Browse ORBi

- What it is and what it isn't
- Green Road / Gold Road?
- Ready to Publish. Now What?
- How can I support the OA movement?
- Where can I learn more?

ORBi

Last 7 days
A generalization of the concept of distance based on the simplex inequality Kiss, Gergely ; Marichal, Jean-Luc ; Teheux, Bruno in Beiträge zur Algebra und Geometrie / Contributions to Algebra and Geometry (in press) We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex ... [more ▼] We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex inequality \[ d(x_1, \ldots, x_n)~\leq~K\, \sum_{i=1}^n d(x_1, \ldots, x_n)_i^z{\,}, \qquad x_1, \ldots, x_n, z \in X, \] where $K=1$. Here $d(x_1,\ldots,x_n)_i^z$ is obtained from the function $d(x_1,\ldots,x_n)$ by setting its $i$th variable to $z$. We provide several examples of $n$-distances, and for each of them we investigate the infimum of the set of real numbers $K\in\left]0,1\right]$ for which the inequality above holds. We also introduce a generalization of the concept of $n$-distance obtained by replacing in the simplex inequality the sum function with an arbitrary symmetric function. [less ▲] Detailed reference viewed: 48 (14 UL)Partizipation in Großschutzgebieten - untersucht am Beispiel der Beteiligung an den Workshops zur Erstellung des Rahmenkonzeptes des Biosphärenreservates Bliesgau 2014 Nienaber, Birte in Weber, Friedericke; Weber, Florian; Jenal, Corinna (Eds.) Wohin des Weges? Regionalentwicklung in Großschutzgebieten (in press) In 2014 a process of public participation was initiated in order to produce a framework concept for the future configuration of the “Biosphere Bliesgau”. This paper presents characteristics of ... [more ▼] In 2014 a process of public participation was initiated in order to produce a framework concept for the future configuration of the “Biosphere Bliesgau”. This paper presents characteristics of participation, both in general and in large-scale protected areas in particular, and discusses what various forms of participation (ranging from pure information as non-participation to bottom-up partnerships as the strongest form of participation) are possible. The empirical-analytical section of the paper investigates the 2014 process of participation in Biosphere Bliesgau, using publically available protocols and interviews. It can be seen that the top-down process – e. g. involving concrete agreements between individuals or groups – involves the selection of participants – intended or otherwise – and that the highest level of participation could therefore not be achieved. [less ▲] Detailed reference viewed: 18 (1 UL)Security of Distance−Bounding: A Survey ; ; et al in ACM Computing Surveys (in press) Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e ... [more ▼] Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features. [less ▲] Detailed reference viewed: 29 (0 UL)New Directions in Attack Tree Research: Catching up with Industrial Needs Gadyatskaya, Olga ; Trujillo Rasua, Rolando in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press) Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼] Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲] Detailed reference viewed: 44 (2 UL)Pointwise regularity of parameterized affine zipper fractal curves fractal curves ; Kiss, Gergely ; in Nonlinearity (in press) We study the pointwise regularity of zipper fractal curves generated by affine mappings. Under the assumption of dominated splitting of index-1, we calculate the Hausdorff dimension of the level sets of ... [more ▼] We study the pointwise regularity of zipper fractal curves generated by affine mappings. Under the assumption of dominated splitting of index-1, we calculate the Hausdorff dimension of the level sets of the pointwise Hölder exponent for a subinterval of the spectrum. We give an equivalent characterization for the existence of regular pointwise Hölder exponent for Lebesgue almost every point. In this case, we extend the multifractal analysis to the full spectrum. In particular, we apply our results for de Rham’s curve. [less ▲] Detailed reference viewed: 17 (2 UL)Intertemporal material deprivation: a proposal and an application to EU countries D'Ambrosio, Conchita ; in Dasgupta, Indraneel; Mitra, Manipushpak (Eds.) Deprivation, Inequality and Polarization: Essays in Honour of Satya Ranjan Chakravarty (in press) This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio ... [more ▼] This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio (2014) by adapting the class of indices on the measurement of poverty over time of Dutta, Roope and Zank (2013). An application to the analysis of material deprivation within EU countries is then provided. Following the path of material deprivation experienced by each individual over time yields a picture which differs from that in the annual results. Since the measurement of material deprivation is used by the EU member states and the European Commission to monitor national and EU progress in the fight against poverty and social exclusion, the results suggest that time cannot be neglected. Countries should not only be compared based on their year-by-year results, but additional information is gained by following individuals over time and producing an aggregate measure once dynamic considerations are taken into consideration. [less ▲] Detailed reference viewed: 36 (1 UL)A Machine Learning-Driven Evolutionary Approach for Testing Web Application Firewalls ; ; Panichella, Annibale et al in IEEE Transactions on Reliability (in press) Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs ... [more ▼] Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs have to be updated and tested regularly to prevent attackers from easily circumventing them. In this paper, we focus on testing WAFs for SQL injection attacks, but the general principles and strategy we propose can be adapted to other contexts. We present ML-Driven, an approach based on machine learning and an evolutionary algorithm to automatically detect holes in WAFs that let SQL injection attacks bypass them. Initially, ML-Driven automatically generates a diverse set of attacks and submit them to the system being protected by the target WAF. Then, ML-Driven selects attacks that exhibit patterns (substrings) associated with bypassing the WAF and evolve them to generate new successful bypassing attacks. Machine learning is used to incrementally learn attack patterns from previously generated attacks according to their testing results, i.e., if they are blocked or bypass the WAF. We implemented ML-Driven in a tool and evaluated it on ModSecurity, a widely used open-source WAF, and a proprietary WAF protecting a financial institution. Our empirical results indicate that ML-Driven is effective and efficient at generating SQL injection attacks bypassing WAFs and identifying attack patterns. [less ▲] Detailed reference viewed: 99 (7 UL)Gute Kindheit. Wohlbefinden, Kindeswohl und Ungleichheit ; ; et al Book published by Beltz Juventa (in press) Detailed reference viewed: 38 (3 UL)Communautés de vie et fiscalité individuelle au Grand-Duché de Luxembourg Chaouche, Fatima in Revue européenne et internationale de droit fiscal (in press) Detailed reference viewed: 34 (6 UL)Bildung für nachhaltige Entwicklung in der Grundschule: Praxisrelevante Ergebnisse einer international-vergleichenden Studie in Deutschland und Luxemburg Andersen, Katja Natalie in Peschel, Markus; Carla, Ursula (Eds.) Dimensionen des Sachunterrichts: Kinder - Sachen - Welten (in press) Detailed reference viewed: 21 (3 UL)Erloubet mir die selben vart. Episodisches Erzählen hoch zu Ross und in der Luft. Mittelalterliche und moderne Helden auf Aventiure-Fahrt Bendheim, Amelie ; in Sieber, Andrea; Müller, Carla (Eds.) âventiure/Abenteuer − Literarisches Lernen mit mittelalterlichen und modernen Medienverbünden (in press) Detailed reference viewed: 19 (0 UL)Fiscalité personelle et droits sociaux des demandeurs de protection internationale au GDL Chaouche, Fatima Book published by Pasicrisie Luxembourg - 1st (in press) Detailed reference viewed: 40 (6 UL)Theater International III Bloch, Natalie ; Heimböckel, Dieter Book published by Hydre Edition (in press) Detailed reference viewed: 32 (1 UL)Caring for the elderly: Effects on Family and Adolescents. Schumacher, Anette ; Willems, Helmut in Boll, Thomas; Ferring, Dieter; Valsiner, Jaan (Eds.) Cultures of care in aging (in press) Detailed reference viewed: 19 (2 UL)Reductions of algebraic integers II Perucca, Antonella in Proceedings of WINE2 (in press) Detailed reference viewed: 23 (2 UL)Reductions of one-dimensional tori II, Perucca, Antonella in Proceedings of WINE2 (in press) Detailed reference viewed: 18 (0 UL)Écriture du genre, genre de l'écriture Barthelmebs-Raguin, Hélène Book published by Peter Lang (in press) Detailed reference viewed: 8 (0 UL)Discursivité des sorcières au XXe siècle, ou l’émancipation par les figures des marges Barthelmebs-Raguin, Hélène in French Studies (in press) Detailed reference viewed: 10 (0 UL)Conclusion à Criminelles Barthelmebs-Raguin, Hélène ; in Barthelmebs-Raguin, Hélène; Freyheit, Matthieu (Eds.) Criminelles. Pourquoi les femmes tuent (in press) Detailed reference viewed: 6 (0 UL)Criminelles. Pourquoi les femmes tuent Barthelmebs-Raguin, Hélène ; Book published by Presses universitaires de Rennes (in press) Detailed reference viewed: 3 (0 UL) |
||