References of "2016"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailCumulative disadvantages of non-employment and non-standard work for career patterns and subjective well-being in retirement
Ponomarenko, Valentina UL

in Advances in Life Course Research (2016), 30

This paper investigates how cumulative disadvantages of non-employment and non-standard work are affecting careers and subjective well-being of older Europeans from 13 countries. In previous research ... [more ▼]

This paper investigates how cumulative disadvantages of non-employment and non-standard work are affecting careers and subjective well-being of older Europeans from 13 countries. In previous research, unemployment, labour market inactivity and part-time work had negative effects, however they were seldom addressed in a common study and over the whole career. In two complementary analyses, first, the employment history of older Europeans is analysed with sequence analysis methods to show how non-employment and part-time work shape careers and to illustrate gender differences. In a second step, adverse career components are used to exemplify cumulative disadvantages on subjective well-being in old age. Data from the Survey of Health, Aging and Retirement in Europe (SHARE) is used for the analyses. After optimal matching and clustering of the retrospective employment history, the results indicate that women experience more turbulent careers with more periods of non-employment and part-time employment. The analyses of subjective well-being show that labour market inactivity and unemployment have negative effects in old age for men, but less for women. Part-time employment has a differentiated effect for women, however not for men. [less ▲]

Detailed reference viewed: 213 (11 UL)
See detailNuclear Energy for Peaceful Purposes:
Al Hajjaji, Shams Al Din UL

Presentation (2016, December)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailTHE PRIVILEGE AGAINST SELF-INCRIMINATION A Chameleon of Criminal Procedure
Lamberigts, Stijn UL

in New Journal of European Criminal Law (2016), 7(4), 418-438

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the ... [more ▼]

This article revisits the different justifications of the privilege against self-incrimination and examines two topical issues, the relation between the privilege and documentary evidence and the applicability of the privilege to corporations, in light of these justifications. Although the Presumption of Innocence Directive has recently addressed these two issues, several lingering uncertainties remain. [less ▲]

Detailed reference viewed: 261 (14 UL)
Full Text
Peer Reviewed
See detailLinear identification of nonlinear systems: A lifting technique based on the Koopman operator
Mauroy, Alexandre UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state ... [more ▼]

We exploit the key idea that nonlinear system identification is equivalent to linear identification of the socalled Koopman operator. Instead of considering nonlinear system identification in the state space, we obtain a novel linear identification technique by recasting the problem in the infinite-dimensional space of observables. This technique can be described in two main steps. In the first step, similar to a component of the Extended Dynamic Mode Decomposition algorithm, the data are lifted to the infinite-dimensional space and used for linear identification of the Koopman operator. In the second step, the obtained Koopman operator is “projected back” to the finite-dimensional state space, and identified to the nonlinear vector field through a linear least squares problem. The proposed technique is efficient to recover (polynomial) vector fields of different classes of systems, including unstable, chaotic, and open systems. In addition, it is robust to noise, well-suited to model low sampling rate datasets, and able to infer network topology and dynamics. [less ▲]

Detailed reference viewed: 160 (8 UL)
See detailFrom integrated omics to microbial systems ecology
Wilmes, Paul UL

Scientific Conference (2016, December)

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailOptimality Results on the Security of Lookup-Based Protocols
Mauw, Sjouke UL; Toro Pozo, Jorge Luis UL; Trujillo Rasua, Rolando UL

in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the ... [more ▼]

Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table. In this paper, we study this security-memory trade-off problem for a large class of lookup-based distance bounding protocols; called layered protocols. Relying on an automata-based security model, we provide mathematical definitions for different design decisions used in previous lookup-based protocols, and perform general security analyses for each of them. We also formalize an interpretation of optimal trade-off and find a non-trivial protocol transformation approach towards optimality. That is to say, our transformation applied to any layered protocol results in either an improved or an equal protocol with respect to the optimality criterion. This transformation allows us to provide a subclass of lookup-based protocol that cannot be improved further, which means that it contains an optimal layered protocol. [less ▲]

Detailed reference viewed: 97 (5 UL)
Full Text
See detailProceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science (ClouCom 2016)
Varrette, Sébastien UL; Bouvry, Pascal UL; Zomaya, Albert et al

Book published by IEEE Computer Society (2016)

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research ... [more ▼]

CloudCom is the premier conference on Cloud Computing worldwide, attracting researchers, developers, users, students and practitioners from the fields of big data, systems architecture, services research, virtualization, security and privacy, high performance computing, always with an emphasis on how to build cloud computing platforms with real impact. The conference is co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE), is steered by the Cloud Computing Association, and draws on the excellence of its world-class Program Committee and its participants. The 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016) was held in the city of Luxembourg on 12-15 December 2016 [less ▲]

Detailed reference viewed: 121 (9 UL)
Full Text
See detailDiscrete Pompeiu problem on the plain
Kiss, Gergely UL

Presentation (2016, December)

Detailed reference viewed: 49 (3 UL)
Full Text
Peer Reviewed
See detailGraph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time Adaptation
Hochgeschwender, Nico UL; Schneider, Sven; Voos, Holger UL et al

in IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (2016, December)

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven ... [more ▼]

Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven engineering (MDE) approaches. However, these models are merely seen as a way to support humans during the robot's software design process. We argue that the robots themselves should be first-class consumers of this knowledge to autonomously adapt their software to the various and changing run-time requirements induced, for instance, by the robot's tasks or environment. Motivated by knowledge-enabled approaches, we address this problem by employing a graph-based knowledge representation that allows us not only to persistently store domain models, but also to formulate powerful queries for the sake of run time adaptation. We have evaluated our approach in an integrated, real-world system using the neo4j graph database and we report some lessons learned. Further, we show that the graph database imposes only little overhead on the system's overall performance. [less ▲]

Detailed reference viewed: 149 (14 UL)
Full Text
Peer Reviewed
See detailOn the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data
Rial, Alfredo UL

in Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December)

The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute ... [more ▼]

The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute-based encryption (CPABE), has received a lot of attention in the last years. Recently, Jahan et al.~(IEEE 40th Conference on Local Computer Networks, 2015) propose a scheme based on CPABE where users have reading and writing access to the outsourced data. We analyze the scheme by Jahan et al.\ and we show that it has several security vulnerabilities. For instance, the cloud server can get information about encrypted messages by using a stored ciphertext and an update of that ciphertext. As another example, users with writing access are able to decrypt all the messages regardless of their attributes. We discuss the security claims made by Jahan et al.\ and point out the reasons why they do not hold. We also explain that existing schemes can already provide the advantages claimed by Jahan et al. [less ▲]

Detailed reference viewed: 142 (5 UL)
Full Text
Peer Reviewed
See detailTowards Integration on Colored Supermanifolds
Poncin, Norbert UL

in Banach Center Publications (2016, December), 110

Detailed reference viewed: 375 (93 UL)
Full Text
See detailUncertainty quantification for soft tissue biomechanics
Hauseux, Paul UL; Hale, Jack UL; Bordas, Stéphane UL

Poster (2016, December)

Detailed reference viewed: 232 (20 UL)
Full Text
Peer Reviewed
See detailCargo-Kulte. Magie im Zeitalter der Globalisierung.
Amann, Wilhelm UL

in Zeitschrift für Interkulturelle Germanistik (2016), 2(2016), 80-89

Detailed reference viewed: 223 (9 UL)
Full Text
Peer Reviewed
See detailGlobal converegence properties of a consensus protocol on the n-sphere
Markdahl, Johan UL; Goncalves, Jorge UL

in Proceedings of the 55th IEEE Conference on Decision and Control (2016, December)

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is ... [more ▼]

This paper provides a novel analysis of the global convergence properties of a well-known consensus protocol for multi-agent systems that evolve in continuous time on the n-sphere. The feedback is intrinsic to the n-sphere, i.e., it does not rely on the use of local coordinates obtained through a parametrization. It is shown that, for any connected undirected graph topology and all n>1, the consensus protocol yields convergence that is akin to almost global consensus in a weak sense. Simulation results suggest that actual almost global consensus holds. This result is of interest in the context of consensus on Riemannian manifolds since it differs from what is known with regard to the 1-sphere and SO(3) where more advanced intrinsic consensus protocols are required in order to generate equivalent results. [less ▲]

Detailed reference viewed: 183 (12 UL)
Full Text
Peer Reviewed
See detailAn Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify ... [more ▼]

Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker’s mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities. [less ▲]

Detailed reference viewed: 307 (17 UL)
Full Text
Peer Reviewed
See detailTowards Characterizing Bluetooth Discovery in a Vehicular Context
Bronzi, Walter UL; Derrmann, Thierry UL; Castignani, German UL et al

in Vehicular Networking Conference (VNC), 2016 IEEE (2016, December)

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever ... [more ▼]

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever increasing number of discoverable devices both inside and outside a populated area gives us an encouraging insight on future research directions for this technology. In this paper, based on a sensing system developed as an Android application, we evaluate Bluetooth Classic and Low Energy discovery characteristics from a vehic- ular perspective. By recording information about devices nearby (e.g. the number of discovered devices, their signal strength, manufacturer information) and the GPS location we can derive interesting information about a driver’s situation, as well as his/her environment. Presented results indicate that the amount of discovered devices and signal strengths are dependent on velocity and road category. Finally, future work and discussions address potential use-case applications based only on Bluetooth discovery, such as low energy and privacy friendly road and traffic context awareness. The sensing system used in this article is free online under the MIT License. [less ▲]

Detailed reference viewed: 245 (23 UL)
Full Text
See detailLocal History: Esch-sur-Sauer, Wool Factory. DIE TUCHFABRIK IN ESCH/SAUER: WOLLE GEGEN JEANS
Ganschow, Inna UL

Article for general public (2016)

The story of the family Demuth and their factory functioning now as a textile museum.

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailIdentifying the Benefits from Home Ownership:A Swedish Experiment
Von Lilienfeld-Toal, Ulf UL; Paolo, Sodini; Stijn, Van Nieuwerburgh et al

Scientific Conference (2016, December)

Detailed reference viewed: 81 (1 UL)
Full Text
See detailNumerical methods for fracture/cutting of heterogeneous materials
Sutula, Danas UL; Agathos, Konstantinos UL; Ziaei Rad, Vahid UL et al

Presentation (2016, December)

Detailed reference viewed: 202 (15 UL)
Full Text
Peer Reviewed
See detailA three-dimensional movement analysis of the spike in fistball
Bund, Andreas UL; Ghorbani, Saeed; Rathjens, Franziska

in Sports (2016), 4(4), 1-12

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a ... [more ▼]

Due to its relevancy to point scoring, the spike is considered as one of the most important skills in fistball. Biomechanical analyses of this sport are very rare. In the present study, we performed a three-dimensional kinematic analysis of the fistball spike, which helps to specify performance parameters on a descriptive level. Recorded by four synchronized cameras (120 Hz) and linked to the motion capture software Simi Motion® 5.0, three female fistball players of the second German league (24–26 years, 1.63–1.69 m) performed several spikes under standardized conditions. Results show that the segment velocities of the arm reached their maximum successively from proximal to distal, following the principle of temporal coordination of single impulses. The wrist shows maximum speed when the fist hits the ball. The elbow joint angle performs a rapid transition from a strong flexion to a (almost) full extension; however, the extension is completed after the moment of ball impact. In contrast, the shoulder joint angle increases almost linearly until the fistball contact and decreases afterward. The findings can be used to optimize the training of the spike. [less ▲]

Detailed reference viewed: 176 (2 UL)