References of "2021"
     in
Bookmark and Share    
Full Text
See detailVisualizing Visions: Re-viewing the seventeenth-century genre of constcamer paintings
Koeleman, Floor Anna UL

Doctoral thesis (2021)

Constcamer paintings or pictures of collections were created almost exclusively in Antwerp, and to a lesser extent in Brussels, in the seventeenth century. Until now, no attempt had been made to collect ... [more ▼]

Constcamer paintings or pictures of collections were created almost exclusively in Antwerp, and to a lesser extent in Brussels, in the seventeenth century. Until now, no attempt had been made to collect all known examples, partly because of the contemporary distribution of such works across collections throughout the Western world. Another difficulty in studying constcamer paintings is the great complexity of the rich variety of subjects, objects, and concepts on display in the images that combine many disciplines separated today. Advances in the field of computer science have made it possible to systematically collect, archive, and analyze artworks and associated information on a large scale. My digital approach to the genre aimed to determine what a constcamer painting is, in terms of form, content, and meaning. In addition to looking at pictorial features and cognitively identifying what we see, contextualization played a key role in achieving understanding. Pictorial, historical, social, cultural, and intellectual contexts served as the framework for interpretation. Special attention has been paid to the interplays between collecting and recollecting, art and science, and physical and metaphysical vision. This thesis argues that pictures of collections primarily lay claim to the active intellect to generate insights by uncovering the multitude of meanings embedded in the seventeenth-century genre. The examination of constcamer paintings through a dataset led to enhanced perception and highlighted the prominence of visuality in the transmission and acquisition of knowledge, both then and now. [less ▲]

Detailed reference viewed: 292 (25 UL)
Full Text
See detailSEMKIS-DSL: a Domain-Specific Language for Specifying Neural Networks’ Key-Properties
Jahic, Benjamin UL; Guelfi, Nicolas UL; Ries, Benoit UL

Report (2021)

Neural networks are becoming increasingly part of today’s software systems. These neural networks are simplified models of the human brain that are mainly capable of learning from large datasets to ... [more ▼]

Neural networks are becoming increasingly part of today’s software systems. These neural networks are simplified models of the human brain that are mainly capable of learning from large datasets to compute some function based on recognized data. Engineering these datasets and these neural network-based software systems is a complicated and challenging task. Software engineers require methods and tools to engineer these datasets and neural networks for their customers and to satisfy their requirements. In general, they lack methods and tools to support the engineering of dataset and neural networks that satisfy the customer’s requirements. They follow traditional approaches consisting of time-consuming, imprecise and manual activities. Typically, these approaches are not supported by any tool that precisely analyse and specify the neural network’s recognition skills. In our previous work, we have introduced the notion of key-properties for describing the neural network’s recognition skills. In this paper, we define a domain-specific language to support our SEMKIS software engineering methodology for the dataset augmentation to improve network’s key-properties. We present the SEMKIS-DSL for the specification of the key-properties of a neural network. We illustrate the concepts of our DSL with a running example specifying a neural network for recognizing a digital meter counter state. This running example demonstrates a specification of the neural network’s key-properties using the SEMKIS-DSL and a successful improvement of the neural network’s recognition skills. [less ▲]

Detailed reference viewed: 84 (6 UL)
Full Text
See detailMeasuring progress to address statelessness in the EU and Georgia
Sommarribas, Adolfo UL

Report (2021)

Member States reported statistics from a range of sources or categories. The time period covered by the statistics, which was not specified in the information request, also varied. If a date is not ... [more ▼]

Member States reported statistics from a range of sources or categories. The time period covered by the statistics, which was not specified in the information request, also varied. If a date is not specified, it is assumed that statistics refer to the time of the answer period for the ad hoc query which was April/May 2021. Sources/categories reported include residence permit data, population register data, statutory stateless persons, persons without citizenship, unknown/undetected nationality, nationality not specified and recognised stateless persons. T [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detail"Just for the sake of transparency": Exploring Voter Mental Models Of Verifiability
Zollinger, Marie-Laure UL; Estaji, Ehsan UL; Ryan, Peter Y A UL et al

in Electronic Voting, Sixth International Joint Conference, E-Vote-ID 2021, Bregenz, Austria, October 5-8 (2021, October)

Verifiable voting schemes allow voters to verify their individual votes and the election outcome. The voting protocol Selene offers verification of plaintext votes while preserving privacy. Misconceptions ... [more ▼]

Verifiable voting schemes allow voters to verify their individual votes and the election outcome. The voting protocol Selene offers verification of plaintext votes while preserving privacy. Misconceptions of verification mechanisms might result in voters mistrust of the system or abstaining from using it. In this paper, we interviewed 24 participants and invited them to illustrate their mental models of Selene. The drawings demonstrated different levels of sophistication and four mental models: 1) technology understanding, 2) meaning of the verification phase, 3) security concerns, and 4) unnecessary steps. We highlight the misconceptions expressed regarding Internet voting technologies and the system design. Based on our findings, we conclude with recommendations for future implementations of Selene as well as for the design of Internet voting systems in general. [less ▲]

Detailed reference viewed: 118 (11 UL)
Full Text
Peer Reviewed
See detailA global carbon tax? Why firm mobility and heterogeneity matters
Zanaj, Skerdilajda UL

E-print/Working paper (2021)

Detailed reference viewed: 134 (9 UL)
Full Text
Peer Reviewed
See detailSeeking 'truth' after devastating, multi-layered conflict: The complex case of transitional justice in South Sudan
Owiso, Owiso UL

in Journal of International Humanitarian Legal Studies (2021)

In August 2015, the Government of South Sudan and other parties to the country’s civil conflict signed a peace agreement, the Agreement on the Resolution of the Conflict in the Republic of South Sudan ... [more ▼]

In August 2015, the Government of South Sudan and other parties to the country’s civil conflict signed a peace agreement, the Agreement on the Resolution of the Conflict in the Republic of South Sudan, aimed at ending the civil conflict that broke out on 15 December 2013. After this agreement failed to hold, South Sudan descended into a second wave of civil conflict. A recommitment to the agreement was secured through regional efforts on 12 September 2018. Dubbed the Revitalised Agreement on the Resolution of the Conflict in the Republic of South Sudan, the agreement provides a transitional justice architecture which includes a truth commission, a hybrid court and a reparations authority. This paper examines the potential of the proposed Commission for Truth, Reconciliation and Healing to contribute towards sustainable transitional justice solutions in South Sudan, based on contemporary standards and practice of transitional justice. Through historical, descriptive and analytical approaches, the paper grapples with South Sudan’s complex truth-seeking journey following years of multi-layered conflict. [less ▲]

Detailed reference viewed: 222 (10 UL)
Full Text
Peer Reviewed
See detailSpecifying Properties over Inter-Procedural, Source Code Level Behaviour of Programs
Dawes, Joshua UL; Bianculli, Domenico UL

in Proceedings of the 21st International Conference on Runtime Verification (2021, October)

The problem of verifying a program at runtime with respect to some formal specification has led to the development of a rich collection of specification languages. These languages often have a high level ... [more ▼]

The problem of verifying a program at runtime with respect to some formal specification has led to the development of a rich collection of specification languages. These languages often have a high level of abstraction and provide sophisticated modal operators, giving a high level of expressiveness. In particular, this makes it possible to express properties concerning the source code level behaviour of programs. However, for many languages, the correspondence between events generated at the source code level and parts of the specification in question would have to be carefully defined. To enable expressing — using a temporal logic — properties over source code level behaviour without the need for this correspondence, previous work introduced Control-Flow Temporal Logic (CFTL), a specification language with a low level of abstraction with respect to the source code of programs. However, this work focused solely on the intra-procedural setting. In this paper, we address this limitation by introducing Inter-procedural CFTL, a language for expressing source code level, inter-procedural properties of program runs. We evaluate the new language, iCFTL, via application to a real-world case study. [less ▲]

Detailed reference viewed: 163 (26 UL)
Full Text
Peer Reviewed
See detailPakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE
Vazquez Sandoval, Itzel UL; Atashpendar, Arash; Lenzini, Gabriele UL et al

in Obaidat, Mohammad S.; Ben-Othman, Jalel (Eds.) E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers. (2021, October)

We propose the use of password-authenticated key exchange (PAKE) for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email ... [more ▼]

We propose the use of password-authenticated key exchange (PAKE) for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email and secure messaging, i.e., without a public key infrastructure or a trusted third party. This not only simplifies the EA process by requiring users to share only a low-entropy secret such as a memorable word, but it also allows us to establish a high-entropy secret key. This approach enables a series of cryptographic enhancements and security properties, which are hard to achieve using out-of-band (OOB) authentication. We first study a few vulnerabilities in voice-based OOB authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. We then propose tackling public key authentication by solving the problem of secure equality test using PAKE and discuss various protocols and their properties. This method enables the automation of important KM tasks such as key renewal and future key pair authentications, reduces the impact of human errors and lends itself to the asynchronous nature of email and modern messaging. It also provides cryptographic enhancements including multi-device synchronization, and secure secret storage/retrieval, and paves the path for forward secrecy, deniability and post-quantum security.We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols. We present an implementation of our proposal, called PakeMail, to demonstrate the feasibility of the core idea and discuss some of its cryptographic details, implemented features and efficiency aspects. We conclude with some design and security considerations, followed by future lines of work. [less ▲]

Detailed reference viewed: 30 (0 UL)
Peer Reviewed
See detailFlight to Safety and Retail Investor Behavior
Lehnert, Thorsten UL

Scientific Conference (2021, October)

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailLeveraging Temporal Information for 3D Trajectory Estimation of Space Objects
Mohamed Ali, Mohamed Adel UL; Ortiz Del Castillo, Miguel UL; Al Ismaeil, Kassem UL et al

in Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV) Workshops (2021, October)

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailThe role of economic complexity on the formation of gender roles
Zanaj, Skerdilajda UL

E-print/Working paper (2021)

Detailed reference viewed: 46 (13 UL)
Full Text
Peer Reviewed
See detailAnalysis of residual stress relaxation of aluminum alloys EN AW 6061/-82 T6 under cyclic loading
Repplinger, Christian UL; Sellen, Stephan UL; Kedziora, Slawomir UL et al

in Fatigue and Fracture of Engineering Materials and Structures (2021)

Stress relaxation describes the reduction of stress under static or cyclic loading at a constant strain level. Several processes induce intentionally residual stresses, for example, autofrettage of thick ... [more ▼]

Stress relaxation describes the reduction of stress under static or cyclic loading at a constant strain level. Several processes induce intentionally residual stresses, for example, autofrettage of thick-walled pressurized tubes to improve their fatigue life. This well-known process induces residual compressive stresses at the critical inner surface by using a single static but controlled over- loading internal pressure. Relaxation of residual stresses due to cyclic loading in service would endanger the effectiveness of autofrettage and could finally lead to unexpected fatigue failure. In this study, strain-controlled experiments up to 500,000 load cycles and amending nonlinear finite element simulations were done for the aluminum alloys EN AW 6061 T6 and EN AW 6082 T6 to study potential cyclic stress relaxation in four-point bending tests after con- trolled single static plasticization for residual stress generation. This analysis identifies almost stable residual stresses for both materials under different cyclic strain-controlled load levels. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailRequirements And Threat Models of Adversarial Attacks and Robustness of Chest X-ray classification
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

E-print/Working paper (2021)

Vulnerability to adversarial attacks is a well-known weakness of Deep Neural Networks. While most of the studies focus on natural images with standardized benchmarks like ImageNet and CIFAR, little ... [more ▼]

Vulnerability to adversarial attacks is a well-known weakness of Deep Neural Networks. While most of the studies focus on natural images with standardized benchmarks like ImageNet and CIFAR, little research has considered real world applications, in particular in the medical domain. Our research shows that, contrary to previous claims, robustness of chest x-ray classification is much harder to evaluate and leads to very different assessments based on the dataset, the architecture and robustness metric. We argue that previous studies did not take into account the peculiarity of medical diagnosis, like the co-occurrence of diseases, the disagreement of labellers (domain experts), the threat model of the attacks and the risk implications for each successful attack. In this paper, we discuss the methodological foundations, review the pitfalls and best practices, and suggest new methodological considerations for evaluating the robustness of chest xray classification models. Our evaluation on 3 datasets, 7 models, and 18 diseases is the largest evaluation of robustness of chest x-ray classification models. We believe our findings will provide reliable guidelines for realistic evaluation and improvement of the robustness of machine learning models for medical diagnosis. [less ▲]

Detailed reference viewed: 82 (10 UL)
Full Text
Peer Reviewed
See detailExplicar los impactos de la globalización en las zonas transfronterizas a través de la calidad de la democracia. Un marco interregional comparativo
Koff, Harlan UL; Mejía Idarraga, Santiago

in Estudios Políticos (2021), 62

Globalisation has significantly affected the ability of States to govern flows. Important questions which have recently emerged in international relations ask: how has globalisation affected border ... [more ▼]

Globalisation has significantly affected the ability of States to govern flows. Important questions which have recently emerged in international relations ask: how has globalisation affected border regions and what explains these impacts? Employing a comparative, cross-regional research design, this article proposes two originalresponses to these questions: first, it questions whether border communities benefit or suffer from globalization and, in doing so, it addresses the impacts of globalization on border communities. Second, an attempt is made to explain these impacts by studying the democratic quality of border integration processes. Thus, globalization is examined as a system in which the benefits are distributed or concentrated according to the quality of the integration processes. [less ▲]

Detailed reference viewed: 7 (0 UL)
See detailBeeinträchtigung und soziale Partizipation in Familie und Schule
Stöcker, Anne UL; Zurbriggen, Carmen

Presentation (2021, October)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailLocal Forms of Morphisms of Colored Supermanifolds
Covolo, Tiffany; Kwok, Stephen; Poncin, Norbert UL

in Journal of Geometry and Physics (2021), 168

Detailed reference viewed: 124 (1 UL)
Full Text
See detailLaurent Menager (1835-1902). Kritische Gesamtausgabe, Abteilung I: Vokalwerke, Band 4, Weltliche Vokalwerke
Anders, Ursula UL; Reuter, Caroline; Sagrillo, Damien François UL et al

Book published by Merseburger (2021)

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailIntelligent Autonomous Agents and Trust in Virtual Reality
Sun, Ningyuan UL; Botev, Jean UL

in Computers in Human Behavior Reports (2021)

Detailed reference viewed: 32 (8 UL)