![]() Kerchev, George ![]() E-print/Working paper (2020) Detailed reference viewed: 60 (3 UL)![]() Heuschling, Luc ![]() in Hazell, Robert; Morris, Bob (Eds.) The Role of Monarchy in Modern Democracy. European Monarchies Compared (2020) Detailed reference viewed: 474 (36 UL)![]() Heuschling, Luc ![]() in Semper perseverans. Liber Amicorum André Alen (2020) Detailed reference viewed: 170 (19 UL)![]() Sun, Zhe ![]() E-print/Working paper (2020) For a finite-type surface S, we study a preferred basis for the commutative algebra C[XSL3(C)(S)] of regular functions on the SL3(C)-character variety, introduced by Sikora and Westbury. These basis ... [more ▼] For a finite-type surface S, we study a preferred basis for the commutative algebra C[XSL3(C)(S)] of regular functions on the SL3(C)-character variety, introduced by Sikora and Westbury. These basis elements come from the trace functions associated to certain tri-valent graphs embedded in the surface S. We show that this basis can be naturally indexed by positive integer coordinates, defined by Knutson-Tao rhombus inequalities. These coordinates are related, by the geometric theory of Fock and Goncharov, to the tropical points at infinity of the dual version of the character variety. [less ▲] Detailed reference viewed: 53 (0 UL)![]() ; ; et al in A boundary-enhanced supervoxel method for extraction of road edges in MLS point clouds (2020) Road extraction plays a significant role in production of high definition maps (HD maps). This paper presents a novel boundary-enhanced supervoxel segmentation method for extracting road edge contours ... [more ▼] Road extraction plays a significant role in production of high definition maps (HD maps). This paper presents a novel boundary-enhanced supervoxel segmentation method for extracting road edge contours from MLS point clouds. The proposed method first leverages normal feature judgment to obtain 3D point clouds global geometric information, then clusters points according to an existing method with global geometric information to enhance the boundaries. Finally, it utilizes the neighbor spatial distance metric to extract the contours and drop out existing outliers. The proposed method is tested on two datasets acquired by a RIEGL VMX-450 MLS system that contain the major point cloud scenes with different types of road boundaries. The experimental results demonstrate that the proposed method provides a promising solution for extracting contours efficiently and completely. Results show that the precision values are 1.5 times higher and approximately equal than the other two existing methods when the recall value is 0 for both tested two road datasets. [less ▲] Detailed reference viewed: 52 (4 UL)![]() Wiese, Gabor ![]() Learning material (2020) These are the lecture notes for the lecture `Algèbre' in the 3rd semester of the Bachelor in Mathematics at the University of Luxembourg. Last update: winter term 2020. Detailed reference viewed: 156 (9 UL)![]() Settels, Jason ![]() ![]() in Innovation in Aging (2020), 4(S1), 483 Detailed reference viewed: 104 (0 UL)![]() Bettaieb, Seifeddine ![]() ![]() ![]() in Empirical Software Engineering (2020), 25(4), 25502582 In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the ... [more ▼] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Objective] In this article, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. [Method and Results] Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of ≈ 94% and average precision of ≈ 63%. We further examine through a survey the perceptions of security analysts about the usefulness of the classification models derived from historical data. [Conclusions] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. Further, our survey results suggest that the generated classification models help provide a documented and explicit rationale for choosing the applicable security controls. [less ▲] Detailed reference viewed: 282 (45 UL)![]() ; ; et al in CPSDebug: a tool for explanation of failures in cyber-physical systems (2020) Debugging Cyber-Physical System models is often challenging, as it requires identifying a potentially long, complex and heterogenous combination of events that resulted in a violation of the expected ... [more ▼] Debugging Cyber-Physical System models is often challenging, as it requires identifying a potentially long, complex and heterogenous combination of events that resulted in a violation of the expected behavior of the system. In this paper we present CPSDebug, a tool for supporting designers in the debugging of failures in MAT- LAB Simulink/Stateflow models. CPSDebug implements a gray-box approach that combines testing, specification mining, and failure analysis to identify the causes of failures and explain their propagation in time and space. The evaluation of the tool, based on multiple usage scenarios and faults and direct feedback from engineers, shows that CPSDebug can effectively aid engineers during debugging tasks. [less ▲] Detailed reference viewed: 197 (4 UL)![]() ; ; Schoepf, Michael ![]() in Zeitschrift für Energiewirtschaft (2020) The expansion of renewable energy requires appropriate flexibility in the electricity system in order to maintain the balance between electricity generation and consumption at all times. The industrial ... [more ▼] The expansion of renewable energy requires appropriate flexibility in the electricity system in order to maintain the balance between electricity generation and consumption at all times. The industrial sector plays a central role for a successful energy transition due to the power-intensive processes and the resulting high electricity demand. Industrial demand response may be a cost-effective alternative to other flexibility options. At the same time, companies can reduce electricity procurement costs by providing demand response. Nevertheless, due to a complex decision-making environment and a lack of planning security, only a few companies are currently exploiting the existing potential. To reach the goals of the energy transition, the potential used must still be raised significantly, i.e., companies must align their demand for electricity more closely to the existing supply of electricity. This article supports companies in this transformation process by illustrating dimensions and characteristics of a business model for demand response. Through a literature study and subsequent expert workshops, a generic business model for companies is derived that provides transparency regarding the necessary activities and resources for enabling and implementing demand response. The results were developed using the established Business Model Canvas. This supports companies that have not yet started to use demand response in their business model development and thus reduces barriers to entry. The results presented contribute to an increase in the demand response potential of the industry. [less ▲] Detailed reference viewed: 113 (10 UL)![]() Neframi, Eleftheria ![]() in in J-C. Barbato, S. Barbou des Places, M. Dubuy, A. Moine (dir), Transformations et résilience de l'Etat, Mélanges en l'honneur de Jean-Denis Mouton (2020) Detailed reference viewed: 174 (5 UL)![]() Torti, Emiliano ![]() E-print/Working paper (2020) Detailed reference viewed: 28 (2 UL)![]() Wiese, Gabor ![]() Learning material (2020) In these lectures (8 hours taught in November 2020), we mention some topics from (algebraic) number theory as well as some related concepts from (algebraic) geometry that can be useful in cryptography. We ... [more ▼] In these lectures (8 hours taught in November 2020), we mention some topics from (algebraic) number theory as well as some related concepts from (algebraic) geometry that can be useful in cryptography. We cannot go deeply into any of the topics and most results will be presented without any proofs. One of the things that one encounters are `ideal lattices'. In the examples I saw, this was nothing but (an ideal in) an order in a number field, which is one of the concepts that we present here in its mathematical context (i.e. embedded in a conceptual setting). It has been noted long ago (already in the 19th century) that number fields and function fields of curves have many properties in common. Accordingly, we shall also present some basic topics on affine plane curves and their function fields. This leads us to mention elliptic curves, however, only in an affine version (instead of the better projective one); we cannot go deeply into that topic at all. The material presented here is classical and very well known. [less ▲] Detailed reference viewed: 98 (10 UL)![]() Devillet, Jimmy ![]() E-print/Working paper (2020) We study the class of symmetric $n$-ary bands. These are $n$-ary semigroups $(X,F)$ such that $F$ is invariant under the action of permutations and idempotent, i.e., satisfies $F(x,\ldots,x)=x$ for all $x ... [more ▼] We study the class of symmetric $n$-ary bands. These are $n$-ary semigroups $(X,F)$ such that $F$ is invariant under the action of permutations and idempotent, i.e., satisfies $F(x,\ldots,x)=x$ for all $x\in X$. We first provide a structure theorem for these symmetric $n$-ary bands that extends the classical (strong) semilattice decomposition of certain classes of bands. We introduce the concept of strong $n$-ary semilattice of $n$-ary semigroups and we show that the symmetric $n$-ary bands are exactly the strong $n$-ary semilattices of $n$-ary extensions of Abelian groups whose exponents divide $n-1$. Finally, we use the structure theorem to obtain necessary and sufficient conditions for a symmetric $n$-ary band to be reducible to a semigroup. [less ▲] Detailed reference viewed: 60 (5 UL)![]() Fridgen, Gilbert ![]() in Energy Economics (2020), 91 To combat climate change, many countries all around the world currently foster the development of renewable energy sources (RES). However, in contrast to traditional energy systems that relied on few ... [more ▼] To combat climate change, many countries all around the world currently foster the development of renewable energy sources (RES). However, in contrast to traditional energy systems that relied on few central power plants, RES are typically highly decentral and spread all over a country. Against this backdrop, the promotion of a decentralization of the energy system by fostering a regional balance of energy demand and supply with a corresponding increase in energy democracy is seen as a promising approach. However, energy democracy driven by an increasing involvement of consumers requires adequate investments of consumers in their own local RES in order to become active players, usually called prosumers. Risk associated with uncertain long-term electricity price developments is generally seen as a barrier to investments. In contrast, we describe that an investment in distributed energy resources (DERs) may actually serve as a consumer's insurance against price risk. Our results set out that the consideration of risk-aversion may actually positively shift an investment decision in renewable DERs. This is due to the prosumer becoming more self-sufficient and less dependent on uncertain price developments. To analyze such an insurance effect, we create a formal decision model considering the prosumer's risk-aversion and derive the prosumer's optimal investment in renewable DERs. However, our results also indicate that under some circumstances the insurance effect disappears: When a prosumer turns into a predominant producer, the prosumer is again exposed to risk in terms of uncertain revenues. Ultimately, our work highlights the importance of a consideration of the insurance effect when assessing an investment in renewable DERs. [less ▲] Detailed reference viewed: 96 (7 UL)![]() Letellier, Elisabeth ![]() ![]() in Actin Cytoskeleton in Cancer Progression and Metastasis - Part B (2020) The view that myosins, which are actin based molecular motors, are only driving muscle contraction evolved a lot during the last decades. Nowadays, it is known that they reshape the actin skeleton, anchor ... [more ▼] The view that myosins, which are actin based molecular motors, are only driving muscle contraction evolved a lot during the last decades. Nowadays, it is known that they reshape the actin skeleton, anchor or transport vesicles, organelles as well as protein complexes. Here, we review how their role in cell division, polarization, migration and death is related to the cancer phenotype. We will further focus our attention on recent evidences suggesting that these central roles make them prime biomarker candidates for the prognosis of various cancers. Finally, we will discuss emerging evidences raising myosins as new therapeutic targets to fight malignant tumors. [less ▲] Detailed reference viewed: 73 (3 UL)![]() Viola, Lorella ![]() in Weber, Andreas; Heerlien, Maarten; Gassó Miracle, Eulàlia (Eds.) et al Proceedings of the International Conference Collect and Connect: Archives and Collections in a Digital Age (2020) Digitally available repositories are becoming not only more and more widespread but also larger and larger. Although there are both digitally-born collections and digitised material, the digital heritage ... [more ▼] Digitally available repositories are becoming not only more and more widespread but also larger and larger. Although there are both digitally-born collections and digitised material, the digital heritage scholar is typically confronted with the latter. This immediately presents new challenges, one of the most urgent being how to find the meaningful elements that are hidden underneath such unprecedented mass of digital data. One way to respond to this challenge is to contextually enrich the digital material, for example through deep learning. Using the enrichment of the digital heritage collection ChroniclItaly 3.0 [10] as a concrete example, this article discusses the complexities of this process. Specifically, combining statistical and critical evaluation, it describes the gains and losses resulting from the decisions made by the researcher at each step and it shows how in the passage from digitised sources to enriched material, most is gained (e.g., preservation, wider and enhanced access, more material) but some is also lost (e.g., original layout and composition, loss of information due to pre-processing steps). The article concludes that it is only through a critical approach that the digital heritage scholar can successfully meet the interpretive challenges presented by the digital and the digital heritage sector fulfil the second most important purpose of digitisation, that is to enhance access. [less ▲] Detailed reference viewed: 27 (1 UL)![]() Heck, Sandra ![]() ![]() in AUC Kinanthropologica (2020), 56(1), 19-27 In the frame of the European Physical Activity Label for Schools (Eu-PALS, 2020a) project diverse indicators of physical activity, physical education and sport in different European schools have been ... [more ▼] In the frame of the European Physical Activity Label for Schools (Eu-PALS, 2020a) project diverse indicators of physical activity, physical education and sport in different European schools have been analysed. As a starting point, this paper is presenting the chosen indicators and comparing them to an already existing physical activity label for schools in Luxembourg. The choice of the quality criteria in the Eu-PALS project, which may lead to the awarding of the label, are further discussed by demonstrating the results of a pilot study at four schools in Luxembourg. This national pilot study shows not only to the participating schools in which areas they might need to improve their activities, but allows also more generally to evaluate the indicators and possibly to improve the choice. Finally, with regard to the topic of the CEREPS Conference 2019 in Prague – “Quality criteria and outcome standards for Physical Education and School Sport” – in the frame of which this study has been presented, it is also discussed whether the project contributes to make criteria and outcome standards of physical education and school sport in Europe visible and comparable. [less ▲] Detailed reference viewed: 242 (9 UL)![]() ; ; et al in Proceedings of the 2020 IEEE Radar Conference (RadarConf20), Florence, Italy, 2020 (2020) Noise Radar technology is the general term used to describe radar systems that employ realizations of a given stochastic process as transmit waveforms. With the advances made in hardware as well as the ... [more ▼] Noise Radar technology is the general term used to describe radar systems that employ realizations of a given stochastic process as transmit waveforms. With the advances made in hardware as well as the rise of the software defined noise radar concept, waveform design emerges as an important research area related to such systems. Several optimization algorithms have been proposed to generate pseudo-random waveforms with specific desired features, specially with respect to sidelobes. Nevertheless, not only modifying random waveforms may compromise their LPI performance, but also the implementation of such algorithms in real time applications may not be feasible. Within this context, this paper analyzes varied design architectures for FM/PM pseudo-noise waveform generation, considering a real-time application. The proposed architectures are verified in a co-simulation environment using the Xilinx System Generator tool and implemented on reconfigurable hardware, i.e., a Xilinx Field Programmable Gate Array (FPGA) is taken into consideration. Timing, resource consumption, and the trade-offs related to hardware area and performance are then investigated. [less ▲] Detailed reference viewed: 102 (13 UL)![]() Stolfi Rosso, Daniel ![]() ![]() ![]() in Sensors (2020), 20(9), 2566 Detailed reference viewed: 162 (27 UL) |
||