References of "2009"
     in
Bookmark and Share    
Peer Reviewed
See detailAn Analysis of Dynamic Mutation Operators for Conformational Sampling
Tantar, Alexandru-Adrian UL; Melab, Nouredine; Talbi, El-Ghazali

in Lewis, Andrew; Mostaghim, Sanaz; Randall, Marcus (Eds.) Biologically-Inspired Optimisation Methods (2009)

Detailed reference viewed: 142 (0 UL)
See detailProblemlösen.
Biesta, Gert UL

in Andresen, S.; Casale, R.; Gabriel, T. (Eds.) et al Handwörterbuch Erziehungswissenschaft (2009)

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailAbusing SIP authentication
Abdelnur, Humberto J.; Avanesov, Tigran UL; Rusinowitch, Michael et al

in Journal of Information Assurance and Security (2009), 4

The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will ... [more ▼]

The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this vulnerability, highlight a simple usage case and propose a mitigation technique. [less ▲]

Detailed reference viewed: 175 (2 UL)
Peer Reviewed
See detailRéflexion comparative sur la transposition des directives européennes : l'exemple des clauses abusives
Poillot, Elise UL

in Breton, Albert; Anne Des Ormeaux; Pistor, Katharina (Eds.) et al Multijuralism: Manifestations, Causes, and Consequences (2009)

Detailed reference viewed: 139 (9 UL)
See detailQualitätsentwicklung in der Sozialen Arbeit
Rotink, G. UL; Brandhorst, K.

in Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009)

Detailed reference viewed: 67 (4 UL)
Full Text
Peer Reviewed
See detailThe Crime Novel: multiculturalism and its impact on the genre's conventions
Glesener, Jeanne UL

in Amodeo, Immacolata; Erdmann, Eva (Eds.) Crime & Nation: Political and Cultural Mappings of Criminality in Traditional and New Media (2009)

Detailed reference viewed: 104 (3 UL)
Full Text
Peer Reviewed
See detailThe Chisini mean revisited
Marichal, Jean-Luc UL

in González, Manuel; Mayor, Gaspar; Suner, Jaume (Eds.) et al Proc. 5th Int. Summer School on Aggregation Operators and their Applications (AGOP 2009) (2009)

We investigate the $n$-variable real functions $\G$ that are solutions of the functional equation $\F(\bfx)=\F(\G(\bfx),\ldots,\G(\bfx))$, where $\F$ is a given function of $n$ real variables. We provide ... [more ▼]

We investigate the $n$-variable real functions $\G$ that are solutions of the functional equation $\F(\bfx)=\F(\G(\bfx),\ldots,\G(\bfx))$, where $\F$ is a given function of $n$ real variables. We provide necessary and sufficient conditions on $\F$ for the existence and uniqueness of solutions. When $\F$ is nondecreasing in each variable, we show in a constructive way that if a solution exists then a nondecreasing and idempotent solution always exists. Such solutions, called Chisini means, are then thoroughly investigated. [less ▲]

Detailed reference viewed: 88 (6 UL)
Full Text
Peer Reviewed
See detailQuasi-Fuchsian manifolds with particles
Moroianu, Sergiu; Schlenker, Jean-Marc UL

in Journal of Differential Geometry (2009), 83(1), 75-129

We consider 3-dimensional hyperbolic cone-manifolds, singular along infinite lines, which are ``convex co-compact'' in a natural sense. We prove an infinitesimal rigidity statement when the angle around ... [more ▼]

We consider 3-dimensional hyperbolic cone-manifolds, singular along infinite lines, which are ``convex co-compact'' in a natural sense. We prove an infinitesimal rigidity statement when the angle around the singular lines is less than $\pi$: any first-order deformation changes either one of those angles or the conformal structure at infinity, with marked points corresponding to the endpoints of the singular lines. Moreover, any small variation of the conformal structure at infinity and of the singular angles can be achieved by a unique small deformation of the cone-manifold structure. [less ▲]

Detailed reference viewed: 125 (9 UL)
Full Text
Peer Reviewed
See detailFault Attacks on RSA Signatures with Partially Unknown Messages
Coron, Jean-Sébastien UL; Joux, Antoine; Kizhvatov, Ilya UL et al

in Proceedings of CHES 2009 (2009)

Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90’s, Boneh, DeMillo and Lipton introduced fault-based attacks on CRt-RSA. These attacks factor ... [more ▼]

Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90’s, Boneh, DeMillo and Lipton introduced fault-based attacks on CRt-RSA. These attacks factor the signer’s modulus when the message padding function is deterministic. However, the attack does not apply when the message is partially unknown, for example when messages contain some randomness which is recovered only when verifying a correct signature. In this paper we successfully extends rsa fault attacks to a large class of partially known message configurations. The new attacks rely on Coppersmith’s algorithm for finding small roots of multivariate polynomial equations. We illustrate the approach by successfully attacking several randomized versions of the ISO/IEC 9796-2 encoding standard. Practical experiments show that a 2048-bit modulus can be factored in less than a minute given one faulty signature containing 160 random bits and an unknown 160-bit message digest. [less ▲]

Detailed reference viewed: 199 (1 UL)
Full Text
Peer Reviewed
See detailKnowledge Portfolios and the Organization of Innovation Networks
Cowan, Robin; Jonard, Nicolas UL

in Academy of Management Review (2009), 34

Detailed reference viewed: 167 (4 UL)
Full Text
Peer Reviewed
See detailMultiobjective Classification with moGEP: An Application in the Network Traffic Domain
Ostaszewski, Marek UL; Bouvry, Pascal UL; Seredynski, Franciszek

in GECCO '09: Proceedings of the 11th Annual conference on Genetic and evolutionary computation (2009)

The paper proposes a multiobjective approach to the problem of malicious network traffic classification, with specificity and sensitivity criteria as objective functions for the problem. The ... [more ▼]

The paper proposes a multiobjective approach to the problem of malicious network traffic classification, with specificity and sensitivity criteria as objective functions for the problem. The multiobjective version of Gene Expression Programming (GEP) called moGEP is proposed and applied to find proper classifiers in the multiobjective search space. The purpose of the classifiers is to discriminate information about the network traffic obtained from Idiotypic Network-based Intrusion Detection System (INIDS), transformed into time series. The proposed approach is validated using the network traffic simulator ns2. Classifiers of high accuracy are obtained and their diversity offers interesting possibilities to the domain of network security. [less ▲]

Detailed reference viewed: 137 (3 UL)
See detailSozialisation
Honig, Michael-Sebastian UL

in Andresen, Sabine; Casale, Rita; Gabriel, Thomas (Eds.) et al Handwörterbuch Erziehungswissenschaft (2009)

Detailed reference viewed: 88 (0 UL)
Full Text
See detailSonderpädagogische Förderung in Luxemburg.
Limbach-Reich, Arthur UL

in Willems, Helmut; Roting, Georges; Ferring, Dieter (Eds.) et al Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009)

Detailed reference viewed: 95 (15 UL)
See detailSozialstaat und Sozialpolitik
Schoos, J.; Schmit, C. UL

in Handbuch der sozialen und erzieherischen Arbeit in Luxemburg / Manuel de l'intervention sociale et éducative au Grand-Duché de Luxembourg (2009)

Detailed reference viewed: 112 (2 UL)
Full Text
Peer Reviewed
See detailEmotional relationship quality of adult children whith ageing parents: On solidarity, conflict and ambivalence.
Ferring, Dieter UL; Michels, Tom UL; Boll, Thomas UL et al

in European Journal of Ageing (2009), 6

Emotions toward a relationship partner provide relevant and specific information about relationship quality. Based on this assumption the present study was performed to identify different types of ... [more ▼]

Emotions toward a relationship partner provide relevant and specific information about relationship quality. Based on this assumption the present study was performed to identify different types of emotional relationship quality of middle-aged adult children with their aging parents. This was done by cluster analytic procedures in a sample of 1,208 middle-aged adult children (482 men, 726 women). Using ratings of positive and negative emotions toward their mother and their father as grouping variables, the same four-cluster solution emerged for both the child-mother relationship and the child-father relationship. Clusters were labelled as amicable, disharmonious, detached, and ambivalent relationships. Results showed that especially amicable relationships clearly prevailed followed by ambivalent, detached, and disharmonious relationships. Clusters differed significantly with respect to gender of adult child, willingness to support, expected parental support, and overt conflicts. In a cross-classification of cluster membership regarding the child-mother relationship (4 clusters) and the child-father relationship (4 clusters), all possible 16 combinations were observed, with a considerable degree of divergence regarding the type of relationship quality within the same family. Results are discussed with respect to types of emotional relationship quality, within family differences, and the intrafamilial regulation of relationship quality. [less ▲]

Detailed reference viewed: 203 (13 UL)
Full Text
Peer Reviewed
See detailTemporal Dependence Networks for the Design of Convivial Multiagent Systems
Caire, Patrice UL; van der Torre, Leon UL

in Proceedings of the Eighth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS (2009)

We show how to use TROPOS as a design methodology for convivial multi-agent systems. We introduce temporal dependence networks to measure the evolution of conviviality over time, and we compare them to ... [more ▼]

We show how to use TROPOS as a design methodology for convivial multi-agent systems. We introduce temporal dependence networks to measure the evolution of conviviality over time, and we compare them to dynamic dependence networks introduced for conviviality masks and internal dynamics. [less ▲]

Detailed reference viewed: 109 (3 UL)
Peer Reviewed
See detailDer Kindsmord zwischen Verbrechen und Tragödie. Pestalozzis Preisschrift von 1783
Tröhler, Daniel UL; Ritzmann, Iris

in Tröhler, Daniel; Ritzmann, Iris (Eds.) Johann Heinrich Pestalozzi. Über Gesetzgebung und Kindermord (2009)

Detailed reference viewed: 92 (1 UL)
Peer Reviewed
See detailTransmissions cholinergiques
Bueb, Jean-Luc UL

in Landry, Yves; Gies, Jean-Pierre (Eds.) Pharmacologie. Des cibles vers l’indication thérapeutique (2009)

Detailed reference viewed: 80 (4 UL)