Results 3081-3100 of 4402.
Bookmark and Share    
Full Text
Peer Reviewed
See detailQuasi-Open Bisimilarity with Mismatch is Intuitionistic
Horne, Ross James UL; Ahn, Ki Yung; Lin, Shang-wei et al

in Proceedings of LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS '18) (2018)

Quasi-open bisimilarity is the coarsest notion of bisimilarity for the π-calculus that is also a congruence. This work extends quasi-open bisimilarity to handle mismatch (guards with inequalities). This ... [more ▼]

Quasi-open bisimilarity is the coarsest notion of bisimilarity for the π-calculus that is also a congruence. This work extends quasi-open bisimilarity to handle mismatch (guards with inequalities). This minimal extension of quasi-open bisimilarity allows fresh names to be manufactured to provide constructive evidence that an inequality holds. The extension of quasi-open bisimilarity is canonical and robust --- coinciding with open barbed bisimilarity (an objective notion of bisimilarity congruence) and characterised by an intuitionistic variant of an established modal logic. The more famous open bisimilarity is also considered, for which the coarsest extension for handling mismatch is identified. Applications to checking privacy properties are highlighted. Examples and soundness results are mechanised using the proof assistant Abella. [less ▲]

Detailed reference viewed: 49 (1 UL)
Full Text
Peer Reviewed
See detailSkew-symmetric Nitsche’s formulation in isogeometric analysis: Dirichlet and symmetry conditions, patch coupling and frictionless contact
Hu, Qingyuan; Chouly, Franz; Hu, Ping et al

in Computer Methods in Applied Mechanics and Engineering (2018), 341

A simple skew-symmetric Nitsche’s formulation is introduced into the framework of isogeometric analysis (IGA) to deal with various problems in small strain elasticity: essential boundary conditions ... [more ▼]

A simple skew-symmetric Nitsche’s formulation is introduced into the framework of isogeometric analysis (IGA) to deal with various problems in small strain elasticity: essential boundary conditions, symmetry conditions for Kirchhoff plates, patch coupling in statics and in modal analysis as well as Signorini contact conditions. For linear boundary or interface conditions, the skew-symmetric formulation is parameter-free. For contact conditions, it remains stable and accurate for a wide range of the stabilization parameter. Several numerical tests are performed to illustrate its accuracy, stability and convergence performance. We investigate particularly the effects introduced by Nitsche’s coupling, including the convergence performance and condition numbers in statics as well as the extra “outlier” frequencies and corresponding eigenmodes in structural dynamics. We present the Hertz test, the block test, and a 3D self-contact example showing that the skew-symmetric Nitsche’s formulation is a suitable approach to simulate contact problems in IGA. [less ▲]

Detailed reference viewed: 96 (1 UL)
Full Text
Peer Reviewed
See detailVisualizing the Template of a Chaotic Attractor
Olszewski, Maya Alexandra UL; Meder, Jeff Alphonse Antoine UL; Kieffer, Emmanuel UL et al

in 26th International Symposium on Graph Drawing and Network Visualization (GD 2018) (2018)

Detailed reference viewed: 75 (19 UL)
See detailPlurilingual Identitites. On the way to an integrative view on language education?
Hu, Adelheid UL

in Bonnet, Andreas; Siemund, Peter (Eds.) Foreign Language Education in Multilingual Classrooms (2018)

Detailed reference viewed: 75 (10 UL)
Full Text
Peer Reviewed
See detail"Kinder besitzen eine eigene Kraft für gute Lösungen". Zur Adressierung von Kindern im frühpädagogischen Partizipationsdiskurs
Hekel, Nicole UL

in Bloch, Bianca; Cloos, Peter; Schulz, Marc (Eds.) et al Kinder und Kindheit(en). Frühpädagogische Perspektiven (2018)

Detailed reference viewed: 44 (3 UL)
Full Text
Peer Reviewed
See detailA Methodological Framework to Design a Machine-Readable Privacy Icon Set
Palmirani, Monica; Rossi, Arianna UL; Martoni, Michele et al

in Schweighofer, Erich (Ed.) Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

The GDPR suggests icons to convey data practices in a more straightforward way. Although vi- sualizations to represent legal terms have many benefits, there is fear that they could be misrep- resented by ... [more ▼]

The GDPR suggests icons to convey data practices in a more straightforward way. Although vi- sualizations to represent legal terms have many benefits, there is fear that they could be misrep- resented by designers and misinterpreted by individuals, thus hindering instead of facilitating the comprehension. In order to solve these issues, we present a methodology to generate legal visual representations that is based on an analysis of legal requirements, on an ontological representation of the legal knowledge, and on an iterative, multi-stakeholder design approach, followed by empirical evaluation. [less ▲]

Detailed reference viewed: 66 (4 UL)
Full Text
Peer Reviewed
See detailElliptic Curves Discrete Logarithm Problem over a Finite Field Fp and p-adic Approximations
Leprévost, Franck UL; Bernard, Nicolas UL; Bouvry, Pascal UL

in Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018) (2018)

These notes summarize some computations conducted around the Elliptic Curves Discrete Logarithm Problem (ECDLP) over a finite field Fp.

Detailed reference viewed: 49 (0 UL)
Full Text
Peer Reviewed
See detailThe University of Luxembourg: A National Excellence Initiative
Leprévost, Franck UL

in Altbach, Phil; Reisberg, Liz; Salmi, Jamil (Eds.) et al Accelerated Universities: A ideas and Money Combine to Build Academic Excellence (2018)

Detailed reference viewed: 34 (5 UL)
Full Text
Peer Reviewed
See detailJames Bond's Most Secret Weapon
Leprévost, Franck UL

in Proceedings of the 3rd International Conference on Applications in Information Technology (2018)

This conference presents in a non-conventional way secret-key and public-key cryptology from its origins to the present days.

Detailed reference viewed: 71 (4 UL)
Full Text
Peer Reviewed
See detailEditionsphilologie und inszenierende Typographie: eine praxeologische Perspektive auf die 'Mein-Kampf'-Edition des Instituts für Zeitgeschichte
Busch, Christopher UL; Ahrens, Moritz

in Editio : Internationales Jahrbuch für Editionswissenschaft = International Yearbook of Textual Criticism and Editorial Science] (2018), 32

Detailed reference viewed: 64 (0 UL)
Full Text
Peer Reviewed
See detailClassification of red blood cell shapes in flow using outlier tolerant machine learning
Kihm, A.; Kaestner, L.; Wagner, Christian UL et al

in PLoS Computational Biology (2018)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailAntimargination of microparticles and platelets in the vicinity of branching vessels
Bächer, C.; Kihm, A.; Schrack, L. et al

in Biophysical Journal (2018)

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailMining Fix Patterns for FindBugs Violations
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in IEEE Transactions on Software Engineering (2018)

Several static analysis tools, such as Splint or FindBugs, have been proposed to the software development community to help detect security vulnerabilities or bad programming practices. However, the ... [more ▼]

Several static analysis tools, such as Splint or FindBugs, have been proposed to the software development community to help detect security vulnerabilities or bad programming practices. However, the adoption of these tools is hindered by their high false positive rates. If the false positive rate is too high, developers may get acclimated to violation reports from these tools, causing concrete and severe bugs being overlooked. Fortunately, some violations are actually addressed and resolved by developers. We claim that those violations that are recurrently fixed are likely to be true positives, and an automated approach can learn to repair similar unseen violations. However, there is lack of a systematic way to investigate the distributions on existing violations and fixed ones in the wild, that can provide insights into prioritizing violations for developers, and an effective way to mine code and fix patterns which can help developers easily understand the reasons of leading violations and how to fix them. In this paper, we first collect and track a large number of fixed and unfixed violations across revisions of software. The empirical analyses reveal that there are discrepancies in the distributions of violations that are detected and those that are fixed, in terms of occurrences, spread and categories, which can provide insights into prioritizing violations. To automatically identify patterns in violations and their fixes, we propose an approach that utilizes convolutional neural networks to learn features and clustering to regroup similar instances. We then evaluate the usefulness of the identified fix patterns by applying them to unfixed violations. The results show that developers will accept and merge a majority (69/116) of fixes generated from the inferred fix patterns. It is also noteworthy that the yielded patterns are applicable to four real bugs in the Defects4J major benchmark for software testing and automated repair. [less ▲]

Detailed reference viewed: 71 (2 UL)
Full Text
Peer Reviewed
See detailDeep neural network with high-order neuron for the prediction of foamed concrete strength
Nguyen, Tuan; Kashani, Alireza; Ngo, Tuan et al

in Computer-Aided Civil and Infrastructure Engineering (2018)

The article presents a deep neural network model for the prediction of the compressive strength of foamed concrete. A new, high-order neuron was developed for the deep neural network model to improve the ... [more ▼]

The article presents a deep neural network model for the prediction of the compressive strength of foamed concrete. A new, high-order neuron was developed for the deep neural network model to improve the performance of the model. Moreover, the cross-entropy cost function and rectified linear unit activation function were employed to enhance the performance of the model. The present model was then applied to predict the compressive strength of foamed concrete through a given data set, and the obtained results were compared with other machine learning methods including conventional artificial neural network (C-ANN) and second-order artificial neural network (SO-ANN). To further validate the proposed model, a new data set from the laboratory and a given data set of high-performance concrete were used to obtain a higher degree of confidence in the prediction. It is shown that the proposed model obtained a better prediction, compared to other methods. In contrast to C-ANN and SO-ANN, the proposed model can genuinely improve its performance when training a deep neural network model with multiple hidden layers. A sensitivity analysis was conducted to investigate the effects of the input variables on the compressive strength. The results indicated that the compressive strength of foamed concrete is greatly affected by density, followed by the water-to-cement and sand-to-cement ratios. By providing a reliable prediction tool, the proposed model can aid researchers and engineers in mixture design optimization of foamed concrete. [less ▲]

Detailed reference viewed: 95 (5 UL)
Full Text
Peer Reviewed
See detailNumerical–experimental observation of shape bistability of red blood cells flowing in a microchannel
Guckenberger, A.; Kihm, A.; John, T. et al

in European Physical Journal E. Soft Matter (2018)

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailTowards Purposeful Enterprise Modeling for Enterprise Analysis
de Kinderen, Sybren; Ma, Qin UL

in 2018 International Conference on Information Management & Management Science (2018)

Detailed reference viewed: 139 (3 UL)
Full Text
Peer Reviewed
See detailDecomposing Models through Dependency Graphs
Ma, Qin UL; Kelsen, Pierre UL

in 12th International Symposium on Theoretical Aspects of Software Engineering (2018)

Detailed reference viewed: 74 (5 UL)
Full Text
Peer Reviewed
See detailModeling in Support of Multi-Perspective Valuation of Smart Grid Initiatives
Kaczmarek-Heß, Monika; de Kinderen, Sybren; Ma, Qin UL et al

in IEEE 12th International Conference on Research Challenges in Information Science (2018)

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailEnabling Value Co-Creation in Customer Journeys with VIVA
Razo-Zapata, Iván; Chew, Eng; Ma, Qin UL et al

in Joint International Conference of Service Science and Innovation and Serviceology (2018)

Detailed reference viewed: 33 (2 UL)
Full Text
See detailKrichever-Novikov type algebras. Definitions and Results
Schlichenmaier, Martin UL

E-print/Working paper (2018)

Detailed reference viewed: 18 (0 UL)