Last 7 days
Bookmark and Share    
Full Text
See detailThe Metamorphosis of the European Economic Constitution
Hofmann, Herwig UL; Pantazatou, Aikaterini UL; Zaccaroni, Giovanni

Book published by Elgar Publishing - 1st (in press)

Detailed reference viewed: 57 (7 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (in press)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 59 (1 UL)
Full Text
Peer Reviewed
See detailA dual‐process exploration of binge drinking: Evidence through behavioral and electrophysiological findings
Lannoy, Séverine; Dormal, Valérie; Billieux, Joël UL et al

in Addiction Biology (in press)

The dual‐process model, describing addictive disorders as resulting from an imbalance between increased automatic approach behaviors towards the substance and reduced abilities to control these behaviors ... [more ▼]

The dual‐process model, describing addictive disorders as resulting from an imbalance between increased automatic approach behaviors towards the substance and reduced abilities to control these behaviors, constitutes a sound theoretical framework to understand alcohol‐use disorders. The present study aimed at exploring this imbalance at behavioral and cerebral levels in binge drinking, a pattern of excessive alcohol consumption frequently observed in youth, by assessing both reflective control abilities and automatic processing of alcohol‐related stimuli. For this purpose, 25 binge drinkers and 25 comparison participants performed a Go/No‐Go task during electrophysiological recording. Inhibition abilities were investigated during explicit (ie, distinguishing alcoholic versus nonalcoholic drinks) and implicit (ie, distinguishing sparkling versus nonsparkling drinks, independently of their alcohol content) processing of beverage cues. Binge drinkers presented poorer inhibition for the explicit processing of beverage cues, as well as reduced N200 amplitude for the specific processing of alcohol‐related stimuli. As a whole, these findings indicated inhibition impairments in binge drinkers, particularly for alcohol cues processing and at the attentional stage of the cognitive stream. In line with the dual‐process model, these results support that binge drinking is already characterized by an underactivation of the reflective system combined with an overactivation of the automatic system. Results also underlined the influence of explicit processing compared with implicit ones. At the clinical level, our findings reinforce the need to develop intervention methods focusing on the inhibition of approach behaviors towards alcohol‐related stimuli. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailA Polynomial Time Subsumption Algorithm for Nominal Safe $ELO_{\bot}$ under Rational Closure
Casini, Giovanni UL; Straccia, Umberto; Meyer, Thomas

in Information Sciences (in press)

Description Logics (DLs) under Rational Closure (RC) is a well-known framework for non-monotonic reasoning in DLs. In this paper, we address the concept subsumption decision problem under RC for nominal ... [more ▼]

Description Logics (DLs) under Rational Closure (RC) is a well-known framework for non-monotonic reasoning in DLs. In this paper, we address the concept subsumption decision problem under RC for nominal safe $ELO_{\bot}$, a notable and practically important DL representative of the OWL 2 profile OWL 2 EL. Our contribution here is to define a polynomial time subsumption procedure for nominal safe $ELO_{\bot}$ under RC that relies entirely on a series of classical, monotonic $EL_{\bot}$ subsumption tests. Therefore, any existing classical monotonic $EL_{\bot}$ reasoner can be used as a black box to implement our method. We then also adapt the method to one of the known extensions of RC for DLs, namely Defeasible Inheritance-based DLs without losing the computational tractability. [less ▲]

Detailed reference viewed: 44 (8 UL)
See detailEU Executive Discretion and the Limits of Law
Mendes, Joana UL

Book published by Oxford University Press (in press)

Detailed reference viewed: 125 (6 UL)
Full Text
Peer Reviewed
See detailAttack-tolerant Control and Observer-based Trajectory Tracking for Cyber-Physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in European Journal of Control (in press)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber-Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber-Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bi-linear Matrix Inequality () approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose of using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. A detection/isolation scheme based on residual observers bank is also proposed. [less ▲]

Detailed reference viewed: 161 (4 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 69 (0 UL)
Full Text
Peer Reviewed
See detailMultiple Sets Exponential Concentration and Higher Order Eigenvalues
Gozlan, Nathael; Herry, Ronan UL

in Potential Analysis (in press)

On a generic metric measured space, we introduce a notion of improved concentration of measure that takes into account the parallel enlargement of k distinct sets. We show that the k-th eigenvalues of the ... [more ▼]

On a generic metric measured space, we introduce a notion of improved concentration of measure that takes into account the parallel enlargement of k distinct sets. We show that the k-th eigenvalues of the metric Laplacian gives exponential improved concentration with k sets. On compact Riemannian manifolds, this allows us to recover estimates on the eigenvalues of the Laplace-Beltrami operator in the spirit of an inequality of Chung, Grigor’yan & Yau, Upper bounds for eigenvalues of the discrete and continuous Laplace operators. Adv. Math. 117(2), 165–178 (1996). [less ▲]

Detailed reference viewed: 46 (4 UL)
Full Text
Peer Reviewed
See detailOn a Software-Defined CAN Controller for Embedded Systems
Gianluca, Cena; Cibrario Bertolotti, Ivan; Hu, Tingting UL et al

in Computer Standards and Interfaces (in press)

Controller Area Network (CAN) technology is nowadays ubiquitous in vehicular applications and is also gaining popularity in other contexts, for instance, embedded and industrial automation systems. The ... [more ▼]

Controller Area Network (CAN) technology is nowadays ubiquitous in vehicular applications and is also gaining popularity in other contexts, for instance, embedded and industrial automation systems. The recent standardization of CAN with flexible data rate (CAN FD), as well as other academic proposals, have highlighted the usefulness of enhancing the CAN physical and data link layers to attain better performance and other features. This paper describes a portable software-defined CAN controller called SDCC. Besides being handy as a research tool for experimenting with novel protocol concepts at the data link layer, SDCC is also fully capable of real-time execution. Hence, it can interact with real-world CAN devices through a physical bus interface. [less ▲]

Detailed reference viewed: 88 (6 UL)
See detailSklaverei war gestern? Menschenhandel im Europa des 21. Jahrhunderts
Veit, Charlotte UL; Nienaber, Birte UL

in Binsfeld, Andrea; Ghetta, Marcello (Eds.) Sklaverei und Identität (in press)

Detailed reference viewed: 39 (0 UL)
Peer Reviewed
See detailIntroducing Luxembourg in the Ephemeral
Carr, Constance UL

in Mössner, Samuel; Freytag, Tim; Krueger, Rob (Eds.) Adventures in Urban Sustainable Development: Theoretical interventions and notes from the field (in press)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailEmpirical Evaluation of Mutation-based Test Prioritization Techniques
Shin, Donghwan; Yoo, Shin; Papadakis, Mike UL et al

in Software Testing, Verification and Reliability (in press)

Detailed reference viewed: 59 (4 UL)
Full Text
Peer Reviewed
See detailA Note on Stein’s Overreaction Puzzle
Lin, Yuehao; Lehnert, Thorsten UL

in Decisions in Economics and Finance (in press)

Recently, Christoffersen et al. (2013) argue that the overreaction puzzle of Stein (1989) can be explained by a variance-dependent pricing kernel. In this note, we challenge this view. Our theoretical ... [more ▼]

Recently, Christoffersen et al. (2013) argue that the overreaction puzzle of Stein (1989) can be explained by a variance-dependent pricing kernel. In this note, we challenge this view. Our theoretical results are in line with their argument that the variance under risk-neutral measure is more persistent than the variance under physical measure due to a negative variance risk premium. But our results do not support their argument that the more persistent variance is able to qualitatively explain Stein’s findings. We show theoretically that the persistence of the volatility cannot amplify the movements of long-term variance to short-term fluctuations in variance, and, therefore, conclude that Stein’s overreaction puzzle is still unsolved. [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailSeeing is believing: Gender diversity in STEM is related to mathematics self-concept
Niepel, Christoph UL; Stadler, Matthias UL; Greiff, Samuel UL

in Journal of Educational Psychology (in press)

Detailed reference viewed: 102 (3 UL)
Full Text
See detailLe discours de Charles-Mathias Simons du 23 octobre 1856 : une première théorisation du monisme avec primauté du droit international
Heuschling, Luc UL

in Pauly, Michel; Jungblut, Marie-Paule; Frieseisen, Claude (Eds.) Les grands débats à la Chambre des députés (in press)

Detailed reference viewed: 51 (3 UL)
Full Text
See detailThe ICO Goldrush - A challenge for Regulators
Zetzsche, Dirk Andreas UL; Buckley, R; Arner, D. et al

in Harvard International Law Journal (in press)

Detailed reference viewed: 65 (6 UL)
Full Text
Peer Reviewed
See detailThe Identity Challenge in Finance: From Analogue Identity to Digitized Identification to Digital KYC Utilities
Zetzsche, Dirk Andreas UL; Arner, Douglas W.; Buckley, Ross P. et al

in European Business Organization Law Review (in press)

Detailed reference viewed: 74 (1 UL)
Peer Reviewed
See detailAkkulturation als Integrationsressource
Maehler, Débora; Murdock, Elke UL; Albert, Isabelle UL

in Pickel, Gert; Decker, Oliver; Kailitz, Steffen (Eds.) et al Handbuch Integration (in press)

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailScreening Powers in Investment Arbitration: Questions of Legal Change and Legitimacy
Radović, Relja UL

in Baetens, Freya (Ed.) The Legitimacy of Unseen Actors in International Adjudication (in press)

Screening powers of arbitral institutions over requests initiating investment arbitrations are often justified by the need to prevent embarrassment of states and to avoid unnecessary costs. This Chapter ... [more ▼]

Screening powers of arbitral institutions over requests initiating investment arbitrations are often justified by the need to prevent embarrassment of states and to avoid unnecessary costs. This Chapter examines possible effects of such powers, particularly on the arbitral development of the jurisdictional standards governing investment arbitration. Can administrative organs filter the demands for legal change that will be heard before tribunals, and if so, does this diminish the legitimacy of their screening powers? It is argued that screening powers offer possibilities of setting arbitrators’ agenda in terms of which demands for legal change will be considered. This could affect their legitimacy, but it does not mean that screening powers have completely lost their justification. It is suggested that such powers must be exercised with an extreme level of diligence, requiring an almost complete elimination of legal considerations, in order to safeguard their legitimacy. [less ▲]

Detailed reference viewed: 28 (3 UL)