Results 41-60 of 4133.
Bookmark and Share    
Full Text
Peer Reviewed
See detailSchnëssen. Surveying language dynamics in Luxembourgish with a mobile research app
Entringer, Nathalie UL; Gilles, Peter UL; Martin, Sara UL et al

in Linguistic Vanguard (in press)

The mobile app Schnëssen is intended to establish a state-of-the-art digital platform to collect data on the present-day language situation of Luxembourgish by means of crowd-sourcing and to document and ... [more ▼]

The mobile app Schnëssen is intended to establish a state-of-the-art digital platform to collect data on the present-day language situation of Luxembourgish by means of crowd-sourcing and to document and present results to a broader public. Users can participate in a large set of audio recordings tasks and in sociolinguistic surveys. By presenting all audio recordings via an interactive map, participants can explore the language variation of their language. In the first year of data collection, around 210.000 recordings could be collected for numerous variation phenomena from all linguistic levels and over 2800 sociolinguistic questionnaires have been filled out. The app allowed us to compile thus the largest systematic spoken language corpus of Luxembourgish. [less ▲]

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailDie Verlustlisten des Ersten Weltkriegs als historisches namengeographisches Korpus
Flores Flores, W. Amaru; Gilles, Peter UL

in Sammelband 'Namengeographie' (in press)

Für die großflächige, deutschlandweite Kartierung und Analyse der Familiennamen (FamilienN, im Folgenden steht „N“ für Name(n)) stellt bis heute die nach Postleitzahlen gegliederte Datenbank der ... [more ▼]

Für die großflächige, deutschlandweite Kartierung und Analyse der Familiennamen (FamilienN, im Folgenden steht „N“ für Name(n)) stellt bis heute die nach Postleitzahlen gegliederte Datenbank der Telefonanschlüsse, wie sie im Telefonbuch der Deutschen Telekom von 2005 verzeichnet sind die Datenbasis des Projekts 'Deutscher Familiennamenatlas' dar. Im Folgenden werden wir eine neue umfangreiche Datenbasis der deutschen FamilienN vorstellen, die die bisherige um eine historische Dimension erweitern wird. Es handelt sich um die Datenbank der Verlustlisten der Kriegsteilnehmer des Ersten Weltkriegs, die mit ihren rund 7,7 Millionen Namenträgern aus allen Gebieten des damaligen Deutschen Reichs die gesamte FamilienN-Landschaft des ausgehenden 19. Jh. umfassen. Mit dieser neuen Datenbasis wird es möglich sein, die heutige FamilienN-Landschaft mit derjenigen vor 130 Jahren zu vergleichen und damit zum ersten Mal die regionale Festigkeit bzw. Veränderung der FamilienN zu erforschen. Unberührt von den großen europäischen Migrationswellen des 20. Jh. und erst am Beginn der durch die Industrialisierung beschleunigten Urbanisierung, repräsentieren die Verlustlisten die Namenverteilung einer im Vergleich zu heute deutlich weniger mobilen, überwiegend ländlichen Gesellschaft. Über diese neue Kartierungsgrundlage hinaus leisten die Verlustlisten wertvolle Dienste bei der Etymologisierung, bei sprachgeschichtlichen, dialektologischen oder graphematischen Fragestellungen sowie für die Migrationsforschung. [less ▲]

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailLe système juridictionnel de l’Union comme garantie de l’Etat de droit dans la jurisprudence récente de la CJUE
Zinonos, Panagiotis UL

in Revue du Droit de l'Union Européenne (in press)

La jurisprudence récente de la Cour de justice suggère que la fonction du système juridictionnel de l’Union, composé des juridictions nationales et européennes stricto sensu, n’est pas seulement de ... [more ▼]

La jurisprudence récente de la Cour de justice suggère que la fonction du système juridictionnel de l’Union, composé des juridictions nationales et européennes stricto sensu, n’est pas seulement de garantir le contenu matériel de l’Etat de droit. Les principes régissant ce système et ses mécanismes constituent en effet autant de composantes du contenu de l’Etat de droit et font du système juridictionnel une garantie à part entière de cette valeur fondatrice de l’Union. D’un point de vue procédural, la fonction nouvelle du système juridictionnel s’exprime par les obligations incombant aux Etats membres et par l’office européen du juge national, dont la pratique a transformé, dans un esprit de loyauté juridictionnelle et de volontarisme, les mécanismes du renvoi préjudiciel et du mandat d’arrêt européen en garanties systémiques de l’Etat de droit. La présente contribution propose une modélisation nouvelle de l’Union qui permet de visualiser le rapprochement du contenu systémique de la protection juridictionnelle et du principe européen de légalité mais aussi la suprématie du principe de loyauté qui non seulement affecte le principe de légalité mais fait aussi émerger des principes fonctionnels dérivés tels que la primauté et la confiance mutuelle. [less ▲]

Detailed reference viewed: 32 (1 UL)
See detailEU Executive Discretion and the Limits of Law
Mendes, Joana UL

Book published by Oxford University Press (in press)

Detailed reference viewed: 151 (7 UL)
Full Text
Peer Reviewed
See detailThe Integration Between National and International Regulation of Space Resources Activities Under Public International Law
Salmeri, Antonino UL

in Journal of Space Law (in press), 43(1),

In light of the current tendency of regulating space resources activities through national legislation, this article addresses the validity of such emerging practice under Public International Law (PIL ... [more ▼]

In light of the current tendency of regulating space resources activities through national legislation, this article addresses the validity of such emerging practice under Public International Law (PIL). To this end, the article first recalls the traditional debate between Monism and Dualism about the relationship between municipal and international law. This analysis is further completed by focusing also on the counter-position between two cornerstones of PIL, the principles of State sovereignty and Pacta Sunt Servanda. Next, the article assesses the exposure of national law “integrating” international law, focusing on ex post conflicts between the two sources as regulated by Article 27 of the Vienna Convention on the Law of Treaties. Accordingly, the article will show that States not willing to adapt their national laws will have to face international responsibility under the Draft Articles on State Responsibility for Internationally Wrongful Acts. Based on the above, the article then presents the related legal consequences, both at the international and national levels. Finally, the article closes by assessing the role of interpretative declarations and the defense of persistent objector as possible legal tools for dissenting States. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailA Multilayer Low-Altitude Airspace Model for UAV Traffic Management
Samir Labib, Nader UL; Danoy, Grégoire UL; Musial, Jedrzej et al

in Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (in press)

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼]

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲]

Detailed reference viewed: 49 (9 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 83 (0 UL)
Full Text
Peer Reviewed
See detailMultiple Sets Exponential Concentration and Higher Order Eigenvalues
Gozlan, Nathael; Herry, Ronan UL

in Potential Analysis (in press)

On a generic metric measured space, we introduce a notion of improved concentration of measure that takes into account the parallel enlargement of k distinct sets. We show that the k-th eigenvalues of the ... [more ▼]

On a generic metric measured space, we introduce a notion of improved concentration of measure that takes into account the parallel enlargement of k distinct sets. We show that the k-th eigenvalues of the metric Laplacian gives exponential improved concentration with k sets. On compact Riemannian manifolds, this allows us to recover estimates on the eigenvalues of the Laplace-Beltrami operator in the spirit of an inequality of Chung, Grigor’yan & Yau, Upper bounds for eigenvalues of the discrete and continuous Laplace operators. Adv. Math. 117(2), 165–178 (1996). [less ▲]

Detailed reference viewed: 59 (4 UL)
Full Text
Peer Reviewed
See detailUsing crowdsourced data to explore the linguistic landscape of cities. Results from the participatory research project Lingscape
Purschke, Christoph UL

in Brunn, Stanley; Kehrein, Roland (Eds.) Handbook of the Changing World Language Map (in press)

Detailed reference viewed: 58 (0 UL)
See detailSklaverei war gestern? Menschenhandel im Europa des 21. Jahrhunderts
Veit, Charlotte UL; Nienaber, Birte UL

in Binsfeld, Andrea; Ghetta, Marcello (Eds.) Sklaverei und Identität (in press)

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailAn efficient approach towards the source-target control of Boolean networks
Paul, Soumya UL; Su, Cui UL; Pang, Jun UL et al

in IEEE/ACM Transactions on Computational Biology and Bioinformatics (in press)

We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be perturbed in a single-step to drive its dynamics from an initial state to a target ... [more ▼]

We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be perturbed in a single-step to drive its dynamics from an initial state to a target steady state (or attractor), which we call the source-target control of Boolean networks. Due to the phenomenon of state-space explosion, a simple global approach that performs computations on the entire network, may not scale well for large networks. We believe that efficient algorithms for such networks must exploit the structure of the networks together with their dynamics. Taking this view, we derive a decomposition-based solution to the minimal source-target control problem which can be significantly faster than the existing approaches on large networks. We then show that the solution can be further optimised if we take into account appropriate information about the source state. We apply our solutions to both real-life biological networks and randomly generated networks, demonstrating the efficiency and efficacy of our approach. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in 3rd Central European Cybersecurity Conference (in press)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailFescher als dein Schatten. Zur Präsenz des Deutschen in Österreich in der Alltagspraxis
Purschke, Christoph UL

in Hundt, Markus; Kleene, Andrea; Plewnia, Albrecht (Eds.) et al Regiolekte – Objektive Sprachdaten und subjektive Wahrnehmung (in press)

Detailed reference viewed: 38 (3 UL)
Full Text
Peer Reviewed
See detailLörres, Möppes, and the Swiss. (Re)Discovering Regional Patterns in Anonymous Social Media Data
Purschke, Christoph UL; Hovy, Dirk

in Journal of Linguistic Geography (in press)

Detailed reference viewed: 56 (3 UL)
Peer Reviewed
See detailIntroducing Luxembourg in the Ephemeral
Carr, Constance UL

in Mössner, Samuel; Freytag, Tim; Krueger, Rob (Eds.) Adventures in Urban Sustainable Development: Theoretical interventions and notes from the field (in press)

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailOvercome of bed-joint imperfections and improvement of actual contact in dry-stacked masonry
Chewe Ngapeya, Gelen Gael UL; Waldmann, Danièle UL

in Construction and Building Materials (in press)

Several researchers studied dry-stacked masonry walls (DSM) and inferred that the actual contact surface between the different block rows and the compressive strength in such walls are reduced by bed ... [more ▼]

Several researchers studied dry-stacked masonry walls (DSM) and inferred that the actual contact surface between the different block rows and the compressive strength in such walls are reduced by bed-joint imperfections as well as by height differences between different masonry blocks leading both to high stress concentration. This paper concentrates on the first type on imperfections. Through experimental tests, it analyses the influence of bed-joint roughness on the load bearing capacity and investigates a strategy to improve the load-bearing capacity of DSM by placing an additional horizontal layer on the top face of raw masonry blocks. First, different contact layers using conventional and auxetic materials were applied. Then 20 dry-stacked masonry prisms built with raw and improved masonry blocks were tested under axial compressive load until failure. Prescale Fujifilm strips were used to measure the actual contact in the bed-joints. Experimental tests show that the use of a contact layer with well-defined material properties enables firstly to increase the actual contact area in the bed-joints from 23% to 98% of the nominal contact area and secondly to increase the load-bearing capacity by 14 to 97%. In addition, the contact layer with an auxetic material shows a significant capacity in altering the lateral expansion in the block units. The outcomes show that although the bed joint roughness influences the stress distribution in a dry-stacked masonry block, a contact layer with well-defined material properties enables to overcome the roughness induced by the bed-joint imperfections. [less ▲]

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailPlea bargaining at the International Criminal Court: Introducing transformative justice aspects prevalent in African cultures
Oyugi, Phoebe; Owiso, Owiso UL

in Leyh, Brianne McGonigle; Fraser, Julie (Eds.) Intersections of law and culture at the International Criminal Court (in press)

Detailed reference viewed: 39 (3 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 237 (66 UL)
Full Text
Peer Reviewed
See detailThe Effect of Rating Scale on Response Style: Experimental Evidence for Job Satisfaction
Joxhe, Majlinda UL; Corrado, Luisa

in Journal of Well-Being Assessment (in press)

This paper explores the relationship between rating scales and response style using experimental data from a sample of 1500 households of the Innovation Panel (2008) which is part of the Understanding ... [more ▼]

This paper explores the relationship between rating scales and response style using experimental data from a sample of 1500 households of the Innovation Panel (2008) which is part of the Understanding Society database. Two random groups of individuals are being asked about their level of job satisfaction using a self-assessment questionnaire through two (7 and 11 points) rating options. By comparing the two groups, we explore the effects of the different rating scales on Extreme Response Style (ERS). The experimental design of the data enables us to show that both high and low Extreme Response Style (ERS) are correlated with personal and demographic characteristics. In addition, when comparing the shorter to a longer scale, we show that the survey design may generates tendency to choose responses at the extreme values of the distribution. [less ▲]

Detailed reference viewed: 56 (2 UL)
See detailMit Lingscape auf Pad in die Schule. Zum Einsatz mobiler Forschungs-Apps im Schulunterricht
Purschke, Christoph UL

in Marten, Heiko; Ziegler, Evelyn (Eds.) Linguistic Landscapes im deutschsprachigen Kontext: Forschungsperspektiven, Methoden und Anwendungsmöglichkeiten im Unterricht und Sprachmarketing (in press)

Detailed reference viewed: 23 (0 UL)