References of "2016"
     in
Bookmark and Share    
Full Text
See detailProceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (ClouCom 2016)
Varrette, Sébastien UL; Bouvry, Pascal UL; Zomaya, Albert et al

Book published by IEEE Computer Society (2016)

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research ... [more ▼]

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research, virtualization, security and privacy, high performance computing, always with an emphasis on how to build cloud computing platforms with real impact. The conference is co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE), is steered by the Cloud Computing Association, and draws on the excellence of its world-class Program Committee and its participants. The 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016) was held in the city of Luxembourg on 12-15 December 2016 [less ▲]

Detailed reference viewed: 124 (11 UL)
Full Text
See detailUncertainty quantification for soft tissue biomechanics
Hauseux, Paul UL; Hale, Jack UL; Bordas, Stéphane UL

Poster (2016, December)

Detailed reference viewed: 234 (20 UL)
See detailErinnerungen an die Zwangsrekrutierung im Großherzogtum Luxemburg
Klos, Eva Maria UL

in Stroh, Frédéric; Quadflieg, Peter M. (Eds.) L’incorporation de force dans les territoires annexés par le IIIe Reich. Die Zwangsrekrutierung in den vom Dritten Reich annektierten Gebieten 1939-1945 (2016, December)

Detailed reference viewed: 165 (16 UL)
Full Text
Peer Reviewed
See detailPick the Right Guy: CQI-Based LTE Forwarder Selection in VANETs
Turcanu, Ion UL; Sommer, Christoph; Baiocchi, Andrea et al

in 8th IEEE Vehicular Networking Conference (VNC 2016) (2016, December)

Periodical collection of data from vehicles inside a target area is of interest for many applications in the context of Intelligent Transportation Systems (ITS). Long Term Evolution (LTE) has been ... [more ▼]

Periodical collection of data from vehicles inside a target area is of interest for many applications in the context of Intelligent Transportation Systems (ITS). Long Term Evolution (LTE) has been identified as a good candidate technology for supporting such type of applications - particularly for the non-safety domain. However, a high number of vehicles intermittently reporting their information via LTE can introduce a very high load on the LTE access network. In this context, the use of heterogeneous networking technologies can yield significant offloading of LTE - here, WLAN and Dedicated Short-Range Communication (DSRC) technology can support local data aggregation. In this paper, we propose an on-the-fly distributed clustering algorithm that uses both LTE and DSRC networks in the forwarder selection process. Our results clearly indicate that it is crucial to consider parameters drawn from both networking platforms for selecting the right forwarders. In particular, we show for the first time that relying on the Channel Quality Indicator (CQI) has a substantial impact. We demonstrate that our solution is able to significantly reduce the LTE channel utilization with respect to other state of the art approaches. [less ▲]

Detailed reference viewed: 139 (5 UL)
Full Text
See detailTutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges
Varrette, Sébastien UL

Learning material (2016)

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper ... [more ▼]

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper such as the code, data, etc. that can be used to reproduce the results and create new work based on the research.” Source: Wikipedia. The need for reproducibility is increasing dramatically as data analyses become more complex, involving larger datasets and more sophisticated computations. Obviously, the advent of the Cloud Computing paradigm is expected to provide the appropriate means for RR. This tutorial is meant to provide an overview of sensible tools every researcher (in computer science but not only) should be aware of to enable RR in its own work. In particular, and after a general talk presenting RR and the existing associated tools and workflow, this tutorial will propose several practical exercises and hands-on meant to be performed on each attendee’s laptop, to cover the management of sharable Development environment using Vagrant. Resources of this tutorial will be available on Github. [less ▲]

Detailed reference viewed: 51 (1 UL)
Full Text
Peer Reviewed
See detailGraph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation
Hochgeschwender, Nico UL; Schneider, Sven; Voos, Holger UL et al

in IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (2016, December)

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven ... [more ▼]

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven engineering (MDE) approaches. However, these models are merely seen as a way to support humans during the robot's software design process. We argue that the robots themselves should be first-class consumers of this knowledge to autonomously adapt their software to the various and changing run-time requirements induced, for instance, by the robot's tasks or environment. Motivated by knowledge-enabled approaches, we address this problem by employing a graph-based knowledge representation that allows us not only to persistently store domain models, but also to formulate powerful queries for the sake of run time adaptation. We have evaluated our approach in an integrated, real-world system using the neo4j graph database and we report some lessons learned. Further, we show that the graph database imposes only little overhead on the system's overall performance. [less ▲]

Detailed reference viewed: 153 (14 UL)
Full Text
Peer Reviewed
See detailCargo-Kulte. Magie im Zeitalter der Globalisierung.
Amann, Wilhelm UL

in Zeitschrift für Interkulturelle Germanistik (2016), 2(2016), 80-89

Detailed reference viewed: 228 (9 UL)
Full Text
Peer Reviewed
See detailIMP: a pipeline for reproducible referenceindependent integrated metagenomic and metatranscriptomic analyses
Narayanasamy, Shaman UL; Jarosz, Yohan UL; Muller, Emilie UL et al

in Genome Biology (2016), 17

Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the ... [more ▼]

Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the integrated and reference-independent analysis of coupled metagenomic and metatranscriptomic data. IMP incorporates robust read preprocessing, iterative co-assembly, analyses of microbial community structure and function, automated binning, as well as genomic signature-based visualizations. The IMP-based data integration strategy enhances data usage, output volume, and output quality as demonstrated using relevant use-cases. Finally, IMP is encapsulated within a user-friendly implementation using Python and Docker. IMP is available at http://r3lab.uni.lu/web/imp/ (MIT license). [less ▲]

Detailed reference viewed: 367 (24 UL)
See detailIntegration of meta-omics data: approaches and applications
Wilmes, Paul UL

Scientific Conference (2016, December)

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailTHE PRIVILEGE AGAINST SELF-INCRIMINATION A Chameleon of Criminal Procedure
Lamberigts, Stijn UL

in New Journal of European Criminal Law (2016), 7(4), 418-438

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the ... [more ▼]

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the applicability of the privilege to corporations, in light of these justifications. Although the Presumption of Innocence Directive has recently addressed these two issues, several lingering uncertainties remain. [less ▲]

Detailed reference viewed: 272 (15 UL)
Full Text
Peer Reviewed
See detailLinear identification of nonlinear systems: A lifting technique based on the Koopman operator
Mauroy, Alexandre UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state ... [more ▼]

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state space, we obtain a novel linear identification technique by recasting the problem in the infinite-dimensional space of observables. This technique can be described in two main steps. In the first step, similar to a component of the Extended Dynamic Mode Decomposition algorithm, the data are lifted to the infinite-dimensional space and used for linear identification of the Koopman operator. In the second step, the obtained Koopman operator is “projected back” to the finite-dimensional state space, and identified to the nonlinear vector field through a linear least squares problem. The proposed technique is efficient to recover (polynomial) vector fields of different classes of systems, including unstable, chaotic, and open systems. In addition, it is robust to noise, well-suited to model low sampling rate datasets, and able to infer network topology and dynamics. [less ▲]

Detailed reference viewed: 165 (8 UL)
Full Text
Peer Reviewed
See detailEine innovative Stahlverbundlösung für komplexe innerstädtische Bauprojekte
Schäfer, Markus UL; Radermacher, Christoph; Braun, Matthias et al

in Stahlbau - Nachrichten (2016), 04/16

The real estate project KONS encountered a two and a half year process of demolition of an existing building and construction of a new building complex in a central, urban location of Luxembourg City ... [more ▼]

The real estate project KONS encountered a two and a half year process of demolition of an existing building and construction of a new building complex in a central, urban location of Luxembourg City opposite of the main railway station. Thereby the ambitious specifications of the investor as well as the requirements of the local authorities could be met only through a comprehensive and intelligent planning process. The complex interrelation between logistics and construction management processes, detailing and overall economic assessment found the solution of steel-composite design highly performant and efficient in every aspect. [less ▲]

Detailed reference viewed: 76 (11 UL)
Full Text
Peer Reviewed
See detailGlobal converegence properties of a consensus protocol on the n-sphere
Markdahl, Johan UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is ... [more ▼]

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is intrinsic to the n-sphere, i.e., it does not rely on the use of local coordinates obtained through a parametrization. It is shown that, for any connected undirected graph topology and all n>1, the consensus protocol yields convergence that is akin to almost global consensus in a weak sense. Simulation results suggest that actual almost global consensus holds. This result is of interest in the context of consensus on Riemannian manifolds since it differs from what is known with regard to the 1-sphere and SO(3) where more advanced intrinsic consensus protocols are required in order to generate equivalent results. [less ▲]

Detailed reference viewed: 185 (12 UL)
Full Text
Peer Reviewed
See detailA parallel algorithm for energy efficiency maximization in massive MIMO networks
Yang, Yang UL; Pesavento, Marius

in Proc. 2016 IEEE Global Communications Conference (2016, December)

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailThe influence of superposition and eccentric loading on the bearing capacity of shallow foundations
Van Baars, Stefan UL

in Computations and Materials in Civil Engineering (2016), 1(3), 121-131

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding surcharge and Keverling Buisman (1940) for the soil weight. Terzaghi (1943) wrote this as a superposition of three separate bearing capacity components for the cohesion, surcharge and soil-weight. The first question is to what ex-tent the currently used components are correct. The second question is to what extent the superposition is correct, because the failure mechanisms for these three components are not the same. A number of finite element calculations show that there is indeed an error, which is luckily not too large and leads to predictions on the safe side. Meyerhof (1953) extended the equation of Terzaghi with correction factors for the shape of the footing and the inclination of the load. For eccentric loading however, there are no correction factors. The common practice is to reduce the contact area of the foundation such that its centroid coincides with that of the load, which means that, the area of the foundation outside the effective area, is completely neglected. Therefore the third question is, if this reduction of the foundation area is an accurate method to describe the reduction of the bearing capacity due to eccentric loading. A number of finite element calculations show that this is indeed the case. [less ▲]

Detailed reference viewed: 270 (7 UL)
Peer Reviewed
See detailNorms, Polycentricity, and Polylanguaging on Social Media
Karrebæk, Martha Sif; Stæhr, Andreas; Juffermans, Kasper UL et al

in Duncker, Dorthe; Perregaard, Bettina (Eds.) Creativity and Continuity: Perspectives on the Dynamics of Language Conventionalisation (2016)

This contribution examines adolescent language use, interaction, and acts of identification on social media sites. Our approach is sociolinguistic, and we show how the understanding of language users ... [more ▼]

This contribution examines adolescent language use, interaction, and acts of identification on social media sites. Our approach is sociolinguistic, and we show how the understanding of language users today needs to break free from previously well-established sociolinguistic notions such as languages as countable units. In the following we argue that hybridity in language use is not intrinsically deviant, that language users may have multiple belongings and identifications, and that linguistic ideology must be accounted for by researchers. We also demonstrate how notions such as registers, polycentricity, and (poly)languaging enable us to address the relationships between language users, language form, social goals, and normativity. The data come from three linguistically heterogeneous European settings, and all focus on hybridity and ethnicity. [less ▲]

Detailed reference viewed: 195 (2 UL)
Full Text
Peer Reviewed
See detailAn Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify ... [more ▼]

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker’s mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities. [less ▲]

Detailed reference viewed: 310 (17 UL)
Full Text
See detailLocal History: Esch-sur-Sauer, Wool Factory. DIE TUCHFABRIK IN ESCH/SAUER: WOLLE GEGEN JEANS
Ganschow, Inna UL

Article for general public (2016)

The story of the family Demuth and their factory functioning now as a textile museum.

Detailed reference viewed: 94 (1 UL)
Full Text
Peer Reviewed
See detailNumerical Analysis for the determination of Stress Percolation in Dry-Stacked Wall Systems
Agaajani, Shahriar; Waldmann, Danièle UL; Scholzen, Frank UL et al

in Masonry International (2016)

This paper comprises a portion of a PhD study concluding on the potential use of a new mortarless and modular masonry system by taking into consideration the outcome of a multidisciplinary study including ... [more ▼]

This paper comprises a portion of a PhD study concluding on the potential use of a new mortarless and modular masonry system by taking into consideration the outcome of a multidisciplinary study including aspects of experimental, numerical and analytical investigations in relation to a practical and economical development of modular load-bearing dry-stacked masonry systems. Different forms of interlocking masonry elements have been modelled and optimised thermo-mechanically. Full-scale masonry walls were assembled and tested experimentally under compressive, flexural, shear, cyclic and long term loads. The overall structural behaviour was compared to conventional masonry systems such as hollow and shuttering blocks. The investigations showed overall relative high structural performances for the developed dry-stacked elements. The effect of dry joint interfaces was extensively investigated experimentally and numerically under FE analysis. Based on the experimental observations, a numeric-analytical failure mechanism of the dry-stacked masonry structure is anticipated under axial and flexural loading. The structural investigations and engineering processes are completed by the development of a package of dry-stacked units consisting of interlocking modular masonries and an accompanying array of various other precast parts. This confirmed the practical issues and solutions towards the exploitation of the developed dry-stacked elements for the construction of ready-to-build, modular and load-bearing walls. The portion of work presented herein proposes a new numerical technique for the determination of stress-percolation in dry stacked load-bearing structures. The model is developed in three steps under a numerical computing environment. First, based on geometrical properties of the dry-stacked elements and with a linear-elastic material behaviour, the load percolation and intensity in dry-stacked masonry walls is determined. In a second step, a phenomenon known as a plastic accommodation which accompanies the redistribution of the stress percolations, is incorporated in the model. This enables the understanding of the evolution of the stress percolations in the post-elastic phase, which is crucial for the determination of the load capacity and stability of the structure in function of an increased external load. This paper also supports the better understanding of early fissuring in dry-stacked masonry structures which has an important influence on the overall stability of the structure. Finally, in a third step, the improvement of dry-stacked structures is pursued by further analysis of the results obtained through the algorithm. This paper represents a new tool for investigating the localized and randomly defined internal stress distribution induced by external compression forces on dry-stacked structures. Furthermore, the algorithm illustrates that experimental investigations on dry-stacked systems may only give real indications on the load capacity of the structure, when the number of joint interfaces and height to length ratio of the block is respected and that results of experimental investigations on reduced prism specimens may not be extrapolated to full sized walls as they may over-evaluate the effective loaded masonry sections and therefore the overall load capacity. [less ▲]

Detailed reference viewed: 209 (39 UL)