Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailIdentical Binding Energies and Work Functions for Distinct Adsorption Structures: Olympicenes on the Cu(111) Surface
Liu, Wei; Schuler, Bruno; Xu, Yong et al

in The Journal of Physical Chemistry Letters (2016), 7(6), 1022-1027

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailNature of Hydrogen Bonds and S···S Interactions in the l-Cystine Crystal
Flores-Huerta, Anaid G.; Tkatchenko, Alexandre UL; Galván, Marcelo

in The Journal of Physical Chemistry A (2016), 120(24), 4223-4230

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailResilient Delegation Revocation with Precedence for Predecessors is NP-Complete
Cramer, Marcos UL; Van Hertum, Pieter; Lapauw, Ruben et al

in IEEE 29th Computer Security Foundations Symposium (2016)

In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these ... [more ▼]

In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains when revoking rights, which give rise to different revocation schemes. One possibility studied in the literature is to revoke rights by issuing negative authorizations, meant to ensure that the revocation is resilient to a later reissuing of the rights, and to resolve conflicts between principals by giving precedence to predecessors, i.e.\ principals that come earlier in the delegation chain. However, the effects of negative authorizations have been defined differently by different authors. Having identified three definitions of this effect from the literature, the first contribution of this paper is to point out that two of these three definitions pose a security threat. However, avoiding this security threat comes at a price: We prove that with the safe definition of the effect of negative authorizations, deciding whether a principal does have access to a resource is an NP-complete decision problem. We discuss two limitations that can be imposed on an access-control system in order to reduce the complexity of the problem back to a polynomial complexity: Limiting the length of delegation chains to an integer m reduces the runtime complexity of determining access to O(n^m), and requiring that principals form a hierarchy that graph-theoretically forms a rooted tree makes this decision problem solvable in quadratic runtime. Finally we discuss an approach that can mitigate the complexity problem in practice without fully getting rid of NP-completeness. [less ▲]

Detailed reference viewed: 5 (0 UL)
See detailDetecting and manipulating Majorana bound states in nanowires
Schmidt, Thomas UL

Scientific Conference (2016)

Detailed reference viewed: 2 (0 UL)
Full Text
Peer Reviewed
See detailCumulative Aggregation
Ambrossio, Diego Agustin UL; Parent, Xavier UL; van der Torre, Leon UL

in Deontic Logic and Normative Systems (2016)

From any two conditional obligations “X if A” and “Y if B”, cumulative aggregation derives the combined obligation “X ∪ Y if A ∪ (B\X)”, whereas simple aggregation derives the obligation “X ∪ Y if A ∪ B” ... [more ▼]

From any two conditional obligations “X if A” and “Y if B”, cumulative aggregation derives the combined obligation “X ∪ Y if A ∪ (B\X)”, whereas simple aggregation derives the obligation “X ∪ Y if A ∪ B”. We propose FC systems consisting of cumulative aggregation together with factual detachment, and we give a representation result for FC systems, as well as for FA systems consisting of simple aggregation together with factual detachment. We relate FC and FA systems to each other and to input/output logics recently introduced by Parent and van der Torre. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
See detailQuality of Work Index Luxembourg: Entwicklung eines validen Messinstruments
Sischka, Philipp UL; Steffgen, Georges UL

in Chambre des salariés (Ed.) Fachtagung Arbeitsqualität: Von der Berfagung zur Umsetzung (2016)

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailIntergenerational Family Relations in Luxembourg: Adult Children and their Ageing Parents in Migrant and Non-Migrant Families
Albert, Isabelle UL; Barros Coimbra, Stephanie UL; Ferring, Dieter UL

in Roland-Lévy, Christine; Denoux, P.; Voyer, B. (Eds.) et al Unity, diversity and culture: Research and Scholarship Selected from the 22nd Congress of the International Association for Cross-Cultural Psychology (2016)

Whereas most studies in the context of acculturation research have focused so far on family relations between first generation parents and their second generation children in adolescence, the present ... [more ▼]

Whereas most studies in the context of acculturation research have focused so far on family relations between first generation parents and their second generation children in adolescence, the present study draws its attention on immigrant families at later stages in the family life cycle. This study is part of the FNR-funded project on “Intergenerational Relations in the Light of Migration and Ageing – IRMA” in which a cross-cultural comparison of altogether N = 120 Portuguese and Luxembourgish triads of older parents and their adult children, both living in the Grand-Duchy of Luxembourg, is envisaged. The aims of this project are, firstly to examine similarities and differences in family values, internalized norms and mutual expectations of older parents and their adult children in migrant and non-migrant families; secondly, to analyze in how far an acculturation gap respectively a generation gap might have an impact on the relationship quality between parents and their adult children; thirdly and related to this, to explore subjective well-being (SWB) of all involved family members. Results are discussed in the framework of an integrative model of intergenerational family relations in the light of migration and ageing. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
See detailLa réforme de la loi du 10 août 1915
Corbisier, Isabelle UL

Conference given outside the academic context (2016)

Présentation générale de la réforme de la loi luxembourgeoise du 10 août 1915 concernant les sociétés commerciales par la loi du 10 août 2016

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailLe règlement des conflits entre actionnaires : exclusion, retrait et modes alternatifs de résolution de conflits
Corbisier, Isabelle UL

in Coipel, Michel; Delvaux, Marie Amélie (Eds.) Jurisprudence en droit des sociétés commerciales - recueil annuel - 2016 - N°s 1264 à 1310 (2016)

Detailed reference viewed: 7 (2 UL)
See detailHôpital des syphilitiques ou vérolés de Strasbourg, Blatterhaus (XVIe et XVIIe siècle)
Leuck, Jessica UL

in Debus-Kehr, Monique; Schlaefli, Louis; Uberfill, François (Eds.) Dictionnaire Historique des Institutions de l'Alsace du moyen âge à 1815. Lettre H, n°9 (2016)

Detailed reference viewed: 5 (1 UL)
Full Text
Peer Reviewed
See detailMetaheuristics for the Virtual Machine Mapping Problem in Clouds
Nesmachnow, Sergio; Dorronsoro, Bernabé UL; Talbi, El-Ghazali et al

in Informatica, Lith. Acad. Sci. (2015), 26(1), 111-134

This article presents sequential and parallel metaheuristics to solve the virtual machines subletting problem in cloud systems, which deals with allocating virtual machine requests into prebooked ... [more ▼]

This article presents sequential and parallel metaheuristics to solve the virtual machines subletting problem in cloud systems, which deals with allocating virtual machine requests into prebooked resources from a cloud broker, maximizing the broker profit. Three metaheuristic are studied: Simulated Annealing, Genetic Algorithm, and hybrid Evolutionary Algorithm. The experimental evaluation over instances accounting for workloads and scenarios using real data from cloud providers, indicates that the parallel hybrid Evolutionary Algorithm is the best method to solve the problem, computing solutions with up to 368.9% profit improvement over greedy heuristics results while accounting for accurate makespan and flowtime values. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailSurvey on Broadcast Algorithms for Mobile Ad Hoc Networks
Ruiz, Patricia UL; Bouvry, Pascal UL

in ACM Computing Surveys (2015), 48(1),

Networking at any time and any place paves the way for a large number of possible applications in ad hoc networks, from disaster relief in remote areas to network extension. Thus, for the past decades ... [more ▼]

Networking at any time and any place paves the way for a large number of possible applications in ad hoc networks, from disaster relief in remote areas to network extension. Thus, for the past decades, many works have been proposed trying to make ad hoc networks a reality. The importance of broadcasting in networking and the broadcast nature of the wireless medium have encouraged researchers to join their efforts on designing efficient dissemination algorithms for Mobile Ad Hoc Networks (MANETs). The many different challenges that MANETs face, such as limited network resources, network partitions, or energy restrictions, gave rise to many different approaches to overcome one or more of those problems. Therefore, literature reveals a huge variety of techniques that have been proposed for efficient message dissemination. In this article, we make an in-depth review of the existing state-of-the-art techniques, as well as propose a new taxonomy that provides a global overview of the most relevant existing algorithms. [less ▲]

Detailed reference viewed: 4 (0 UL)
See detailPerspectives for the development of ECEC in Europe
Honig, Michael-Sebastian UL

Scientific Conference (2015, September)

Detailed reference viewed: 20 (1 UL)
Full Text
See detailHarvesting Fix Hints in the History of Bugs
Bissyande, Tegawendé François D Assise UL

Report (2015)

In software development, fixing bugs is an im- portant task that is time consuming and cost-sensitive. While many approaches have been proposed to automatically detect and patch software code, the ... [more ▼]

In software development, fixing bugs is an im- portant task that is time consuming and cost-sensitive. While many approaches have been proposed to automatically detect and patch software code, the strategies are limited to a set of identified bugs that were thoroughly studied to define their properties. They thus manage to cover a niche of faults such as infinite loops. We build on the assumption that bugs, and the associated user bug reports, are repetitive and propose a new approach of fix recommendations based on the history of bugs and their associated fixes. In our approach, once a bug is reported, it is automatically compared to all previously fixed bugs using information retrieval techniques and machine learning classification. Based on this comparison, we recommend top-k fix actions, identified from past fix examples, that may be suitable as hints for software developers to address the new bug [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailFinding a robust configuration for the AEDB information dissemination protocol for mobile ad hoc networks
Ruiz, Patricia; Dorronsoro, Bernabé UL; Talbi, El-Ghazali et al

in Applied Soft Computing (2015), 32

The Adaptive Enhanced Distance Based Broadcasting Protocol, AEDB hereinafter, is an advanced adaptive protocol for information dissemination in mobile ad hoc networks (MANETs). It is based on the Distance ... [more ▼]

The Adaptive Enhanced Distance Based Broadcasting Protocol, AEDB hereinafter, is an advanced adaptive protocol for information dissemination in mobile ad hoc networks (MANETs). It is based on the Distance Based broadcasting protocol, and it acts differently according to local information to minimize the energy and network use, while maximizing the coverage of the broadcasting process. As most of the existing communication protocols, AEDB relies on different thresholds for adapting its behavior to the environment. We propose in this work to look for configurations that induce a stable performance of the protocol in different networks by automatically fine tuning these thresholds thanks to the use of cooperative coevolutionary multi-objective evolutionary algorithms. Finding robust solutions for this problem is important because MANETs have a highly unpredictable and dynamic topology, features that have a strong influence on the performance of the protocol. Consequently, robust solutions that show a good performance under any circumstances are required. In this work, we define different fitness functions that measure robustness of solutions for better guiding the algorithm towards more robust solutions. They are: median, constrained, worst coverage, and worst hypervolume. Results show, that the two worst-case approaches perform better, not only in case of robustness but also in terms of accuracy of the reported AEDB configurations on a large set of networks. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailKulturpolitik und Romantik. Zur Einleitung
Dembeck, Till UL

in Athenäum (2015), 25

Detailed reference viewed: 7 (0 UL)