Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailAsset Pricing Implications of Good Governance
Lehnert, Thorsten UL

in PLoS ONE (2019), 14 (4)(e0214930), 1-14

Detailed reference viewed: 25 (2 UL)
Full Text
See detailDesign and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
Udovenko, Aleksei Nikolaevich UL

Doctoral thesis (2019)

Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties have a shared secret key which allows both to encrypt and decrypt messages. The encryption schemes used ... [more ▼]

Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties have a shared secret key which allows both to encrypt and decrypt messages. The encryption schemes used are very efficient but have no rigorous security proof. In order to design a symmetric-key primitive, one has to ensure that the primitive is secure at least against known attacks. During 4 years of my doctoral studies at the University of Luxembourg under the supervision of Prof. Alex Biryukov, I studied symmetric-key cryptography and contributed to several of its topics. Part I is about the structural and decomposition cryptanalysis. This type of cryptanalysis aims to exploit properties of the algorithmic structure of a cryptographic function. The first goal is to distinguish a function with a particular structure from random, structure-less functions. The second goal is to recover components of the structure in order to obtain a decomposition of the function. Decomposition attacks are also used to uncover secret structures of S-Boxes, cryptographic functions over small domains. In this part, I describe structural and decomposition cryptanalysis of the Feistel Network structure, decompositions of the S-Box used in the recent Russian cryptographic standard, and a decomposition of the only known APN permutation in even dimension. Part II is about the invariant-based cryptanalysis. This method became recently an active research topic. It happened mainly due to recent extreme cryptographic designs, which turned out to be vulnerable to this cryptanalysis method. In this part, I describe an invariant-based analysis of NORX, an authenticated cipher. Further, I show a theoretical study of linear layers that preserve low-degree invariants of a particular form used in the recent attacks on block ciphers. Part III is about the white-box cryptography. In the white-box model, an adversary has full access to the cryptographic implementation, which in particular may contain a secret key. The possibility of creating implementations of symmetric-key primitives secure in this model is a long-standing open question. Such implementations have many applications in industry; in particular, in mobile payment systems. In this part, I study the possibility of applying masking, a side-channel countermeasure, to protect white-box implementations. I describe several attacks on direct application of masking and provide a provably-secure countermeasure against a strong class of the attacks. Part IV is about the design of symmetric-key primitives. I contributed to design of the block cipher family SPARX and to the design of a suite of cryptographic algorithms, which includes the cryptographic permutation family SPARKLE, the cryptographic hash function family ESCH, and the authenticated encryption family SCHWAEMM. In this part, I describe the security analysis that I made for these designs. [less ▲]

Detailed reference viewed: 44 (5 UL)
Full Text
Peer Reviewed
See detailParis and Nice terrorist attacks: Exploring Twitter and web archives
Schafer, Valerie UL; Truc, Gérôme; Badouard, Romain et al

in Media, War and Conflict (2019)

The attacks suffered by France in January and November 2015, and then in the course of 2016, especially the Nice attack, provoked intense online activity both during the events and in the months that ... [more ▼]

The attacks suffered by France in January and November 2015, and then in the course of 2016, especially the Nice attack, provoked intense online activity both during the events and in the months that followed. The digital traces left by this reactivity and reactions to events gave rise, from the very first days and even hours after the attacks, to a ‘real-time’ institutional archiving by the National Library of France (Bibliothèque nationale de France, BnF) and the National Audio-visual Institute (Institut national de l’audiovisuel, Ina). The results amount to millions of archived tweets and URLs. This article sets out to explore the creation and the temporalities of this ‘born-digital’ heritage. It seeks to highlight the most significant issues guiding initial research carried out on these relatively unedited corpora, from collection to exploitation, online stream of data to its mediation and re-composition. [less ▲]

Detailed reference viewed: 37 (0 UL)
See detailSearching bodies through born-digital heritage: issues and challenges
Schafer, Valerie UL

Presentation (2019, April 03)

This presentation, followed by a hands-on session, will present several methods, issues and challenges that researchers may face when they analyse web archives and give a few examples more specifically ... [more ▼]

This presentation, followed by a hands-on session, will present several methods, issues and challenges that researchers may face when they analyse web archives and give a few examples more specifically dedicated to the histories of healthy bodies. [less ▲]

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailHemap: An nteractive online resource for characterizing molecular phenotypes across hematologic malignancies
Pölönen, Petri; Mehtonen, Juha; Lin, Jake et al

in Cancer Research (2019)

Large collections of genome-wide data can facilitate the characterization of disease states and subtypes, permitting pan-cancer analysis of molecular phenotypes and evaluation of disease contexts for new ... [more ▼]

Large collections of genome-wide data can facilitate the characterization of disease states and subtypes, permitting pan-cancer analysis of molecular phenotypes and evaluation of disease contexts for new therapeutic approaches. We analyzed 9,544 transcriptomes from over 30 hematologic malignancies, normal blood cell types and cell lines, and show that the disease types can be stratified in a data-driven manner. We utilized the obtained molecular clustering for discovery of cluster-specific pathway activity, new biomarkers and in silico drug target prioritization through integration with drug target databases. Using known vulnerabilities and available drug screens in benchmarking, we highlight the importance of integrating the molecular phenotype context and drug target expression for in silico prediction of drug responsiveness. Our analysis implicates BCL2 expression level as important indicator of venetoclax responsiveness and provides a rationale for its targeting in specific leukemia subtypes and multiple myeloma, links several polycomb group proteins that could be targeted by small molecules (SFMBT1, CBX7 and EZH1) with CLL, and supports CDK6 as disease-specific target in AML. Through integration with proteomics data, we characterized target protein expression for pre-B leukemia immunotherapy candidates, including DPEP1. These molecular data can be explored using our freely available interactive resource, Hemap, for expediting therapeutic innovations in hematologic malignancies. [less ▲]

Detailed reference viewed: 61 (7 UL)
See detail[Rezension] Lars Nowak (Hg.): Medien - Krieg - Raum
Pause, Johannes UL

in MEDIENwissenschaft: Rezensionen, Reviews (2019), 1(2019), 24-27

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailThe democratic deficit and European Central Bank crisis monetary policies.
Högenauer, Anna-Lena UL; Howarth, David UL

in Maastricht Journal of European and Comparative Law (2019)

This article presents the argument that European Central Bank (ECB) policy-making from the start of the sovereign debt crisis in 2010 undermined the democratic legitimacy of the ECB. We start with the ... [more ▼]

This article presents the argument that European Central Bank (ECB) policy-making from the start of the sovereign debt crisis in 2010 undermined the democratic legitimacy of the ECB. We start with the argument – defended by a number of scholars including Majone and Moravcsik – that where European Union (EU) policy-making is technocratic and does not have significant redistributive implications it can benefit from depoliticization that does not undermine the democratic legitimacy of this policy-making. This is notably the case where EU institutions have narrow mandates and are constrained by super-majoritarian decision-making. Prior to the international financial crisis, the ECB’s monetary policies were shaped entirely by the interpretation that its mandate was primarily to ensure low inflation. From the outbreak of the sovereign debt crisis, the ECB adopted a range of policies which pushed its role well beyond that interpretation and engaged in a form of redistribution that directly undermined treaty provisions. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
See detailLËTZEBUERGER MUSEK AM 19. JOERHONNERT
Sagrillo, Damien UL

Conference given outside the academic context (2019)

Musikhistoriographie ist vielschichtig. Die Geschichtsschreibung über Musik in Luxemburg gliedert sich in verschiedene Teilaspekte. Zunächst ist sie Teil regionaler Musikforschung in Europa und zudem, was ... [more ▼]

Musikhistoriographie ist vielschichtig. Die Geschichtsschreibung über Musik in Luxemburg gliedert sich in verschiedene Teilaspekte. Zunächst ist sie Teil regionaler Musikforschung in Europa und zudem, was Luxemburg betrifft, nationale Musikforschung. Ein erster Blickwinkel ist der musikethnologische: Ein Volk, eine Nation hat seine/ihre Lieder, die in ihm/ihr entstehen, aufgenommen, mündlich über Landes- sowie Sprachgrenzen und über Generationen überliefert werden. Volkstümliche Lieder schauen dem Volk „auf’s Maul“, sind Volksliedern nachempfunden, stammen aus der Feder von Komponisten und sind – zumindest auf Luxemburg bezogen – patriotisch gefärbt. Ein weiterer Blickwinkel luxemburgischer Musik befasst sich mit der Kunstmusik, und hier ist die staatliche Unabhängigkeit des Großherzogtums ein historischer Ausgangspunkt. Musiksoziologische Überlegungen leiten den Blick auf das Wesen und Werden von Musikgesellschaften („community music“). Ausgangspunkt ist eine liberalere Verfassung, durch welche den Bürgern zum ersten Mal das Versammlungsrecht angeboten wurde. Die Professionalisierung der Musik in Luxemburg nimmt ihren Ausgangspunkt mit der Entwicklung der musikalischen Bildung, welche in den Händen der ersten Komponistengeneration lag und auf die später aufgebaut werden konnte. [less ▲]

Detailed reference viewed: 36 (4 UL)
Full Text
Peer Reviewed
See detailPricing Perspective for SWIPT in OFDM-based Multi-User Wireless Cooperative Systems
Gautam, Sumit UL; Lagunas, Eva UL; Vuppala, Satyanarayana UL et al

Scientific Conference (2019, April)

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from ... [more ▼]

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from a pricing perspective. Specifically, we consider that a transmit source communicates with multiple destinations using Orthogonal Frequency Division Multiplexing (OFDM) system within a dual-hop relay-assisted network, where the destination nodes are capable of jointly decoding information and harvesting energy from the same radio-frequency (RF) signal using either the time-switching (TS) or power-splitting (PS) based SWIPT receiver architectures. Computation of the optimal solution for the aforementioned problem is an extremely challenging task as joint optimization of several network resources introduce intractability at high numeric values of relays, destination nodes and OFDM sub-carriers. Therefore, we present a suitable algorithm with sub-optimal results and good performance to compute the performance of joint data processing and harvesting energy under fixed pricing methods by adjusting the respective weight factors, motivated by practical statistics. Furthermore, by exploiting the binary options of the weights, we show that the proposed formulation can be regulated purely as a sum-spectral efficiency maximization or solely as a sum-harvested energy maximization problem. Numerical results illustrate the benefits of the proposed design under several operating conditions and parameter values. [less ▲]

Detailed reference viewed: 41 (6 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 83 (20 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 99 (15 UL)
See detailOverprosecution and Negotiated Justice in Europe
Ligeti, Katalin UL; Robinson, Gavin UL

in Van Kempen, Piet Hein (Ed.) Overuse in the Criminal Justice System: On Criminalization, Prosecution and Imprisonment (2019)

Detailed reference viewed: 31 (3 UL)
Full Text
See detailReview for "Journal of Sports Sciences"
Bund, Andreas UL

in Journal of Sports Sciences (2019)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailEdito Varia
Dablanc, Laetitia; Schafer, Valerie UL

in Flux: Cahiers Scientifiques Internationaux Réseaux et Territoires (2019), 115(1), 82

Au cœur de ce numéro de Varia le lecteur découvrira trois analyses originales sur l’urbain, qu’elles concernent l’urbanisme commercial, la grande mobilité domicile-travail (qui fait intervenir deux aires ... [more ▼]

Au cœur de ce numéro de Varia le lecteur découvrira trois analyses originales sur l’urbain, qu’elles concernent l’urbanisme commercial, la grande mobilité domicile-travail (qui fait intervenir deux aires urbaines) ou encore les mobilités du périurbain. [less ▲]

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailExploring the "French Web" of the 1990s
Schafer, Valerie UL

in Brügger, Niels; Laursen, Ditte (Eds.) The Historical Web and Digital Humanities: The Case of National Web Domains (2019)

This chapter draws from the experience of the collective French Web90 project to show the approaches, tools, and methodologies required to sketch a broad historical picture of the French Web during the ... [more ▼]

This chapter draws from the experience of the collective French Web90 project to show the approaches, tools, and methodologies required to sketch a broad historical picture of the French Web during the 1990s. It also describes the limits and challenges we met during its realisation. Uncertainties about the perimeter of the French Web and its archives, data overload, progressive learning of a particular digital literacy, specific features of born-digital heritage (Newsgroups and Web archives), and using the tools for its exploration and analysis are at the heart of this study, which has progressively refined and adapted its ambitions and methodologies, notably by using methods and tools from the Digital Humanities. [less ▲]

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailCollaborative Distributed Q-Learning for RACH Congestion Minimization in Cellular IoT Networks
Sharma, Shree Krishna UL; Wang, Xianbin

in IEEE Communications Letters (2019), 23(4), 600-603

Due to infrequent and massive concurrent access requests from the ever-increasing number of machine-type communication (MTC) devices, the existing contention-based random access (RA) protocols, such as ... [more ▼]

Due to infrequent and massive concurrent access requests from the ever-increasing number of machine-type communication (MTC) devices, the existing contention-based random access (RA) protocols, such as slotted ALOHA, suffer from the severe problem of random access channel (RACH) congestion in emerging cellular IoT networks. To address this issue, we propose a novel collaborative distributed Q-learning mechanism for the resource-constrained MTC devices in order to enable them to find unique RA slots for their transmissions so that the number of possible collisions can be significantly reduced. In contrast to the independent Q-learning scheme, the proposed approach utilizes the congestion level of RA slots as the global cost during the learning process and thus can notably lower the learning time for the low-end MTC devices. Our results show that the proposed learning scheme can significantly minimize the RACH congestion in cellular IoT networks. [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailQuantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future
Nawaz, Sayed Junaid; Sharma, Shree Krishna UL; Wyne, Shurjeel et al

in IEEE Access (2019)

The upcoming 5th Generation (5G) of wireless networks is expected to lay a foundation of intelligent networks with the provision of some isolated Artificial Intelligence (AI) operations. However, fully ... [more ▼]

The upcoming 5th Generation (5G) of wireless networks is expected to lay a foundation of intelligent networks with the provision of some isolated Artificial Intelligence (AI) operations. However, fully-intelligent network orchestration and management for providing innovative services will only be realized in Beyond 5G (B5G) networks. To this end, we envisage that the 6th Generation (6G) of wireless networks will be driven by on-demand self-reconfiguration to ensure a many-fold increase in the network performanceandservicetypes.Theincreasinglystringentperformancerequirementsofemergingnetworks may finally trigger the deployment of some interesting new technologies such as large intelligent surfaces, electromagnetic-orbital angular momentum, visible light communications and cell-free communications – tonameafew.Ourvisionfor6Gis–amassivelyconnectedcomplexnetworkcapableofrapidlyresponding to the users’ service calls through real-time learning of the network state as described by the network-edge (e.g., base-station locations, cache contents, etc.), air interface (e.g., radio spectrum, propagation channel, etc.), and the user-side (e.g., battery-life, locations, etc.). The multi-state, multi-dimensional nature of the network state, requiring real-time knowledge, can be viewed as a quantum uncertainty problem. In this regard, the emerging paradigms of Machine Learning (ML), Quantum Computing (QC), and Quantum ML (QML) and their synergies with communication networks can be considered as core 6G enablers. Considering these potentials, starting with the 5G target services and enabling technologies, we provide a comprehensivereviewoftherelatedstate-of-the-artinthedomainsofML(includingdeeplearning),QCand QML, and identify their potential benefits, issues and use cases for their applications in the B5G networks. Subsequently,weproposeanovelQC-assistedandQML-basedframeworkfor6Gcommunicationnetworks whilearticulatingitschallengesandpotentialenablingtechnologiesatthenetwork-infrastructure,networkedge, air interface and user-end. Finally, some promising future research directions for the quantum- and QML-assisted B5G networks are identified and discussed. [less ▲]

Detailed reference viewed: 43 (2 UL)
See detailDie Pariser Vorortverträge (1919-1923) in den europäischen Erinnerungskulturen
Brüll, Christoph UL

Conference given outside the academic context (2019)

Detailed reference viewed: 22 (0 UL)
See detailKarl der Grosse und Aachen in Europa. Eine kleine Mythologie
Brüll, Christoph UL

Conference given outside the academic context (2019)

Detailed reference viewed: 19 (1 UL)
Full Text
See detailMieux Comprendre le choix de demande d'asile au Luxembourg
Joxhe, Majlinda UL

Article for general public (2019)

Detailed reference viewed: 67 (0 UL)