References of "2016"
     in
Bookmark and Share    
See detailRaising the Achievement of all Learners in Inclusive Education Project: Rosmini and Sereni
Limbach-Reich, Arthur UL

Scientific Conference (2016, December)

Detailed reference viewed: 107 (2 UL)
See detailNuclear Energy for Peaceful Purposes:
Al Hajjaji, Shams Al Din UL

Presentation (2016, December)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailGlobal converegence properties of a consensus protocol on the n-sphere
Markdahl, Johan UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is ... [more ▼]

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is intrinsic to the n-sphere, i.e., it does not rely on the use of local coordinates obtained through a parametrization. It is shown that, for any connected undirected graph topology and all n>1, the consensus protocol yields convergence that is akin to almost global consensus in a weak sense. Simulation results suggest that actual almost global consensus holds. This result is of interest in the context of consensus on Riemannian manifolds since it differs from what is known with regard to the 1-sphere and SO(3) where more advanced intrinsic consensus protocols are required in order to generate equivalent results. [less ▲]

Detailed reference viewed: 187 (12 UL)
Full Text
Peer Reviewed
See detailCargo-Kulte. Magie im Zeitalter der Globalisierung.
Amann, Wilhelm UL

in Zeitschrift für Interkulturelle Germanistik (2016), 2(2016), 80-89

Detailed reference viewed: 229 (9 UL)
Full Text
Peer Reviewed
See detailAn Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify ... [more ▼]

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker’s mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities. [less ▲]

Detailed reference viewed: 330 (17 UL)
Full Text
Peer Reviewed
See detailOptimality Results on the Security of Lookup-Based Protocols
Mauw, Sjouke UL; Toro Pozo, Jorge Luis UL; Trujillo Rasua, Rolando UL

in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the ... [more ▼]

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table. In this paper, we study this security-memory trade-off problem for a large class of lookup-based distance bounding protocols; called layered protocols. Relying on an automata-based security model, we provide mathematical definitions for different design decisions used in previous lookup-based protocols, and perform general security analyses for each of them. We also formalize an interpretation of optimal trade-off and find a non-trivial protocol transformation approach towards optimality. That is to say, our transformation applied to any layered protocol results in either an improved or an equal protocol with respect to the optimality criterion. This transformation allows us to provide a subclass of lookup-based protocol that cannot be improved further, which means that it contains an optimal layered protocol. [less ▲]

Detailed reference viewed: 103 (5 UL)
Full Text
See detailDiscrete Pompeiu problem on the plain
Kiss, Gergely UL

Presentation (2016, December)

Detailed reference viewed: 51 (3 UL)
Full Text
Peer Reviewed
See detailGraph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation
Hochgeschwender, Nico UL; Schneider, Sven; Voos, Holger UL et al

in IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (2016, December)

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven ... [more ▼]

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven engineering (MDE) approaches. However, these models are merely seen as a way to support humans during the robot's software design process. We argue that the robots themselves should be first-class consumers of this knowledge to autonomously adapt their software to the various and changing run-time requirements induced, for instance, by the robot's tasks or environment. Motivated by knowledge-enabled approaches, we address this problem by employing a graph-based knowledge representation that allows us not only to persistently store domain models, but also to formulate powerful queries for the sake of run time adaptation. We have evaluated our approach in an integrated, real-world system using the neo4j graph database and we report some lessons learned. Further, we show that the graph database imposes only little overhead on the system's overall performance. [less ▲]

Detailed reference viewed: 157 (14 UL)
Full Text
Peer Reviewed
See detailSociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms
Fiandrino, Claudio UL; Kantarci, Burak; Anjomshoa, Fazel et al

in IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2016 (2016, December)

The Internet of Things (IoT) paradigm makes the Internet more pervasive, interconnecting objects of everyday life, and is a promising solution for the development of next- generation services. Smart ... [more ▼]

The Internet of Things (IoT) paradigm makes the Internet more pervasive, interconnecting objects of everyday life, and is a promising solution for the development of next- generation services. Smart cities exploit the most advanced information technologies to improve and add value to existing public services. Applying the IoT paradigm to smart cities is fundamental to build sustainable Information and Communication Technology (ICT) platforms. Having citizens involved in the process through mobile crowdsensing (MCS) techniques unleashes potential benefits as MCS augments the capabilities of the platform without additional costs. Recruitment of participants is a key challenge when MCS systems assign sensing tasks to the users. Proper recruitment both minimizes the cost and maximizes the return, such as the number and the accuracy of accomplished tasks. In this paper, we propose a novel user recruitment policy for data acquisition in mobile crowdsensing systems. The policy can be employed in two modes, namely sociability-driven mode and distance-based mode. Sociability stands for the willingness of users in contributing to sensing tasks. Furthermore, we propose a novel metric to assess the efficiency of any recruitment policy in terms of the number of users contacted and the ones actually recruited. Performance evaluation, conducted in a real urban environment for a large number of participants, reveals the effectiveness of sociability-driven user recruitment as the average number of recruited users improves by at least a factor of two. [less ▲]

Detailed reference viewed: 357 (21 UL)
Full Text
Peer Reviewed
See detailLinear identification of nonlinear systems: A lifting technique based on the Koopman operator
Mauroy, Alexandre UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state ... [more ▼]

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state space, we obtain a novel linear identification technique by recasting the problem in the infinite-dimensional space of observables. This technique can be described in two main steps. In the first step, similar to a component of the Extended Dynamic Mode Decomposition algorithm, the data are lifted to the infinite-dimensional space and used for linear identification of the Koopman operator. In the second step, the obtained Koopman operator is “projected back” to the finite-dimensional state space, and identified to the nonlinear vector field through a linear least squares problem. The proposed technique is efficient to recover (polynomial) vector fields of different classes of systems, including unstable, chaotic, and open systems. In addition, it is robust to noise, well-suited to model low sampling rate datasets, and able to infer network topology and dynamics. [less ▲]

Detailed reference viewed: 168 (8 UL)
Peer Reviewed
See detailNorms, Polycentricity, and Polylanguaging on Social Media
Karrebæk, Martha Sif; Stæhr, Andreas; Juffermans, Kasper UL et al

in Duncker, Dorthe; Perregaard, Bettina (Eds.) Creativity and Continuity: Perspectives on the Dynamics of Language Conventionalisation (2016)

This contribution examines adolescent language use, interaction, and acts of identification on social media sites. Our approach is sociolinguistic, and we show how the understanding of language users ... [more ▼]

This contribution examines adolescent language use, interaction, and acts of identification on social media sites. Our approach is sociolinguistic, and we show how the understanding of language users today needs to break free from previously well-established sociolinguistic notions such as languages as countable units. In the following we argue that hybridity in language use is not intrinsically deviant, that language users may have multiple belongings and identifications, and that linguistic ideology must be accounted for by researchers. We also demonstrate how notions such as registers, polycentricity, and (poly)languaging enable us to address the relationships between language users, language form, social goals, and normativity. The data come from three linguistically heterogeneous European settings, and all focus on hybridity and ethnicity. [less ▲]

Detailed reference viewed: 196 (2 UL)
Full Text
Peer Reviewed
See detailShear strength and stiffness degradation of geomaterials in cyclic loading
Pytlik, Robert Stanislaw UL; Van Baars, Stefan UL

in Soils and Rocks (2016), 39(3), 273-283

Cyclic loading on civil structures can lead to a reduction of strength and stiffness in the loaded materials. The life span of many cyclically loaded structures such as wind turbines, high-speed train ... [more ▼]

Cyclic loading on civil structures can lead to a reduction of strength and stiffness in the loaded materials. The life span of many cyclically loaded structures such as wind turbines, high-speed train tracks and bridges strongly depends on the foundation. The soils and rocks in the foundation can be subjected to cyclic loads from natural and human sources. In order to evaluate the fatigue behaviour of geomaterials, this paper presents static and cyclic triaxial test results for several geomaterials. It was concluded that cyclic loading on different geomaterials can cause different types of effects. The shear strength of cohesionless crumbled limestone increases during cyclic loading; while for cohesive materials, such as gypsum and mortar, the strength decreases. The strength decrease can be seen as a degradation of the cohesion. The most significant factor in the cohesion reduction was found to be the number of applied cycles. It was also noticed that the friction angle for sands does not reduce under cyclic loading. A fatigue limit was not found for cohesive geomaterials; neither a dependence of the strength reduction on the cyclic loading ratios. [less ▲]

Detailed reference viewed: 228 (5 UL)
Full Text
Peer Reviewed
See detailThe influence of superposition and eccentric loading on the bearing capacity of shallow foundations
Van Baars, Stefan UL

in Computations and Materials in Civil Engineering (2016), 1(3), 121-131

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a centric loaded strip footing on a weightless in-finite half-space. Reissner (1924) extended this solution for a surrounding surcharge and Keverling Buisman (1940) for the soil weight. Terzaghi (1943) wrote this as a superposition of three separate bearing capacity components for the cohesion, surcharge and soil-weight. The first question is to what ex-tent the currently used components are correct. The second question is to what extent the superposition is correct, because the failure mechanisms for these three components are not the same. A number of finite element calculations show that there is indeed an error, which is luckily not too large and leads to predictions on the safe side. Meyerhof (1953) extended the equation of Terzaghi with correction factors for the shape of the footing and the inclination of the load. For eccentric loading however, there are no correction factors. The common practice is to reduce the contact area of the foundation such that its centroid coincides with that of the load, which means that, the area of the foundation outside the effective area, is completely neglected. Therefore the third question is, if this reduction of the foundation area is an accurate method to describe the reduction of the bearing capacity due to eccentric loading. A number of finite element calculations show that this is indeed the case. [less ▲]

Detailed reference viewed: 282 (7 UL)
See detailErinnerungen an die Zwangsrekrutierung im Großherzogtum Luxemburg
Klos, Eva Maria UL

in Stroh, Frédéric; Quadflieg, Peter M. (Eds.) L’incorporation de force dans les territoires annexés par le IIIe Reich. Die Zwangsrekrutierung in den vom Dritten Reich annektierten Gebieten 1939-1945 (2016, December)

Detailed reference viewed: 168 (16 UL)
Full Text
Peer Reviewed
See detailA three-dimensional movement analysis of the spike in fistball
Bund, Andreas UL; Ghorbani, Saeed; Rathjens, Franziska

in Sports (2016), 4(4), 1-12

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a ... [more ▼]

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a three-dimensional kinematic analysis of the fistball spike, which helps to specify performance parameters on a descriptive level. Recorded by four synchronized cameras (120 Hz) and linked to the motion capture software Simi Motion® 5.0, three female fistball players of the second German league (24–26 years, 1.63–1.69 m) performed several spikes under standardized conditions. Results show that the segment velocities of the arm reached their maximum successively from proximal to distal, following the principle of temporal coordination of single impulses. The wrist shows maximum speed when the fist hits the ball. The elbow joint angle performs a rapid transition from a strong flexion to a (almost) full extension; however, the extension is completed after the moment of ball impact. In contrast, the shoulder joint angle increases almost linearly until the fistball contact and decreases afterward. The findings can be used to optimize the training of the spike. [less ▲]

Detailed reference viewed: 191 (2 UL)
See detailFrom integrated omics to microbial systems ecology
Wilmes, Paul UL

Scientific Conference (2016, December)

Detailed reference viewed: 52 (2 UL)
Full Text
Peer Reviewed
See detailTowards Integration on Colored Supermanifolds
Poncin, Norbert UL

in Banach Center Publications (2016, December), 110

Detailed reference viewed: 392 (96 UL)
See detailThe European Association for Data Science, its main goals and tasks
Krolak-Schwerdt, Sabine; Böhmer, Matthias UL

Presentation (2016, December)

Detailed reference viewed: 57 (2 UL)
See detailIntegration of meta-omics data: approaches and applications
Wilmes, Paul UL

Scientific Conference (2016, December)

Detailed reference viewed: 50 (1 UL)