References of "2016"
     in
Bookmark and Share    
Full Text
See detailTutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges
Varrette, Sébastien UL

Learning material (2016)

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper ... [more ▼]

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper such as the code, data, etc. that can be used to reproduce the results and create new work based on the research.” Source: Wikipedia. The need for reproducibility is increasing dramatically as data analyses become more complex, involving larger datasets and more sophisticated computations. Obviously, the advent of the Cloud Computing paradigm is expected to provide the appropriate means for RR. This tutorial is meant to provide an overview of sensible tools every researcher (in computer science but not only) should be aware of to enable RR in its own work. In particular, and after a general talk presenting RR and the existing associated tools and workflow, this tutorial will propose several practical exercises and hands-on meant to be performed on each attendee’s laptop, to cover the management of sharable Development environment using Vagrant. Resources of this tutorial will be available on Github. [less ▲]

Detailed reference viewed: 54 (1 UL)
See detailValuing American options using fast recursive projections
Cosma, Antonio UL; Galluccio, Stefano; Pederzoli, Paola et al

Scientific Conference (2016, December)

Detailed reference viewed: 139 (4 UL)
See detailErinnerungen an die Zwangsrekrutierung im Großherzogtum Luxemburg
Klos, Eva Maria UL

in Stroh, Frédéric; Quadflieg, Peter M. (Eds.) L’incorporation de force dans les territoires annexés par le IIIe Reich. Die Zwangsrekrutierung in den vom Dritten Reich annektierten Gebieten 1939-1945 (2016, December)

Detailed reference viewed: 168 (16 UL)
Full Text
See detailAnalysis of the impact of ROS in networks describing neurodegenerative diseases
Ignatenko, Andrew UL

Doctoral thesis (2016)

In the current thesis the model of the ROS management network is built using the domino principle. The model offers insight into the design principles underlying the ROS management network and enlightens ... [more ▼]

In the current thesis the model of the ROS management network is built using the domino principle. The model offers insight into the design principles underlying the ROS management network and enlightens its functionality in the diseases such as cancer and Parkinson’s disease (PD). It is validated using experimental data. The model is used for in silico study of the ROS management dynamics under the stress conditions (oxidative stress). This highlights the phenomena of both adaptation to stress and the stress accumulation effect in case of repeated stress. This study also helps to discover the potential ways to a personalized treatment of the insufficient ROS management. The different ways of a control of the ROS management network are shown using the optimal control approach. Obtained results could be used for a seeking of the treatment strategies to fix the ROS management failures caused by an oxidative stress, neurodegenerative diseases, etc. Or, in vice versa, to develop the ways of a controllable cell death that might be used in cancer research. [less ▲]

Detailed reference viewed: 118 (13 UL)
Full Text
Peer Reviewed
See detailIMP: a pipeline for reproducible referenceindependent integrated metagenomic and metatranscriptomic analyses
Narayanasamy, Shaman UL; Jarosz, Yohan UL; Muller, Emilie UL et al

in Genome Biology (2016), 17

Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the ... [more ▼]

Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the integrated and reference-independent analysis of coupled metagenomic and metatranscriptomic data. IMP incorporates robust read preprocessing, iterative co-assembly, analyses of microbial community structure and function, automated binning, as well as genomic signature-based visualizations. The IMP-based data integration strategy enhances data usage, output volume, and output quality as demonstrated using relevant use-cases. Finally, IMP is encapsulated within a user-friendly implementation using Python and Docker. IMP is available at http://r3lab.uni.lu/web/imp/ (MIT license). [less ▲]

Detailed reference viewed: 380 (24 UL)
Full Text
Peer Reviewed
See detailDesign Strategies for ARX with Provable Bounds: SPARX and LAX
Dinu, Dumitru-Daniel UL; Perrin, Léo Paul UL; Udovenko, Aleksei UL et al

in Cheon, Jung Hee; Takagi, Tsuyoshi (Eds.) Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (2016, December)

We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a ... [more ▼]

We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a long standing open problem in the area of ARX design. The Wide-Trail design Strategy (WTS), that is at the basis of many S-box based ciphers, including the AES, is not suitable for ARX designs due to the lack of S-boxes in the latter. In this paper we address the mentioned limitation by proposing the Long-Trail design Strategy (LTS) -- a dual of the WTS that is applicable (but not limited) to ARX constructions. In contrast to the WTS, that prescribes the use of small and efficient S-boxes at the expense of heavy linear layers with strong mixing properties, the LTS advocates the use of large (ARX-based) S-Boxes together with sparse linear layers. With the help of the so-called long-trail argument, a designer can bound the maximum differential and linear probabilities for any number of rounds of a cipher built according to the LTS. To illustrate the effectiveness of the new strategy, we propose Sparx -- a family of ARX-based block ciphers designed according to the LTS. Sparx has 32-bit ARX-based S-boxes and has provable bounds against differential and linear cryptanalysis. In addition, Sparx is very efficient on a number of embedded platforms. Its optimized software implementation ranks in the top-6 of the most software-efficient ciphers along with Simon, Speck, Chaskey, LEA and RECTANGLE. As a second contribution we propose another strategy for designing ARX ciphers with provable properties, that is completely independent of the LTS. It is motivated by a challenge proposed earlier by Wallen and uses the differential properties of modular addition to minimize the maximum differential probability across multiple rounds of a cipher. A new primitive, called LAX is designed following those principles. LAX partly solves the Wallen challenge. [less ▲]

Detailed reference viewed: 265 (15 UL)
Full Text
Peer Reviewed
See detailGraph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation
Hochgeschwender, Nico UL; Schneider, Sven; Voos, Holger UL et al

in IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (2016, December)

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven ... [more ▼]

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven engineering (MDE) approaches. However, these models are merely seen as a way to support humans during the robot's software design process. We argue that the robots themselves should be first-class consumers of this knowledge to autonomously adapt their software to the various and changing run-time requirements induced, for instance, by the robot's tasks or environment. Motivated by knowledge-enabled approaches, we address this problem by employing a graph-based knowledge representation that allows us not only to persistently store domain models, but also to formulate powerful queries for the sake of run time adaptation. We have evaluated our approach in an integrated, real-world system using the neo4j graph database and we report some lessons learned. Further, we show that the graph database imposes only little overhead on the system's overall performance. [less ▲]

Detailed reference viewed: 157 (14 UL)
Full Text
Peer Reviewed
See detailA three-dimensional movement analysis of the spike in fistball
Bund, Andreas UL; Ghorbani, Saeed; Rathjens, Franziska

in Sports (2016), 4(4), 1-12

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a ... [more ▼]

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a three-dimensional kinematic analysis of the fistball spike, which helps to specify performance parameters on a descriptive level. Recorded by four synchronized cameras (120 Hz) and linked to the motion capture software Simi Motion® 5.0, three female fistball players of the second German league (24–26 years, 1.63–1.69 m) performed several spikes under standardized conditions. Results show that the segment velocities of the arm reached their maximum successively from proximal to distal, following the principle of temporal coordination of single impulses. The wrist shows maximum speed when the fist hits the ball. The elbow joint angle performs a rapid transition from a strong flexion to a (almost) full extension; however, the extension is completed after the moment of ball impact. In contrast, the shoulder joint angle increases almost linearly until the fistball contact and decreases afterward. The findings can be used to optimize the training of the spike. [less ▲]

Detailed reference viewed: 191 (2 UL)
Full Text
Peer Reviewed
See detailCargo-Kulte. Magie im Zeitalter der Globalisierung.
Amann, Wilhelm UL

in Zeitschrift für Interkulturelle Germanistik (2016), 2(2016), 80-89

Detailed reference viewed: 229 (9 UL)
See detailIntegration of meta-omics data: approaches and applications
Wilmes, Paul UL

Scientific Conference (2016, December)

Detailed reference viewed: 50 (1 UL)
Full Text
Peer Reviewed
See detailA parallel algorithm for energy efficiency maximization in massive MIMO networks
Yang, Yang UL; Pesavento, Marius

in Proc. 2016 IEEE Global Communications Conference (2016, December)

Detailed reference viewed: 106 (1 UL)
Full Text
Peer Reviewed
See detailTHE PRIVILEGE AGAINST SELF-INCRIMINATION A Chameleon of Criminal Procedure
Lamberigts, Stijn UL

in New Journal of European Criminal Law (2016), 7(4), 418-438

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the ... [more ▼]

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the applicability of the privilege to corporations, in light of these justifications. Although the Presumption of Innocence Directive has recently addressed these two issues, several lingering uncertainties remain. [less ▲]

Detailed reference viewed: 278 (15 UL)
Full Text
Peer Reviewed
See detailLinear identification of nonlinear systems: A lifting technique based on the Koopman operator
Mauroy, Alexandre UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state ... [more ▼]

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state space, we obtain a novel linear identification technique by recasting the problem in the infinite-dimensional space of observables. This technique can be described in two main steps. In the first step, similar to a component of the Extended Dynamic Mode Decomposition algorithm, the data are lifted to the infinite-dimensional space and used for linear identification of the Koopman operator. In the second step, the obtained Koopman operator is “projected back” to the finite-dimensional state space, and identified to the nonlinear vector field through a linear least squares problem. The proposed technique is efficient to recover (polynomial) vector fields of different classes of systems, including unstable, chaotic, and open systems. In addition, it is robust to noise, well-suited to model low sampling rate datasets, and able to infer network topology and dynamics. [less ▲]

Detailed reference viewed: 168 (8 UL)
Full Text
Peer Reviewed
See detailOptimality Results on the Security of Lookup-Based Protocols
Mauw, Sjouke UL; Toro Pozo, Jorge Luis UL; Trujillo Rasua, Rolando UL

in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the ... [more ▼]

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table. In this paper, we study this security-memory trade-off problem for a large class of lookup-based distance bounding protocols; called layered protocols. Relying on an automata-based security model, we provide mathematical definitions for different design decisions used in previous lookup-based protocols, and perform general security analyses for each of them. We also formalize an interpretation of optimal trade-off and find a non-trivial protocol transformation approach towards optimality. That is to say, our transformation applied to any layered protocol results in either an improved or an equal protocol with respect to the optimality criterion. This transformation allows us to provide a subclass of lookup-based protocol that cannot be improved further, which means that it contains an optimal layered protocol. [less ▲]

Detailed reference viewed: 103 (5 UL)
Full Text
See detailProceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (ClouCom 2016)
Varrette, Sébastien UL; Bouvry, Pascal UL; Zomaya, Albert et al

Book published by IEEE Computer Society (2016)

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research ... [more ▼]

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research, virtualization, security and privacy, high performance computing, always with an emphasis on how to build cloud computing platforms with real impact. The conference is co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE), is steered by the Cloud Computing Association, and draws on the excellence of its world-class Program Committee and its participants. The 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016) was held in the city of Luxembourg on 12-15 December 2016 [less ▲]

Detailed reference viewed: 130 (11 UL)
Full Text
Peer Reviewed
See detailThe influence of superposition and eccentric loading on the bearing capacity of shallow foundations
Van Baars, Stefan UL

in Computations and Materials in Civil Engineering (2016), 1(3), 121-131

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding surcharge and Keverling Buisman (1940) for the soil weight. Terzaghi (1943) wrote this as a superposition of three separate bearing capacity components for the cohesion, surcharge and soil-weight. The first question is to what ex-tent the currently used components are correct. The second question is to what extent the superposition is correct, because the failure mechanisms for these three components are not the same. A number of finite element calculations show that there is indeed an error, which is luckily not too large and leads to predictions on the safe side. Meyerhof (1953) extended the equation of Terzaghi with correction factors for the shape of the footing and the inclination of the load. For eccentric loading however, there are no correction factors. The common practice is to reduce the contact area of the foundation such that its centroid coincides with that of the load, which means that, the area of the foundation outside the effective area, is completely neglected. Therefore the third question is, if this reduction of the foundation area is an accurate method to describe the reduction of the bearing capacity due to eccentric loading. A number of finite element calculations show that this is indeed the case. [less ▲]

Detailed reference viewed: 282 (7 UL)
Peer Reviewed
See detailNorms, Polycentricity, and Polylanguaging on Social Media
Karrebæk, Martha Sif; Stæhr, Andreas; Juffermans, Kasper UL et al

in Duncker, Dorthe; Perregaard, Bettina (Eds.) Creativity and Continuity: Perspectives on the Dynamics of Language Conventionalisation (2016)

This contribution examines adolescent language use, interaction, and acts of identification on social media sites. Our approach is sociolinguistic, and we show how the understanding of language users ... [more ▼]

This contribution examines adolescent language use, interaction, and acts of identification on social media sites. Our approach is sociolinguistic, and we show how the understanding of language users today needs to break free from previously well-established sociolinguistic notions such as languages as countable units. In the following we argue that hybridity in language use is not intrinsically deviant, that language users may have multiple belongings and identifications, and that linguistic ideology must be accounted for by researchers. We also demonstrate how notions such as registers, polycentricity, and (poly)languaging enable us to address the relationships between language users, language form, social goals, and normativity. The data come from three linguistically heterogeneous European settings, and all focus on hybridity and ethnicity. [less ▲]

Detailed reference viewed: 196 (2 UL)
Full Text
Peer Reviewed
See detailAn Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify ... [more ▼]

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker’s mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities. [less ▲]

Detailed reference viewed: 329 (17 UL)
Full Text
Peer Reviewed
See detailNumerical Analysis for the determination of Stress Percolation in Dry-Stacked Wall Systems
Agaajani, Shahriar; Waldmann, Danièle UL; Scholzen, Frank UL et al

in Masonry International (2016)

This paper comprises a portion of a PhD study concluding on the potential use of a new mortarless and modular masonry system by taking into consideration the outcome of a multidisciplinary study including ... [more ▼]

This paper comprises a portion of a PhD study concluding on the potential use of a new mortarless and modular masonry system by taking into consideration the outcome of a multidisciplinary study including aspects of experimental, numerical and analytical investigations in relation to a practical and economical development of modular load-bearing dry-stacked masonry systems. Different forms of interlocking masonry elements have been modelled and optimised thermo-mechanically. Full-scale masonry walls were assembled and tested experimentally under compressive, flexural, shear, cyclic and long term loads. The overall structural behaviour was compared to conventional masonry systems such as hollow and shuttering blocks. The investigations showed overall relative high structural performances for the developed dry-stacked elements. The effect of dry joint interfaces was extensively investigated experimentally and numerically under FE analysis. Based on the experimental observations, a numeric-analytical failure mechanism of the dry-stacked masonry structure is anticipated under axial and flexural loading. The structural investigations and engineering processes are completed by the development of a package of dry-stacked units consisting of interlocking modular masonries and an accompanying array of various other precast parts. This confirmed the practical issues and solutions towards the exploitation of the developed dry-stacked elements for the construction of ready-to-build, modular and load-bearing walls. The portion of work presented herein proposes a new numerical technique for the determination of stress-percolation in dry stacked load-bearing structures. The model is developed in three steps under a numerical computing environment. First, based on geometrical properties of the dry-stacked elements and with a linear-elastic material behaviour, the load percolation and intensity in dry-stacked masonry walls is determined. In a second step, a phenomenon known as a plastic accommodation which accompanies the redistribution of the stress percolations, is incorporated in the model. This enables the understanding of the evolution of the stress percolations in the post-elastic phase, which is crucial for the determination of the load capacity and stability of the structure in function of an increased external load. This paper also supports the better understanding of early fissuring in dry-stacked masonry structures which has an important influence on the overall stability of the structure. Finally, in a third step, the improvement of dry-stacked structures is pursued by further analysis of the results obtained through the algorithm. This paper represents a new tool for investigating the localized and randomly defined internal stress distribution induced by external compression forces on dry-stacked structures. Furthermore, the algorithm illustrates that experimental investigations on dry-stacked systems may only give real indications on the load capacity of the structure, when the number of joint interfaces and height to length ratio of the block is respected and that results of experimental investigations on reduced prism specimens may not be extrapolated to full sized walls as they may over-evaluate the effective loaded masonry sections and therefore the overall load capacity. [less ▲]

Detailed reference viewed: 213 (39 UL)
Full Text
See detailSymbiose aus Stahl und Stein - innovative Lösungen
Schäfer, Markus UL; Braun, Matthias; Radermacher, Christoph et al

in Revue Technique Luxembourgeoise (2016), 04/2016

Detailed reference viewed: 67 (3 UL)