References of "Engel, Thomas 50001752"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailMagnetic Interaction with Devices: A Pilot Study on Mobile Gaming
Afshari, Saeed UL; Popleteev, Andrei UL; McCall, Roderick UL et al

in Proceedings of NordiCHI '14, October 26 - 30 2014, Helsinki, Finland (2014, October 26)

This work-in-progress paper presents a study of interaction techniques for mobile devices, with a focus on gaming scenarios. We introduce and explore usability and performance aspects of a novel compass ... [more ▼]

This work-in-progress paper presents a study of interaction techniques for mobile devices, with a focus on gaming scenarios. We introduce and explore usability and performance aspects of a novel compass based control for tangible around-device interaction, and compare it with traditional mobile gaming controls, such as touchscreen thumbstick, swiping and tilt-based approaches. [less ▲]

Detailed reference viewed: 412 (27 UL)
Full Text
Peer Reviewed
See detailTraffic Routing in Urban Environments: the Impact of Partial Information
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of 17th Internatonal IEEE Conference on Intelligent Transportation Systems (2014, October)

There are many studies concerning the problem of traffic congestion in cities. One of the best accepted solutions to relieving congestion involves optimization of resources already available, by means of ... [more ▼]

There are many studies concerning the problem of traffic congestion in cities. One of the best accepted solutions to relieving congestion involves optimization of resources already available, by means of balancing traffic flows to minimize travel delays. To achieve this optimization, it is necessary to collect and process Floating Car Data (FCD) from vehicles. In this paper we evaluate the repercussions of partial information on the overall traffic view, and consequently on the outcome of the optimization. Our study focuses on the role of the user participation rate and the availability of Road Side Units to collect the FCD. By means of simulation we quantify the impact of partially-available information on the computation of route optimization, and how it impedes traffic flows. Our results show that even minor uncertainties can significantly impact routing strategies and lead to deterioration in the overall traffic situation. [less ▲]

Detailed reference viewed: 195 (14 UL)
Full Text
Peer Reviewed
See detailIncentives and gaming environments for changing commuter behaviour
Kracheel, Martin UL; McCall, Roderick UL; Koenig, Vincent UL et al

Scientific Conference (2014, September 30)

The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will ... [more ▼]

The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will reduce traffic, emissions and, in the end, save money. The alternatives, for example, such as taking different modes of transport, are incentivised through gamification. In order to develop this pervasive system, we analysed existing mobility patterns of commuters in Luxembourg. The methodology that we developed consists of a questionnaire, a smartphone application and focus group interviews. This paper presents the findings of the questionnaire and how they influence the design of the gamified pervasive application. [less ▲]

Detailed reference viewed: 252 (15 UL)
Full Text
Peer Reviewed
See detailTowards a New Way of Reliable Routing: Multiple Paths over ARCs
Melakessou, Foued UL; Palattella, Maria Rita UL; Engel, Thomas UL

in Towards a New Way of Reliable Routing: Multiple Paths over ARCs (2014, September 24)

The Available Routing Construct (ARC), recently proposed at IETF, provides a promising model for achieving highly reliable routing in large-scale networks. Among its features, ARC offers multi-path ... [more ▼]

The Available Routing Construct (ARC), recently proposed at IETF, provides a promising model for achieving highly reliable routing in large-scale networks. Among its features, ARC offers multi-path routing by design. In the present work, we introduced ARC for the first time to the research community. Then, we showed, by means of simulation results, how ARC over-performs classical multi-path routing algorithms, by building disjoint multiple paths without extra-cost due to new route computation. [less ▲]

Detailed reference viewed: 181 (0 UL)
Full Text
Peer Reviewed
See detailUndesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11
Lanze, Fabian UL; Panchenko, Andriy UL; Ponce-Alcaide, Ignacio et al

in Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (2014, September)

Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their ... [more ▼]

Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their traffic is referred to in the literature as the evil twin attack. It allows an attacker with little effort and expenditure to fake a genuine AP and intercept, collect, or alter (potentially even encrypted) data. Due to its severity, the topic has gained remarkable research interest in the past decade. In this paper, we introduce a differentiated attacker model to express the attack in all its facets. We propose a taxonomy for classifying and struc- turing countermeasures and apply it to existing approaches. We are the first to conduct a comprehensive survey in this domain to reveal the potential and the limits of state-of- the-art solutions. Our study discloses an important attack scenario which has not been addressed so far, i.e., the usage of specialized software to mount the attack. We propose and experimentally validate a novel method to detect evil twin APs operated by software within a few seconds. [less ▲]

Detailed reference viewed: 285 (7 UL)
Full Text
See detailTriple Graph Grammars in the Large for Translating Satellite Procedures - Extended Version
Hermann, Frank UL; Gottmann, Susann UL; Nachtigall, Nico UL et al

Report (2014)

Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability ... [more ▼]

Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability concerning the correctness of the translation. Triple graph grammars (TGGs) have shown to be an intuitive, wellde ned technique for model translation. In this paper, we leverage TGGs for industry scale software translations. The approach is implemented using the Eclipse-based graph transformation tool Henshin and has been successfully applied in a large industrial project with the satellite operator SES on the translation of satellite control procedures. We evaluate the approach regarding requirements from the project and performance on a complete set of procedures of one satellite. [less ▲]

Detailed reference viewed: 297 (49 UL)
Full Text
Peer Reviewed
See detailTriple Graph Grammars in the Large for Translating Satellite Procedures
Hermann, Frank UL; Gottmann, Susann UL; Nachtigall, Nico UL et al

in Theory and Practice of Model Transformations (2014, July)

Software translation is a challenging task. Several requirements are important – including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability ... [more ▼]

Software translation is a challenging task. Several requirements are important – including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability concerning the correctness of the translation. Triple graph grammars (TGGs) have shown to be an intuitive, well-defined technique for model translation. In this paper, we leverage TGGs for industry scale software translations. The approach is implemented using the Eclipse-based graph transformation tool Henshin and has been successfully applied in a large industrial project with the satellite operator SES on the translation of satellite control procedures. We evaluate the approach regarding requirements from the project and performance on a complete set of procedures of one satellite. [less ▲]

Detailed reference viewed: 355 (39 UL)
Full Text
Peer Reviewed
See detailA Big Data Architecture for Large Scale Security Monitoring
Marchal, Samuel UL; Jiang, Xiuyan; State, Radu UL et al

in Proceedings of the 3rd IEEE Congress on Big Data (2014, July)

Network traffic is a rich source of information for security monitoring. However the increasing volume of data to treat raises issues, rendering holistic analysis of network traffic difficult. In this ... [more ▼]

Network traffic is a rich source of information for security monitoring. However the increasing volume of data to treat raises issues, rendering holistic analysis of network traffic difficult. In this paper we propose a solution to cope with the tremendous amount of data to analyse for security monitoring perspectives. We introduce an architecture dedicated to security monitoring of local enterprise networks. The application domain of such a system is mainly network intrusion detection and prevention, but can be used as well for forensic analysis. This architecture integrates two systems, one dedicated to scalable distributed data storage and management and the other dedicated to data exploitation. DNS data, NetFlow records, HTTP traffic and honeypot data are mined and correlated in a distributed system that leverages state of the art big data solution. Data correlation schemes are proposed and their performance are evaluated against several well-known big data framework including Hadoop and Spark. [less ▲]

Detailed reference viewed: 579 (14 UL)
Full Text
Peer Reviewed
See detailUsing opcode-sequences to detect malicious Android applications
Jerome, Quentin UL; Allix, Kevin UL; State, Radu UL et al

in IEEE International Conference on Communications, ICC 2014, Sydney Australia, June 10-14, 2014 (2014, June)

Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the number of alternative market places for ... [more ▼]

Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the number of alternative market places for distributing Android applications, rogue authors are developing constantly new malicious programs. While current anti-virus software mainly relies on signature detection, the issue of alternative malware detection has to be addressed. In this paper, we present a feature based detection mechanism relying on opcode-sequences combined with machine learning techniques. We assess our tool on both a reference dataset known as Genome Project as well as on a wider sample of 40,000 applications retrieved from the Google Play Store. [less ▲]

Detailed reference viewed: 306 (12 UL)
Full Text
See detailNetwork Analysis and Routing eVALuation V3.0
Melakessou, Foued UL; Engel, Thomas UL

Scientific Conference (2014, May 15)

Detailed reference viewed: 119 (0 UL)
Full Text
Peer Reviewed
See detailBluetooth Low Energy: An Alternative Technology for VANET Applications
Frank, Raphaël UL; Bronzi, Walter UL; Castignani, German UL et al

in Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (2014, April)

Detailed reference viewed: 281 (8 UL)
Full Text
See detailCorrectness of source code extension for fault detection in openflow based networks
Hermann, Frank UL; Hommes, Stefan UL; State, Radu UL et al

Report (2014)

Software Defined Networks using OpenFlow have to provide a re- liable way to detect network faults and attacks. This technical report shows a formal analysis of correctness for an automated code extension ... [more ▼]

Software Defined Networks using OpenFlow have to provide a re- liable way to detect network faults and attacks. This technical report shows a formal analysis of correctness for an automated code extension technique used to extend OpenFlow networks with a logging mecha- nism that is used for the detection of faults and attacks. As presented in a companion paper, we applied the code extension techniques for a framework that can extend controller programs transparently, making possible on-line fault management, debugging as well as off-line and forensic analysis. [less ▲]

Detailed reference viewed: 187 (37 UL)
Full Text
See detailImproving Traffic in Urban Environments
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

Report (2014)

The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network ... [more ▼]

The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network cannot easily be done. There are some solution proposed to improve the traffic situation, among them, the optimization of the resources already available by means of collecting real time Floating Car Data (FCD) from the vehicles and use them to suggest dynamic routes in order to minimize travel delays. The centralized infrastructure able to achieve this goal has already been presented in ”Improving Traffic in Urban Environments applying the Wardrop Equilibrium” (Codeca, L. et al., 2013). In this extended abstract we present the decentralized version of the system and the preliminary results of its evaluation. [less ▲]

Detailed reference viewed: 156 (15 UL)
Full Text
Peer Reviewed
See detailCollaborative Traffic Sensing: A Case Study of a Mobile Phone Based Traffic Management System
Frank, Raphaël UL; Weitz, Hervé UL; Castignani, German UL et al

in Proceedings of the 11th IEEE Consumer Communications and Networking Conference (CCNC'14) (2014, January 10)

Detailed reference viewed: 212 (4 UL)
Full Text
Peer Reviewed
See detailSolving the FIXML2Code-case Study with HenshinTGG
Hermann, Frank UL; Nachtigall, Nico UL; Braatz, Benjamin UL et al

in Rose, Louis M.; Krause, Christian; Horn, Tassilo (Eds.) Proceedings of the 7th Transformation Tool Contest - part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences (2014)

Triple graph grammars (TGGs) provide a formal framework for bidirectional model transformations. As in practice, TGGs are primarily used in pure model-to-model transformation scenarios, tools for text-to ... [more ▼]

Triple graph grammars (TGGs) provide a formal framework for bidirectional model transformations. As in practice, TGGs are primarily used in pure model-to-model transformation scenarios, tools for text-to-model and model-to-text transformations make them also applicable in text-to-text transformation contexts. This paper presents a solution for the text-to-text transformation case study of the Transformation Tool Contest 2014 on translating FIXML (an XML notation for financial transactions) to source code written in Java, C# or C++. The solution uses the HenshinTGG tool for specifying and executing model-to-model transformations based on the formal concept of TGGs as well as the Xtext tool for parsing XML content to yield its abstract syntax tree (text-to-model transformation) and serialising abstract syntax trees to source code (model-to-text transformation). The approach is evaluated concerning a given set of criteria. [less ▲]

Detailed reference viewed: 170 (16 UL)
Full Text
Peer Reviewed
See detailLetting the Puss in Boots Sweat: Detecting Fake Access Points using Dependency of Clock Skews on Temperature
Lanze, Fabian UL; Panchenko, Andriy UL; Braatz, Benjamin UL et al

in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) (2014)

Detailed reference viewed: 252 (17 UL)
Full Text
Peer Reviewed
See detailA Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock Waves
Forster, Markus UL; Frank, Raphaël UL; Gerla, Mario et al

in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (2014)

We address the problem of shock wave formation in uncoordinated highway traffic. First, we identify the combination of heavy traffic and small traffic perturbations or unexpected driver actions as the ... [more ▼]

We address the problem of shock wave formation in uncoordinated highway traffic. First, we identify the combination of heavy traffic and small traffic perturbations or unexpected driver actions as the main causes of highway traffic jams. Then we introduce a novel distributed communication protocol that enables us to eliminate upstream shock wave formation even with low system penetration rates. Based on traffic information ahead, we propose a Cooperative Advanced Driver Assistance System (CADAS) that recommends non-intuitive velocity reductions in order to redistribute traffic more uniformly thereby eliminating traffic peaks. Simulation results show that CADAS significantly increases the average velocity and therewith reduces the overall travel time and avoids unnecessary slowdowns. [less ▲]

Detailed reference viewed: 418 (18 UL)
Full Text
Peer Reviewed
See detail6TiSCH Wireless Industrial Networks: Determinism meet IPv6
Palattella, Maria Rita UL; Thubert, Pascal; Vilajosana, Xavier et al

in Internet of Things: Challenges and Opportunities. Lecture series of Smart Sensors, Measurements, and Instrumentation. vol 9 (2014)

Detailed reference viewed: 189 (5 UL)
Full Text
Peer Reviewed
See detailCognition: a tool for reinforcing security in Software Defined Netwks
Tantar, Emilia UL; Palattella, Maria Rita UL; Avanesov, Tigran UL et al

in Tantar, Alexandru-Adrian; Tantar, Emilia; Jian-Qiao, Sun (Eds.) et al EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V (2014)

Detailed reference viewed: 239 (10 UL)