Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 25 (4 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 26 (3 UL)
Full Text
Peer Reviewed
See detailEarly reading of preschool children in Serbia: A longitudinal study
Aleksic, Gabrijela UL; Ferring, Dieter UL; Merrell, Christine et al

in Journal of Research in Reading (2018)

It is necessary to identify predictors of early reading, foundation of children’s school success. No study in Serbia has investigated this before. The purpose of our study was to identify predictors of ... [more ▼]

It is necessary to identify predictors of early reading, foundation of children’s school success. No study in Serbia has investigated this before. The purpose of our study was to identify predictors of early reading and explore correlates of preschool children in Serbia. Children (N=159) age 5-8 were assessed three times over 14 months by an adaptive test, Performance Indicators in Primary School (PIPS). Reading at Time 3 was predicted by gender and mathematics and not by vocabulary and phonological awareness from Time 1. Older children performed higher than younger in vocabulary, phonological awareness, reading and mathematics at Time 1 only. Girls scored higher than boys and Romani scored the lowest in reading at all times. This study offers important information on early reading of an under researched population. Attrition of the sample limits the findings. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailLa compétitivité de l'hôpital public : le cas français
Rassafi-Guibal, Hicham UL

in Chiocchetti, Paolo; Allemand, Frederic (Eds.) Compétitivité et solidarité dans l'Union européenne (2018)

Detailed reference viewed: 6 (0 UL)
See detailThe Informal Construction of Europe
Herzog, Mechthild UL; van Heumen, Lennaert

Book published by Routledge (2018)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailLinks between socio-emotional skills, behaviour and cognitive development of preschool children in Serbia: A longitudinal study
Aleksic, Gabrijela UL; Merrell, Christine; Ferring, Dieter UL et al

in Early Childhood Education Journal (2018)

Young children’s socio-emotional skills are important for understanding their own and other’s behaviours and interactions. No study in Serbia has investigated this before. In this study we explored the ... [more ▼]

Young children’s socio-emotional skills are important for understanding their own and other’s behaviours and interactions. No study in Serbia has investigated this before. In this study we explored the links between early socio-emotional skills, behaviour and cognitive development of preschool children in Serbia over time. Children (N=159) aged 5-8 were rated by the teachers on their socio-emotional skills and behaviour, and their literacy and mathematics assessed, at three-time points over 14 months. At Time 3, children’s socio-emotional skills and behaviour were associated with gender and mathematics. Mathematics was associated with children’s social skills and literacy. Literacy was associated with adjustment, gender and mathematics. At all three times, girls were rated more positively than boys. This study offers the first insight into the relationship between socio-emotional skills, behaviour and mathematics and literacy performance of preschool children in Serbia which will inform the development and evaluation of interventions. Attrition of the sample limits the findings. [less ▲]

Detailed reference viewed: 32 (8 UL)
Full Text
Peer Reviewed
See detailJoint signature of two or more systems with applications to multistate systems made up of two-state components
Marichal, Jean-Luc UL; Mathonet, Pierre; Navarro, Jorge et al

in European Journal of Operational Research (2017), 263(2), 559-570

The structure signature of a system made up of n components having continuous and i.i.d. lifetimes was defined in the eighties by Samaniego as the n-tuple whose k-th coordinate is the probability that the ... [more ▼]

The structure signature of a system made up of n components having continuous and i.i.d. lifetimes was defined in the eighties by Samaniego as the n-tuple whose k-th coordinate is the probability that the k-th component failure causes the system to fail. More recently, a bivariate version of this concept was considered as follows. The joint structure signature of a pair of systems built on a common set of components having continuous and i.i.d. lifetimes is a square matrix of order n whose (k,l)-entry is the probability that the k-th failure causes the first system to fail and the l-th failure causes the second system to fail. This concept was successfully used to derive a signature-based decomposition of the joint reliability of the two systems. In the first part of this paper we provide an explicit formula to compute the joint structure signature of two or more systems and extend this formula to the general non-i.i.d. case, assuming only that the distribution of the component lifetimes has no ties. We also provide and discuss a necessary and sufficient condition on this distribution for the joint reliability of the systems to have a signature-based decomposition. In the second part of this paper we show how our results can be efficiently applied to the investigation of the reliability and signature of multistate systems made up of two-state components. The key observation is that the structure function of such a multistate system can always be additively decomposed into a sum of classical structure functions. Considering a multistate system then reduces to considering simultaneously several two-state systems. [less ▲]

Detailed reference viewed: 47 (8 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 45 (12 UL)
Peer Reviewed
See detailLuxembourg Analysis
Danescu, Elena UL; Kmec, Sonja UL

in Hartley, Cathy (Ed.) WESTERN EUROPE 2018 (2017)

With a long tradition of political stability and social democracy, a creative development model, skilled human capital and a culture of consensus, Luxembourg is at the forefront of Europe. Its main ... [more ▼]

With a long tradition of political stability and social democracy, a creative development model, skilled human capital and a culture of consensus, Luxembourg is at the forefront of Europe. Its main strategic challenge is how to achieve economic diversification while maintaining the sustainability of the Luxembourg social model. The country has embarked on the "third industrial revolution", with innovation as the main driver of sustainable growth and the University of Luxembourg as a major player. [less ▲]

Detailed reference viewed: 30 (5 UL)
See detailEnergy, Risk and Governance: The Case of Nuclear Energy in India
Wong, Catherine UL

Book published by Palgrave Macmillan (2017)

This book is about how risk, energy and governance are intertwined in the development of the nuclear industry in India and its relationship with the Indian public. It provides a rare insider-view of how ... [more ▼]

This book is about how risk, energy and governance are intertwined in the development of the nuclear industry in India and its relationship with the Indian public. It provides a rare insider-view of how the nuclear establishment thinks about risk and contrasts that with public understandings of nuclear risk. Through that, the book presents a more nuanced picture of why nuclear energy is considered a rational choice in spite of the risks; the ambiguities in both expert and public risk perceptions; and the internal reflexivities that have emerged within the nuclear establishment as a result of the Fukushima-Daiichi disaster which are not displayed in the public discourse. The insights in this book are not unique to India and similar observations can easily be made in the global nuclear industry. Reflecting on what this means for risk governance in practice, the book proposes a toolkit that practitioners in the nuclear industry can use in public engagement, risk communication and deliberation at various stages of decision-making. [less ▲]

Detailed reference viewed: 51 (4 UL)
Peer Reviewed
See detailValue-Added Modelling in Primary and Secondary School: An Integrative Review of 674 Publications
Levy, Jessica UL; Keller, Ulrich UL; Brunner, Martin et al

Scientific Conference (2017, December)

Detailed reference viewed: 19 (9 UL)
Full Text
Peer Reviewed
See detailOn a geometric framework for Lagrangian supermechanics
Bruce, Andrew UL; Grabowska, Katarzyna; Moreno, Giovanni

in Journal of Geometric Mechanics (2017), 9(4), 411-437

We re--examine classical mechanics with both commuting and anticommuting degrees of freedom. We do this by defining the phase dynamics of a general Lagrangian system as an implicit differential equation ... [more ▼]

We re--examine classical mechanics with both commuting and anticommuting degrees of freedom. We do this by defining the phase dynamics of a general Lagrangian system as an implicit differential equation in the spirit of Tulczyjew. Rather than parametrising our basic degrees of freedom by a specified Grassmann algebra, we use arbitrary supermanifolds by following the categorical approach to supermanifolds. [less ▲]

Detailed reference viewed: 5 (2 UL)
Full Text
Peer Reviewed
See detailThe Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

Scientific Conference (2017, November 17)

Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely ... [more ▼]

Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely just the beginning of a new era. According to a recent intelligence report by Cybersecurity Ventures, the total cost due to ransomware attacks is predicted to exceed $5 billion in 2017. How can this disruptive threat can be contained? Current anti-ransomware solutions are effective only against existing threats, and the worst is yet to come. Cyber criminals will design and deploy more sophisticated strategies, overcoming current defenses and, as it commonly happens in security, defenders and attackers will embrace a competition that will never end. In this arm race, anticipating how current ransomware will evolve may help at least being prepared for some future damage. In this paper, we describe existing techniques to mitigate ransomware and we discuss their limitations. Discussing how current ransomware could become even more disruptive and elusive is crucial to conceive more solid defense and systems that can mitigate zero-day ransomware, yielding higher security levels for information systems, including critical infrastructures such as intelligent transportation networks and health institutions. [less ▲]

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailL’événement énonciatif en sémiotique de l’image : de Roland Barthes à la sémiotique tensive
Colas-Blaise, Marion UL; Dondero, Maria Giulia

in La part de l'oeil (2017)

Detailed reference viewed: 19 (2 UL)
Full Text
Peer Reviewed
See detailAnalysis of Fingerprinting Techniques for Tor Hidden Services
Panchenko, Andriy UL; Mitseva, Asya UL; Henze, Martin et al

in Proceedings of the 24th ACM Computer and Communications Security (ACM CCS) 16th Workshop on Privacy in the Electronic Society (ACM WPES 2017) (2017, October 31)

Detailed reference viewed: 24 (2 UL)
Full Text
Peer Reviewed
See detailAdvanced Interest Flooding Attacks in Named-Data Networking
Signorello, Salvatore UL; Marchal, Samuel; François, Jérôme et al

Scientific Conference (2017, October 30)

The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN’s data-plane seems to offer many advantages, e.g., native ... [more ▼]

The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN’s data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable content requests can be set up effortlessly to exhaust routers’ resources and cause a severe performance drop to legitimate users. So far several countermeasures have addressed this security threat, however, their efficacy was proved by means of simplistic assumptions on the attack model. Therefore, we propose a more complete attack model and design an advanced IFA. We show the efficiency of our novel attack scheme by extensively assessing some of the state-of-the-art countermeasures. Further, we release the software to perform this attack as open source tool to help design future more robust defense mechanisms. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailEthereum: state of knowledge and research perspectives
Tikhomirov, Sergei UL

Scientific Conference (2017, October 24)

Ethereum is a decentralized application platform that allows users to write, deploy, and interact with smart contracts -- programs that encode financial agreements. A peer-to-peer network of mutually ... [more ▼]

Ethereum is a decentralized application platform that allows users to write, deploy, and interact with smart contracts -- programs that encode financial agreements. A peer-to-peer network of mutually distrusting nodes maintains a common view of the state of all accounts and executes smart contracts' code upon request. The global state is stored in a blockchain secured by a proof-of-work consensus mechanism similar to that in Bitcoin. The core value proposition of Ethereum is a Turing-complete programming language that enables implementing complex logic in smart contracts. Decentralized applications without a trusted third party are appealing in many areas, such as financial services, crowdfunding, and gambling. Smart contracts as a research topic contains many unsolved challenges and spans over areas ranging from cryptography, consensus algorithms, and programming languages to governance, ethical, and legal issues. This paper is the first to summarize the state of knowledge in this field. We provide a technical overview of Ethereum and outline open challenges along with proposed solutions. We also mention alternative blockchains with Turing complete programming capabilities. [less ▲]

Detailed reference viewed: 122 (13 UL)
Full Text
See detailA Model-Based Framework for Legal Policy Simulation and Compliance Checking
Soltana, Ghanem UL

Doctoral thesis (2017)

Information systems implementing requirements from laws and regulations, such as taxes and social benefits, need to be thoroughly verified to demonstrate their compliance. Several Verification and ... [more ▼]

Information systems implementing requirements from laws and regulations, such as taxes and social benefits, need to be thoroughly verified to demonstrate their compliance. Several Verification and Validation (V&V) techniques, such as reliability testing, and modeling and simulation, can be used for assessing that such systems meet their legal. Typically, one has to model the expected (legal) behavior of the system in a form that can be executed (simulated), subject the resulting models and the system to the same input data, and then compare the observed behavior of the model simulation and system execution. Existing V&V techniques often rely on code and complex logical expressions with no intuitive appeal to legal experts for specifying the expected behavior of a given system. Subsequently, one has no practical way to validate with legal experts that the underlying legal requirements are indeed complete and constitute a faithful representation of what needs to be implemented. Further, manually defining the expected behavior of a system and its test oracles is a tedious and error-prone task. The challenge here is to find a suitable knowledge representation that can be understood by all the involved stakeholders, e.g., software engineers and legal experts, but that remains complete and precise enough to enable automated analysis such as simulation and testing. As real data is seldom accessible in highly regulated domains, V&V requires the generation of synthetic testing data that can be used to build confidence in the reliability of the system under test. In particular, such data has to be structurally and logically well-formed to raise meaningful failures that can help reasoning about the reliability of the system under test. Further, the data should exhibit as much as possible the actual or anticipated system usage to help mimic how the system would behave under realistic circumstances. Generating such data is not a trivial task as the underlying data schemas are usually large and subject to numerous complex domain-related logical constraints. In this thesis, we investigate the use of the Unified Modeling Language (UML) and model-driven technologies, e.g., model to code transformations, to facilitate V&V activities for information systems that have to conform to laws and regulations, while tackling the above challenges. All our technical solutions have been developed and empirically evaluated in close collaboration with a government administration. Concretely, the technical solutions covered by this thesis include: - A modeling notation and methodology for formalizing legal policies. We propose a modeling notation and methodology for building abstract interpretations of the law. Models built using our methodology are simple enough to be understood by the involved stakeholders and are, at the same time, detailed enough to enable automated V&V activities. - A model-based simulation framework. We develop a model-based framework and associated tool support for simulating legal policies, when formalized using the aforementioned modeling methodology. Simulation provides a comparison baseline of how a compliant system should behave. Further, simulation is a mean to support decision-making when considering legal changes. Specifically, we report on a sizable case study where we assess the anticipated economic implications of a given policy change in Luxembourg’s tax law. - A model-based generator of test cases for reliability testing. We develop a heuristic approach for generating valid and representative test cases (data). Our generator is scalable and produces high-quality test data that is suitable for testing the reliability of data-intensive systems, e.g., a tax management system. [less ▲]

Detailed reference viewed: 17 (7 UL)