Last 7 days     Results 61-80 of 4377.   1 2 3 4 5 6 7 8 9   Commentary of Article 272 TFEU: Jurisdiction of the Union courts pursuant to an arbitration clauseNeframi, Eleftheria in Commentary of the TFEU (in press)Detailed reference viewed: 78 (2 UL) Im Schatten der Geschichte. Die (vergessene) Gewaltkommission der Bundesregierung zur Analyse und Prävention politisch motivierter Gewalt (1987 bis 1990)Eckert, Roland; Schumacher, Anette ; Willems, Helmut in Zeithistorische Forschungen (in press)Detailed reference viewed: 17 (10 UL) The Politics of Church Land Administration: the Case of the Orthodox Patriarchate of Jerusalem in Ottoman and Mandatory PalestinePapastathis, Konstantinos ; Kark, Ruthin Byzantine & Modern Greek Studies (in press)Detailed reference viewed: 36 (0 UL) An Investigation of Compression Techniques to Speed up Mutation TestingZhu; Panichella, Annibale ; Zaidman, Andyin 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]Detailed reference viewed: 61 (15 UL) A generalization of the concept of distance based on the simplex inequalityKiss, Gergely ; Marichal, Jean-Luc ; Teheux, Bruno in Beiträge zur Algebra und Geometrie / Contributions to Algebra and Geometry (in press)We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex ... [more ▼]We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex inequality $d(x_1, \ldots, x_n)~\leq~K\, \sum_{i=1}^n d(x_1, \ldots, x_n)_i^z{\,}, \qquad x_1, \ldots, x_n, z \in X,$ where $K=1$. Here $d(x_1,\ldots,x_n)_i^z$ is obtained from the function $d(x_1,\ldots,x_n)$ by setting its $i$th variable to $z$. We provide several examples of $n$-distances, and for each of them we investigate the infimum of the set of real numbers $K\in\left]0,1\right]$ for which the inequality above holds. We also introduce a generalization of the concept of $n$-distance obtained by replacing in the simplex inequality the sum function with an arbitrary symmetric function. [less ▲]Detailed reference viewed: 53 (14 UL) Environmental and sustainability education in the Benelux countries: Research, policy and practices at the intersection of education and societal transformationVan Poeck, Katrien; König, Ariane ; Wals, Arjen E.J.in Environmental Education Research (in press), (Special Issue), As an introductory article of a Special Issue on Environmental and Sustainability Education (ESE) in the Benelux region, this paper provides an overview of ESE research, policy and practice in Belgium ... [more ▼]As an introductory article of a Special Issue on Environmental and Sustainability Education (ESE) in the Benelux region, this paper provides an overview of ESE research, policy and practice in Belgium, The Netherlands and Luxembourg. It discusses the different contributions in this collection with regard to how the central theme of this issue, the relation between education and societal transformation, is approached in each paper. The main characteristics of the ESE research fields in the Benelux are described in general terms, and placed within the context of how ESE policy and practice are organised in these countries. Next, different conceptualisations of the relation between educational and political spaces reflected in the collection are discussed and the varied contributions to this issue are positioned in relation to three distinguished traditions of approaching the place of democracy in ESE. The authors conclude with commenting on how this relates to different approaches to the research-policy-practice interface. [less ▲]Detailed reference viewed: 88 (5 UL) Environmental and Sustainability Education in the Benelux RegionVan Poeck, Katrien; Wals, Arjen E.J.; König, Ariane in Environmental Education Research (in press), (Special Issue), Detailed reference viewed: 19 (2 UL) Modeling Security and Privacy Requirements: a Use Case-Driven ApproachMai, Xuan Phu ; Göknil, Arda ; Shar, Lwin Khin et alin Information and Software Technology (in press)Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These ... [more ▼]Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These services are delivered through an ecosystem of device-specific software components and interfaces (e.g., mobile and wearable device applications). Since they often handle private information (e.g., location and health status), their security and privacy requirements are of crucial importance. Defining and analyzing those requirements is a significant challenge due to the multiple types of software components and devices integrated into software ecosystems. Each software component presents peculiarities that often depend on the context and the devices the component interact with, and that must be considered when dealing with security and privacy requirements. Objective: In this paper, we propose, apply, and assess a modeling method that supports the specification of security and privacy requirements in a structured and analyzable form. Our motivation is that, in many contexts, use cases are common practice for the elicitation of functional requirements and should also be adapted for describing security requirements. Method: We integrate an existing approach for modeling security and privacy requirements in terms of security threats, their mitigations, and their relations to use cases in a misuse case diagram. We introduce new security-related templates, i.e., a mitigation template and a misuse case template for specifying mitigation schemes and misuse case specifications in a structured and analyzable manner. Natural language processing can then be used to automatically report inconsistencies among artifacts and between the templates and specifications. Results: We successfully applied our approach to an industrial healthcare project and report lessons learned and results from structured interviews with engineers. Conclusion: Since our approach supports the precise specification and analysis of security threats, threat scenarios and their mitigations, it also supports decision making and the analysis of compliance to standards. [less ▲]Detailed reference viewed: 12 (3 UL) Conflicting temporalities of social and environmental changeLockie, Stewart; Wong, Catherine in Boström, M.; Davidson, D. (Eds.) Environment and Society: Concepts and Challenges. (in press)This chapter explores how time and temporality – that is, the rhythms and tempos of social and environmental change – have been considered in social theory before going on to explore the conceptual ... [more ▼]This chapter explores how time and temporality – that is, the rhythms and tempos of social and environmental change – have been considered in social theory before going on to explore the conceptual frameworks and practices through which policy-makers seek to influence temporal processes in the specific context of climate change policy. The chapter highlights conflict between the temporalities of climate change and the temporalities of politics, as well as conflict between the temporalities of competing political and decision-making processes. While policy-makers advocate strategies to depoliticize climate policy in response to these conflicts, the chapter argues this is neither possible nor desirable. Instead, it advocates more democratic and deliberative approaches to the challenge of synchronizing ever more visible ecological temporalities with the multiple temporalities of the social. [less ▲]Detailed reference viewed: 7 (1 UL) Environmental and Sustainability Education (ESE) in the Benelux regionVan Poeck, Katrien; Wals, Arjen E.J.; König, Ariane in Environmental Education Research (in press)Detailed reference viewed: 15 (3 UL) Assessment of the suitability of gravel wash mud as raw material for the synthesis of an alkali-activated binderThapa, Vishojit Bahadur ; Waldmann, Danièle ; Wagner, Jean-Frank et alin Applied Clay Science (SJR Index:Q1) (in press)Gravel wash mud (GWM), a waste product from gravel mining was dried and processed into a fine powder to be activated by different concentrations of sodium hydroxide (NaOH) solutions for the synthesis of ... [more ▼]Gravel wash mud (GWM), a waste product from gravel mining was dried and processed into a fine powder to be activated by different concentrations of sodium hydroxide (NaOH) solutions for the synthesis of an alkali-activated binder. The GWM powders were thermally treated at five different calcination temperatures 550, 650, 750, 850 and 950°C. The characterisation of the raw material comprises the particle size distribution (PSD) by laser granulometry, the chemical and mineralogical composition by X-ray fluorescence and X-ray diffraction analysis respectively, and simultaneous thermal analysis. The performance of the alkali-activated binders was examined using compression strength tests and the microstructure was observed using scanning electron microscopy (SEM). The GWM was classified as an aluminosilicate raw material with kaolinite and illite as main clay minerals. Furthermore, a mean particle size around 6.50μm was determined for the uncalcined and calcined GWM powders. The SEM images of the developed binders showed the formation of a compact microstructure, however, relatively low strengths were achieved. This preliminary study highlights an example of an aluminosilicate prime material, which shows very promising chemical and mineralogical characteristics, but its suitability for alkaline activation without further additives was not confirmed as far as performance-based criteria are considered. [less ▲]Detailed reference viewed: 17 (6 UL) Security of Distance−Bounding: A SurveyGildas, Avoine; Muhammed, Ali Bingöl; Ioana, Boureanu et alin ACM Computing Surveys (in press)Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e ... [more ▼]Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features. [less ▲]Detailed reference viewed: 38 (0 UL) New Directions in Attack Tree Research: Catching up with Industrial NeedsGadyatskaya, Olga ; Trujillo Rasua, Rolando in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]Detailed reference viewed: 52 (2 UL) Intertemporal material deprivation: a proposal and an application to EU countriesD'Ambrosio, Conchita ; Bossert, Walterin Dasgupta, Indraneel; Mitra, Manipushpak (Eds.) Deprivation, Inequality and Polarization: Essays in Honour of Satya Ranjan Chakravarty (in press)This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio ... [more ▼]This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio (2014) by adapting the class of indices on the measurement of poverty over time of Dutta, Roope and Zank (2013). An application to the analysis of material deprivation within EU countries is then provided. Following the path of material deprivation experienced by each individual over time yields a picture which differs from that in the annual results. Since the measurement of material deprivation is used by the EU member states and the European Commission to monitor national and EU progress in the fight against poverty and social exclusion, the results suggest that time cannot be neglected. Countries should not only be compared based on their year-by-year results, but additional information is gained by following individuals over time and producing an aggregate measure once dynamic considerations are taken into consideration. [less ▲]Detailed reference viewed: 53 (2 UL) On Koszul-Tate resolutions and Sullivan modelsPistalo, Damjan ; Poncin, Norbert in Dissertationes Mathematicae (in press)Detailed reference viewed: 81 (14 UL) The Scent of a Smell: An Extensive Comparison between Textual and Structural SmellsPalomba, Fabio; Panichella, Annibale ; Zaidman, Andy et alin IEEE Transactions on Software Engineering (in press)Code smells are symptoms of poor design or implementation choices that have a negative effect on several aspects of software maintenance and evolution, such as program comprehension or change- and fault ... [more ▼]Code smells are symptoms of poor design or implementation choices that have a negative effect on several aspects of software maintenance and evolution, such as program comprehension or change- and fault-proneness. This is why researchers have spent a lot of effort on devising methods that help developers to automatically detect them in source code. Almost all the techniques presented in literature are based on the analysis of structural properties extracted from source code, although alternative sources of information (e.g., textual analysis) for code smell detection have also been recently investigated. Nevertheless, some studies have indicated that code smells detected by existing tools based on the analysis of structural properties are generally ignored (and thus not refactored) by the developers. In this paper, we aim at understanding whether code smells detected using textual analysis are perceived and refactored by developers in the same or different way than code smells detected through structural analysis. To this aim, we set up two different experiments. We have first carried out a software repository mining study to analyze how developers act on textually or structurally detected code smells. Subsequently, we have conducted a user study with industrial developers and quality experts in order to qualitatively analyze how they perceive code smells identified using the two different sources of information. Results indicate that textually detected code smells are easier to identify and for this reason they are considered easier to refactor with respect to code smells detected using structural properties. On the other hand, the latter are often perceived as more severe, but more difficult to exactly identify and remove. [less ▲]Detailed reference viewed: 56 (5 UL) A Machine Learning-Driven Evolutionary Approach for Testing Web Application FirewallsAppelt, Dennis; Nguyen, Cu D.; Panichella, Annibale et alin IEEE Transactions on Reliability (in press)Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs ... [more ▼]Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs have to be updated and tested regularly to prevent attackers from easily circumventing them. In this paper, we focus on testing WAFs for SQL injection attacks, but the general principles and strategy we propose can be adapted to other contexts. We present ML-Driven, an approach based on machine learning and an evolutionary algorithm to automatically detect holes in WAFs that let SQL injection attacks bypass them. Initially, ML-Driven automatically generates a diverse set of attacks and submit them to the system being protected by the target WAF. Then, ML-Driven selects attacks that exhibit patterns (substrings) associated with bypassing the WAF and evolve them to generate new successful bypassing attacks. Machine learning is used to incrementally learn attack patterns from previously generated attacks according to their testing results, i.e., if they are blocked or bypass the WAF. We implemented ML-Driven in a tool and evaluated it on ModSecurity, a widely used open-source WAF, and a proprietary WAF protecting a financial institution. Our empirical results indicate that ML-Driven is effective and efficient at generating SQL injection attacks bypassing WAFs and identifying attack patterns. [less ▲]Detailed reference viewed: 152 (10 UL) Gute Kindheit. Wohlbefinden, Kindeswohl und UngleichheitBetz, Tanja; Bollig, Sabine; Joos, Magdalena et alBook published by Beltz Juventa (in press)Detailed reference viewed: 57 (5 UL) Communautés de vie et fiscalité individuelle au Grand-Duché de LuxembourgChaouche, Fatima in Revue européenne et internationale de droit fiscal (in press)Detailed reference viewed: 39 (6 UL) Bildung für nachhaltige Entwicklung in der Grundschule: Praxisrelevante Ergebnisse einer international-vergleichenden Studie in Deutschland und LuxemburgAndersen, Katja Natalie in Peschel, Markus; Carla, Ursula (Eds.) Dimensionen des Sachunterrichts: Kinder - Sachen - Welten (in press)Detailed reference viewed: 24 (3 UL)