen sein. Der Beitrag beschäftigt sich mit einem CO2-Wärmepumpensystem, bestehend aus einem neuartigen PVT-Modul, welches einen mikrokanal-basierten Verdampfer einer CO2-Wärmepumpe mit einem PV-Modul vereint (PVT-direkt). Um die Machbarkeit des neuartigen PVT-direkt-Wärmepumpensystems zu demonstrieren, wird im Rah-men eines Forschungsprojekts ein funktionsfähiges PVT-direkt-Modul konstruiert und schließlich als Teil eines CO2-Wärmepumpensystems getestet und modelliert. Die Leistung eines PVT-basierten Wärmepumpensystems ist stark von klimatischen Randbedingungen abhängig. Im Rahmen dieser Arbeit wird die Entwicklung einer Regelungsstrategie eines PVT-basierten Wärmepumpensys-tems präsentiert, welche die Solarstrahlung, Umgebungstemperatur, Windgeschwindigkeit, Verdampfungstem-peratur und Verdichterleistung berücksichtigt. Zusätzlich werden die reale Antriebsleistung und der optimale Betriebspunkt des Verdichters einschließlich des optimalen Hochdruckes berücksichtigt. Die entwickelte Rege-lungsstrategie der PVT-basierten Wärmepumpe sieht verschiedene Betriebsmodi in Abhängigkeit von dem So-larstrahlungsangebot sowie der Umgebungstemperatur vor. Der Betrieb der Wärmepumpe erfolgt zwischen Deckung des Heizbedarfs in der Heizperiode und möglichst hoher Effizienz in Zeiten hoher Einstrahlungswerte und hoher Umgebungstemperaturen. [less ▲]

Detailed reference viewed: 63 (6 UL)
Full Text
Peer Reviewed
See detailIDENTIFICATION OF A RARE GENE VARIANT THAT IS ASSOCIATED WITH FAMILIAL ALZHEIMER DISEASE AND REGULATES APP EXPRESSION
Hartl, Daniela; May, Patrick UL; Gu, Wei UL et al

in Alzheimer's & Dementia : The Journal of the Alzheimer's Association (2017), 13(7, Supplement), 648

Background Genetic mutations leading to familial forms of Alzheimer disease (AD) have so far been reported for a few genes including APP, PSEN1 and PSEN2, UNC5C, PLD3, ABCA7, TTC3, and possibly ADAM10 ... [more ▼]

Background Genetic mutations leading to familial forms of Alzheimer disease (AD) have so far been reported for a few genes including APP, PSEN1 and PSEN2, UNC5C, PLD3, ABCA7, TTC3, and possibly ADAM10. With the advent of whole exome and whole genome sequencing approaches new genes and mutations are likely to be identified. Methods We analyzed the genetic cause of AD in a large multiplex family with an autosomal-dominant pattern of inheritance with LOAD. The family lacked pathogenic mutations of known AD genes. We performed whole-genome sequencing (WGS) in six family members (two affected and four unaffected) and prioritized rare, potential damaging, variants that segregated with disease. Variants were further characterized by subsequent molecular analyzes in human brain and cell culture models. Results We identified a single rare nonsynonymous variant co-segregating with AD. The mutation inhibits pro-protein cleavage and the formation of the active enzyme, thus leading to a loss-of-function of the gene. We further found a strong negative correlation between the identified gene and APP gene expression in human brain and in cells over-expressing the gene. The negative regulation of APP expression was only observed for the wt gene, but not for mutated forms, thus causing beside the loss of enzyme function a decoupling of both APPexpression and subsequent beta-amyloid formation. The identity of the gene will be presented on the conference. Conclusions This novel pathway strongly supports a causative association of the identified gene with the pathogenesis of AD. [less ▲]

Detailed reference viewed: 116 (16 UL)
Full Text
Peer Reviewed
See detailCognitive inequalities in later life: Cross-country differences in the education-cognition gradient
Leist, Anja UL

in Innovation in Aging (Gerontological Society of America) (2017), 1(Suppl. 1), 16

Detailed reference viewed: 30 (5 UL)
Full Text
Peer Reviewed
See detailOn characterizing the relationship between route choice behavior and optimal traffic control solution space
Rinaldi, Marco UL; Tampère, C. M. J.; Viti, Francesco UL

in Transportation Research Procedia (2017), 23

Explicitly including the dynamics of users' route choice behaviour in optimal traffic control applications has been of interest for researchers in the last five decades. This has been recognized as a very ... [more ▼]

Explicitly including the dynamics of users' route choice behaviour in optimal traffic control applications has been of interest for researchers in the last five decades. This has been recognized as a very challenging problem, due to the added layer of complexity and the considerable non-convexity of the resulting problem, even when dealing with simple static assignment and analytical link cost functions. In this work we establish a direct behavioural connection between the different shapes and structures emerging in the solution space of such problems and the underlying route choice behaviour. We specifically investigate how changes in the active equilibrium route set exert direct influence on the solution space's structure and behaviour. Based on this result, we then formulate and validate a constrained version of the original problem, yielding desirable properties in terms of solution space regularity. © 2017 The Authors. [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailPour une redéfinition dynamique des relations entre comtes et abbayes (fin IXe – fin XIe siècle). Conclusions
Margue, Michel UL

in Trajectoires. Travaux des jeunes chercheurs du CIERA (2017), Hors série n° 2

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailLES-VOF SIMULATIONS OF A PURE WATER JET DEVELOPING INSIDE AN AWJC NOZZLE: PRELIMINARY OBSERVATIONS AND GUIDELINES
Pozzetti, Gabriele UL; Peters, Bernhard UL

in 2017 WJTA-IMCA Conference Proceedings (2017)

In this work, a numerical approach to predict the behavior of a pure water jet developing inside a nozzle for Abrasive Water Jet Cutting (AWJC) is investigated. In a standard AWJC configuration, the water ... [more ▼]

In this work, a numerical approach to predict the behavior of a pure water jet developing inside a nozzle for Abrasive Water Jet Cutting (AWJC) is investigated. In a standard AWJC configuration, the water jet carries the major energy content of the entire system, and is responsible for accelerating abrasive particles that will perform the cutting action of hard materials. Therefore an accurate simulation of a pure water jet can bring significant insight on the overall AWJC process. Capturing the behavior of a multiphase high-speed flow in a complex geometry is however particularly challenging. In this work, we adopt a combined approach based on the Volume of Fluid (VOF) and Large Eddy Simulation (LES) techniques in order to respectively capture the water/air interface and to model turbulent structures of the flow. The aim of this contribution is to investigate how the two techniques apply to the specific problem, and to offer general guidelines for practitioners willing to adopt them. Costs considerations will be then presented with particular reference to the usage of the OpenFOAM® environment. The reported results are meant to provide guidance for AWJ applications and future developments of AWJ nozzles. [less ▲]

Detailed reference viewed: 49 (6 UL)
Full Text
Peer Reviewed
See detailAffective evaluation of body images in anorexia nervosa
Lutz, Annika UL; Herbert, Cornelia; Schulz, André UL et al

in Psychophysiology (2017), 54(S1),

Anorexia nervosa is characterized by fear of weight gain. This is reflected in amygdala activation during confrontation with distorted photographs of oneself simulating weight gain. In contrast ... [more ▼]

Anorexia nervosa is characterized by fear of weight gain. This is reflected in amygdala activation during confrontation with distorted photographs of oneself simulating weight gain. In contrast, photographs of emaciated women induce startle attenuation, suggesting a positive valuation of extreme slimness. To combine these findings, we applied an affective startle modulation paradigm containing photos of the participants simulating weight gain and photos simulating weight loss. We assessed eye-blink startle responses via EMG in 20 women with anorexia nervosa (AN; mean age = 25 years; mean BMI = 23) and 20 healthy control women (HC; mean age = 25 years; mean BMI = 23). We were able to replicate affective startle modulation of standard positive, negative, and neutral pictures, except for an absence of startle attenuation for positive pictures in AN. Body images did not modulate the startle response in either group. This was in contrast to the subjective ratings, in which the AN group indicated negative valence and high arousal for distorted body images. The body photographs used in our study emphasized general body shape and it appears that this was not threatening to AN patients. Photos highlighting body details might produce different results. Considering that body image exposure, a frequently used intervention tool for AN, aims at fear reduction through habituation, it is essential to determine which aspects of the body actually elicit fear responses to maximize therapy outcome. [less ▲]

Detailed reference viewed: 97 (4 UL)
Full Text
Peer Reviewed
See detailFast and optimal countermeasure selection for attack defence trees
Muller, Steve UL; Harpes, Carlo; Muller, Cédric

in Lecture Notes in Computer Science (2017), 10224 LNCS

Risk treatment is an important part of risk management, and deals with the question which security controls shall be implemented in order to mitigate risk. Indeed, most notably when the mitigated risk is ... [more ▼]

Risk treatment is an important part of risk management, and deals with the question which security controls shall be implemented in order to mitigate risk. Indeed, most notably when the mitigated risk is low, the costs engendered by the implementation of a security control may exceed its benefits. The question becomes particularly interesting if there are several countermeasures to choose from. A promising candidate for modeling the effect of defensive mechanisms on a risk scenario are attack–defence trees. Such trees allow one to compute the risk of a scenario before and after the implementation of a security control, and thus to weigh its benefits against its costs. A naive approach for finding an optimal set of security controls is to try out all possible combinations. However, such a procedure quickly reaches its limits already for a small number of defences. This paper presents a novel branch-and-bound algorithm, which skips a large part of the combinations that cannot lead to an optimal solution. The performance is thereby increased by several orders of magnitude compared to the pure brute–force version. © 2017, Springer International Publishing AG. [less ▲]

Detailed reference viewed: 19 (5 UL)
Full Text
Peer Reviewed
See detailThermal Model of a Solar Hybrid Module as the Heat Source for a CO2 Heat Pump
Rullof, Johannes UL; Lambers, Klaus Jürgen; Blieske, Ulf et al

in Proceeding of 2017 International Energy and Sustainability Conference (IESC 2016) (2017)

In recent years, the possibility of combining photovoltaics (PV) and solar thermal collectors into one solar hybrid module (PVT-module) has been increasingly investigated. PVT-modules produce thermal and ... [more ▼]

In recent years, the possibility of combining photovoltaics (PV) and solar thermal collectors into one solar hybrid module (PVT-module) has been increasingly investigated. PVT-modules produce thermal and electrical energy at the same time. Since the efficiency of a photovoltaic module decreases with increasing temperature, the temperature of the heat transfer media is often limited to about 30 °C and the PVT-module is combined with a heat pump, which increases the temperature on the “warm side”. A common approach is to integrate the PVT-module directly as an evaporator in a heat pump system (PVT-direct). This paper presents a thermal model of a PVT-direct module as the heat source for a R744/CO2 heat pump. Due to the combined effect of flow channel patterns, solar radia-tion, the ambient conditions and possible condensation and frost formation, heat transfer and thermal distribution conditions of the PVT-direct evaporator are inevitably com-plicated to determine. The proposed thermal model of this hybrid solar module that has CO2 direct evaporation in microchannels will be used to simulate the behavior of the module under different climatic operating conditions. Fur-thermore, it will quantify all energy inputs and/or losses as well as their influence on the total energy supplied by the PVT-module. This will be used to investigate the overall CO2-PVT heat pump system performance in prospective simulations. [less ▲]

Detailed reference viewed: 26 (7 UL)
Full Text
Peer Reviewed
See detailOn the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data
Rial, Alfredo UL

in Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December)

The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute ... [more ▼]

The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute-based encryption (CPABE), has received a lot of attention in the last years. Recently, Jahan et al.~(IEEE 40th Conference on Local Computer Networks, 2015) propose a scheme based on CPABE where users have reading and writing access to the outsourced data. We analyze the scheme by Jahan et al.\ and we show that it has several security vulnerabilities. For instance, the cloud server can get information about encrypted messages by using a stored ciphertext and an update of that ciphertext. As another example, users with writing access are able to decrypt all the messages regardless of their attributes. We discuss the security claims made by Jahan et al.\ and point out the reasons why they do not hold. We also explain that existing schemes can already provide the advantages claimed by Jahan et al. [less ▲]

Detailed reference viewed: 48 (3 UL)
Full Text
Peer Reviewed
See detailTowards Integration on Colored Supermanifolds
Poncin, Norbert UL

in Banach Center Publications (2016, December), 110

Detailed reference viewed: 209 (50 UL)
Full Text
Peer Reviewed
See detailGreen exercise is associated with better cell ageing profiles
Olafsdottir, Gunnthora; Cloke, Paul; Epel, Elissa et al

in The European Journal of Public Health (2016, November 01), 26(Suppl 1), 165021

Detailed reference viewed: 84 (4 UL)
Full Text
Peer Reviewed
See detailPrivacy-preserving Friendship-based Recommender Systems
Tang, Qiang; Wang, Jun UL

in IEEE Transactions on Dependable and Secure Computing (2016, November)

Privacy-preserving recommender systems have been an active research topic for many years. However, until today, it is still a challenge to design an efficient solution without involving a fully trusted ... [more ▼]

Privacy-preserving recommender systems have been an active research topic for many years. However, until today, it is still a challenge to design an efficient solution without involving a fully trusted third party or multiple semitrusted third parties. The key obstacle is the large underlying user populations (i.e. huge input size) in the systems. In this paper, we revisit the concept of friendship-based recommender systems, proposed by Jeckmans et al. and Tang and Wang. These solutions are very promising because recommendations are computed based on inputs from a very small subset of the overall user population (precisely, a user’s friends and some randomly chosen strangers). We first clarify the single prediction protocol and Top-n protocol by Tang and Wang, by correcting some flaws and improving the efficiency of the single prediction protocol. We then design a decentralized single protocol by getting rid of the semi-honest service provider. In order to validate the designed protocols, we crawl Twitter and construct two datasets (FMT and 10-FMT) which are equipped with auxiliary friendship information. Based on 10-FMT and MovieLens 100k dataset with simulated friendships, we show that even if our protocols use a very small subset of the datasets, their accuracy can still be equal to or better than some baseline algorithm. Based on these datasets, we further demonstrate that the outputs of our protocols leak very small amount of information of the inputs, and the leakage decreases when the input size increases. We finally show that he single prediction protocol is quite efficient but the Top-n is not. However, we observe that the efficiency of the Top-n protocol can be dramatically improved if we slightly relax the desired security guarantee. [less ▲]

Detailed reference viewed: 62 (7 UL)
Full Text
See detailReport on the Oberwolfach Workshop "Computations in the Cohomology of Arithmetic Groups"
Rahm, Alexander UL

in Oberwolfach Reports (2016, November)

Explicit calculations play an important role in the theoretical development of the cohomology of groups and its applications. It is becoming more common for such calculations to be derived with the aid of ... [more ▼]

Explicit calculations play an important role in the theoretical development of the cohomology of groups and its applications. It is becoming more common for such calculations to be derived with the aid of a computer. This mini-workshop assembled together experts on a diverse range of computational techniques relevant to calculations in the cohomology of arithmetic groups and applications in algebraic K-theory and number theory with a view to extending the scope of computer aided calculations in this area. [less ▲]

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailOptimising time-series experimental design for modelling of circadian rhythms: the value of transient data
Mombaerts, Laurent UL; Mauroy, Alexandre UL; Goncalves, Jorge UL

in IFAC-PapersOnLine (2016, October)

Circadian clocks consist of complex networks that coordinate the daily cycle of most organisms. In light/dark cycles, the clock is synchronized (or entrained) by the environment, which corresponds to a ... [more ▼]

Circadian clocks consist of complex networks that coordinate the daily cycle of most organisms. In light/dark cycles, the clock is synchronized (or entrained) by the environment, which corresponds to a constant rephasing of the oscillations and leads to a steady state regime. Some circadian clocks are endogenous oscillators with rhythms of about 24-hours that persist in constant light or constant darkness. This operating mechanism with and without entrainment provides flexibility and robustness to the clock against perturbations. Most of the clock-oriented experiments are performed under constant photoperiodic regime, overlooking the transitory regime that takes place between light/dark cycles and constant light or darkness. This paper provides a comparative analysis of the informative potential of the transient time-series data with the other regimes for clock modelling. Realistic data were simulated from 2 experimentally validated plant circadian clock models and sliced into several time windows. These windows represent the different regimes that take place before, meanwhile and after the switch to constant light. Then, a network inference tool was used over each window and its capability of retrieving the ground-truth of the network was compared for each window. The results suggest that including the transient data to the network inference technique significally improves its performance. [less ▲]

Detailed reference viewed: 81 (9 UL)
Full Text
Peer Reviewed
See detailExploiting diversity in future generation satellite systems with optical feeder links
Mengali, Alberto UL; Kayhan, Farbod UL; Shankar, Bhavani UL et al

in Proceedings of the 34TH AIAA INTERNATIONAL COMMUNICATIONS SATELLITE SYSTEMS CONFERENCE (2016, October)

Detailed reference viewed: 98 (5 UL)
Full Text
Peer Reviewed
See detailUAV degradation identification for pilot notification using machine learning techniques
Manukyan, Anush UL; Olivares Mendez, Miguel Angel UL; Bissyande, Tegawendé François D Assise UL et al

in Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016 (2016, September 06)

Unmanned Aerial Vehicles are currently investigated as an important sub-domain of robotics, a fast growing and truly multidisciplinary research field. UAVs are increasingly deployed in real-world settings ... [more ▼]

Unmanned Aerial Vehicles are currently investigated as an important sub-domain of robotics, a fast growing and truly multidisciplinary research field. UAVs are increasingly deployed in real-world settings for missions in dangerous environments or in environments which are challenging to access. Combined with autonomous flying capabilities, many new possibilities, but also challenges, open up. To overcome the challenge of early identification of degradation, machine learning based on flight features is a promising direction. Existing approaches build classifiers that consider their features to be correlated. This prevents a fine-grained detection of degradation for the different hardware components. This work presents an approach where the data is considered uncorrelated and, using machine learning <br />techniques, allows the precise identification of UAV’s damages. [less ▲]

Detailed reference viewed: 57 (19 UL)
Full Text
See detailCrystallographic and optoelectronic properties of the novel thin film absorber Cu2GeS3
Robert, Erika UL; De Wild, Jessica UL; Colombara, Diego UL et al

in Proceedings of SPIE (2016, September)

Detailed reference viewed: 64 (7 UL)
Full Text
Peer Reviewed
See detailCompressive Sensing Based Energy Detector
Lagunas, Eva UL; Sharma, Shree Krishna UL; Chatzinotas, Symeon UL et al

in European Signal Processing Conference (EUSIPCO) (2016, August)

Detailed reference viewed: 87 (11 UL)
Full Text
See detailUmsetzung der Inklusion in der Bildungslandschaft der EU: Anregungen für die Schweiz
Limbach-Reich, Arthur UL

in FACHFORUM SUPPORTED EDUCATION (2016, May 29)

Detailed reference viewed: 78 (2 UL)
Full Text
Peer Reviewed
See detailMMSE Filtering Performance of DH-AF Massive MIMO Relay Systems with Residual Transceiver Impairments
Papazafeiropoulos, Anastasios; Sharma, Shree Krishna UL; Chatzinotas, Symeon UL

in Proceedings of IEEE ICC 2016 (2016, May)

The emerging requirements of the fifth generation (5G) wireless communications are high spectral efficiency, low latency, and ubiquitous coverage. In this direction, Dual-Hop (DH) Amplify-and-Forward (AF ... [more ▼]

The emerging requirements of the fifth generation (5G) wireless communications are high spectral efficiency, low latency, and ubiquitous coverage. In this direction, Dual-Hop (DH) Amplify-and-Forward (AF) relaying has been widely investigated due to its simplicity, low implementation complexity and low transmission delay. However, most existing works assume ideal transceiver hardware which is impractical. In practice, a cost-efficient wireless transceiver has to combat the effects of several inevitable impairments such as high power amplifier nonlinearities, In-phase/Quadrature-phase (I/Q)-imbalance, and oscillator phase noise, which can be only partially compensated using calibration algorithms. In this direction, this paper analyzes the Minimum Mean Square Error (MMSE) filtering performance of a DH-AF Multiple-Input-Multiple-Output (MIMO) wireless system considering the effects of the residual additive impairments at the transmitter and receiver of both hops. Using free probability principles, the MMSE filtering performance of the considered system is studied and a tight lower bound is proposed by taking the effects of residual additive transceiver impairments into account. Our numerical results show that the MMSE filtering performance of the DH-AF massive MIMO relay system significantly degrades and results to saturation in the presence of residual additive transceiver impairments. [less ▲]

Detailed reference viewed: 102 (3 UL)
Full Text
See detailTransmission polarized optical microscopy of short-pitch cholesteric liquid crystal shells
Geng, Yong UL; Noh, Junghyun UL; Lagerwall, Jan UL

in Proceedings of SPIE - The International Society for Optical Engineering (2016, March 07), 9769

We recently demonstrated that colloidal crystal arrangements of monodisperse droplets or shells of planar-aligned cholesteric liquid crystal exhibit intricate patterns of circularly polarized reflection ... [more ▼]

We recently demonstrated that colloidal crystal arrangements of monodisperse droplets or shells of planar-aligned cholesteric liquid crystal exhibit intricate patterns of circularly polarized reflection spots of different colors. The spots appear as a result of photonic cross communication between droplets, hence the patterns reflect the macroscopic arrangement of droplets or shells. Apart from being an interesting optical phenomenon, it offers attractive application opportunities in photonics and beyond, due to the unique characteristics of the patterns. It turns out that the optical quality of shells is much enhanced compared to that of droplets, hence we focus our attention primarily on shells, of varying thickness. Here we analyze and explain the intriguing textures arising when studying planar-aligned short-pitch cholesteric shells in transmission polarizing optical microscopy. In this case, the texture reflects the properties of each individual shell, without any sign of cross communication, yet also this pattern holds some fascinating mysteries. These can only be elucidated by considering all the peculiar optical properties of cholesterics together, as well as the unusual situation given by the spherical shell geometry. [less ▲]

Detailed reference viewed: 96 (6 UL)
Full Text
See detailFostering Reflective Thinking About Information In 5th Graders With Blogs: How Helpful Are Learning Supports?
Thoss, Jennifer; Reuter, Bob UL

in EAPRIL Conference Proceedings (2016, March), (2), 246-257

This study is about fostering media and information literacy and, more precisely, reflective thinking about information in 5th graders. A learning scenario integrating weblogs into a class by providing ... [more ▼]

This study is about fostering media and information literacy and, more precisely, reflective thinking about information in 5th graders. A learning scenario integrating weblogs into a class by providing learning tasks, learning supports and learning resources was elaborated and tested. The class was divided into a test group and a control group, which did not receive learning supports. Over five weeks the pupils ́ degree of reflection was measured by analysing their blog entries by means of pre- defined evaluation criteria. We also observed them while blogging and recorded our impressions. The results showed that, against our expectation, the pupils of the test group were less reflexive in their entries than the ones of the control group. However, we observed that the test group pupils verbally expressed many reflections, which they did not write down. This suggests that our learning scenario comprised of learning tasks, resources and supports promoted reflective thinking about information of all the pupils even if this is not recognisable in their entries. [less ▲]

Detailed reference viewed: 167 (7 UL)
Full Text
See detailDialogic Classroom Talk - Rethinking 'Messy' Classroom Interaction
Arend, Béatrice UL; Sunnen, Patrick UL

in EAPRIL Conference Proceedings (2016, March), (2), 423-434

Over the past decades, dialogic classroom talk has increasingly been acknowledged to be of prime importance for teaching and learning. Many researchers refer to the writings of Mikhail Bakhtin when ... [more ▼]

Over the past decades, dialogic classroom talk has increasingly been acknowledged to be of prime importance for teaching and learning. Many researchers refer to the writings of Mikhail Bakhtin when conceptualising ‘dialogic’ or ‘dialogism’, either as an epistemology or an ontology. In our study we rely on an ontological view of ‘dialogue’ and on the distinction drawn by Bakhtin between ‘authoritative’ and ‘internally persuasive word’ to conduct a sequential analysis (informed by CA) of an extract taken from the film ‘The Class’. Although, the teacher-student interactions at times appear to be ‘messy’ at first sight, our analysis will show that students’ utterances can be considered as an expansion of the subject matter which is accomplished dialogically with their teacher. [less ▲]

Detailed reference viewed: 189 (10 UL)
Full Text
Peer Reviewed
See detailInteroception in anorexia nervosa: evidence at cortical and self-report levels
Lutz, Annika UL; Schulz, André UL; Voderholzer, Ulrich et al

in Appetite (2016), 107

Detailed reference viewed: 93 (0 UL)
Full Text
See detailDe la démocratie au Luxembourg, ou : Pourquoi et jusqu’à quel point les référendums de l’art. 51 § 7 Const. sont-ils décisionnels ?
Heuschling, Luc UL

in Actes de la section des sciences morales et politiques de l'Institut grand-ducal (2016)

Detailed reference viewed: 73 (8 UL)
Full Text
Peer Reviewed
See detailCognitive inequalities in later life: Cross-country differences in the education-cognition gradient
Leist, Anja UL

in Gerontologist (2016), 56(S3), 428-429

Detailed reference viewed: 25 (7 UL)
Full Text
See detailEntwicklung eines PVT-basierten Wärmepumpensystems auf der Basis von CO2 Direktverdampfung
Rullof, Johannes UL; Lambers, Klaus Jürgen; Hadji-Minaglou, Jean-Régis UL et al

in Proceedings of Deutsche Kälte- und Klimatagung (DKV) (2016)

Bereits Ende der 1970’iger Jahren wurden Wärmepumpen in Kombination mit glykolbasierten großflächigen Absorbern entwickelt, welche sich die Umgebungsenergie und Solarenergie als Energiequelle zu Nutze ... [more ▼]

Bereits Ende der 1970’iger Jahren wurden Wärmepumpen in Kombination mit glykolbasierten großflächigen Absorbern entwickelt, welche sich die Umgebungsenergie und Solarenergie als Energiequelle zu Nutze machen. Aufgrund der nach der Ölkrise fallenden Ölpreise, der meist noch nicht wirtschaftlichen Anlagentechnik und den benötigten großen Absorberflächen, konnten sich diese Anlagen nicht durchsetzen. Durch die starke Reduzierung des Heizwärmebedarfs eines heutigen Neubaus werden heutzutage deutlich kleinere Absorberflächen in Kombination mit einer Wärmepumpe benötigt, was die Systemkombination aus Wärmepumpe und Absorber aktuell wieder interessant werden lässt. Vor allem die Kombination aus thermischen Absorber, basierend auf freier Konvektion und Strahlung, und Photovoltaik (PV) in einem Modul (PVT-Modul) kann aufgrund der Reduzierung des Heizwärmebedarfs von Gebäuden und des verstärkten Betriebs von Wärmepumpen während der Niedrigstrompreiszeiten am Tage und dem damit verbundenen höheren Strahlungsanteil der Umweltwärme zukünftig eine Alternative zu zwangskonvektions-basierten Luft-Wärmepumpen sein. Im Rahmen dieser Arbeit wird auf die Konstruktion eines funktionsfähigen PVT-direkt Moduls eingegangen, welches einen mikrokanalbasierten Verdampfer einer transkritischen CO2-Wärmepumpe mit einem PV-Modul kombiniert. Im ersten Teil dieser Arbeit wird ein thermisches Modell des PVT-direkt Moduls hergeleitet, welches in zukünftigen Untersuchungen Anwendung findet, um eine Aussage über die PV-seitige Wirkungsgradsteigerung durch niedrigere Modultemperaturen aufgrund der Kältemittelverdampfung an der Modulrückseite treffen zu können. Der zweite Teil dieser Arbeit präsentiert die Auslegung zweier Verdampfer-Designvarianten (Mäander und Harfendesign) und eine Temperaturverteilungsanalyse. Bei beiden Konzepten fällt die Temperaturverteilung annähernd homogen aus. [less ▲]

Detailed reference viewed: 74 (5 UL)
Full Text
Peer Reviewed
See detailExperimental studies on the development of a solar hybrid module with an aluminum microchannel evaporator
Rullof, Johannes UL; Lambers, Klaus Jürgen; Dick, Christian et al

in Proceeding of 2016 International Energy and Sustainability Conference (IESC 2016) (2016)

In recent years, the possibility to combine photovoltaics (PV) and solar thermal collectors into one hybrid module (PVT-module) has been increasingly investigated. PVT-modules produce thermal and ... [more ▼]

In recent years, the possibility to combine photovoltaics (PV) and solar thermal collectors into one hybrid module (PVT-module) has been increasingly investigated. PVT-modules produce thermal and electrical energy at the same time. As the efficiency of a photovoltaic module decreases with temperature, the temperature of the heat transfer media is often limited to about 30 °C and the PVT-module is combined with a heat pump, which increases the temperature on the “warm side”. This paper deals with a PVT-module, which combines a microchannel based evaporator of a CO2 (R744) heat pump with a PV panel (PVT-direct). The PVT-direct overall system is reduced to the refrigerant circuit due to the direct refrigerant expansion in the PVT-module. A conventional PVT heat pump system has an additional glycol-water circuit. Since a pump and an additional heat exchanger for the secondary cycle were omitted, the system has increased efficiency. Due to lower module temperatures, the increase of the photovoltaic efficiency is a further advantage of the PVT-direct-module. To prove the feasibility of the PVT-direct heat pump system, the Cologne Institute for Renewable Energy (CIRE) is developing and modeling a test facility for this purpose within the research project “PVT-direkt”. Furthermore, a functional PVT-direct-module with a microchannel based evaporator was designed and built. Much importance has been given to experimental studies under laboratory conditions in order to investigate (1) the adjustment of the functionality and layout of the PVT-direct-module for characterizing the joining of brazed joints in aluminum microchannel evaporators and (2) the influence of the backside aluminum plate of the PVT-direct-module regarding leakage currents and parasitic capacitances. The overall results obtained in these experimental studies are analyzed in this paper. [less ▲]

Detailed reference viewed: 43 (8 UL)
Full Text
Peer Reviewed
See detailStationary Wavelet Transform denoising in Pulsed Thermography: influence of camera resolution on defect detection
Revel, Gian Marco; Chiariotti, Paolo; Copertaro, Edoardo UL et al

in Proceedings of 13th Conference on Advanced Infrared Technology and Applications (2016)

Denoising filters are widely used in image enhancement. However, they might induce severe blurring effects the lower is the resolution of the original image. When applied to a thermal image in Non ... [more ▼]

Denoising filters are widely used in image enhancement. However, they might induce severe blurring effects the lower is the resolution of the original image. When applied to a thermal image in Non-Destructive Testing (NDT), blurring could entail wrong estimation of defect boundaries and an overall reduction in defect detection performances. This contribution discusses the application of a wavelet-based denoising technique to a thermographic sequence obtained from a Pulsed Thermography testing, when using a high- resolution 1024x768 FPA infrared camera. Influence of denoising approach on data post- processed by Principal Component Analysis is discussed. Results indicate marked enhancement in defect detection, especially when compared to those obtained with a standard-resolution 320x240 FPA infrared camera. [less ▲]

Detailed reference viewed: 27 (0 UL)
See detailUsing modern technology to support museum activities. Case study: Estonians Deported to Siberia: Soviet Red Terror 1940-1960
Uueni, Andres; Pagi, Hembo; Sikk, Kaarel UL et al

in ICOM, Milano 2016 (2016)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailDoctor-patient communication about nutrition on related secondary preventive behaviours, especially for hypertension
Baumann, Michèle UL; Tchicaya, Anastase

in Hypertension (2016)

Inadequate consumption of fruit and vegetables and salt intake are two major factors that can play a role in increased to secondary prevention behaviours. Doctor-patient relationship intervenes on the ... [more ▼]

Inadequate consumption of fruit and vegetables and salt intake are two major factors that can play a role in increased to secondary prevention behaviours. Doctor-patient relationship intervenes on the adherence of these advices. For hypertension, hypercholesterolemia, diabetes, overweight and obesity, our study’s aim was to analyse the associations between the quality of the doctor-patient communication, evaluated in 2013, and patients’ adherence to their general practitioner (GP)’s nutritional advices, between 2008 and 2013. Methods Performed by the National Institute of Cardiac Surgery and Interventional Cardiology in Luxembourg, 4391 patients were contacted. Five years after a coronary angiography, 1289 completed a self-rating questionnaire assessing the GP’Com-5 items scale (Cronbach 0.87). The variables were analysed with a multiple logistic regression model. Results Patients declared that 57.9% reduced or stopped their consumption of salt intake, whereas 65% increased their consumption of fresh fruits and vegetables. Around 37% of the patients reported having made changes following the advice of their doctor. An increased consumption of fresh fruits and vegetables was linked with the quality of doctor-patient communication when patients were hypertension (odd ratio (OR) = 1.084, IC 95%, [1.017-1.157]), overweight (1.081 [1.013-1.155]), obesity (OR = 1.130 [1.056-1.209]), hypercholesterolemia (OR = 1.102 [1.033–1.175]) and diabetes (OR = 1.103 [1.029-1.181]). The decreased of salt intake consumption was associated with the quality of physician-patient communication when the patient was hypertension (OR = 1.102 [1.034 – 1.176]). Conclusion Doctor-patient communication is a relevant determinant in obtaining a favourable behavioural outcome, especially on nutrition. The rehabilitation program must promote more exchange and telephone assistance to develop a mutual engagement. [less ▲]

Detailed reference viewed: 114 (6 UL)
Full Text
Peer Reviewed
See detailATTENTIONAL BIASES IN PAIN: A META-ANALYSIS OF DOT PROBE RESEARCH
Todd, J.; Sharpe, L.; van Ryckeghem, Dimitri UL et al

in INTERNATIONAL JOURNAL OF BEHAVIORAL MEDICINE (2016), 23(1), 119

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailEnvironmental stability of highly conductive nominally undoped ZnO layers
Hala, Matej UL; Inoue, Yukari; Kato, Iroki et al

in IEEE Photovoltaic Specialists Conference. Conference Record (2016), 978-1-5090-2724

Detailed reference viewed: 78 (5 UL)
Full Text
Peer Reviewed
See detailAutomated Test Suite Generation for Time-Continuous Simulink Models
Matinnejad, Reza UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 38th International Conference on Software Engineering (2016)

All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches ... [more ▼]

All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches that incorporate different modeling needs and usages. Specifically, the Simulink modeling platform greatly appeals to CPS engineers due to its seamless support for simulation and code generation. In this paper, we propose a test generation approach that is applicable to Simulink models built for both purposes of simulation and code generation. We define test inputs and outputs as signals that capture evolution of values over time. Our test gener- ation approach is implemented as a meta-heuristic search algorithm and is guided to produce test outputs with diverse shapes according to our proposed notion of diversity. Our evaluation, performed on industrial and public domain models, demonstrates that: (1) In con- trast to the existing tools for testing Simulink models that are only applicable to a subset of code generation models, our approach is applicable to both code generation and simulation Simulink mod- els. (2) Our new notion of diversity for output signals outperforms random baseline testing and an existing notion of signal diversity in revealing faults in Simulink models. (3) The fault revealing ability of our test generation approach outperforms that of the Simulink Design Verifier, the only testing toolbox for Simulink. [less ▲]

Detailed reference viewed: 260 (32 UL)
Full Text
Peer Reviewed
See detailPerceived injustice explains pain intensity over and above attentional bias.
Bell, T.; Trost, Z.; van Ryckeghem, Dimitri UL et al

in Journal of Pain (2016), 17(4, 1), 32

Detailed reference viewed: 40 (7 UL)
Full Text
Peer Reviewed
See detailFormenbestand und strukturelle Asymmetrien der Personalpronomen im Luxemburgischen
Döhmer, Caroline UL

in Zeitschrift fuer Dialektologie und Linguistik. Beihefte (2016)

Detailed reference viewed: 182 (28 UL)
See detail“Melanomics”: analysis and integration of whole genomes, transcriptomes and miRNomes of primary melanoma patients
Reinsbach, Susanne; Wienecke, Anke UL; Ginolhac, Aurélien UL et al

in European Journal of Cancer (2016), 61(Suppl.1), 32

Detailed reference viewed: 194 (18 UL)
Full Text
Peer Reviewed
See detailOn the Formal Consistency of the Principal Principle
Bana, Gergely UL

in Philosophy of Science (2016)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailInequality in old age cognition across the world
Olivera, Javier; Leist, Anja UL; Chauvel, Louis UL

in PAA website (2016)

Detailed reference viewed: 126 (9 UL)
Full Text
Peer Reviewed
See detailReified Input/Output logic - a position paper
Robaldo, Livio UL; Sun, Xin UL

in proceedings of Workshop on Artificial Intelligence for Justice (AI4J), collocated at the 22nd European Conference on Artificial Intelligence (ECAI 2016) (2016)

Detailed reference viewed: 34 (6 UL)
Full Text
Peer Reviewed
See detailCohort factors impinging on suicide rates in the United States, 1990-2010
Chauvel, Louis UL; Leist, Anja UL; Smith, Herbert

in PAA server (2016)

We use CDC microdata on cause of death and CPS data on populations by age to create suicide rates for five-year age groups at five-year intervals, further cross-classified by race/ethnicity, education ... [more ▼]

We use CDC microdata on cause of death and CPS data on populations by age to create suicide rates for five-year age groups at five-year intervals, further cross-classified by race/ethnicity, education, and marital status. We examine the suicide history 1990-2010 of U.S. birth cohorts, net of age and cohort linear trends. These de-trended cohort deviations follow familiar patterns: most pronounced in the Baby Boom, least pronounced during the Baby Bust, they illustrate the so-called Easterlin effect. Suicide rates for women show similar patterns as suicide patterns for men. We show persistence of those effects net of micro factors (especially education and marriage) implicated in suicide behavior and correlated at the macro level with relative cohort size. Analysis of suicide patterns over time for high- and low-educated men and women shows that white men with low education face a sharp increase, significantly above the linear time trends, in suicide rates among cohorts born between 1955 and 1970. This bump is mostly unrelated to secular trends of increasing average educational attainment rates, at least if no interaction between age and cohort is involved in the explanation. No obvious pattern related to cohort size is found for African-American high- and low-educated men, which makes sense given the very different historical dynamics for this minority sub-population. [less ▲]

Detailed reference viewed: 183 (24 UL)
Full Text
Peer Reviewed
See detailSimCoTest: A Test Suite Generation Tool for Simulink/Stateflow Controllers
Matinnejad, Reza UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 38th International Conference on Software Engineering (2016)

Detailed reference viewed: 213 (24 UL)
Full Text
Peer Reviewed
See detailIs income equality also better for your cognitive health? A multilevel analysis on trajectories of cognitive function at older ages
Leist, Anja UL; Chauvel, Louis UL

in PAA website (2016)

This paper contributes to research on contextual associations with older-age cognitive function by investigating to which extent country-level income inequality is associated with older-age cognitive ... [more ▼]

This paper contributes to research on contextual associations with older-age cognitive function by investigating to which extent country-level income inequality is associated with older-age cognitive function and decline. Data came from the Survey of Health, Ageing and Retirement in Europe (SHARE), providing information on cognitive function (fluency, immediate and delayed recall) of respondents aged 50-80 years coming from a total of 16 European countries that participated in at least two waves of SHARE. A total of 44,303 observations were available at first and second measurement, 13,509 observations at third measurement, and 9,736 observations at fourth measurement. Three-level hierarchical models (measurements nested within individuals nested within countries) were run, showing that income inequality was negatively associated with cognitive level but not with decline. The findings suggest that income inequality is not associated with cognitive trajectories. Mechanisms of maintaining cognitive function at older ages may not be susceptible to country-level income inequalities. [less ▲]

Detailed reference viewed: 139 (4 UL)
Full Text
Peer Reviewed
See detailTextual Inference with Deep Learning Technique
Adebayo, Kolawole; Di Caro, Luigi; Robaldo, Livio UL et al

in Proc. of the 28th Annual Benelux Conference on Artificial Intelligence (BNAIC2016). (2016)

Detailed reference viewed: 77 (3 UL)