![]() Juffermans, Kasper ![]() in van de Craats, Ineke; Kurvers, Jeanne (Eds.) Low-educated adult second language and literacy acquisition: Proceedings of the 4th symposium in Antwerp (2009) Detailed reference viewed: 56 (0 UL)![]() Couceiro, Miguel ![]() ![]() in Aequationes Mathematicae (2009), 78(1-2), 195-213 Two emergent properties in aggregation theory are investigated, namely horizontal maxitivity and comonotonic maxitivity (as well as their dual counterparts) which are commonly defined by means of certain ... [more ▼] Two emergent properties in aggregation theory are investigated, namely horizontal maxitivity and comonotonic maxitivity (as well as their dual counterparts) which are commonly defined by means of certain functional equations. We completely describe the function classes axiomatized by each of these properties, up to weak versions of monotonicity in the cases of horizontal maxitivity and minitivity. While studying the classes axiomatized by combinations of these properties, we introduce the concept of quasi-polynomial function which appears as a natural extension of the well-established notion of polynomial function. We give further axiomatizations for this class both in terms of functional equations and natural relaxations of homogeneity and median decomposability. As noteworthy particular cases, we investigate those subclasses of quasi-term functions and quasi-weighted maximum and minimum functions, and provide characterizations accordingly. [less ▲] Detailed reference viewed: 97 (5 UL)![]() ; ; Ottersten, Björn ![]() in IEEE Transactions on Signal Processing (2009), 57(10), 4027-4041 In the design of narrowband multi-antenna systems, a limiting factor is the amount of channel state information (CSI) available at the transmitter. This is especially evident in multi-user systems, where ... [more ▼] In the design of narrowband multi-antenna systems, a limiting factor is the amount of channel state information (CSI) available at the transmitter. This is especially evident in multi-user systems, where the spatial user separability determines the multiplexing gain, but it is also important for transmission-rate adaptation in single-user systems. To limit the feedback load, the unknown and multi-dimensional channel needs to be represented by a limited number of bits. When combined with long-term channel statistics, the norm of the channel matrix has been shown to provide substantial CSI that permits efficient user selection, linear precoder design, and rate adaptation. Herein, we consider quantized feedback of the squared Frobenius norm in a Rayleigh fading environment with arbitrary spatial correlation. The conditional channel statistics are characterized and their moments are derived for both identical, distinct, and sets of repeated eigenvalues. These results are applied for minimum mean square error (MMSE) estimation of signal and interference powers in single- and multi-user systems, for the purpose of reliable rate adaptation and resource allocation. The problem of efficient feedback quantization is discussed and an entropy-maximizing framework is developed where the post-user-selection distribution can be taken into account in the design of the quantization levels. The analytic results of this paper are directly applicable in many widely used communication techniques, such as space-time block codes, linear precoding, space division multiple access (SDMA), and scheduling. [less ▲] Detailed reference viewed: 189 (0 UL)![]() Steffgen, Georges ![]() Presentation (2009, October) Detailed reference viewed: 54 (0 UL)![]() Engel de Abreu, Pascale ![]() Poster (2009, October) The aim of the present study was to investigate the contribution of two working memory systems (the phonological loop and the central executive) to children’s foreign language learning. A sample of 119 ... [more ▼] The aim of the present study was to investigate the contribution of two working memory systems (the phonological loop and the central executive) to children’s foreign language learning. A sample of 119 Luxembourgish children, whose native language is Luxembourgish and who learn German and French as secondary languages in school were assessed longitudinally over a 4-year time period. Children were tested in kindergarten (5 years of age), in first, second, and third grade with a one-year interval between each testing wave. Results indicate that individual differences in phonological loop functioning were causally related to foreign vocabulary development. One particular phonological loop measure - the repetition of low wordlike nonwords - was identified as the single best predictor of the acquisition of an unfamiliar foreign language up to two years later, suggesting that this measure may provide a valuable tool for early screening to identify children who are at present and future risk for foreign language learning difficulties. [less ▲] Detailed reference viewed: 116 (2 UL)![]() ![]() Huemer, Birgit ![]() Scientific Conference (2009, October) Detailed reference viewed: 59 (0 UL)![]() ; Krolak-Schwerdt, Sabine ![]() Scientific Conference (2009, October) Detailed reference viewed: 49 (0 UL)![]() Schlichenmaier, Martin ![]() Scientific Conference (2009, October) Detailed reference viewed: 57 (5 UL)![]() Leboutte, René ![]() in European Review of History (2009), 16 Detailed reference viewed: 276 (0 UL)![]() ![]() Sagrillo, Damien ![]() Scientific Conference (2009, September 30) Detailed reference viewed: 95 (0 UL)![]() Michael, Mark ![]() Presentation (2009, September 30) Detailed reference viewed: 113 (2 UL)![]() Rivain, Matthieu ![]() Doctoral thesis (2009) In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption ... [more ▼] In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible to potential attackers. This physical access invalidates the modeling of the cryptosystem as a simple encryption oracle since it allows the adversary to observe and disrupt its physical behavior. New attacks then become possible which are known as physical cryptanalysis. Physical cryptanalysis includes two main families of attacks: side channel attacks and fault attacks. The purpose of side channel attacks is to analyze the different physical leakages of a cryptographic implementation during its computation. Chief among these rank timing, power consumption, and electromagnetic radiation. Observing these so-called side channels provides sensitive information about the cryptographic computation. The secret key value can then be easily recovered by statistical treatment although the cryptosystem is secure in the black-box model. The access to a cryptographic implementation enables more than a simple observation of its physical behavior; it is also possible to disrupt its computation. Working on this assumption, fault attacks consist in corrupting cryptographic computations so that they produce erroneous results. Surprisingly, these results can be used in order to recover information about the secret key. This thesis focuses on physical cryptanalysis as well as on the secure implementation of cryptographic primitives. We examine in the first part side channel attacks from a theoretical viewpoint. Various techniques of attack based on different statistical tools are addressed. We analyze their success rate, we compare their efficiency and we propose some improvements. Our analyses are illustrated by results of simulated attacks as well as practical attacks on smart cards. The second part of this thesis is devoted to one of the most widely used countermeasures to side channel attacks: data masking. Our investigations concentrate on generic masking schemes for block ciphers such as the encryption standards DES and AES. We analyze existing schemes, exhibiting some attacks against certain of them and we propose new designs. The third and last part of this thesis deals with fault attacks. First, we describe a new attack on the DES cipher which exhibits some requirements to its secure implementation. We then provide a case study based on the RSA cryptosystem where we propose a new countermeasure which can also be applied to secure any exponentiation algorithm. We finally address an important issue for practical security: the implementation of coherence checks. [less ▲] Detailed reference viewed: 216 (5 UL)![]() Nienaber, Birte ![]() Scientific Conference (2009, September 20) Detailed reference viewed: 78 (1 UL)![]() Nienaber, Birte ![]() Conference given outside the academic context (2009) Detailed reference viewed: 74 (1 UL)![]() Sonnleitner, Philipp ![]() ![]() ![]() Scientific Conference (2009, September 06) Detailed reference viewed: 111 (5 UL)![]() ![]() ; ; Steffgen, Georges ![]() Poster (2009, September) Findings demonstrated that overweight adolescents are more likely to be both victims and perpetrators of violent acts (Janssen et al., 2004). The present study tested this weight-based victimization ... [more ▼] Findings demonstrated that overweight adolescents are more likely to be both victims and perpetrators of violent acts (Janssen et al., 2004). The present study tested this weight-based victimization/perpetrator hypothesis. The study sample comprised N1⁄4649 middle school students, which were regrouped in three weight categories (i.e. underweight, normal weight, overweight) according to the cut-offs proposed by the International Obesity Taskforce. In order to analyze group differences between the weight categories, three same sized groups (N 1⁄4 75) were randomly created from the whole data set. Results confirmed that overweight students are more likely to be victimized but not to become perpetrators themselves compared to their peers. Logistic regressions showed that being anxious (OR 1⁄4 2.34), having low self- esteem (OR1⁄40.58), having a higher BMI (OR1⁄41.11) and being male (OR1⁄40.26) are risk factors of victimization. Results will be discussed with respect to psychosocial interventions. [less ▲] Detailed reference viewed: 86 (2 UL)![]() Wille, Christian ![]() Scientific Conference (2009, September) Detailed reference viewed: 61 (0 UL)![]() Martin, Romain ![]() ![]() Scientific Conference (2009, September) The fundamental hypothesis related to the distinction between categorical and coordinate processing has been that these two types of spatial relations coding are qualitatively different. Based on ... [more ▼] The fundamental hypothesis related to the distinction between categorical and coordinate processing has been that these two types of spatial relations coding are qualitatively different. Based on Kosslyn’s initial hemispheric specialization theory, they also are hypothesized to rely on different functional networks in the brain which are supposed to have evolved in a way to take advantage of more fundamental hemispheric specializations in order to adapt these hemispheric strengths to the processing of the two different types of spatial relations. (...) [less ▲] Detailed reference viewed: 69 (1 UL)![]() Fischbach, Antoine ![]() ![]() Presentation (2009, September) Detailed reference viewed: 66 (4 UL)![]() ; Juffermans, Kasper ![]() in Cuvelier, Pol; Vandekerckhove, Reinhild; Aerts, Ann (Eds.) Multilingualism from Below: Proceedings MIDP Colloquium (2009, September) Detailed reference viewed: 77 (0 UL) |
||