Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailQuelques réflexions autour du Liber de Rectoribus christianis de Sedulius Scottus : contexte(s), patron(s), destinataire(s)
Pettiau, Hérold UL

in Revue Belge de Philologie et d'Histoire (in press)

This contribution aims at providing a review of the different hypotheses for dating and contextualising the writing of Liber de Rectoribus Christianis, a Carolingian mirror of the prince written by ... [more ▼]

This contribution aims at providing a review of the different hypotheses for dating and contextualising the writing of Liber de Rectoribus Christianis, a Carolingian mirror of the prince written by Sedulius Scottus, an Irish scholar whose activity is recorded in Francia media between the 840’s and the early 870’s. The structure of the text is first summarised. The possible contexts of writing are then reviewed following three axis ; 1) a review of the criteria supporting different dating ; 2) the question of Sedulius’s potential sponsors, addressees of his verse pieces, and finally 3) the text’s dedicatees. The attempted conquest by Charles the Bald of the regnum Lotharii end of 869-beginning 870 remains the most credible one. [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailBlockchain-based Micropayment Systems: Economic Impact
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in ACM IDEAS '19 Proceedings of the 23rd International Database Engineering & Applications Symposium (in press)

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology ... [more ▼]

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology includes the divisible nature of a cryptocurrency, that can facilitate payments in fractions of a cent, enabling micropayments through the blockchain. Micropayments are a critical tool to enable financial inclusion and to aid in global poverty alleviation. The paper conducts a study on the economic impact of blockchain-based micropayment systems, emphasizing their significance for socioeconomic benefit and financial inclusion. The paper also highlights the contribution of blockchain-based micropayments to the cybercrime economy, indicating the critical need of economic regulations to curtail the growing threat posed by the digital payment mechanism. [less ▲]

Detailed reference viewed: 45 (2 UL)
Full Text
Peer Reviewed
See detailUsing crowd-sourced data to analyse the ongoing merger of [ɕ] and [ʃ] in Luxembourgish
Gilles, Peter UL

in Proceedings of the 19th International Congress of Phonetic Sciences. Melbourne, Australia (in press)

Detailed reference viewed: 32 (2 UL)
See detailFabricating Modern Societies: Education, Bodies and Minds in the Age of Steel
Priem, Karin UL; Herman, Frederik

Book published by Brill (in press)

Fabricating Modern Societies: Education, Bodies, and Minds in the Age of Steel, edited by Karin Priem and Frederik Herman, offers new interdisciplinary and transnational perspectives on the history of ... [more ▼]

Fabricating Modern Societies: Education, Bodies, and Minds in the Age of Steel, edited by Karin Priem and Frederik Herman, offers new interdisciplinary and transnational perspectives on the history of industrialization and societal transformation in early-twentieth-century Luxembourg. The individual chapters focus on how industrialists addressed a large array of challenges related to industrialization, borrowing and mixing ideas originating in domains such as corporate identity formation, mediatization, scientification, technological innovation, mechanization, capitalism, mass production, medicalization, educationalization, artistic production, and social utopia, while competing with other interest groups who pursued their own goals. The book looks at different focus areas of modernity, and analyzes how humans created, mediated, and interacted with the technospheres of modern societies. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detail40. Komplexe Überdachung II: Luxemburg. Die Genese einer neuen Nationalsprache
Gilles, Peter UL

in Herrgen, Joachim; Schmidt, Jürgen-Erich (Eds.) Language and Space - An International Handbook of Linguistic Variation. Vol. 4 Deutsch (in press)

Der Beitrag behandelt die komplexe Sprachensituation Luxemburgs, mit Fokus auf den germanischen Varietäten, i.e. Deutsch und Luxemburgisch, im Hinblick auf Überdachung und ihre sprachgeschichtlichen ... [more ▼]

Der Beitrag behandelt die komplexe Sprachensituation Luxemburgs, mit Fokus auf den germanischen Varietäten, i.e. Deutsch und Luxemburgisch, im Hinblick auf Überdachung und ihre sprachgeschichtlichen Verschiebungen. In dieser varietätenlinguistischen Perspektive liegt der Schwerpunkt auf der äußeren Sprachgeschichte; Aspekte der inneren Sprachgeschichte werden aus Platzgründen lediglich anhand ausgewählter Beispiele thematisiert. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailQuantifying information flow in interactive systems
Mestel, David UL

in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (in press)

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is ... [more ▼]

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic. [less ▲]

Detailed reference viewed: 32 (0 UL)
Peer Reviewed
See detailBorders and Migration
Nienaber, Birte UL

in Wassenberg, Birte; Reitel, Bernard; Thevenet, Anne (Eds.) et al Critical Dictionary on Cross-Border Cooperation in Europe (in press)

Detailed reference viewed: 13 (0 UL)
See detailLa réintroduction des contrôles frontaliers dans l’Espace Schengen. Réflexions préliminaires pour un agenda de recherche
Evrard, Estelle UL; Sommarribas, Adolfo UL; Nienaber, Birte UL

in Hamez, Grégory; Defays, Jean-Marc (Eds.) Réalités, perceptions et représentations des frontières de l'Union Européenne (in press)

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailHigh involvement versus pathological involvement in video games: A crucial distinction for ensuring the validity and utility of gaming disorder
Billieux, Joël UL; Flayelle, Maèva UL; Rumpf, Hans-Jürgen et al

in Current Addiction Reports (in press)

Purpose of review. The year 2018 was marked by the official recognition of Gaming Disorder (GD) as a mental condition with its inclusion in the proposed eleventh edition of the International ... [more ▼]

Purpose of review. The year 2018 was marked by the official recognition of Gaming Disorder (GD) as a mental condition with its inclusion in the proposed eleventh edition of the International Classification of Diseases (ICD-11). Recently, a group of scholars has repeatedly criticized the notion of GD proposed by the World Health Organization (WHO), arguing that its inclusion in ICD-11 will pathologize highly involved but healthy gamers. It is therefore of crucial importance to clarify the characteristics of high involvement versus pathological involvement in video games, the boundaries between these constructs, and the implementation of screening and diagnostic GD tools that distinguish the two. Recent findings. Increasing evidence supports the view that intense video game playing may involve patterns of gaming that are characterized by high involvement but that are non-pathological. Furthermore, some criteria for addictive and related disorders may reflect peripheral features that are not necessarily indicative of pathology, whereas others may reflect core features that are more likely to adequately identify pathological behavior and so have diagnostic validity. Finally, it is key to assess functional impairment associated with gaming, so that a GD diagnosis has clinical utility. Summary. Available evidence supports the crucial need to distinguish between high and pathological involvement in videogames, in order to avoid over-diagnosis and pathologization of normal behavior. The definition of GD adopted in ICD-11 has clinical utility and diagnostic validity since it explicitly mentions the functional impairment caused by problem gaming and its diagnostic guidelines refer to core addiction features, reflecting pathological involvement. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailA forcing fictitious domain/immersed boundary method for super-quadric shape of particulate flow simulation of cementitious material
Wu, Mingqiu UL; Peters, Bernhard UL; Dressler, Inka

Scientific Conference (2019, June 05)

Fictitious domain/immersed boundary method (FD/IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The advantage of FD/IBM over the body- fitted method is that ... [more ▼]

Fictitious domain/immersed boundary method (FD/IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The advantage of FD/IBM over the body- fitted method is that it substantially simplifies grid generation for immersed geometries, and it is easier to handle moving boundary situations. FD/IBM even allows the use of a stationary and non- deformation background mesh, as well as it reduces the cost of computation by avoiding generation of a body-fitted mesh for each time step. In this work, we develop a new platform to directly simulate super-quadric (SQ) particles in fluid based on a forcing fictitious domain method. Specifically, a super-quadric particle function is used to represent particle with varying shapes and sizes as encountered for concrete and mortar. The immersion of particles in fluid is handled by imposing a rigidity solid body motion in the particle domain, as well as adding a forcing term to the Navier-stokes equation by integral of pressure gradient and particle related velocity over the whole particle domain. Particle shapes are given by changing the super-quadric parameters of SQ equation. Particle motions, which occur during pumping of cementitious material, can be calculated and tracked by solving Newton’s equations of motions using the extended discrete element method (XDEM)[4] while the data of fluid flow properties are obtained by solving the Navier-Stokes equations which govern the fluid phase. Hence, a particle interface resolving solver is developed by coupling XDEM and IBM. We validate our solver by performing flow around particles and free falling of a particle in the channel at different parameters in 2D and 3D. The final objective of this work is to develop a particle-resolved direct numerical simulation platform to predict highly packed fluids with different shapes of particles and over a wide range of particle sizes. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailCache-Aided Nonorthogonal Multiple Access: The Two-User Case
Xiang, Lin UL; Ng, Derrick Wing Kwan; Ge, Xiaohu et al

in IEEE Journal on Selected Topics in Signal Processing (2019), 13(3), 436-451

In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA ... [more ▼]

In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA and caching, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orders at the users feasible. The resulting flexibility in decoding can be exploited for improved NOMA detection. We characterize the achievable rate region of cache-aided NOMA and derive the Pareto optimal rate tuples forming the boundary of the rate region. Moreover, we optimize cache-aided NOMA for minimization of the time required for completing file delivery. The optimal decoding order and the optimal transmit power and rate allocation are derived as functions of the cache status, the file sizes, and the channel conditions. Simulation results confirm that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region and increases the sum rate for downlink transmission, which translates into substantially reduced file delivery times. [less ▲]

Detailed reference viewed: 16 (7 UL)
Full Text
Peer Reviewed
See detailSimple ClinVar:an interactive web server to explore and retrieve gene and disease variants 1 aggregated in ClinVar database
Pérez-Palma, Eduardo; Gramm, Marie; Nürnberg, Peter et al

in Nucleic Acids Research (2019)

Clinical genetic testing has exponentially expanded in recent years, leading to an overwhelming amount of patient variants with high variability in pathogenicity and heterogeneous phenotypes. A large part ... [more ▼]

Clinical genetic testing has exponentially expanded in recent years, leading to an overwhelming amount of patient variants with high variability in pathogenicity and heterogeneous phenotypes. A large part of the variant level data are comprehensively aggregated in public databases such as ClinVar. However, the ability to explore this rich resource and answer general questions such as “How many genes inside ClinVar are associated with a specific disease? or “In which part of the protein are patient variants located?” is limited and requires advanced bioinformatics processing. Here, we present Simple ClinVar (http://simple-clinvar.broadinstitute.org/) a web- server application that is able to provide variant, gene, and disease level summary statistics based on the entire ClinVar database in a dynamic and user-friendly web-interface. Overall, our web application is able to interactively answer basic questions regarding genetic variation and its known relationships to disease. By typing a disease term of interest, t he user can identify in seconds the genes and phenotypes most frequently reported to ClinVar. Subsets of variants can then be further explored, filtered, or mapped and visualized in the corresponding protein sequences. Our website will follow ClinVar monthly releases and provide easy access to rich ClinVar resources to a broader audience including basic and clinical scientists. [less ▲]

Detailed reference viewed: 14 (2 UL)
See detailOpen Science Quest
England, Jonathan UL

Learning material (2019)

The Open Science Quest was an activity organised as part of a national Open Science event in Luxembourg at the university library and was displayed for two weeks from 12 to 23 November 2018. Its aim was ... [more ▼]

The Open Science Quest was an activity organised as part of a national Open Science event in Luxembourg at the university library and was displayed for two weeks from 12 to 23 November 2018. Its aim was for library users (mainly Bachelor and Master students) and the event’s attendees (early-career and senior researchers, librarians and research support staff) to explore and discover Open Science practices at their own pace. The activity was stand-alone and promoted independent learning – once set up no external help was needed apart from issuing the diploma and prize for completing the Quest. The aim was also to make the activity as informative and engaging as possible by requiring participants to use a mix of information gathering techniques – text, images and videos presented on the displays, websearch and online tools, (very simple) puzzle-solving. The Quest was created and displayed in such a way that allowed various types of individual learning goals – each display provided knowledge without requiring to do the Quest and the Quest itself could be completed by grasping a minimal of concepts, while allowing participants to get more in-depth knowledge of each subject if they wanted to. [less ▲]

Detailed reference viewed: 24 (2 UL)
Full Text
Peer Reviewed
See detailA Recurrent Missense Variant in AP2M1 Impairs Clathrin-Mediated Endocytosis and Causes Developmental and Epileptic Encephalopathy.
Helbig, Ingo; Lopez-Hernandez, Tania; Shor, Oded et al

in American journal of human genetics (2019)

The developmental and epileptic encephalopathies (DEEs) are heterogeneous disorders with a strong genetic contribution, but the underlying genetic etiology remains unknown in a significant proportion of ... [more ▼]

The developmental and epileptic encephalopathies (DEEs) are heterogeneous disorders with a strong genetic contribution, but the underlying genetic etiology remains unknown in a significant proportion of individuals. To explore whether statistical support for genetic etiologies can be generated on the basis of phenotypic features, we analyzed whole-exome sequencing data and phenotypic similarities by using Human Phenotype Ontology (HPO) in 314 individuals with DEEs. We identified a de novo c.508C>T (p.Arg170Trp) variant in AP2M1 in two individuals with a phenotypic similarity that was higher than expected by chance (p = 0.003) and a phenotype related to epilepsy with myoclonic-atonic seizures. We subsequently found the same de novo variant in two individuals with neurodevelopmental disorders and generalized epilepsy in a cohort of 2,310 individuals who underwent diagnostic whole-exome sequencing. AP2M1 encodes the mu-subunit of the adaptor protein complex 2 (AP-2), which is involved in clathrin-mediated endocytosis (CME) and synaptic vesicle recycling. Modeling of protein dynamics indicated that the p.Arg170Trp variant impairs the conformational activation and thermodynamic entropy of the AP-2 complex. Functional complementation of both the mu-subunit carrying the p.Arg170Trp variant in human cells and astrocytes derived from AP-2mu conditional knockout mice revealed a significant impairment of CME of transferrin. In contrast, stability, expression levels, membrane recruitment, and localization were not impaired, suggesting a functional alteration of the AP-2 complex as the underlying disease mechanism. We establish a recurrent pathogenic variant in AP2M1 as a cause of DEEs with distinct phenotypic features, and we implicate dysfunction of the early steps of endocytosis as a disease mechanism in epilepsy. [less ▲]

Detailed reference viewed: 21 (0 UL)
Full Text
See detailSingle-peakedness in aggregation function theory
Devillet, Jimmy UL; Couceiro, Miguel; Marichal, Jean-Luc UL

Presentation (2019, May 14)

Due to their great importance in data fusion, aggregation functions have been extensively investigated for a few decades. Among these functions, fuzzy connectives (such as uninorms) play an important role ... [more ▼]

Due to their great importance in data fusion, aggregation functions have been extensively investigated for a few decades. Among these functions, fuzzy connectives (such as uninorms) play an important role in fuzzy logic. We establish a remarkable connection between a family of associative aggregation functions, which includes the class of idempotent uninorms, and the concepts of single-peakedness and single-plateaudness, introduced in social choice theory by D. Black. Finally, we enumerate those orders when the underlying set is finite. [less ▲]

Detailed reference viewed: 42 (2 UL)
Full Text
See detailComputational and symbolic analysis of distance-bounding protocols
Toro Pozo, Jorge Luis UL

Doctoral thesis (2019)

Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless payment, smart cards for transport ticketing, NFC-enabled mobile phones, and e-passports are just a few ... [more ▼]

Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless payment, smart cards for transport ticketing, NFC-enabled mobile phones, and e-passports are just a few examples of contactless devices we are familiar with nowadays. Most secure systems meant for these devices presume physical proximity between the device and the reader terminal, due to their short communication range. In theory, a credit card should not be charged of an on-site purchase if the card is not up to a few centimeters away from the payment terminal. In practice, this is not always true. Indeed, some contactless payment protocols, such as Visa's payWave, have been shown vulnerable to relay attacks. In a relay attack, a man-in-the-middle uses one or more relay devices in order to make two distant devices believe they are close. Relay attacks have been implemented also to bypass keyless entry and start systems in various modern cars. Relay attacks can be defended against with distance-bounding protocols, which are security protocols that measure the round-trip times of a series of challenge/response rounds in order to guarantee physical proximity. A large number of these protocols have been proposed and more sophisticated attacks against them have been discovered. Thus, frameworks for systematic security analysis of these protocols have become of high interest. As traditional security models, distance-bounding security models sit within the two classical approaches: the computational and the symbolic models. In this thesis we propose frameworks for security analysis of distance-bounding protocols, within the two aforementioned models. First, we develop an automata-based computational framework that allows us to generically analyze a large class of distance-bounding protocols. Not only does the proposed framework allow us to straightforwardly deliver computational (in)security proofs but it also permits us to study problems such as optimal trade-offs between security and space complexity. Indeed, we solve this problem for a prominent class of protocols, and propose a protocol solution that is optimally secure amongst space-constrained protocols within the considered class. Second, by building up on an existing symbolic framework, we develop a causality-based characterization of distance-bounding security. This constitutes the first symbolic property that guarantees physical proximity without modeling continuous time or physical location. We extend further our formalism in order to capture a non-standard attack known as terrorist fraud. By using our definitions and the verification tool Tamarin, we conduct a security survey of over 25 protocols, which include industrial protocols based on the ISO/IEC 14443 standard such as NXP's MIFARE Plus with proximity check and Mastercard's PayPass payment protocol. For the industrial protocols we find attacks, propose fixes and deliver security proofs of the repaired versions. [less ▲]

Detailed reference viewed: 26 (4 UL)