Last 7 days
Bookmark and Share    
Peer Reviewed
See detailMath and Reading Difficulties in a Multilingual Educational Setting
Martini, Sophie Frédérique UL; Fischbach, Antoine UL; Ugen, Sonja UL

Scientific Conference (2019, November 06)

Detailed reference viewed: 24 (2 UL)
Peer Reviewed
See detailNeed for Cognition across school tracks: The importance of learning environments
Colling, Joanne UL; Wollschläger, Rachel UL; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 43 (5 UL)
See detailDialog, Monolog, Hybrid - Mehrsprachige Theatertexte in Luxemburg
Bloch, Natalie UL

Presentation (2019, November)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 60 (6 UL)
Full Text
Peer Reviewed
See detailSoftware Engineering for Dataset Augmentation using Generative Adversarial Networks
Jahic, Benjamin UL; Guelfi, Nicolas UL; Ries, Benoît UL

Scientific Conference (2019, October 19)

Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity ... [more ▼]

Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity. In this work, we present a novel software engineering approach for dataset augmentation using neural networks. We propose a rigorous process for generating synthetic data to improve the training of neural networks. Also, we demonstrate our approach to successfully improve the recognition of handwritten digits using conditional generative adversarial networks (cGAN). Finally, we shortly discuss selected important issues of our process, presenting related work and proposing some improvements. [less ▲]

Detailed reference viewed: 68 (49 UL)
See detailMonitoring du système scolaire – Le modèle luxembourgeois (invited talk)
Fischbach, Antoine UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 36 (6 UL)
Full Text
See detailConstant Gaussian curvature foliations and Schläfli formulas of hyperbolic 3-manifolds
Mazzoli, Filippo UL

E-print/Working paper (2019)

We study the geometry of the foliation by constant Gaussian curvature surfaces (S_k)_k of a hyperbolic end, and how it relates to the structures of its boundary at infinity and of its pleated boundary ... [more ▼]

We study the geometry of the foliation by constant Gaussian curvature surfaces (S_k)_k of a hyperbolic end, and how it relates to the structures of its boundary at infinity and of its pleated boundary. First, we show that the Thurston and the Schwarzian parametrizations are the limits of two families of parametrizations of the space of hyperbolic ends, defined by Labourie in 1992 in terms of the geometry of the leaves S_k. We give a new description of the renormalized volume using the constant curvature foliation. We prove a generalization of McMullen's Kleinian reciprocity theorem, which replaces the role of the Schwarzian parametrization with Labourie's parametrizations. Finally, we describe the constant curvature foliation of a hyperbolic end as the integral curve of a time-dependent Hamiltonian vector field on the cotangent space to Teichmüller space, in analogy to the Moncrief flow for constant mean curvature foliations in Lorenzian space-times. [less ▲]

Detailed reference viewed: 11 (0 UL)
Peer Reviewed
See detailModelling of Railways Signalling System Requirements by Controlled Natural Languages: A Case Study
Lenzini, Gabriele UL; Petrocchi, Marinella

in From Software Engineering to Formal Methods and Tools, and Back (2019)

The railway sector has been a source of inspiration for generations of researchers challenged to develop models and tools to analyze safety and reliability. Threats were coming mainly from within, due to ... [more ▼]

The railway sector has been a source of inspiration for generations of researchers challenged to develop models and tools to analyze safety and reliability. Threats were coming mainly from within, due to occasionally faults in hardware components. With the advent of smart trains, the railway industry is venturing into cybersecurity and the railway sector will become more and more compelled to protect assets from threats against information & communication technology. We discuss this revolution at large, while speculating that instruments developed for security requirements engineering can then come in support of in the railway sector. And we explore the use of one of them: the Controlled Natural Language for Data Sharing Agreement (CNL4DSA). We use it to formalize a few exemplifying signal management system requirements. Since CNL4DSA enables the automatic generation of enforceable access control policies, our exercise is preparatory to implementing the security-by design principle in railway signalling management engineering. [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
See detailParadox: Mehr Bildung, weniger Gleichheit
Powell, Justin J W UL

in Powell, Justin J W (Ed.) Wissen aktuell: Exoplaneten, Urknall und Bildung (2019)

Bildung für sozialen Fortschritt: Wie wirkt sich ein Mehr an Bildung auf eine Gesellschaft aus? Dieser Frage widmete sich eine Tagung am Institut für Höhere Studien in Wien. In den vergangenen Jahrzenten ... [more ▼]

Bildung für sozialen Fortschritt: Wie wirkt sich ein Mehr an Bildung auf eine Gesellschaft aus? Dieser Frage widmete sich eine Tagung am Institut für Höhere Studien in Wien. In den vergangenen Jahrzenten ist der Bildungsstand weltweit gestiegen und geht mit einem längeren, gesünderen Leben, einer höheren Produktivität und mehr zivilgesellschaftlichem Engagement einher. Gleichzeitig kann Bildung die soziale Ungleichheit verschärfen. Gestaltung: Julia Geistberger Mit: Justin Powell, Bildungssoziologe Universität Luxemburg Redaktion: Barbara Daser [less ▲]

Detailed reference viewed: 40 (3 UL)
Full Text
See detailL'Histoire avec sa grande Hache et la Plume
Scuto, Denis UL

Article for general public (2019)

A chronicle by historian Denis Scuto on the new novel of Jean Portante about the migrations of twins, Lorenzo and Antonio Tramagni from San Demetrio (Abruzze, Italy), the one to New York and West Virginia ... [more ▼]

A chronicle by historian Denis Scuto on the new novel of Jean Portante about the migrations of twins, Lorenzo and Antonio Tramagni from San Demetrio (Abruzze, Italy), the one to New York and West Virginia, the other to Hussigny (Lorraine, France) and Differdange (Luxembourg), their fates and those of their descendants, closely linked to the tragedies of 20th century. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailSoftwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection
Rinaldi, Giulia UL; Adamsky, Florian UL; Soua, Ridha UL et al

in 10th International Conference on Networks of the Future (NoF) (2019, October 04)

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼]

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲]

Detailed reference viewed: 70 (12 UL)
Full Text
Peer Reviewed
See detailThe Power of LC-MS Based Multiomics: Exploring Adipogenic Differentiation of Human Mesenchymal Stem/Stromal Cells
Rampler, Evelyn; Egger, Dominik; Schoeny, Harald et al

in Molecules (2019)

The molecular study of fat cell development in the human body is essential for our understanding of obesity and related diseases. Mesenchymal stem/stromal cells (MSC) are the ideal source to study fat ... [more ▼]

The molecular study of fat cell development in the human body is essential for our understanding of obesity and related diseases. Mesenchymal stem/stromal cells (MSC) are the ideal source to study fat formation as they are the progenitors of adipocytes. In this work, we used human MSCs, received from surgery waste, and differentiated them into fat adipocytes. The combination of several layers of information coming from lipidomics, metabolomics and proteomics enabled network analysis of the biochemical pathways in adipogenesis. Simultaneous analysis of metabolites, lipids, and proteins in cell culture is challenging due to the compound’s chemical difference, so most studies involve separate analysis with unimolecular strategies. In this study, we employed a multimolecular approach using a two–phase extraction to monitor the crosstalk between lipid metabolism and protein-based signaling in a single sample (~105 cells). We developed an innovative analytical workflow including standardization with in-house produced 13C isotopically labeled compounds, hyphenated high-end mass spectrometry (high-resolution Orbitrap MS), and chromatography (HILIC, RP) for simultaneous untargeted screening and targeted quantification. Metabolite and lipid concentrations ranged over three to four orders of magnitude and were detected down to the low fmol (absolute on column) level. Biological validation and data interpretation of the multiomics workflow was performed based on proteomics network reconstruction, metabolic modelling (MetaboAnalyst 4.0), and pathway analysis (OmicsNet). Comparing MSCs and adipocytes, we observed significant regulation of different metabolites and lipids such as triglycerides, gangliosides, and carnitine with 113 fully reprogrammed pathways. The observed changes are in accordance with literature findings dealing with adipogenic differentiation of MSC. These results are a proof of principle for the power of multimolecular extraction combined with orthogonal LC-MS assays and network construction. Considering the analytical and biological validation performed in this study, we conclude that the proposed multiomics workflow is ideally suited for comprehensive follow-up studies on adipogenesis and is fit for purpose for different applications with a high potential to understand the complex pathophysiology of diseases. [less ▲]

Detailed reference viewed: 26 (1 UL)
See detailArchives du Web, "la cathédrale et le bazar"
Schafer, Valerie UL

Presentation (2019, October 03)

Le groupe de travail Ethique & Droit a organisé, avec le soutien de l’URFIST Méditerranée, une journée d’étude intitulée « Diffuser les données numériques en SHS : le droit et l’éthique comme alliés » ... [more ▼]

Le groupe de travail Ethique & Droit a organisé, avec le soutien de l’URFIST Méditerranée, une journée d’étude intitulée « Diffuser les données numériques en SHS : le droit et l’éthique comme alliés ». S’inscrivant dans la dynamique de la science ouverte, cette journée d’étude a présenté l’actualité juridique et éthique de la diffusion des données en SHS tout en précisant les orientations actuelles des institutions d’enseignement et de recherche en la matière. De nouvelles problématiques, comme celles soulevées par les archives du web, ont été abordées, notamment lors de mon intervention qui prenait pour point de départ la référence à l'ouvrage d'E. Raymond et les différents modèles de conservation et d'accès aux archives du Web mais aussi les enjeux éthiques posés par les périmètres de conservation notamment. voir: https://ethiquedroit.hypotheses.org/3003 [less ▲]

Detailed reference viewed: 34 (2 UL)
See detailEnforcing the European Pillar of Social Rights: Finding the Right Mix and Balance
Muñoz, Susana UL

in Effective Enforcement of EU Law & Policy <www.euenforcement.com/research-blog-1> (2019)

Against the backdrop of the recent multidimensional crisis, significant changes have been introduced to the legal and political frameworks in which the EU and its Member States design, implement, monitor ... [more ▼]

Against the backdrop of the recent multidimensional crisis, significant changes have been introduced to the legal and political frameworks in which the EU and its Member States design, implement, monitor and evaluate policies and practices. Both the nature and the content of the European Pillar of Social Rights (EPSR) raise issues regarding effective enforcement of EU law and policy in the post-crisis context. From this perspective, this contribution addresses the main challenges facing the EPRS and explores possible ways forward. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailA Forcing Fictitious Domain Method to Simulate Fluid-particle Interaction of Particles with Super-quadric Shape
Wu, Mingqiu UL; Peters, Bernhard UL; Rosemann, Tony et al

in Powder Technology (2019), Accepted, in press

In this work, we develop a new framework to directly simulate super-quadric (SQ) particles in fluid flows based on a forcing fictitious domain method. Specifically, a super-quadric particle function is ... [more ▼]

In this work, we develop a new framework to directly simulate super-quadric (SQ) particles in fluid flows based on a forcing fictitious domain method. Specifically, a super-quadric particle function is used to represent the particle shape of different types in a flexible manner. The immersion of particles in the fluid is handled by imposing rigid solid body motion in the particle domain, as well as adding a local forcing term to the Navier-Stokes equations by calculating the integral of both the pressure gradient and the particle velocity over the whole particle domain. Particle shapes are varied by changing the five super-quadric parameters of the SQ equation. We validate our approach by performing simulations of flow around a fixed particle and sedimentation of a particle in a channel in 2D and 3D. The validation results indicate that the current simulation results show a good agreement with experimental data. Moreover, our method is used to study the flow around fixed non-spherical particles with different orientations and particle Reynolds numbers. The particle Reynolds numbers vary from 0.1 to 3000. The super-quadric particles exemplarily considered in the current study are an ellipsoidal particle and fibre-like particles. We present the results for drag and lift coefficients at different particle orientations and different particle Reynolds numbers. The obtained results lay the foundation to apply the framework to flown through multi-particle systems in the near future. [less ▲]

Detailed reference viewed: 86 (36 UL)
Full Text
Peer Reviewed
See detailElectoral Violence Under Different Contexts. Evidence from the Western Balkans
Mochtak, Michal UL

in Nations and Nationalism (2019), 25(4), 1325-1361

The paper addresses the question of what settings are empirically relevant for the occurrence of electoral violence in the region of Western Balkans and what theoretical paths may cover their logic ... [more ▼]

The paper addresses the question of what settings are empirically relevant for the occurrence of electoral violence in the region of Western Balkans and what theoretical paths may cover their logic. Electoral violence has been part of the electoral arenas in the region for decades and although it has evolved and in some cases disappeared, a number of countries still experience it. The paper analyses original data on electoral violence collected from the OSCE monitoring reports covering 56 parliamentary elections organized between 1990 and 2015. Applying fuzzy‐set Qualitative Comparative Analysis (fsQCA), the paper identifies four sub-models under which electoral violence is observed. The conjunctural logic that defines each and every of the discussed paths within the sub-models shows that the scenarios of electoral violence in the Western Balkans are always complex and potentially relevant conditions are never sufficient for the outcome on their own. [less ▲]

Detailed reference viewed: 53 (6 UL)
Full Text
Peer Reviewed
See detailUser Experience Design for E-Voting: How mental models align with security mechanisms
Zollinger, Marie-Laure UL; Distler, Verena UL; Roenne, Peter UL et al

in Electronic Voting (2019, October)

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]

Detailed reference viewed: 57 (4 UL)
Full Text
Peer Reviewed
See detailOpinion Statement ECJ-TF 2/2019 on the ECJ Decisions of 26 February 2019 inN Luxembourg I et al.(Joined Cases C-115/16, C-118/16, C-119/16 and C-299/16) andT Danmark et al.(Joined Cases C-116/16 and C-117/17)
García Prats, Alfredo; Haslehner, Werner UL; Heydt, Volker et al

in European Taxation (2019), 59(10), 10

The article acknowledges that the “Danish beneficial ownership cases” address a number of important and timely issues, especially with regard to the concept of abuse in EU law. These include (i) the ... [more ▼]

The article acknowledges that the “Danish beneficial ownership cases” address a number of important and timely issues, especially with regard to the concept of abuse in EU law. These include (i) the expansion of the general anti-abuse principle enshrined in EU law to areas of tax law that are subject to minimal harmonization, (ii) the use of the OECD materials to define the beneficial ownership concept, (iii) the conflation of the beneficial ownership concept with the general anti-abuse principle and the Court’s attempt to give the notion of “abuse” workable contours, and (iv) the reading of an effective subject-to-tax clause with regard to interest income into the definition of a “company” laid down in the IRD. The article also, however, predicts that domestic courts will struggle to translate the abstract guidance of the “Danish beneficial ownership cases” into concrete decisions, that practitioners and academics alike will have to discuss building blocks and nuances of the Grand Chamber’s decisions for some time to come, and that consideration needs to be given to the impact these cases will have on current tax structures. [less ▲]

Detailed reference viewed: 39 (1 UL)