References of "2020"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailA Big Data Demand Estimation Model for Urban Congested Networks
Cantelmo, Guido; Viti, Francesco UL

in Transport and Telecommunication (2020)

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailBorrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation
Gao, Jun UL; li, li; Kong, Pingfan UL et al

in ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2020, November)

{The Android ecosystem offers different facilities to enable communication among app components and across apps to ensure that rich services can be composed through functionality reuse. At the heart of ... [more ▼]

{The Android ecosystem offers different facilities to enable communication among app components and across apps to ensure that rich services can be composed through functionality reuse. At the heart of this system is the Inter-component communication (ICC) scheme, which has been largely studied in the literature. Less known in the community is another powerful mechanism that allows for direct inter-app code invocation which opens up for different reuse scenarios, both legitimate or malicious. This paper exposes the general workflow for this mechanism, which beyond ICCs, enables app developers to access and invoke functionalities (either entire Java classes, methods or object fields) implemented in other apps using official Android APIs. We experimentally showcase how this reuse mechanism can be leveraged to â plagiarize" supposedly-protected functionalities. Typically, we were able to leverage this mechanism to bypass security guards that a popular video broadcaster has placed for preventing access to its video database from outside its provided app. We further contribute with a static analysis toolkit, named DICIDer, for detecting direct inter-app code invocations in apps. An empirical analysis of the usage prevalence of this reuse mechanism is then conducted. Finally, we discuss the usage contexts as well as the implications of this studied reuse mechanism [less ▲]

Detailed reference viewed: 46 (5 UL)
Full Text
See detailQuels seraient les impacts d’une pandémie numérique pour l’armée de Terre (fonctionnement et rôle au sein de la Nation) ?
Fouillet, Thibault UL

Report (2020)

La pandémie numérique est un sujet qui n’a pas fait l’objet d’une véritable documentation. L’occurrence d’un tel phénomène qui dépasserait une simple panne pour intéresser de vastes zones durant une ... [more ▼]

La pandémie numérique est un sujet qui n’a pas fait l’objet d’une véritable documentation. L’occurrence d’un tel phénomène qui dépasserait une simple panne pour intéresser de vastes zones durant une période importante, est souvent considérée comme faible, au point de la négliger voire de la classer arbitrairement dans la catégorie des fantasmes. Mais comme en toute chose, la capacité à anticiper une crise peut faciliter son traitement et accélérer le retour à la normale. En effet, un effondrement localisé et durable de l’internet peut se trouver lié à des causes naturelles spécifiques de grande ampleur, accidentelles du fait de la défaillance d’installations techniques, ou intentionnelles du fait d’actes malveillants terroristes ou de guerre. La robus-tesse du réseau de communication maillé que nous connaissons peut-être mise à défaut par des pannes généralisées d’électricité ou la destruction simultanée de composants électro-niques uniformément répartis dont la fragilité ou la vulnérabilité à des actions spécifiques n’avaient pas été détectées. Les impacts sur la vie de la nation seraient majeurs du fait de la généralisation des applications internet qui pilotent aujourd’hui la presque totalité des réseaux utilisés par les administra-tions, les particuliers ou les industriels. Ainsi, le dysfonctionnement de l’internet aurait un ef-fet domino sur les réseaux de transport d’énergie (électricité, gaz, oléoducs), de transport fer-roviaire et dans une moindre mesure aujourd’hui routière, télécommunications (particuliers, banques…). En conséquence le pays serait frappé d’une certaine paralysie entraînant des dé-sordres importants dictés par les tentatives de survie face aux différents blocages. La situation de 2035 serait encore plus difficile à gérer que celle d’aujourd’hui du fait de la multiplication des objets connectés. Dans ce cadre, les forces armées et l’armée de Terre en particulier peuvent être réquisitionnées pour intervenir et les missions qui en découlent doivent être imaginées dans le cadre d’une démarche générale d’anticipation qui ne vise pas nécessairement le retour à la normale, mais la stabilisation dans un état acceptable dans une logique de résilience. Deux types de missions peuvent être envisagés sous forme de réquisition conformément aux conventions existantes, en utilisant les structures de commandement des zones de défense. D’une part des missions de sécurité civiles permettant dans l’urgence de renforcer le service public en apportant le concours d’hommes et de matériels. D’autre part des missions proprement militaires pour protéger les points d’importance vitale dont les systèmes de sécurité seraient devenus inopérants. Enfin, des missions principalement techniques pour rétablir les moyens de communication en utilisant des réseaux militaires pour une grande part indépen-dants de l’internet. Des enseignements et recommandations viennent conclure la note, en insistant sur l’importance de l’acceptabilité du temps de retour à la normale et notamment du service dégradé qu’il s’agirait de mettre sur pied. Parmi ces enseignements, certains seront dédiés aux évolutions de la réserve pour que celle-ci soit au mieux adaptée à ces missions nouvelles. [less ▲]

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailLightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers
Cheng, Hao UL; Groszschädl, Johann UL; Roenne, Peter et al

in Liardet, Pierre-Yvan; Mentens, Nele (Eds.) Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (2020, November)

Recent progress in quantum computing has increased interest in the question of how well the existing proposals for post-quantum cryptosystems are suited to replace RSA and ECC. While some aspects of this ... [more ▼]

Recent progress in quantum computing has increased interest in the question of how well the existing proposals for post-quantum cryptosystems are suited to replace RSA and ECC. While some aspects of this question have already been researched in detail (e.g. the relative computational cost of pre- and post-quantum algorithms), very little is known about the RAM footprint of the proposals and what execution time they can reach when low memory consumption rather than speed is the main optimization goal. This question is particularly important in the context of the Internet of Things (IoT) since many IoT devices are extremely constrained and possess only a few kB of RAM. We aim to contribute to answering this question by exploring the software design space of the lattice-based key-encapsulation scheme ThreeBears on an 8-bit AVR microcontroller. More concretely, we provide new techniques for the optimization of the ring arithmetic of ThreeBears (which is, in essence, a 3120-bit modular multiplication) to achieve either high speed or low RAM footprint, and we analyze in detail the trade-offs between these two metrics. A low-memory implementation of BabyBear that is secure against Chosen Plaintext Attacks (CPA) needs just about 1.7 kB RAM, which is significantly below the RAM footprint of other lattice-based cryptosystems reported in the literature. Yet, the encapsulation time of this RAM-optimized BabyBear version is below 12.5 million cycles, which is less than the execution time of scalar multiplication on Curve25519. The decapsulation is more than four times faster and takes roughly 3.4 million cycles on an ATmega1284 microcontroller. [less ▲]

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailDiffusion-based Virtual Graph Adjacency for Fourier Analysis of Network Signals
Elias, Vitor R. M.; Alves Martins, Wallace UL; Werner, Stefan

in XXXVIII SIMPÓSIO BRASILEIRO DE TELECOMUNICAÇÕES E PROCESSAMENTO DE SINAIS, Florianópolis 22-25 November 2020 (2020, November)

This work proposes a graph model for networks where node collaborations can be described by the Markov property. The proposed model augments an initial graph adjacency using diffusion distances. The ... [more ▼]

This work proposes a graph model for networks where node collaborations can be described by the Markov property. The proposed model augments an initial graph adjacency using diffusion distances. The resulting virtual adjacency depends on a diffusion-scale parameter, which leads to a controlled shift in the graph-Fourier-transform spectrum. This enables a frequency analysis tailored to the actual network collaboration, revealing more information on the graph signal when compared to traditional approaches. The proposed model is employed for anomaly detection in real and synthetic networks, and results confirm that using the proposed virtual adjacency yields better classification than the initial adjacency. [less ▲]

Detailed reference viewed: 93 (5 UL)
Full Text
Peer Reviewed
See detailSeparation of Concerns Within Robotic Systems Through Proactive Computing
Frantz, Alexandre; Zampunieris, Denis UL

in Proceeding of the 4th IEEE International Conference on Robotic Computing (2020, November)

In this short paper, we first introduce a possible new model for designing and implementing software in robotic systems. This model is based on proactive scenarios, coded through dynamic sets of condition ... [more ▼]

In this short paper, we first introduce a possible new model for designing and implementing software in robotic systems. This model is based on proactive scenarios, coded through dynamic sets of condition-action rules. Each scenario embeds the required rules and can be assembled dynamically with others, allowing the proactive system to achieve a unique objective or behavior and instruct the robot accordingly. Furthermore, a scenario is not aware of the existence of the other scenarios. In fact, it only contains information about a predefined central scenario, which oversees global decision making. In addition, each scenario knows where to enter its suggestions, thus allowing for a high degree in terms of separating concerns and modularity of code. Consequently, allowing easier development, testing and optimization of each scenario independently, possible reuse in different robots, and finally, a faster achievement of robust and scalable robotics software. We then show how to apply this programming model and its functionalities during runtime, by a proof of concept consisting of a virtual robot deployed in the Webots™ simulator. This simulator is controlled with four proactive scenarios (plus the central one), in charge of three different objectives. [less ▲]

Detailed reference viewed: 171 (16 UL)
Full Text
Peer Reviewed
See detailLa formation dans la Grande Région : réalités et défis
Pigeron-Piroth, Isabelle UL; Belkacem, Rachid

in Les Cahiers de la Grande Région (2020), 3

Inscrit dans la continuité du Cahier n°2 interrogeant les équations du marché du travail, l’objet de ce Cahier n°3 de la Grande Région est la formation sous plusieurs de ses formes (formation continue ... [more ▼]

Inscrit dans la continuité du Cahier n°2 interrogeant les équations du marché du travail, l’objet de ce Cahier n°3 de la Grande Région est la formation sous plusieurs de ses formes (formation continue, apprentissage…), ses réalités et ses défis. A l’heure du déclin démographique et de la transition numérique, mais aussi de la crise sanitaire, cette question s’avère centrale. Difficile jeu d’équilibre entre les besoins des employeurs et les intérêts des individus, la formation dans la Grande Région est également confrontée à la particularité de la situation transfrontalière (questions linguistiques, reconnaissance des diplômes…). En s’appuyant sur les travaux de divers instituts de la Grande Région, ce Cahier de la Grande Région illustrera les problématiques de la formation à résoudre dans les années à venir. [less ▲]

Detailed reference viewed: 56 (3 UL)
See detailReflections on our teaching activities in the initial teacher training during the COVID-19 crisis: From “onsite classes” to “schooling at home”
Kreis, Yves UL; Haas, Ben; Reuter, Robert UL et al

in Mein, Georg; Pause, Johannes (Eds.) Self and Society in the Corona Crisis: Perspectives from the Humanities and Social Sciences (2020)

The COVID-19 public health crisis and the subsequent confinement induced a series of profound changes to teaching and learning in education all over the world (Lancker and Parolin 2020). Mid-March 2020 ... [more ▼]

The COVID-19 public health crisis and the subsequent confinement induced a series of profound changes to teaching and learning in education all over the world (Lancker and Parolin 2020). Mid-March 2020, the University of Luxembourg also switched from on-campus classes to schooling at home for all courses. This transition was more or less smooth for the teaching staff and the students. In this paper, we present our reflections, as lecturers in the “Bachelor en Sciences de l’Éducation”, on how we adapted three courses and the internships, which could not happen as usual. We describe and discuss which aspects of our teaching approaches and the settings within which we have been working so far, might have contributed to a rather successful response to the current health crisis. The insights gained via these forced changes are discussed in terms of lessons learned for future instructional design decisions. [less ▲]

Detailed reference viewed: 279 (6 UL)
Peer Reviewed
See detailThe role of the European Investment Bank in Times of COVID-19
Howarth, David UL; Kavvadia, Helen; Clifton, Judith et al

in McDonald, D.A.; Marois, T.; Barrowclough, D.V. (Eds.) Public Banks and Covid-19: Combatting the Pandemic With Public Finance. Municipal Services Project (2020)

The European Guarantee Fund (EGF) is spearheading European Investment Bank (EIB) action in response to Covid-19. It will provide guarantees to the EIB and the EIF to reimburse any possible losses incurred ... [more ▼]

The European Guarantee Fund (EGF) is spearheading European Investment Bank (EIB) action in response to Covid-19. It will provide guarantees to the EIB and the EIF to reimburse any possible losses incurred in their operations. By pooling credit risk across all of the EIB’s members, the overall average cost of the EGF will be significantly reduced, compared to national schemes. Financially speaking, this appears an efficient solution given the objectives of a Regional Development Bank – which the EIB can be categorised. Most of the EGF funding will be made available through financial intermediaries – National Promotional Banks and commercial banks. Once the funds are made available and the list of financial intermediaries established, companies can file requests directly with financial intermediaries. We argue that especially in view of the public health crisis, it is high time for the EIB to establish a health sector strategy and step up its contribution from its own funds, beyond risk-sharing facilities with the Member States and the Commission as EGF and IDFF respectively. In its response to Covid-19 economic crisis, it is imperative for the EIB to focus squarely on the final beneficiaries (SMEs, innovation, social and environmental projects) rather than the private financial intermediaries. For the EU’s public bank, the need for assuring transparency and accountability, in view of the increasing use of budgetary and Member States’ funds especially in the public good health sector, is higher than ever. [less ▲]

Detailed reference viewed: 138 (0 UL)
Full Text
Peer Reviewed
See detailOn the nonparametric inference of coefficients of self-exciting jump-diffusion
Amorino, Chiara UL; Dion, Charlotte; Gloter, Arnaud et al

E-print/Working paper (2020)

In this paper, we consider a one-dimensional diffusion process with jumps driven by a Hawkes process. We are interested in the estimations of the volatility function and of the jump function from discrete ... [more ▼]

In this paper, we consider a one-dimensional diffusion process with jumps driven by a Hawkes process. We are interested in the estimations of the volatility function and of the jump function from discrete high-frequency observations in long time horizon. We first propose to estimate the volatility coefficient. For that, we introduce in our estimation procedure a truncation function that allows to take into account the jumps of the process and we estimate the volatility function on a linear subspace of L 2 (A) where A is a compact interval of R. We obtain a bound for the empirical risk of the volatility estimator and establish an oracle inequality for the adaptive estimator to measure the performance of the procedure. Then, we propose an estimator of a sum between the volatility and the jump coefficient modified with the conditional expectation of the intensity of the jumps. The idea behind this is to recover the jump function. We also establish a bound for the empirical risk for the non-adaptive estimator of this sum and an oracle inequality for the final adaptive estimator. We conduct a simulation study to measure the accuracy of our estimators in practice and we discuss the possibility of recovering the jump function from our estimation procedure. [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
See detailDer Wert digitaler Güter - Steuerrechtliche Einordnung
Sinnig, Julia UL

in Kommunikation und Recht (2020)

Detailed reference viewed: 52 (1 UL)
See detaileCoBus: Smart and sustainable public transport in Luxembourg
Viti, Francesco UL

Scientific Conference (2020, November)

Detailed reference viewed: 74 (4 UL)
Full Text
Peer Reviewed
See detailMechanisms of Ras Membrane Organization and Signaling: Ras Rocks Again.
Abankwa, Daniel UL; Gorfe, Alemayehu A.

in Biomolecules (2020), 10(11),

Ras is the most frequently mutated oncogene and recent drug development efforts have spurred significant new research interest. Here we review progress toward understanding how Ras functions in nanoscale ... [more ▼]

Ras is the most frequently mutated oncogene and recent drug development efforts have spurred significant new research interest. Here we review progress toward understanding how Ras functions in nanoscale, proteo-lipid signaling complexes on the plasma membrane, called nanoclusters. We discuss how G-domain reorientation is plausibly linked to Ras-nanoclustering and -dimerization. We then look at how these mechanistic features could cooperate in the engagement and activation of RAF by Ras. Moreover, we show how this structural information can be integrated with microscopy data that provide nanoscale resolution in cell biological experiments. Synthesizing the available data, we propose to distinguish between two types of Ras nanoclusters, an active, immobile RAF-dependent type and an inactive/neutral membrane anchor-dependent. We conclude that it is possible that Ras reorientation enables dynamic Ras dimerization while the whole Ras/RAF complex transits into an active state. These transient di/oligomer interfaces of Ras may be amenable to pharmacological intervention. We close by highlighting a number of open questions including whether all effectors form active nanoclusters and whether there is an isoform specific composition of Ras nanocluster. [less ▲]

Detailed reference viewed: 76 (4 UL)
Full Text
Peer Reviewed
See detailRate of estimation for the stationary distribution of jump-processes over anisotropic Holder classes.
Amorino, Chiara UL

E-print/Working paper (2020)

We study the problem of the non-parametric estimation for the density π of the stationary distribution of the multivariate stochastic differential equation with jumps (Xt)0≤t≤T , when the dimension d is ... [more ▼]

We study the problem of the non-parametric estimation for the density π of the stationary distribution of the multivariate stochastic differential equation with jumps (Xt)0≤t≤T , when the dimension d is such that d ≥ 3. From the continuous observa- tion of the sampling path on [0, T ] we show that, under anisotropic H ̈older smoothness constraints, kernel based estimators can achieve fast convergence rates. In particu- lar, they are as fast as the ones found by Dalalyan and Reiss [9] for the estimation of the invariant density in the case without jumps under isotropic H ̈older smooth- ness constraints. Moreover, they are faster than the ones found by Strauch [29] for the invariant density estimation of continuous stochastic differential equations, under anisotropic H ̈older smoothness constraints. Furthermore, we obtain a minimax lower bound on the L2-risk for pointwise estimation, with the same rate up to a log(T) term. It implies that, on a class of diffusions whose invariant density belongs to the anisotropic Holder class we are considering, it is impossible to find an estimator with a rate of estimation faster than the one we propose. [less ▲]

Detailed reference viewed: 37 (6 UL)
Full Text
Peer Reviewed
See detailIntelligent Adaptive Agents and Trust in Virtual and Augmented Reality
Sun, Ningyuan UL; Botev, Jean UL

in Proceedings of the 19th IEEE International Symposium on Mixed and Augmented Reality (ISMAR) (2020, November)

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailComprehensive Physical Layer Security Analysis of FSO Communications over Malaga Channels
Ai, Yun; Mathur, Aashish; Verma, Gyan Deep et al

in IEEE Photonics Journal (2020)

In this paper, we study the physical layer security of free-space optical (FSO) communications under different eavesdropping scenarios. More specifically, the secrecy performance of FSO communication ... [more ▼]

In this paper, we study the physical layer security of free-space optical (FSO) communications under different eavesdropping scenarios. More specifically, the secrecy performance of FSO communication employing intensity modulation/direct detection detection is analyzed for the well-established Mlaga channels. Three different realistic scenarios of eavesdropping are considered by assuming different placement locations for the eavesdropper in the paper. Novel expressions for the average secrecy capacity (ASC) and secrecy outage probability (SOP) are derived for the considered scenarios, and useful insights are also provided through asymptotic analysis. The results show: (i) When the eavesdropper is placed near the transmitter, atmospheric condition imposes a less significant impact on secrecy performance; (ii) Certain level of correlation can potentially enhance the secrecy performance for FSO communications; (iii) The correlation imposes opposite impacts on the ASC and SOP of FSO communications; and the secrecy performance metrics exhibit a non-monotonic impact with the increase of correlation; (v) When the correlation of the FSO links is too small or too large (i.e., the correlation parameter around 0 or 1), the correlation plays a more significant impact on secrecy performance; and (vi) The asymptotic slope of the SOP is 0.5 for all eavesdropping scenarios under practical FSO channels. [less ▲]

Detailed reference viewed: 133 (8 UL)
See detailSTREAMS: A supporting tool for shared mobility services
Giorgione, Giulio UL; Viti, Francesco UL

Scientific Conference (2020, November)

Detailed reference viewed: 79 (4 UL)
Full Text
Peer Reviewed
See detailDistraction from pain: The role of selective attention and pain catastrophizing
Rischer, Katharina Miriam UL; Gonzalez-Roldan, Ana Maria; Montoya, Pedro et al

in European Journal of Pain (2020), 24(10), 1880-1891

Detailed reference viewed: 62 (1 UL)
Peer Reviewed
See detailRampini, Asca
Thill, Jean UL

in Thill, Jean (Ed.) Luxemburger Musiklexikon (2020)

Detailed reference viewed: 31 (7 UL)