References of "2018"
     in
Bookmark and Share    
Peer Reviewed
See detailSchool Shootings
Böhmer, Matthias UL; Hale, Miriam-Linnea UL

Poster (2018, November)

Detailed reference viewed: 104 (9 UL)
Full Text
Peer Reviewed
See detailDeformation-Based Abnormal Motion Detection using 3D Skeletons
Baptista, Renato UL; Demisse, Girum UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA) (2018, November)

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a ... [more ▼]

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a sequence, based on few joints of a 3D skeleton, and a deformation-based distance function. We further introduce a time-variation model that is specifically designed for assessing the quality of a motion; we refer to a distance function that is based on such a model as~\emph{motion quality distance}. The overall advantages of the proposed approach are 1) lower dimensional yet representative sequence representation and 2) a distance function that emphasizes time variation, the motion quality distance, which is a particularly important property for quality assessment. We validate our approach using a publicly available dataset, SPHERE-StairCase2014 dataset. Qualitative and quantitative results show promising performance. [less ▲]

Detailed reference viewed: 161 (5 UL)
Full Text
Peer Reviewed
See detailEvidence for the homothetic scaling of urban forms
Lemoy, Rémi UL; Caruso, Geoffrey UL

in Environment and Planning B: Urban Analytics and City Science (2018)

The size and form of cities influence their social and environmental impacts. Whether cities have the same form irrespective of their size is still an open question. We analyse the profile of artificial ... [more ▼]

The size and form of cities influence their social and environmental impacts. Whether cities have the same form irrespective of their size is still an open question. We analyse the profile of artificial land and population density, with respect to the distance to their main centre, for the 300 largest European cities. Our analysis combines the GMES/Copernicus Urban Atlas 2006 land use database at 5 m resolution for 300 larger urban zones with more than 100,000 inhabitants and the Geostat population grid at 1 km resolution. We find a remarkable constancy of radial profiles across city sizes. Artificial land profiles scale in the two horizontal dimensions with the square root of city population, while population density profiles scale in three dimensions with its cube root. In short, cities of different size are homothetic in terms of land use and population density, which challenges the idea that larger cities are more parsimonious in the use of land per capita. While earlier literature documented the scaling of average densities (total surface and population) with city size, we document the scaling of the whole radial distance profile with city size, thus liaising intra-urban radial analysis and systems of cities. Our findings also yield homogenous spatial definitions of cities, from which we can re-question urban scaling laws and Zipf’s law for cities. [less ▲]

Detailed reference viewed: 161 (8 UL)
Full Text
See detailStudying Borders
Wille, Christian UL

Article for general public (2018)

Die Border Studies durchlaufen auch in der Großregion eine spürbare Institutionalisierung. Allerdings hier mit der Besonderheit, dass Fragen der Grenze und die damit verbundenen Phänomene nicht nur ... [more ▼]

Die Border Studies durchlaufen auch in der Großregion eine spürbare Institutionalisierung. Allerdings hier mit der Besonderheit, dass Fragen der Grenze und die damit verbundenen Phänomene nicht nur untersucht und gelehrt werden, sondern dass dies selbst grenzüberschreitend stattfindet. Hier haben sich Grenzforscher_innen der Universitäten des Saarlandes, Kaiserslautern, Trier, Lothringen, Luxemburg und Lüttich im Jahr 2014 unter dem Dach der Universität Großregion (UniGR) zusammengeschlossen. Mit dem grenzüberschreitenden Netzwerk „UniGR-Center for Border Studies“ haben sie sich eine Plattform gegeben, um Grenzforschungen enger abzustimmen, an die internationale Fachdebatte besser anzuschließen und Erkenntnisse der Grenzforschung in die universitäre Lehre zu tragen. Grenzforschung, wie sie sich aktuell in der Großregion formiert und künftig entwickeln wird, ist hier an die Erfahrung der Grenze geknüpft und bleibt ein kollektives Unterfangen der UniGR-Grenzforscher_innen. [less ▲]

Detailed reference viewed: 111 (3 UL)
Full Text
Peer Reviewed
See detailPorts, cities and the global maritime infrastructure
Hesse, Markus UL; McDonough, Evan

in Kloosterman, Robert; Mamadouh, Virginie; Terhorst, Pieter (Eds.) Handbook on the Geographies of Globalisation (2018)

This chapter deals with the particular geographies of global maritime industries and their implications for concrete places, most notably port cities. In order to provide an up-to-date picture on this ... [more ▼]

This chapter deals with the particular geographies of global maritime industries and their implications for concrete places, most notably port cities. In order to provide an up-to-date picture on this subject matter, we firstly apply a supply chain perspective regarding maritime and port geographies, since the movement of ocean vessels and the territorial or geographical impact of these flows cannot be separated from the underlying logistics networks, or their spatio-temporal performance and overarching political-economic power configuration. Secondly, we employ a relational perspective with respect to ports, cities and their interaction against the background of globalised logistics networks. This relational approach is inspired by understanding cities and regions as increasingly dependent on, and co-constituted by, larger associations, networks, mobilities and identities, rather than conceiving these entities as fixed in territories within a bounded space, delineated by clear margins. For illustrative purposes, we add some empirical insights from two cases studies on related developments in the Netherlands, particularly the port city of Rotterdam and the inland port situated in Venlo. [less ▲]

Detailed reference viewed: 135 (0 UL)
Full Text
Peer Reviewed
See detailIntravalley Spin-Flip Relaxation Dynamics in Single-Layer WS2
Wang, Zilong; Molina-Sanchez, Alejandro; Altmann, Patrick et al

in NANO LETTERS (2018), 18(11), 6882-6891

In monolayer (1L) transition metal dichalcogenides (TMDs) the valence and conduction bands are spin-split because of the strong spin-orbit interaction. In tungsten-based TMDs the spin-ordering of the ... [more ▼]

In monolayer (1L) transition metal dichalcogenides (TMDs) the valence and conduction bands are spin-split because of the strong spin-orbit interaction. In tungsten-based TMDs the spin-ordering of the conduction band is such that the so-called dark excitons, consisting of electrons and holes with opposite spin orientation, have lower energy than A excitons. The transition from bright to dark excitons involves the scattering of electrons from the upper to the lower conduction band at the K point of the Brillouin zone, with detrimental effects for the optoelectronic response of 1L-TMDs, since this reduces their light emission efficiency. Here, we exploit the valley selective optical selection rules and use two-color helicity-resolved pump-probe spectroscopy to directly measure the intravalley spin-flip relaxation dynamics in 1L-WS2. This occurs on a sub-ps time scale, and it is significantly dependent on temperature, indicative of phonon-assisted relaxation. Time-dependent ab initio calculations show that intravalley spin-flip scattering occurs on significantly longer time scales only at the K point, while the occupation of states away from the minimum of the conduction band significantly reduces the scattering time. Our results shed light on the scattering processes determining the light emission efficiency in optoelectronic and photonic devices based on 1L-TMDs. [less ▲]

Detailed reference viewed: 229 (7 UL)
Full Text
Peer Reviewed
See detail3D Cultures of Parkinson's Disease‐Specific Dopaminergic Neurons for High Content Phenotyping and Drug Testing
Bolognin, Silvia UL; Fossépré, Marie; Qing, Xiaobing et al

in Advanced Science (2018)

Parkinson's disease (PD)‐specific neurons, grown in standard 2D cultures, typically only display weak endophenotypes. The cultivation of PD patient‐specific neurons, derived from induced pluripotent stem ... [more ▼]

Parkinson's disease (PD)‐specific neurons, grown in standard 2D cultures, typically only display weak endophenotypes. The cultivation of PD patient‐specific neurons, derived from induced pluripotent stem cells carrying the LRRK2‐G2019S mutation, is optimized in 3D microfluidics. The automated image analysis algorithms are implemented to enable pharmacophenomics in disease‐relevant conditions. In contrast to 2D cultures, this 3D approach reveals robust endophenotypes. High‐content imaging data show decreased dopaminergic differentiation and branching complexity, altered mitochondrial morphology, and increased cell death in LRRK2‐G2019S neurons compared to isogenic lines without using stressor agents. Treatment with the LRRK2 inhibitor 2 (Inh2) rescues LRRK2‐G2019S‐dependent dopaminergic phenotypes. Strikingly, a holistic analysis of all studied features shows that the genetic background of the PD patients, and not the LRRK2‐G2019S mutation, constitutes the strongest contribution to the phenotypes. These data support the use of advanced in vitro models for future patient stratification and personalized drug development. [less ▲]

Detailed reference viewed: 364 (42 UL)
Full Text
Peer Reviewed
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex UL; Udovenko, Aleksei UL

in Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018 (2018, November)

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation ... [more ▼]

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces. Structure hiding must provide protection against circuit analysis attacks. In this paper we focus on developing the value hiding component. It includes protection against the DCA attack by Bos et al. and protection against a new attack called algebraic attack. We present a provably secure first-order protection against the new al- gebraic attack. The protection is based on small gadgets implementing secure masked XOR and AND operations. Furthermore, we give a proof of compositional security allowing to freely combine secure gadgets. We derive concrete security bounds for circuits built using our construction. [less ▲]

Detailed reference viewed: 915 (20 UL)
Full Text
Peer Reviewed
See detailDeterminants of cognitive decline in a large cross-national study using machine learning
Leist, Anja UL

in Innovation in Aging (2018, November), 2(S1), 244

Detailed reference viewed: 194 (10 UL)
Full Text
Peer Reviewed
See detailDeploying Joint Beamforming and Precoding in Multibeam Satellite Networks with Time Variant Traffic
Joroughi, Vahid; Lagunas, Eva UL; Andrenacci, Stefano UL et al

in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, California, USA (2018, November)

Detailed reference viewed: 82 (13 UL)
Full Text
Peer Reviewed
See detailDatemi gli occhi
Cicotti, Claudio UL

in Cicotti, Claudio (Ed.) The many faces of 1918 (2018)

Detailed reference viewed: 121 (1 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 398 (11 UL)
See detailEntwicklung eines Fragebogens zur Erfassung des emotionalen Selbstkonzepts von Jugendlichen
Schmidt, Philipp; Zurbriggen, Carmen UL

Poster (2018, November)

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailA Protocol to Strengthen Password-Based Authentication
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL; Stojkovski, Borce UL

in Emerging Technologies for Authorization and Authentication (2018, November)

We discuss a password-based authentication protocol that we argue to be robust against password-guessing and o -line dictionary attacks. The core idea is to hash the passwords with a seed that comes from ... [more ▼]

We discuss a password-based authentication protocol that we argue to be robust against password-guessing and o -line dictionary attacks. The core idea is to hash the passwords with a seed that comes from an OTP device, making the resulting identity token unpredictable for an adversary. We believe that the usability of this new protocol is the same as that of password-based methods with OTP, but has the advan- tage of not burdening users with having to choose strong passwords. [less ▲]

Detailed reference viewed: 240 (66 UL)
Full Text
See detailLa concurrence croissante entre banques et institutions de microfinance
Leon, Florian UL; Baraton, Pierrick

Article for general public (2018)

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailEfficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers
Cheng, Hao UL; Dinu, Dumitru-Daniel; Groszschädl, Johann UL

in Lanet, Jean-Louis; Toma, Cristian (Eds.) Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (2018, November)

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides ... [more ▼]

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides strong resistance to collision and preimage attacks, and is assumed to remain secure in the dawning era of quantum computers. However, the compression function of SHA-512 is challenging to implement on small 8 and 16-bit microcontrollers because of their limited register space and the fact that 64-bit rotations are generally slow on such devices. In this paper, we present the first highly-optimized Assembler implementation of SHA-512 for the ATmega family of 8-bit AVR microcontrollers. We introduce a special optimization technique for the compression function based on a duplication of the eight working variables so that they can be more efficiently loaded from RAM via the indirect addressing mode with displacement (using the ldd and std instruction). In this way, we were able to achieve high performance without unrolling the main loop of the compression function, thereby keeping the code size small. When executed on an 8-bit AVR ATmega128 microcontroller, the compression function takes slightly less than 60k clock cycles, which corresponds to a compression rate of roughly 467 cycles per byte. The binary code size of the full SHA-512 implementation providing a standard Init-Update-Final (IUF) interface amounts to approximately 3.5 kB. [less ▲]

Detailed reference viewed: 427 (45 UL)
See detailAssociations of wealth with frailty and memory impairment across the course of aging
Leist, Anja UL

Scientific Conference (2018, November)

Detailed reference viewed: 54 (4 UL)
Full Text
See detailCognitive functioning and decline in relation to urban environmental characteristics
Leist, Anja UL

Scientific Conference (2018, November)

Detailed reference viewed: 80 (3 UL)
See detailEducational assessment and its prospects in the 21st century
Greiff, Samuel UL

Speeches/Talks (2018)

Detailed reference viewed: 55 (1 UL)