Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailIdentifying elastoplastic parameters with Bayes' theorem considering double error sources and model uncertainty
Rappel, Hussein UL; Beex, Lars UL; Noels, Ludovic et al

in Probabilistic Engineering Mechanics (in press)

We discuss Bayesian inference for the identi cation of elastoplastic material parameters. In addition to errors in the stress measurements, which are commonly considered, we furthermore consider errors in ... [more ▼]

We discuss Bayesian inference for the identi cation of elastoplastic material parameters. In addition to errors in the stress measurements, which are commonly considered, we furthermore consider errors in the strain measurements. Since a difference between the model and the experimental data may still be present if the data is not contaminated by noise, we also incorporate the possible error of the model itself. The three formulations to describe model uncertainty in this contribution are: (1) a random variable which is taken from a normal distribution with constant parameters, (2) a random variable which is taken from a normal distribution with an input-dependent mean, and (3) a Gaussian random process with a stationary covariance function. Our results show that incorporating model uncertainty often, but not always, improves the results. If the error in the strain is considered as well, the results improve even more. [less ▲]

Detailed reference viewed: 12 (5 UL)
Full Text
Peer Reviewed
See detailTeacher expectations concerning students with immigrant background or special educational needs
Pit-Ten Cate, Ineke UL; Glock, Sabine UL

in Journal of Educational Research and Evaluation (in press)

Male students with immigrant backgrounds are disproportionally referred for special educational support outside regular classrooms or schools, which may reflect differential teachers´ expectations ... [more ▼]

Male students with immigrant backgrounds are disproportionally referred for special educational support outside regular classrooms or schools, which may reflect differential teachers´ expectations concerning the academic achievement of students based on socio-demographic characteristics. Although research has indicated differential teachers´ expectations for students based on immigrant background or special educational needs (SEN), less is known about a possible double vulnerability associated with combined stereotypes. Therefore, in the current study both SEN and immigrant background were systematically varied and teachers were asked to rate the students´ academic achievement. Results show that teachers´ expectations of students with SEN and immigrant background was lower than for students without immigrant background, especially in regards to language proficiency. These results may help to explain the overrepresentation of students with immigrant background in special educational programs. The educational and theoretical implications of these findings are discussed. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailMaintenance location routing for rolling stock under line and fleet planning uncertainty
Arts, Joachim UL; Tönissen, Denise; Shen, Zuo-Jun

in Transportation Science (in press)

Detailed reference viewed: 41 (6 UL)
Full Text
Peer Reviewed
See detailNew synthetic opioids: Part of a new addiction landscape.
Karila, Laurent; Marillier, Maude; Chaumette, Boris et al

in Neuroscience and biobehavioral reviews (in press)

Synthetic opioids (SO) are a major risk for public health across the world. These drugs can be divided into 2 categories, pharmaceutical and non-pharmaceutical fentanyls. A new generation of SO has ... [more ▼]

Synthetic opioids (SO) are a major risk for public health across the world. These drugs can be divided into 2 categories, pharmaceutical and non-pharmaceutical fentanyls. A new generation of SO has emerged on the drug market since 2010. North America is currently facing an opioid epidemic of morbi-mortality, caused by over-prescription of opioids, illegally diverted prescribed medicines, the increasing use of heroin, is and the emergence of SO. Furthermore, this opioid crisis is also seen in Europe. SO are new psychoactive substances characterized by different feature such as easy availability on the Internet, low price, purity, legality, and lack of detection in laboratory tests. They have not been approved or are not recommended for human use. Opioid misuse is associated with somatic and psychiatric complications. For many substances, limited pharmacological information is available, increasing the risk of harmful adverse events. Health actors and the general population need to be clearly informed of the potential risks and consequences of the diffusion and use of SO. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailDoes “forced abstinence” from gaming lead to pornography use? Insight from the April 2018 crash of Fortnite’s servers
Castro-Calvo, Jesús; Ballester-Arnal, Rafael; Potenza, Marc et al

in Journal of Behavioral Addictions (in press)

In April 2018, the servers of the popular video game “Fortnite” crashed for 24 hr. During this period, Pornhub (a popular pornographic website) analyzed trends in pornography access, finding that: (a) the ... [more ▼]

In April 2018, the servers of the popular video game “Fortnite” crashed for 24 hr. During this period, Pornhub (a popular pornographic website) analyzed trends in pornography access, finding that: (a) the percentage of gamers accessing Pornhub increased by 10% and (b) the searches of pornographic videos using the key term “Fortnite” increased by 60%. In this letter, we discuss these observations in the context of ongoing debate regarding the validity of “withdrawal” when applied to problematic involvement in video gaming and the potential use of pornography as a “compensation behavior” during the periods of “forced abstinence” from gaming. [less ▲]

Detailed reference viewed: 327 (0 UL)
Peer Reviewed
See detailStriking a balance between competitiveness and social fairness: what can we expect from the European Pillar of Social Rights?
Muñoz, Susana UL

in Chiocchetti, Paolo; Allemand, Frédéric (Eds.) Competitiveness and Solidarity in the European Union: Interdisciplinary Perspectives (2019)

The solemnly proclaimed European Pillar of Social Rights provides a meaningful response to the process of building a deeper, fairer European Union in the aftermath of the crisis. This chapter aims to ... [more ▼]

The solemnly proclaimed European Pillar of Social Rights provides a meaningful response to the process of building a deeper, fairer European Union in the aftermath of the crisis. This chapter aims to provide a critical assessment of the nature, scope, rationale, purpose, content and effectiveness of the Pillar in the light of its potential contribution to foster social fairness and competitiveness in the EU. The Pillar complements and develops the EU’s social acquis and reinforces standards which may provide a fairer and more socially-balanced competitiveness in the EU. Progress has been made, but further efforts are needed to build a sense of common purpose to strengthen the social foundations of the Union. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailA Pedagogical Note on Risk Sharing Versus Instability in International Financial Integration: When Obstfeld Meets Stiglitz
Boucekkine, Raouf; Zou, Benteng UL

in Open Economies Review (2019)

The pure risk sharing mechanism implies that financial liberalization is growth enhancing for all countries as the world portfolio shifts from safe low-yield capital to riskier high-yield capital. This ... [more ▼]

The pure risk sharing mechanism implies that financial liberalization is growth enhancing for all countries as the world portfolio shifts from safe low-yield capital to riskier high-yield capital. This result is typically obtained under the assumption that the volatilities for risky assets prevailing under autarky are not altered after liberalization. We relax this assumption within a simple two-country model of intertemporal portfolio choices. By doing so, we put together the risk sharing effect and a well defined instability effect. We identify the conditions under which liberalization may cause a drop in growth. These conditions combine the typical threshold conditions outlined in the literature, which concern the deep characteristics of the economies, and size conditions on the instability effect induced by liberalization. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailClimate politics: how public persuasion affects the trade-off between environmental and economic performance
Prieur, Fabien; Zou, Benteng UL

in Mathematical Social Sciences (2019)

This paper aims at studying the impact of public persuasion, through information dissemination, on environmental and economic performance. A differential game in which opposite interest groups compete for ... [more ▼]

This paper aims at studying the impact of public persuasion, through information dissemination, on environmental and economic performance. A differential game in which opposite interest groups compete for bringing the majority’s environmental concern closer to their views is developed. The results show a strong asymmetry in the impact of public persuasion. It may bring the median voter economy closer to the social optimum in the long run, thereby reducing environmental and economic distorsions. But this only occurs when the environmental group exhibits a radical ideology and people are initially closer to the industrialists’ views. By contrast, economies where industrial groups are powerful and strongly opposed to environmental protection never benefit from the outcome of the game of persuasion. This may explain why the US have failed to take action on global warming up to now. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailTo MigrateWith orWithout Ones’ Children in China - That is the Question
Chen, Yiwen UL; Fromentin, Vincent; Zou, Benteng UL

in Annals of Eceonomcis and statistics (2019)

Where should Chinese internal migrant parents locate their school-aged children: migrate with them or leave them behind? And should they invest in private education of their children? We investigate ... [more ▼]

Where should Chinese internal migrant parents locate their school-aged children: migrate with them or leave them behind? And should they invest in private education of their children? We investigate whether migrant parents can afford to take their children to migrate and thus provide theoretical optimum that maximizes migrant parents’ utility which includes the children’s educational performance. Depending on the educational investment parents make and the relocation cost of children, we provide necessary and sufficient conditions under which migrant parents should take their children to migrate and conditions under which migrant parents should provide their children with private education. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailSequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, December)

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays facilitate simultaneous wireless information and power transfer (SWIPT) to the end-users. In this context, we address an optimization problem to maximize the end-users’ sum-rate subjected to transmit power and harvested energy constraints. Furthermore, the problem is formulated for both time-switching (TS) and power-splitting (PS) SWIPT schemes.We aim at optimizing the users’ SWIPT splitting factors as well as sub-carrier–destination assignment, sub-carrier pairing, and relay–destination coupling metrics. This kind of joint evaluation is combinatorial in nature with non-linear structure involving mixed-integer programming. In this vein, we propose a sub-optimal low complex sequential resource distribution (SRD) method to solve the aforementioned problem. The performance of the proposed SRD technique is compared with a semi-random resource allocation and relay selection approach. Simulation results reveal the benefits of the proposed design under several parameter values with various operating conditions to illustrate the efficiency of SWIPT schemes for the proposed techniques. [less ▲]

Detailed reference viewed: 36 (5 UL)
Full Text
Peer Reviewed
See detailPower and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks
Lei, Lei UL; You, Lei; Yang, Yang UL et al

in IEEE Global Communications Conference (GLOBECOM) 2018 (2018, December)

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 123 (21 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 70 (7 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 33 (0 UL)
Peer Reviewed
See detailSecurity, reliability and regulation compliance in Ultrascale Computing System
Bouvry, Pascal UL; Varrette, Sébastien UL; Wasim, Muhammad Umer UL et al

in Carretero, J.; Jeannot, E. (Eds.) Ultrascale Computing Systems (2018)

Ultrascale Computing Systems (UCSs) are envisioned as large-scale complex systems joining parallel and distributed computing systems that will be two to three orders of magnitude larger than today’s ... [more ▼]

Ultrascale Computing Systems (UCSs) are envisioned as large-scale complex systems joining parallel and distributed computing systems that will be two to three orders of magnitude larger than today’s systems (considering the number of Central Process Unit (CPU) cores). It is very challenging to find sustainable solutions for UCSs due to their scale and a wide range of possible applications and involved technologies. For example, we need to deal with heterogeneity and cross fertilization among HPC, large-scale distributed systems, and big data management. One of the challenges regarding sustainable UCSs is resilience. Another one, which attracted less interest in the literature but becomes more and more crucial with the expected convergence with the Cloud computing paradigm, is the notion of regulation in such system to assess the Quality of Service (QoS) and Service Level Agreement (SLA) proposed for the use of these platforms. This chapter covers both aspects through the reproduction of two articles: [1] and [2]. [less ▲]

Detailed reference viewed: 21 (6 UL)
Peer Reviewed
See detailA Full-Cost Model for Estimating the Energy Consumption of Computing Infrastructures
Orgerie, Anne-Cecile; Varrette, Sébastien UL

in Carretero, J.; Jeannot, E. (Eds.) Ultrascale Computing Systems (2018)

Since its advent in the middle of the 2000’s, the Cloud Computing (CC) paradigm is increasingly advertised as a price-effective solution to many IT problems. This seems reasonable if we exclude the pure ... [more ▼]

Since its advent in the middle of the 2000’s, the Cloud Computing (CC) paradigm is increasingly advertised as a price-effective solution to many IT problems. This seems reasonable if we exclude the pure performance point of view as many studies highlight a non-negligible overhead induced by the virtualization layer at the heart of every Cloud middleware when subjected to an High Performance Computing (HPC) workload. When this is the case, traditional HPC and Ultrascale computing systems are required, and then comes the question of the real cost-effectiveness, especially when comparing to instances offered by the Cloud providers. In this section, and inspired by the work proposed in [1], we propose a Total Cost of Ownership (TCO) analysis of an in-house academic HPC facility of medium-size (in particular the one operated at the University of Luxembourg since 2007, or within the Grid’5000 project [2]), and compare it with the investment that would have been required to run the same platform (and the same workload) over a competitive Cloud IaaS offer. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailThe Price of Privacy in Collaborative Learning
Pejo, Balazs UL; Tang, Qiang UL; Gergely, Biczok

Poster (2018, October)

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼]

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have enough data to train a reasonably accurate model. For such organizations, a realistic solution is to train machine learning models based on a joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
See detailReport: The European Commission's e-Evidence Proposals
Robinson, Gavin UL

in European Data Protection Law Review (2018), (3),

In April 2018, the European Commission presented a legislative package intended to enable, foster and formalise cross-border access by national judicial authorities to electronic evidence controlled by ... [more ▼]

In April 2018, the European Commission presented a legislative package intended to enable, foster and formalise cross-border access by national judicial authorities to electronic evidence controlled by private service providers.1 In particular the public-private character of the ‘cooperation’ envisaged in the proposed set-up raises several questions at the interface of criminal procedure and data protection law. This report provides a brief overview of the proposed EUlegislation and an introduction to themost salient attendant legal and policy-related issues. [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailShared Access Satellite-Terrestrial Reconfigurable Backhaul Network Enabled by Smart Antennas at MmWave Band
Artiga, Xavier; Pérez-Neira; Baranda et al

in IEEE Network (2018)

Detailed reference viewed: 3 (0 UL)
See detailPreventing and Resolving Conflicts of Jurisdiction in EU Criminal Law
Ligeti, Katalin UL; Robinson, Gavin UL; European Law Institute

Book published by Oxford University Press (2018)

Detailed reference viewed: 22 (6 UL)