References of "2016"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailSociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms
Fiandrino, Claudio UL; Kantarci, Burak; Anjomshoa, Fazel et al

in IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2016 (2016, December)

The Internet of Things (IoT) paradigm makes the Internet more pervasive, interconnecting objects of everyday life, and is a promising solution for the development of next- generation services. Smart ... [more ▼]

The Internet of Things (IoT) paradigm makes the Internet more pervasive, interconnecting objects of everyday life, and is a promising solution for the development of next- generation services. Smart cities exploit the most advanced information technologies to improve and add value to existing public services. Applying the IoT paradigm to smart cities is fundamental to build sustainable Information and Communication Technology (ICT) platforms. Having citizens involved in the process through mobile crowdsensing (MCS) techniques unleashes potential benefits as MCS augments the capabilities of the platform without additional costs. Recruitment of participants is a key challenge when MCS systems assign sensing tasks to the users. Proper recruitment both minimizes the cost and maximizes the return, such as the number and the accuracy of accomplished tasks. In this paper, we propose a novel user recruitment policy for data acquisition in mobile crowdsensing systems. The policy can be employed in two modes, namely sociability-driven mode and distance-based mode. Sociability stands for the willingness of users in contributing to sensing tasks. Furthermore, we propose a novel metric to assess the efficiency of any recruitment policy in terms of the number of users contacted and the ones actually recruited. Performance evaluation, conducted in a real urban environment for a large number of participants, reveals the effectiveness of sociability-driven user recruitment as the average number of recruited users improves by at least a factor of two. [less ▲]

Detailed reference viewed: 366 (21 UL)
Full Text
Peer Reviewed
See detailIdentifying the Benefits from Home Ownership:A Swedish Experiment
Von Lilienfeld-Toal, Ulf UL; Paolo, Sodini; Stijn, Van Nieuwerburgh et al

Scientific Conference (2016, December)

Detailed reference viewed: 91 (1 UL)
Full Text
Peer Reviewed
See detailIndoor positioning and floor plan based ground truth: Can you really click where you are?
Popleteev, Andrei UL

in 15th International Conference on Mobile and Ubiquitious Multimedia (MUM-2016) (2016, December)

The increasing accuracy of indoor positioning systems requires an appropriately accurate evaluation, which compares system outputs with the known coordinates of test locations --- the ground truth ... [more ▼]

The increasing accuracy of indoor positioning systems requires an appropriately accurate evaluation, which compares system outputs with the known coordinates of test locations --- the ground truth. Although ground truth data are rarely (if ever) tested, they are traditionally assumed to be perfectly accurate. However, even small errors introduced by inaccurate ground truth need to be taken into account for fair evaluation and comparison between modern high-resolution positioning systems. In this paper we analyze the quality of ground truth data provided by clicking on an interactive floor plan (a method employed by such classical systems as RADAR and Horus). Experimental results show that this method has high precision but low accuracy, and high systematic errors make it unsuitable for evaluation of fine-grained localization systems. [less ▲]

Detailed reference viewed: 188 (3 UL)
Full Text
Peer Reviewed
See detailDesign Strategies for ARX with Provable Bounds: SPARX and LAX
Dinu, Dumitru-Daniel UL; Perrin, Léo Paul UL; Udovenko, Aleksei UL et al

in Cheon, Jung Hee; Takagi, Tsuyoshi (Eds.) Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (2016, December)

We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a ... [more ▼]

We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a long standing open problem in the area of ARX design. The Wide-Trail design Strategy (WTS), that is at the basis of many S-box based ciphers, including the AES, is not suitable for ARX designs due to the lack of S-boxes in the latter. In this paper we address the mentioned limitation by proposing the Long-Trail design Strategy (LTS) -- a dual of the WTS that is applicable (but not limited) to ARX constructions. In contrast to the WTS, that prescribes the use of small and efficient S-boxes at the expense of heavy linear layers with strong mixing properties, the LTS advocates the use of large (ARX-based) S-Boxes together with sparse linear layers. With the help of the so-called long-trail argument, a designer can bound the maximum differential and linear probabilities for any number of rounds of a cipher built according to the LTS. To illustrate the effectiveness of the new strategy, we propose Sparx -- a family of ARX-based block ciphers designed according to the LTS. Sparx has 32-bit ARX-based S-boxes and has provable bounds against differential and linear cryptanalysis. In addition, Sparx is very efficient on a number of embedded platforms. Its optimized software implementation ranks in the top-6 of the most software-efficient ciphers along with Simon, Speck, Chaskey, LEA and RECTANGLE. As a second contribution we propose another strategy for designing ARX ciphers with provable properties, that is completely independent of the LTS. It is motivated by a challenge proposed earlier by Wallen and uses the differential properties of modular addition to minimize the maximum differential probability across multiple rounds of a cipher. A new primitive, called LAX is designed following those principles. LAX partly solves the Wallen challenge. [less ▲]

Detailed reference viewed: 272 (15 UL)
Full Text
Peer Reviewed
See detailDe la grammaire à la littérature : comment progresser de l’une à l’autre en l’espace d’un cours ?
Freyermuth, Sylvie UL

in Revue Luxembourgeoise de Littérature Générale et Comparée (2016)

Detailed reference viewed: 178 (15 UL)
Full Text
See detailAnalysis of the impact of ROS in networks describing neurodegenerative diseases
Ignatenko, Andrew UL

Doctoral thesis (2016)

In the current thesis the model of the ROS management network is built using the domino principle. The model offers insight into the design principles underlying the ROS management network and enlightens ... [more ▼]

In the current thesis the model of the ROS management network is built using the domino principle. The model offers insight into the design principles underlying the ROS management network and enlightens its functionality in the diseases such as cancer and Parkinson’s disease (PD). It is validated using experimental data. The model is used for in silico study of the ROS management dynamics under the stress conditions (oxidative stress). This highlights the phenomena of both adaptation to stress and the stress accumulation effect in case of repeated stress. This study also helps to discover the potential ways to a personalized treatment of the insufficient ROS management. The different ways of a control of the ROS management network are shown using the optimal control approach. Obtained results could be used for a seeking of the treatment strategies to fix the ROS management failures caused by an oxidative stress, neurodegenerative diseases, etc. Or, in vice versa, to develop the ways of a controllable cell death that might be used in cancer research. [less ▲]

Detailed reference viewed: 120 (13 UL)
Full Text
Peer Reviewed
See detailTHE PRIVILEGE AGAINST SELF-INCRIMINATION A Chameleon of Criminal Procedure
Lamberigts, Stijn UL

in New Journal of European Criminal Law (2016), 7(4), 418-438

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the ... [more ▼]

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the applicability of the privilege to corporations, in light of these justifications. Although the Presumption of Innocence Directive has recently addressed these two issues, several lingering uncertainties remain. [less ▲]

Detailed reference viewed: 284 (15 UL)
Full Text
Peer Reviewed
See detailGraph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation
Hochgeschwender, Nico UL; Schneider, Sven; Voos, Holger UL et al

in IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (2016, December)

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven ... [more ▼]

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven engineering (MDE) approaches. However, these models are merely seen as a way to support humans during the robot's software design process. We argue that the robots themselves should be first-class consumers of this knowledge to autonomously adapt their software to the various and changing run-time requirements induced, for instance, by the robot's tasks or environment. Motivated by knowledge-enabled approaches, we address this problem by employing a graph-based knowledge representation that allows us not only to persistently store domain models, but also to formulate powerful queries for the sake of run time adaptation. We have evaluated our approach in an integrated, real-world system using the neo4j graph database and we report some lessons learned. Further, we show that the graph database imposes only little overhead on the system's overall performance. [less ▲]

Detailed reference viewed: 160 (14 UL)
Full Text
Peer Reviewed
See detailA three-dimensional movement analysis of the spike in fistball
Bund, Andreas UL; Ghorbani, Saeed; Rathjens, Franziska

in Sports (2016), 4(4), 1-12

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a ... [more ▼]

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a three-dimensional kinematic analysis of the fistball spike, which helps to specify performance parameters on a descriptive level. Recorded by four synchronized cameras (120 Hz) and linked to the motion capture software Simi Motion® 5.0, three female fistball players of the second German league (24–26 years, 1.63–1.69 m) performed several spikes under standardized conditions. Results show that the segment velocities of the arm reached their maximum successively from proximal to distal, following the principle of temporal coordination of single impulses. The wrist shows maximum speed when the fist hits the ball. The elbow joint angle performs a rapid transition from a strong flexion to a (almost) full extension; however, the extension is completed after the moment of ball impact. In contrast, the shoulder joint angle increases almost linearly until the fistball contact and decreases afterward. The findings can be used to optimize the training of the spike. [less ▲]

Detailed reference viewed: 193 (2 UL)
Full Text
Peer Reviewed
See detailLinear identification of nonlinear systems: A lifting technique based on the Koopman operator
Mauroy, Alexandre UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state ... [more ▼]

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state space, we obtain a novel linear identification technique by recasting the problem in the infinite-dimensional space of observables. This technique can be described in two main steps. In the first step, similar to a component of the Extended Dynamic Mode Decomposition algorithm, the data are lifted to the infinite-dimensional space and used for linear identification of the Koopman operator. In the second step, the obtained Koopman operator is “projected back” to the finite-dimensional state space, and identified to the nonlinear vector field through a linear least squares problem. The proposed technique is efficient to recover (polynomial) vector fields of different classes of systems, including unstable, chaotic, and open systems. In addition, it is robust to noise, well-suited to model low sampling rate datasets, and able to infer network topology and dynamics. [less ▲]

Detailed reference viewed: 172 (9 UL)
Full Text
Peer Reviewed
See detailIMP: a pipeline for reproducible referenceindependent integrated metagenomic and metatranscriptomic analyses
Narayanasamy, Shaman UL; Jarosz, Yohan UL; Muller, Emilie UL et al

in Genome Biology (2016), 17

Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the ... [more ▼]

Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the integrated and reference-independent analysis of coupled metagenomic and metatranscriptomic data. IMP incorporates robust read preprocessing, iterative co-assembly, analyses of microbial community structure and function, automated binning, as well as genomic signature-based visualizations. The IMP-based data integration strategy enhances data usage, output volume, and output quality as demonstrated using relevant use-cases. Finally, IMP is encapsulated within a user-friendly implementation using Python and Docker. IMP is available at http://r3lab.uni.lu/web/imp/ (MIT license). [less ▲]

Detailed reference viewed: 390 (27 UL)
Full Text
See detailUncertainty quantification for soft tissue biomechanics
Hauseux, Paul UL; Hale, Jack UL; Bordas, Stéphane UL

Poster (2016, December)

Detailed reference viewed: 242 (20 UL)
Full Text
Peer Reviewed
See detailOptimality Results on the Security of Lookup-Based Protocols
Mauw, Sjouke UL; Toro Pozo, Jorge Luis UL; Trujillo Rasua, Rolando UL

in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the ... [more ▼]

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table. In this paper, we study this security-memory trade-off problem for a large class of lookup-based distance bounding protocols; called layered protocols. Relying on an automata-based security model, we provide mathematical definitions for different design decisions used in previous lookup-based protocols, and perform general security analyses for each of them. We also formalize an interpretation of optimal trade-off and find a non-trivial protocol transformation approach towards optimality. That is to say, our transformation applied to any layered protocol results in either an improved or an equal protocol with respect to the optimality criterion. This transformation allows us to provide a subclass of lookup-based protocol that cannot be improved further, which means that it contains an optimal layered protocol. [less ▲]

Detailed reference viewed: 105 (5 UL)
Full Text
Peer Reviewed
See detailReliability problems and Pareto-optimality in cognitive radar (Invited paper)
Soltanalian, M.; Mysore, R.B.S.; Ottersten, Björn UL

in Signal Processing Conference (EUSIPCO), 2016 24th European (2016, December)

Cognitive radar refers to an adaptive sensing system exhibiting high degree of waveform adaptivity and diversity enabled by intelligent processing and exploitation of information from the environment. The ... [more ▼]

Cognitive radar refers to an adaptive sensing system exhibiting high degree of waveform adaptivity and diversity enabled by intelligent processing and exploitation of information from the environment. The next generation of radar systems are characterized by their application to scenarios exhibiting non-stationary scenes as well as interference caused by use of shared spectrum. Cognitive radar systems, by their inherent adaptivity, seem to be the natural choice for such applications. However, adaptivity opens up reliability issues due to uncertainties induced in the information gathering and processing. This paper lists some of the reliability aspects foreseen for cognitive radar systems and motivates the need for waveform designs satisfying different metrics simultaneously towards enhancing the reliability. An iterative framework based on multi-objective optimization is proposed to provide Pareto-optimal waveform designs. [less ▲]

Detailed reference viewed: 152 (0 UL)
Full Text
Peer Reviewed
See detailThe influence of superposition and eccentric loading on the bearing capacity of shallow foundations
Van Baars, Stefan UL

in Computations and Materials in Civil Engineering (2016), 1(3), 121-131

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding surcharge and Keverling Buisman (1940) for the soil weight. Terzaghi (1943) wrote this as a superposition of three separate bearing capacity components for the cohesion, surcharge and soil-weight. The first question is to what ex-tent the currently used components are correct. The second question is to what extent the superposition is correct, because the failure mechanisms for these three components are not the same. A number of finite element calculations show that there is indeed an error, which is luckily not too large and leads to predictions on the safe side. Meyerhof (1953) extended the equation of Terzaghi with correction factors for the shape of the footing and the inclination of the load. For eccentric loading however, there are no correction factors. The common practice is to reduce the contact area of the foundation such that its centroid coincides with that of the load, which means that, the area of the foundation outside the effective area, is completely neglected. Therefore the third question is, if this reduction of the foundation area is an accurate method to describe the reduction of the bearing capacity due to eccentric loading. A number of finite element calculations show that this is indeed the case. [less ▲]

Detailed reference viewed: 290 (7 UL)
Full Text
See detailTutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges
Varrette, Sébastien UL

Learning material (2016)

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper ... [more ▼]

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper such as the code, data, etc. that can be used to reproduce the results and create new work based on the research.” Source: Wikipedia. The need for reproducibility is increasing dramatically as data analyses become more complex, involving larger datasets and more sophisticated computations. Obviously, the advent of the Cloud Computing paradigm is expected to provide the appropriate means for RR. This tutorial is meant to provide an overview of sensible tools every researcher (in computer science but not only) should be aware of to enable RR in its own work. In particular, and after a general talk presenting RR and the existing associated tools and workflow, this tutorial will propose several practical exercises and hands-on meant to be performed on each attendee’s laptop, to cover the management of sharable Development environment using Vagrant. Resources of this tutorial will be available on Github. [less ▲]

Detailed reference viewed: 55 (1 UL)
Full Text
Peer Reviewed
See detailGame-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications
Pouryazdan, Maryam; Fiandrino, Claudio UL; Kantarci, Burak et al

in IEEE Global Communications Conference (GLOBECOM) Workshops: Fifth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA) (2016, December)

Widespread use of connected smart devices that are equipped with various built-in sensors has introduced the mobile crowdsensing concept to the IoT-driven information and communication applications ... [more ▼]

Widespread use of connected smart devices that are equipped with various built-in sensors has introduced the mobile crowdsensing concept to the IoT-driven information and communication applications. Mobile crowdsensing requires implicit collaboration between the crowdsourcer/recruiter platforms and users. Additionally, users need to be incentivized by the crowdsensing platform because each party aims to maximize their utility. Due to the participatory nature of data collection, trustworthiness and truthfulness pose a grand challenge in crowdsensing systems in the presence of malicious users, who either aim to manipulate sensed data or collaborate unfaithfully with the motivation of maximizing their income. In this paper, we propose a game-theoretic approach for trustworthiness-driven user recruitment in mobile crowdsensing systems that consists of three phases: i) user recruitment, ii) collaborative decision making on trust scores, and iii) badge rewarding. Our proposed framework incentivizes the users through a sub-game perfect equilibrium (SPE) and gamification techniques. Through simulations, we show that the platform utility can be improved by up to the order of 50\% while the average user utility can be increased by at least 15\% when compared to fully-distributed and user-centric trustworthy crowdsensing. [less ▲]

Detailed reference viewed: 291 (10 UL)
Full Text
See detailProceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (ClouCom 2016)
Varrette, Sébastien UL; Bouvry, Pascal UL; Zomaya, Albert et al

Book published by IEEE Computer Society (2016)

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research ... [more ▼]

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research, virtualization, security and privacy, high performance computing, always with an emphasis on how to build cloud computing platforms with real impact. The conference is co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE), is steered by the Cloud Computing Association, and draws on the excellence of its world-class Program Committee and its participants. The 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016) was held in the city of Luxembourg on 12-15 December 2016 [less ▲]

Detailed reference viewed: 145 (14 UL)
Full Text
See detailSymbiose aus Stahl und Stein - innovative Lösungen
Schäfer, Markus UL; Braun, Matthias; Radermacher, Christoph et al

in Revue Technique Luxembourgeoise (2016), 04/2016

Detailed reference viewed: 68 (3 UL)
Full Text
Peer Reviewed
See detailOn the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data
Rial, Alfredo UL

in Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December)

The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute ... [more ▼]

The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute-based encryption (CPABE), has received a lot of attention in the last years. Recently, Jahan et al.~(IEEE 40th Conference on Local Computer Networks, 2015) propose a scheme based on CPABE where users have reading and writing access to the outsourced data. We analyze the scheme by Jahan et al.\ and we show that it has several security vulnerabilities. For instance, the cloud server can get information about encrypted messages by using a stored ciphertext and an update of that ciphertext. As another example, users with writing access are able to decrypt all the messages regardless of their attributes. We discuss the security claims made by Jahan et al.\ and point out the reasons why they do not hold. We also explain that existing schemes can already provide the advantages claimed by Jahan et al. [less ▲]

Detailed reference viewed: 151 (5 UL)