References of "Reports => Other"
     in
Bookmark and Share    
Full Text
See detailDer Bachelor in Sozial- und Erziehungswissenschaften (BSSE) und seine Praxisfelder
Böwen, Petra UL; Dujardin, Céline UL

Report (2017)

Der vorliegende Forschungsbericht „Der Bachelor in Sozial- und Erziehungswissenschaften (BSSE) und seine Praxisfelder“ beschäftigt sich mit dem Studiengang des BSSE und stellt seine Bedeutung für die ... [more ▼]

Der vorliegende Forschungsbericht „Der Bachelor in Sozial- und Erziehungswissenschaften (BSSE) und seine Praxisfelder“ beschäftigt sich mit dem Studiengang des BSSE und stellt seine Bedeutung für die luxemburgische Gesellschaft im Allgemeinen und für den Arbeitsmarkt der Sozialen Arbeit im Besonderen dar. Er zeigt die Vernetzung der vielfältigen Praxisfelder und der verschiedenen politischen Bereiche auf. Letztere werden durch Beiträge der jeweiligen Minister von den acht zuständigen Ministerien verdeutlicht. Mit diesem Projekt möchte das PraxisBüro auf die Soziale Arbeit als wesentliche Säule für das Funktionieren unserer Gesellschaft hinweisen und weitere Brücken zwischen den unterschiedlichen Akteuren der verschiedenen Praxisfelder schaffen. Durch den BSSE-Studiengang wird seit über 11 Jahren eine Ausbildung in Sozialarbeit/Sozialpädagogik an der Universität Luxemburg angeboten, die den bestehenden Ausbildungstraditionen aus dem Ausland gegenübertritt. Es ist der einzige Studiengang dieser Art in Luxemburg. Das Diplom ermöglicht die Arbeit als éducateur gradué und/oder assistant social und den Zugang zu der Gehaltsgruppe A2 (Bachelorebene) beim Staat. Die Entwicklung und Bedeutung des Studiengangs wird durch die Anzahl der Absolventen und deren Berufsabschlüsse illustriert, wobei auch die wachsende starke Nachfrage bei den Studienplätzen erstmals systematisch aufgearbeitet wird. Die Argumentation einer Typologie der Praxisfelder gibt den sehr vielfältigen sozialen Bereichen eine Ordnung und ermöglicht somit die Analyse der Praktikumsstellen, der Studienabschlussarbeiten und der beruflichen Praxis der BSSE-Studierenden bzw. BSSE-Absolventen. Der Arbeitsmarkt und die Arbeitsmarktchancen der BSSE-Absolventen werden sowohl durch die existierende Fachliteratur und Informationen der Arbeitsmarktverwaltung als auch durch systematische Arbeitsmarktbeobachtungen (hierbei handelt es sich um ein weiteres Forschungsprojekt des PraxisBüros) untersucht. Die konkreten Praxisfelder werden durch die vorausgegangene Typologie und durch BSSEAbsolventen im Beruf selbst vorgestellt. In diesen Beiträgen finden auch die Absolventen, die sich für ein weiterführendes Master-Studium entschieden haben, ihren Platz. Abschließend unterstreichen Fazit und Ausblick die Bedeutung des Studiengangs für die luxemburgische Gesellschaft und laden zu Kooperations-, Netzwerk- und Weiterbildungsmöglichkeiten ein, die die Brücken zwischen Wissenschaft, Praxis und Politik weiter ausbauen und festigen. [less ▲]

Detailed reference viewed: 908 (100 UL)
See detailAn Open Dataset for Human Activity Analysis using Smart Devices
Faye, Sébastien; Louveton, Nicolas; Jafarnejad, Sasan UL et al

Report (2017)

Detailed reference viewed: 3 (0 UL)
See detail21st century skills for the 21st century work place. Special section.
Murphy, Kevin; Greiff, Samuel UL; Niepel, Christoph UL

Report (2017)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailLESEN LERNEN IN EINER FREMDSPRACHE Prädiktoren des Lesens bei Kindern mit Migrationshintergrund
Ertel Silva, Cintia UL; Loff, Ariana; Engel de Abreu, Pascale UL

in LESEN LERNEN IN EINER FREMDSPRACHE Prädiktoren des Lesens bei Kindern mit Migrationshintergrund (2016)

Detailed reference viewed: 63 (11 UL)
Full Text
See detailReACP: A Semi-Automated Framework for Reverse-engineering and Testing of Access Control Policies of Web Applications
Le, Ha Thanh UL; Nguyen, Duy Cu UL; Briand, Lionel UL

Report (2016)

This technical report details our a semi-automated framework for the reverse-engineering and testing of access control (AC) policies for web-based applications. In practice, AC specifications are often ... [more ▼]

This technical report details our a semi-automated framework for the reverse-engineering and testing of access control (AC) policies for web-based applications. In practice, AC specifications are often missing or poorly documented, leading to AC vulnerabilities. Our goal is to learn and recover AC policies from implementation, and assess them to find AC issues. Built on top of a suite of security tools, our framework automatically explores a system under test, mines domain input specifications from access request logs, and then, generates and executes more access requests using combinatorial test generation. We apply machine learning on the obtained data to characterise relevant attributes that influence access control to learn policies. Finally, the inferred policies are used for detecting AC issues, being vulnerabilities or implementation errors. We have evaluated our framework on three open-source applications with respect to correctness and completeness. The results are very promising in terms of the quality of inferred policies, more than 94% of them are correct with respect to implemented AC mechanisms. The remaining incorrect policies are mainly due to our unrefined permission classification. Moreover, a careful analysis of these policies has revealed 92 vulnerabilities, many of them are new. [less ▲]

Detailed reference viewed: 139 (17 UL)
Full Text
See detailAutomated Testing of Web Application Firewalls
Appelt, Dennis UL; Nguyen, Duy Cu UL; Briand, Lionel UL

Report (2016)

Web application firewalls (WAF) are an indispensable mechanism to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their increasing sophistication ... [more ▼]

Web application firewalls (WAF) are an indispensable mechanism to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their increasing sophistication require WAFs to be updated and tested regularly as otherwise they will be circumvented. In this paper, we focus our research on WAFs and SQL injection attacks, but the general principles and strategy could be adapted to other contexts. We present a machine learning-driven testing approach to automatically detect holes in WAFs that let SQL injection attacks bypass them. At the beginning, the approach can automatically generate diverse attacks (tests) and then submit them to a system that is protected by a WAF. Incrementally learning from the tests that are blocked or accepted by the WAF, our approach can then select tests that exhibit characteristics associated with bypassing the WAF and mutate them to efficiently generate new bypassing attacks. In the race against cyberattacks, time is vital. Being able to learn and anticipate more attacks that can circumvent a WAF in a timely manner is very important in order to quickly fix or fine-tune protection rules. We developed a tool that implements the approach and evaluated it on ModSecurity, a widely used WAF, and a proprietary WAF that protects a financial institution. Evaluation results indicate that our proposed technique is efficient at generating SQL injection attacks that can bypass a WAF and can be used to identify successful attack patterns. [less ▲]

Detailed reference viewed: 367 (27 UL)
See detailhistograph. Graph-based exploration, crowdsourced indexation
Guido, Daniele; Wieneke, Lars UL; During, Marten UL

Report (2016)

Detailed reference viewed: 12 (5 UL)
Full Text
See detailVielfalt betreuter Kindheiten. Ethnographische Fallstudien zu den Bildungs- und Betreuungsarrangements 2-4jähriger Kinder
Bollig, Sabine UL; Honig, Michael-Sebastian UL; Nienhaus, Sylvia UL

Report (2016)

Kinder werden gemeinhin als Adressaten, aber weniger als Akteure von institutionellen Angeboten der Bildung und Betreuung in früher Kindheit wahrgenommen – und das obwohl sie ein komplexes Leben zwischen ... [more ▼]

Kinder werden gemeinhin als Adressaten, aber weniger als Akteure von institutionellen Angeboten der Bildung und Betreuung in früher Kindheit wahrgenommen – und das obwohl sie ein komplexes Leben zwischen Familie, Kindertagesbetreuung und Vorschule führen. Das Forschungsprojekt "CHILD - Children in the Luxembourgian Day Care System" hat das Feld der frühen Bildung und Betreuung von der Position der Kinder aus betrachtet und in kindheitstheoretischer und praxisanalytischer Perspektive nach der Vielfalt betreuter Kindheiten gefragt. Vom Standpunkt der Kinder aus differenziert sich das Luxemburger Feld von Bildung und Betreuung in früher Kindheit in vielfältige Bildungs- und Betreuungsarrangements aus. Sie bestimmen nicht nur die Erfahrungen, die Kinder mit nichtfamilialer Bildung und Betreuung machen – und man muss hinzufügen: die nur Kinder machen –, sondern sie bedingen auch die strukturelle Position der Kinder als Mitgestalter von Bildungs- und Betreuungslandschaften früher Kindheit. Bildungs- und Betreuungsarrangements sind eine Domäne der Kinder, obwohl sie sich in einem Zusammenspiel vieler aufeinander bezogener Orte, Kontexte und Akteure realisieren. In diesem Forschungsbericht werden acht ethnographische Fallstudien präsentiert, welche die Multilokalität, Multikontextualität und Multiperspektivität der Bildungs- und Betreuungsarrangements zwei- bis vierjähriger Kinder im Lichte der Alltagspraxis der Kinder analysieren. Die acht Fallstudien zeigen daher nicht nur, dass und wie Kinder zur täglichen Herstellung des Feldes früher Bildung und Betreuung beitragen, sie machen auch die Vielfalt betreuter Kindheiten in Luxemburg sichtbar. [less ▲]

Detailed reference viewed: 331 (27 UL)
Full Text
See detailEcho iTEO. Co-languaging, collaborating, co-constructing
Kirsch, Claudine UL; Gretsch, Gérard

Report (2015)

Detailed reference viewed: 42 (4 UL)
Full Text
See detailBilateral comparison between the FG5X-216 and FG5-242
Francis, Olivier UL; Ullrich, Christian

Report (2015)

Detailed reference viewed: 54 (8 UL)
Full Text
See detailRelative gravity measurements in Ilulissat in July 2013
Francis, Olivier UL

Report (2015)

Detailed reference viewed: 101 (22 UL)
Full Text
See detailElements of direct democracy in the recent practice of European countries: some thoughts à propos the Roundtable ‘Constitutional Change and People
Pichou, Maria UL

Report (2015)

How can the general public participate in constitution-making and constitution-amending procedures? Are popular initiatives in constitutional change more desirable or feasible in European countries today ... [more ▼]

How can the general public participate in constitution-making and constitution-amending procedures? Are popular initiatives in constitutional change more desirable or feasible in European countries today? The recent Roundtable ‘Constitutional Change and People’, organised by the University of Luxembourg and the International Association of Constitutional Law (Constitution-Making and Constitutional Change Research Group) on December 12th 2014, dealt with these issues. The discussion was prompted by ongoing developments in some European countries, which reveal a tendency to introduce elements of direct democracy, such as referendums, online petitions and citizens’ initiatives into the field of constitutional change. The introductory address by the President of the European Court of Justice Prof. Dr. Vasileios Skouris, underlined the difficulties that many European constitutions face in integrating the ‘European phenomenon’. The interaction between the European legal order and national constitutions is still a source of legal uncertainty. There is a movement towards strengthening the possibility of people contributing to constitutional changes around the world in general, and in Europe specifically, after the adoption of the Lisbon Treaty. The timeliness of analysing recent examples of people’s participation in constitutional changes in France, Greece, Iceland, Ireland, Luxembourg, Romania and Switzerland, therefore, becomes evident. [less ▲]

Detailed reference viewed: 47 (9 UL)
Full Text
See detailSimulink Fault Localization: an Iterative Statistical Debugging Approach
Liu, Bing UL; Lucia, Lucia UL; Nejati, Shiva UL et al

Report (2015)

Debugging Simulink models presents a significant challenge in the embedded industry. In this work, we propose SimFL, a fault localization approach for Simulink models by combining statistical debugging ... [more ▼]

Debugging Simulink models presents a significant challenge in the embedded industry. In this work, we propose SimFL, a fault localization approach for Simulink models by combining statistical debugging and dynamic model slicing. Simulink models, being visual and hierarchical, have multiple outputs at different hierarchy levels. Given a set of outputs to observe for localizing faults, we generate test execution slices, for each test case and output, of the Simulink model. In order to further improve fault localization accuracy, we propose iSimFL, an iterative fault localization algorithm. At each iteration, iSimFL increases the set of observable outputs by including outputs at lower hierarchy levels, thus increasing the test oracle cost but offsetting it with significantly more precise fault localization. We utilize a heuristic stopping criterion to avoid unnecessary test oracle extension. We evaluate our work on three industrial Simulink models from Delphi Automotive. Our results show that, on average, SimFL ranks faulty blocks in the top 8.9% in the list of suspicious blocks. Further, we show that iSimFL significantly improves this percentage down to 4.4% by requiring engineers to observe only an average of five additional outputs at lower hierarchy levels on top of high-level model outputs. [less ▲]

Detailed reference viewed: 168 (22 UL)
Full Text
See detailAutomated Test Suite Generation for Time-Continuous Simulink Models
Matinnejad, Reza UL; Nejati, Shiva UL; Briand, Lionel UL

Report (2015)

All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches ... [more ▼]

All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches that incorporate different modeling needs and usages. Specifically, the Simulink modeling platform greatly appeals to CPS engineers due to its seamless support for simulation and code generation. In this paper, we propose a test generation approach that is applicable to Simulink models built for both purposes of simulation and code generation. We define test inputs and outputs as signals that capture evolution of values over time. Our test gener- ation approach is implemented as a meta-heuristic search algorithm and is guided to produce test outputs with diverse shapes according to our proposed notion of diversity. Our evaluation, performed on industrial and public domain models, demonstrates that: (1) In con- trast to the existing tools for testing Simulink models that are only applicable to a subset of code generation models, our approach is applicable to both code generation and simulation Simulink mod- els. (2) Our new notion of diversity for output signals outperforms random baseline testing and an existing notion of signal diversity in revealing faults in Simulink models. (3) The fault revealing ability of our test generation approach outperforms that of the Simulink Design Verifier, the only testing toolbox for Simulink. [less ▲]

Detailed reference viewed: 150 (27 UL)
See detailShould I do Social Network Analysis?
During, Marten UL

Report (2015)

Network theories and methods have recently gained wide-spread attention. Graph visualizations look great and will easily grab the attention of any audience. However for those who are new to the field ... [more ▼]

Network theories and methods have recently gained wide-spread attention. Graph visualizations look great and will easily grab the attention of any audience. However for those who are new to the field, there is a steep learning curve. Novices need to … Continue reading → [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
See detailPrivacy and Security in an Age of Surveillance
Ryan, Peter UL; Preneel, Bart; Rogaway, Phillip et al

Report (2015)

The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence ... [more ▼]

The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence agencies are not only pursuing passive surveillance over the world's communication systems, but are also seeking to facilitate such surveillance by undermining the security of the internet and communications technologies. Thus the activities of these agencies threatens not only the rights of individual citizens but also the fabric of democratic society. Intelligence services do have a useful role to play in protecting society and for this need the capabilities and authority to perform targeted surveillance. But the scope of such surveillance must be strictly limited by an understanding of its costs as well as benefits, and it should not impinge on the privacy rights of citizens any more than necessary. Here we report on a recent Dagstuhl Perspectives Workshop addressing these issues - a four-day gathering of experts from multiple disciplines connected with privacy and security. The meeting explored the scope of mass-surveillance and the deliberate undermining of the security of the internet, defined basic principles that should underlie needed reforms, and discussed the potential for technical, legal and regulatory means to help restore the security of the internet and stem infringement of human-rights by ubiquitous electronic surveillance. [less ▲]

Detailed reference viewed: 112 (2 UL)
See detailCheat Sheet: Social Network Analysis for Humanists
During, Marten UL

Report (2015)

Social Network Analysis concepts and methods are extremely powerful ways to describe complex social relations. The field however has developed their own their concepts, some of which require a little bit ... [more ▼]

Social Network Analysis concepts and methods are extremely powerful ways to describe complex social relations. The field however has developed their own their concepts, some of which require a little bit of translation. This cheat sheet should help with the … Continue reading → [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
See detailExtension of 2D FEniCS implementation of Cosserat non-local elasticity to the 3D case
Sautot, Camille; Bordas, Stéphane UL; Hale, Jack UL

Report (2014)

The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in ... [more ▼]

The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in classical elasticity as a Timoshenko's beam - this study will show that DOLFIN could offer approximated solutions converging to the analytical solution. The second step is the computation of the stress in a plate with a circular hole. The stress concentration factors around the hole in classical and Cosserat elasticities will be compared, and a convergence study for the Cosserat case will be realised. The third step is the extension to the 3D case with the computation of the stress concentration factor around a spherical cavity in an infinite elastic medium. This computed value will be compare to the analytical solution described by couple-stress theory. [less ▲]

Detailed reference viewed: 156 (5 UL)
Full Text
See detailMachine Learning-Based Malware Detection for Android Applications: History Matters!
Allix, Kevin UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

Report (2014)

Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are ... [more ▼]

Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are daily poured into markets, such a technique could be valuable to guaran- tee a strong filtering of malicious apps. The success of machine-learning approaches however is highly de- pendent on (1) the quality of the datasets that are used for training and of (2) the appropriateness of the tested datasets with regards to the built classifiers. Unfortu- nately, there is scarce mention of these aspects in the evaluation of existing state-of-the-art approaches in the literature. In this paper, we consider the relevance of history in the construction of datasets, to highlight its impact on the performance of the malware detection scheme. Typ- ically, we show that simply picking a random set of known malware to train a malware detector, as it is done in most assessment scenarios from the literature, yields significantly biased results. In the process of assessing the extent of this impact through various experiments, we were also able to confirm a number of intuitive assump- tions about Android malware. For instance, we discuss the existence of Android malware lineages and how they could impact the performance of malware detection in the wild. [less ▲]

Detailed reference viewed: 542 (33 UL)
Full Text
See detailSlicing High-level Petri nets
Khan, Yasir Imtiaz UL

Report (2014)

Detailed reference viewed: 54 (8 UL)
Full Text
See detailImproving Traffic in Urban Environments
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

Report (2014)

The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network ... [more ▼]

The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network cannot easily be done. There are some solution proposed to improve the traffic situation, among them, the optimization of the resources already available by means of collecting real time Floating Car Data (FCD) from the vehicles and use them to suggest dynamic routes in order to minimize travel delays. The centralized infrastructure able to achieve this goal has already been presented in ”Improving Traffic in Urban Environments applying the Wardrop Equilibrium” (Codeca, L. et al., 2013). In this extended abstract we present the decentralized version of the system and the preliminary results of its evaluation. [less ▲]

Detailed reference viewed: 85 (13 UL)
Full Text
See detailBlack-box SQL Injection Testing
Appelt, Dennis UL; Alshahwan, Nadia UL; Nguyen, Duy Cu UL et al

Report (2014)

Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of ... [more ▼]

Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of attacks and exploitations like the Web. Among the attacks, those that target SQL injection vulnerabilities have consistently been top-ranked for the last years. Testing to detect such vulnerabilities before making web services public is crucial. We present in this report an automated testing approach, namely μ4SQLi, and its underpinning set of mutation operators. μ4SQLi can produce effective inputs that lead to executable and harmful SQL statements. Executability is key as otherwise no injection vulnerability can be exploited. Our evaluation demonstrated that the approach outperforms contemporary known attacks in terms of vulnerability detection and the ability to get through an application firewall, which is a popular configuration in real world. [less ▲]

Detailed reference viewed: 575 (58 UL)
Full Text
See detailTowards a Formally Verified Proof Assistant (technical report)
Anand, Abhishek; Rahli, Vincent UL

Report (2014)

Detailed reference viewed: 21 (2 UL)
Full Text
See detailMapping the Social Economy in British Columbia and Alberta - Final Report
Gismondi, Mike; Ross, Lynda; Marois, Juanita et al

Report (2013)

Detailed reference viewed: 19 (1 UL)
Full Text
See detailHighly precise taint analysis for Android applications
Fritz, Christian; Arzt, Steven; Rasthofer, Siegfried et al

Report (2013)

Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by malicious apps that exploit their given privileges to steal such sensitive ... [more ▼]

Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by malicious apps that exploit their given privileges to steal such sensitive data, or to track users without their consent or even the users noticing. Dynamic program analyses fail to discover such malicious activity because apps have learned to recognize the analyses as they execute. In this work we present FlowDroid, a novel and highly precise taint analysis for Android applications. A precise model of Android’s lifecycle allows the analysis to properly handle callbacks, while context, flow, field and objectsensitivity allows the analysis to track taints with a degree of precision unheard of from previous Android analyses. We also propose DroidBench, an open test suite for evaluating the e↵ectiveness and accuracy of taint-analysis tools specifically for Android apps. As we show through a set of experiments using SecuriBench Micro, DroidBench and a set of well-known Android test applications, our approach finds a very high fraction of data leaks while keeping the rate of false positives low. On DroidBench, our approach achieves 93% recall and 86% precision, greatly outperforming the commercial tools AppScan Source and Fortify SCA. [less ▲]

Detailed reference viewed: 37 (1 UL)
Full Text
See detailHigher Lie Theory
Jubin, Benoît Michel UL; Poncin, Norbert UL

Report (2013)

Poster, abstracts, and list of participants of the International Workshop on Higher Lie Theory organized in December 2013 at the University of Luxembourg by Benoît Jubin and Norbert Poncin

Detailed reference viewed: 91 (13 UL)
Full Text
See detailReport of Stakeholder Workshop
Carr, Constance UL

Report (2013)

Detailed reference viewed: 51 (13 UL)
Full Text
See detailGovernance for Sustainable Spatial Development – a comparative study of Luxembourg and Switzerland
Carr, Constance UL; Hesse, Markus UL

Report (2013)

The project, SUSTAIN_GOV, aims at investigating sustainable spatial development policies in the context of governance, both with respect to Luxembourg and, as a comparative ap-proach, to the Swiss ... [more ▼]

The project, SUSTAIN_GOV, aims at investigating sustainable spatial development policies in the context of governance, both with respect to Luxembourg and, as a comparative ap-proach, to the Swiss planning system and urban transformation processes in the Glattal-Stadt. SUSTAIN_GOV builds directly from the strong conceptual and empirical foundations estab-lished by the “SUSTAINLUX Project” (CO9/SR/01) that has thus far shown that despite the intense urbanization pressure, the strong strains on land resources and infrastructure, and the political dilemmas these issues raise, policy, planning and governance practices in the Grand Duchy remain underdeveloped, particularly in the domain citizen involvement in public deci-sion-making. SUSTAIN_GOV brings into sharper focus a more nuanced scientific under-standing of participation, governance, and integrated sustainable spatial development, and an in-depth evaluation of existing spatial planning, policy, and governance patterns in the Grand Duchy. The proposed research is informed by a robust and contemporary set of conceptual approach, that shape current urban and regional literatures. The research design follows a qualitative methodological approach. [less ▲]

Detailed reference viewed: 158 (16 UL)
Full Text
See detailHigher Algebras and Lie Infinity Homotopy Theory
Dotsenko, Vladimir; Poncin, Norbert UL

Report (2013)

Abstracts and list of participants of the Workshop on "Higher Algebras and Lie Infinity Homotopy Theory" organized in June 2013 at the University of Luxembourg by Vladimir Dotsenko and Norbert Poncin

Detailed reference viewed: 78 (12 UL)
Full Text
See detailImplications of Results
Carr, Constance UL; Hesse, Markus UL

Report (2013)

Detailed reference viewed: 72 (14 UL)
Full Text
See detailLibraries and publications of the future
Fonds national de la Recherche; Bibliothèque nationale de Luxembourg; Université du Luxembourg - Bibliothèque et al

Report (2013)

For sustainable growth, job creation and innovation, Luxembourg has chosen to rapidly develop high quality university and public research infrastructures and transition to a knowledge society. Europe ... [more ▼]

For sustainable growth, job creation and innovation, Luxembourg has chosen to rapidly develop high quality university and public research infrastructures and transition to a knowledge society. Europe, through its "Digital Agenda" has chosen to maximise the social and economic potential of ICT. In order to achieve these goals, high quality knowledge in all fields must be available not only for University and Research Centers but for the whole population. Lifelong learning and cultural commons need to be promoted actively. This was one of the motivations to modernise the library sector and to invest in new built infrastructures for the National Library and the University of Luxembourg. Though printed material will not disappear, a rapidly increasing amount will be in exclusively digital format (the focus of this document) either licensed from publishers, made accessible under Open Access regimes or through digitisation of printed originals. The internet continues to have a big impact on knowledge creation and cultural creativity through vastly facilitated networking and availability of very large amounts of information. The organisations endorsing this document have taken up the challenge to respond pro-actively to this evolution. This document is a guide to help readers understand a number of current challenges and opportunities for digital culture and science, relevant to libraries, research organisations as well as research and library funders. [less ▲]

Detailed reference viewed: 71 (26 UL)
Full Text
See detailGraded Algebra and Geometry
Covolo, Tiffany UL; Ovsienko, Valentin; Poncin, Norbert UL

Report (2012)

Abstracts and list of participants of the Workshop on "Graded Algebra and Geometry" organized in December 2012 at the University of Luxembourg by Tiffany Covolo, Valentin Ovsienko, and Norbert Poncin

Detailed reference viewed: 75 (7 UL)
Full Text
See detailImproving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation
Bartel, Alexandre UL; Klein, Jacques UL; Monperrus, Martin et al

Report (2012)

In this paper we claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: 1) to perform runtime monitoring 2) by instrumenting the application bytecode ... [more ▼]

In this paper we claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: 1) to perform runtime monitoring 2) by instrumenting the application bytecode and 3) in-vivo, i.e. directly on the smartphone. We present a tool chain to do this and present experimental results showing that this tool chain can run on smartphones in a reasonable amount of time and with a realistic effort. Our findings also identify challenges to be addressed before running powerful runtime monitoring and instrumentations directly on smartphones. We implemented two use-cases leveraging the tool chain: FineGPolicy, a fine-grained user centric permission policy system and AdRemover an advertisement remover. Both prototypes improve the privacy of Android systems thanks to in-vivo bytecode instrumentation. [less ▲]

Detailed reference viewed: 194 (24 UL)
Full Text
See detailIntroduction to EventML
Bickford, Mark; Constable, Robert L.; Eaton, Richard et al

Report (2012)

Detailed reference viewed: 18 (1 UL)
Full Text
See detailKey Data of the BUL 2008 to 2011
Park, Beth Anne UL; Pausch, Marie-Pierre UL; Willems, Julie UL et al

Report (2012)

Pour la première fois, la Bibliothèque de l'Université du Luxembourg publie des chiffres disponibles relatifs à ses activités, à ses services et collections, ainsi qu'à l'usage de ceux-ci.

Detailed reference viewed: 44 (13 UL)
Full Text
See detailObservations from the Field: A Synthesis Report
Carr, Constance UL

Report (2012)

Detailed reference viewed: 49 (3 UL)
Full Text
See detailGeometry of Manifolds and Mathematical Physics
Poncin, Norbert UL

Report (2011)

Detailed reference viewed: 38 (5 UL)
See detailOn a connection between Stein characterizations and Fisher information
Ley, Christophe; Swan, Yvik UL

Report (2011)

Detailed reference viewed: 15 (0 UL)
See detailZwischenbericht - Wissenschaftliche Begleitung des Projekts „Keine/r ohne Abschluss“ im besonderen 10.Schuljahr
Eckert, Roland; Smilek, Natalie; Cremer, Annelie et al

Report (2010)

Detailed reference viewed: 21 (2 UL)
See detailCountry Report Austria. Faith-Based Organisations and Social Exclusion in European Cities
Ernst, André; Kmiotek, Emilia Alicja UL; Meyer, Robert et al

Report (2010)

Detailed reference viewed: 6 (1 UL)
See detailDefinition and Measurement of the Social Economy: Continuous Construct or Dichotomous Variable?
Gismondi, Mike; Ross, Lynda; Affolderbach, Julia UL

Report (2009)

Detailed reference viewed: 18 (0 UL)
Full Text
See detailLebensqualität in der Stadt Luxemburg:Bürgerbefragung
Vogelgesang, Waldemar; Lorig, Philipp; Decieux, Jean Philippe Pierre UL et al

Report (2009)

Die vorliegende Befragungsstudie ‚Lebensqualität der Bürgerinnen und Bürger der Stadt Luxemburg’ ist Teil eines Gesamtprojektes, das im Auftrag der Stadt Luxemburg durchgeführt wurde und an dem drei ... [more ▼]

Die vorliegende Befragungsstudie ‚Lebensqualität der Bürgerinnen und Bürger der Stadt Luxemburg’ ist Teil eines Gesamtprojektes, das im Auftrag der Stadt Luxemburg durchgeführt wurde und an dem drei Institutionen mitgewirkt haben: FOREG (Projektleitung: Dr. Manfred Schenk), CEPS (Leiter der Abteilung GEODE: Patrick Bousch) und die Universität Trier (Teilprojekt Bürgerbefragung: PD Dr. Waldemar Vogelgesang). Ziel der Befragung ist es, aus der Sicht der in der Stadt lebenden Menschen die Stärken und Schwächen ihres urbanen Lebensraums aufzuzeigen. Ein besonderer Schwerpunkt der Studie liegt dabei auf dem Wohnumfeld, der Familien- und Betreuungssituation und auf den sozialen Beziehungen der Bewohnerinnen und Bewohner untereinander. Die auf diese Weise gewonnenen Erkenntnisse über die Lebens- und Wohnverhältnisse bilden eine wichtige Informationsgrundlage für einen Sozialplan, der für die Stadt Luxemburg erstellt wird. [less ▲]

Detailed reference viewed: 182 (8 UL)
Full Text
See detail9th Conference on Geometry and Topology of Manifolds
Poncin, Norbert UL

Report (2008)

Detailed reference viewed: 24 (3 UL)
See detailSummary of Results: BALTA Social Economy Survey Fall 2008
Affolderbach, Julia UL; Gismondi, Mike

Report (2008)

Detailed reference viewed: 10 (1 UL)
Full Text
See detailResearch Decisions in Mapping the Social Economy in Alberta and British Columbia
Affolderbach, Julia UL; Gismondi, Mike; Soots, Lena

Report (2008)

Detailed reference viewed: 13 (0 UL)
Full Text
See detailEuropean Science Foundation Research Conference on 'Algebraic Aspects in Geometry'
Poncin, Norbert UL

Report (2007)

Abstracts of the ESF Conference 'Algebraic Aspects in Geometry' chaired by Norbert Poncin

Detailed reference viewed: 30 (15 UL)
Full Text
See detailMeasurements of the acceleration due to gravity at the gravity laboratory of the National Institute of Metrological Research Turin (Italy)
D'Agostino, G.; Desogus, S.; Germak, A. et al

Report (2006)

Detailed reference viewed: 37 (1 UL)
Full Text
See detailUtilisation de l'implémentation de DTLS fournie par OpenSSL
Bernard, Nicolas UL

Report (2006)

Datagram Transport Layer Security (DTLS) is a recent prococol. It provides a cryptographical layer on the top of UDP. This protocol is implemented in the OpenSSL library but its use is not documented ... [more ▼]

Datagram Transport Layer Security (DTLS) is a recent prococol. It provides a cryptographical layer on the top of UDP. This protocol is implemented in the OpenSSL library but its use is not documented. This document aims to show how to use this implementation, by providing examples. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
See detail4th Conference on Poisson Geometry and related fields
Poncin, Norbert UL

Report (2004)

Speakers' abstracts and list of participants of the International Conference on 'Poisson Geometry and related fields' organized in June 2004 at the University of Luxembourg by Norbert Poncin

Detailed reference viewed: 42 (11 UL)
See detailArchitecture des gigarouteurs
Bernard, Nicolas UL; Ménier, Clément

Report (2002)

Detailed reference viewed: 12 (0 UL)
See detailBibliography \textbar Historical Network Research
During, Marten UL

Report (n.d.)

Detailed reference viewed: 10 (0 UL)