References of "2009"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe 2005 Riots in France: The International Impact of Domestic Violence
Koff, Harlan UL; Duprez, Dominique

in JOURNAL OF ETHNIC AND MIGRATION STUDIES (2009), 35(5), 713-730

Detailed reference viewed: 127 (2 UL)
Full Text
Peer Reviewed
See detailTime-resolved analysis of transcriptional events during SNAI1-triggered epithelial to mesenchymal transition
Vetter, G.; Le Béchec, Antony UL; Muller, J. et al

in Biochemical and Biophysical Research Communications (2009), 385(4), 485-91

The transcription regulator SNAI1 triggers a transcriptional program leading to epithelial to mesenchymal transition (EMT), providing epithelial cells with mesenchymal features and invasive properties ... [more ▼]

The transcription regulator SNAI1 triggers a transcriptional program leading to epithelial to mesenchymal transition (EMT), providing epithelial cells with mesenchymal features and invasive properties during embryonic development and tumor progression. To identify early transcriptional changes occurring during SNAI1-induced EMT, we performed a time-resolved genome-scale study using human breast carcinoma cells conditionally expressing SNAI1. The approach we developed for microarray data analysis, allowed identifying three distinct EMT stages and the temporal classification of genes. Importantly, we identified unexpected, biphasic expression profiles of EMT-associated genes, supporting their pivotal role during this process. Finally, we established early EMT gene networks by identifying transcription factors and their potential targets which may orchestrate early events of EMT. Collectively, our work provides a framework for the identification and future systematic analysis of novel genes which contribute to SNAI1-triggered EMT. [less ▲]

Detailed reference viewed: 130 (2 UL)
See detailRevision, Acceptability and Context
Gabbay, Dov M. UL; Rodrigues, O.; Russo, A.

Book published by Springer (2009)

Detailed reference viewed: 82 (0 UL)
See detailComplessità e rendimento di sistemi educativi
Molz, Markus UL

in Abbona, Francesco; Del Re, Francesco; Monaco, Guglielmo (Eds.) Complessità dinamica dei processi educativi. Aspetti teorici e pratici (2009)

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailTraining-Based Bayesian MIMO Channel and Channel Norm Estimation
Björnson, Emil; Ottersten, Björn UL

in Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on (2009)

Training-based estimation of channel state information in multi-antenna systems is analyzed herein. Closed-form expressions for the general Bayesian minimum mean square error (MMSE) estimators of the ... [more ▼]

Training-based estimation of channel state information in multi-antenna systems is analyzed herein. Closed-form expressions for the general Bayesian minimum mean square error (MMSE) estimators of the channel matrix and the squared channel norm are derived in a Rayleigh fading environment with known statistics at the receiver side. When the second-order channel statistics are available also at the transmitter, this information can be exploited in the training sequence design to improve the performance. Herein, mean square error (MSE) minimizing training sequences are considered. The structure of the general solution is developed, with explicit expressions at high and low SNRs and in the special case of uncorrelated receive antennas. The optimal length of the training sequence is equal or smaller than the number of transmit antennas. [less ▲]

Detailed reference viewed: 155 (0 UL)
Peer Reviewed
See detailCurriculum, Languages, and Mentalities
Tröhler, Daniel UL

in Baker, Bernadette (Ed.) New Curriculum History (2009)

Detailed reference viewed: 125 (0 UL)
Peer Reviewed
See detailHow ellipsoids freeze
Schilling, Tanja UL

Scientific Conference (2009)

Detailed reference viewed: 22 (0 UL)
See detailDie Begleitung von Sterbenden und Trauernden
Pfetsch, Jan UL; Chomé, Jeanne; Recktenwald, Pit

in Willems, Helmut; Rotink, G.; Ferring, Dieter (Eds.) et al Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009)

Detailed reference viewed: 69 (0 UL)
Peer Reviewed
See detailDeformations of the Witt, Virasoro, and Current Algebra
Schlichenmaier, Martin UL

in Silvestrov, Sergei; Paal, Eugen; Abramov, Viktor (Eds.) et al Generalized Lie Theory in Mathematics, Physics and Beyond (2009)

Detailed reference viewed: 108 (1 UL)
Full Text
Peer Reviewed
See detailDetection Based on Relaxation in MIMO Systems
Jalden, Joakim; Ottersten, Björn UL

in Handbook on Advancements in Smart Antenna Technologies for Wireless Networks (2009)

Detailed reference viewed: 154 (1 UL)
See detailDie Dozentenweiterbildung von imMEDIAte TEACHing
Doff, Sabine; Höppner, Kristina D. C. UL

in Klippel, Friederike; Koller, Gerhard; Polleti, Axel (Eds.) Fremdsprachenlernen online: Erfahrungen und Erkenntnisse im Projektverbund SprachChancen (2009)

Detailed reference viewed: 87 (0 UL)
Full Text
Peer Reviewed
See detailUnbiased H∞ filtering for a class of stochastic systems with time-varying delay
Li, Yumei UL; Guan, Xinping; Luo, Xiaoyuan

in The 21st annual international conference on Chinese control and decision conference (2009)

This paper presents the unbiased H∞ filter design for a class of stochastic systems with time-varying delay. The aim is to design an unbiased filter assuring exponential stability in mean square and a ... [more ▼]

This paper presents the unbiased H∞ filter design for a class of stochastic systems with time-varying delay. The aim is to design an unbiased filter assuring exponential stability in mean square and a prescribed H∞ performance level for the filtering error system. Based on the application of the descriptor model transformation and free weighting matrices, delay-dependent sufficient conditions for stochastic systems with time-varying delay are proposed respectively in terms of linear matrix inequalities(LMIs). Numerical examples demonstrate the proposed approaches are effective and are an improvement over existing methods. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of the LAKE Hash Family
Biryukov, Alex UL; Gauravaram, Praveen; Guo, Jian et al

in Fast Software Encryption (2009)

We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show ... [more ▼]

We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 2^{33}. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 2^{42}. The final attack uses differences only in the chaining values to yield near-collisions with complexity 2^{99}. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions. [less ▲]

Detailed reference viewed: 169 (0 UL)
See detailDer Einfluss des Kaltwasserstresstests auf die mittlere Stimmhöhe
Plein, D. E.; Schulz, André UL; Richter, S. et al

in Widmann, A.; Andersen, S. K.; Friederici, A. D. (Eds.) et al 35. Arbeitstagung Psychophysiologie und Methodik (2009)

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailSpeeding up Collision Search for Byte-Oriented Hash Functions
Khovratovich, Dmitry UL; Biryukov, Alex UL; Nikolic, Ivica UL

in CT-RSA (2009)

We describe a new tool for the search of collisions for hash functions. The tool is applicable when an attack is based on a differential trail, whose probability determines the complexity of the attack ... [more ▼]

We describe a new tool for the search of collisions for hash functions. The tool is applicable when an attack is based on a differential trail, whose probability determines the complexity of the attack. Using the linear algebra methods we show how to organize the search so that many (in some cases — all) trail conditions are always satisfied thus significantly reducing the number of trials and the overall complexity. The method is illustrated with the collision and second preimage attacks on the compression functions based on Rijndael. We show that slow diffusion in the Rijndael (and AES) key schedule allows to run an attack on a version with a 13-round compression function, and the S-boxes do not prevent the attack. We finally propose how to modify the key schedule to resist the attack and provide lower bounds on the complexity of the generic differential attacks for our modification. [less ▲]

Detailed reference viewed: 178 (0 UL)
Full Text
Peer Reviewed
See detailPierre Klossowski ou la représentation de l’incommensurable
Roelens, Nathalie UL

in Approches interdisciplinaires de la lecture (2009), 3

Detailed reference viewed: 115 (1 UL)
Peer Reviewed
See detailSymbolic Planning Politics in a Region of Ongoing Decline. The Restructuring Model of IBA Emscher Park (1989-1999)
Müller, Sebastian; Carr, Constance UL

in Porter, L.; Shaw, K. (Eds.) Whose Urban Renaissance? An international comparison of urban regeneration policies (2009)

Detailed reference viewed: 90 (5 UL)