References of "2021"
     in
Bookmark and Share    
Full Text
See detailLabor Market Effects of Technology Shocks biased Toward the Traded Sector
Bertinelli, Luisito UL; Cardi; Restout

E-print/Working paper (2021)

Motivated by recent evidence pointing at an increasing contribution of asymmetric shocks across sectors to economic fluctuations, we explore the labor market effects of technology shocks biased toward the ... [more ▼]

Motivated by recent evidence pointing at an increasing contribution of asymmetric shocks across sectors to economic fluctuations, we explore the labor market effects of technology shocks biased toward the traded sector. Our VAR evidence for seventeen OECD countries reveals that the non-traded sector alone drives the increase in total hours worked following a technology shock that increases permanently traded relative to non-traded TFP. The shock generates a reallocation of labor toward the non-traded sector which contributes to 35% on average of the rise in non-traded hours worked. Both labor reallocation and variations in labor income shares are found empirically connected with factor-biased technological change. Our quantitative analysis shows that a two-sector open economy model with flexible prices can reproduce the labor market effects we document empirically once we allow for imperfect mobility of labor, gross substitutability between home- and foreign-produced traded goods, and factor-biased technological change. When calibrating the model to country-specific data, its ability to account for the cross-country reallocation and redistributive effects we estimate increases once we let factor-biased technological change vary between sectors and across countries. [less ▲]

Detailed reference viewed: 85 (6 UL)
Full Text
Peer Reviewed
See detailPakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE
Vazquez Sandoval, Itzel UL; Atashpendar, Arash; Lenzini, Gabriele UL et al

in Obaidat, Mohammad S.; Ben-Othman, Jalel (Eds.) E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers. (2021, October)

We propose the use of password-authenticated key exchange (PAKE) for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email ... [more ▼]

We propose the use of password-authenticated key exchange (PAKE) for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email and secure messaging, i.e., without a public key infrastructure or a trusted third party. This not only simplifies the EA process by requiring users to share only a low-entropy secret such as a memorable word, but it also allows us to establish a high-entropy secret key. This approach enables a series of cryptographic enhancements and security properties, which are hard to achieve using out-of-band (OOB) authentication. We first study a few vulnerabilities in voice-based OOB authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. We then propose tackling public key authentication by solving the problem of secure equality test using PAKE and discuss various protocols and their properties. This method enables the automation of important KM tasks such as key renewal and future key pair authentications, reduces the impact of human errors and lends itself to the asynchronous nature of email and modern messaging. It also provides cryptographic enhancements including multi-device synchronization, and secure secret storage/retrieval, and paves the path for forward secrecy, deniability and post-quantum security.We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols. We present an implementation of our proposal, called PakeMail, to demonstrate the feasibility of the core idea and discuss some of its cryptographic details, implemented features and efficiency aspects. We conclude with some design and security considerations, followed by future lines of work. [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailLeveraging Temporal Information for 3D Trajectory Estimation of Space Objects
Mohamed Ali, Mohamed Adel UL; Ortiz Del Castillo, Miguel UL; Al Ismaeil, Kassem UL et al

in Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV) Workshops (2021, October)

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailAnalysis of the geometrical imperfections of a dry-stacked masonry block based on Miscanthus
Pereira Dias, Patrick; Jesuino Kammer, Vanessa; Waldmann, Daniele UL

in Construction and Building Materials (2021)

Detailed reference viewed: 57 (0 UL)
Full Text
Peer Reviewed
See detailA global carbon tax? Why firm mobility and heterogeneity matters
Zanaj, Skerdilajda UL

E-print/Working paper (2021)

Detailed reference viewed: 134 (9 UL)
Full Text
See detailLaurent Menager (1835-1902). Kritische Gesamtausgabe, Abteilung I: Vokalwerke, Band 4, Weltliche Vokalwerke
Anders, Ursula UL; Reuter, Caroline; Sagrillo, Damien François UL et al

Book published by Merseburger (2021)

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailSpecifying Properties over Inter-Procedural, Source Code Level Behaviour of Programs
Dawes, Joshua UL; Bianculli, Domenico UL

in Proceedings of the 21st International Conference on Runtime Verification (2021, October)

The problem of verifying a program at runtime with respect to some formal specification has led to the development of a rich collection of specification languages. These languages often have a high level ... [more ▼]

The problem of verifying a program at runtime with respect to some formal specification has led to the development of a rich collection of specification languages. These languages often have a high level of abstraction and provide sophisticated modal operators, giving a high level of expressiveness. In particular, this makes it possible to express properties concerning the source code level behaviour of programs. However, for many languages, the correspondence between events generated at the source code level and parts of the specification in question would have to be carefully defined. To enable expressing — using a temporal logic — properties over source code level behaviour without the need for this correspondence, previous work introduced Control-Flow Temporal Logic (CFTL), a specification language with a low level of abstraction with respect to the source code of programs. However, this work focused solely on the intra-procedural setting. In this paper, we address this limitation by introducing Inter-procedural CFTL, a language for expressing source code level, inter-procedural properties of program runs. We evaluate the new language, iCFTL, via application to a real-world case study. [less ▲]

Detailed reference viewed: 163 (26 UL)
Full Text
Peer Reviewed
See detailIntelligent Autonomous Agents and Trust in Virtual Reality
Sun, Ningyuan UL; Botev, Jean UL

in Computers in Human Behavior Reports (2021)

Detailed reference viewed: 32 (8 UL)
Full Text
Peer Reviewed
See detailIs the Z2xZ2-graded sine-Gordon equation integrable?
Bruce, Andrew UL

in Nuclear Physics B (2021), 971

We examine the question of the integrability of the recently defined Z2xZ2-graded sine-Gordon model, which is a natural generalisation of the supersymmetric sine-Gordon equation. We do this via ... [more ▼]

We examine the question of the integrability of the recently defined Z2xZ2-graded sine-Gordon model, which is a natural generalisation of the supersymmetric sine-Gordon equation. We do this via appropriate auto-Bäcklund transformations, construction of conserved spinor-valued currents and a pair of infinite sets of conservation laws. [less ▲]

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailDeep Learning to Predict the Feasibility of Priority-Based Ethernet Network Configurations
Mai, Tieu Long UL; Navet, Nicolas UL

in ACM Transactions on Cyber-Physical Systems (2021), 5(4), 126

Machine learning has been recently applied in real-time systems to predict whether Ethernet network configurations are feasible in terms of meeting deadline constraints without executing conventional ... [more ▼]

Machine learning has been recently applied in real-time systems to predict whether Ethernet network configurations are feasible in terms of meeting deadline constraints without executing conventional schedulability analysis. However, the existing prediction techniques require domain expertise to choose the relevant input features and do not perform consistently when topologies or traffic patterns differ significantly from the ones in the training data. To overcome these problems, we propose a Graph Neural Network (GNN) prediction model that synthesizes relevant features directly from the raw data. This deep learning model possesses the ability to exploit relations among flows, links, and queues in switched Ethernet networks, and generalizes to unseen topologies and traffic patterns. We also explore the use of ensembles of GNNs and show that it enhances the robustness of the predictions. An evaluation on heterogeneous testing sets comprising realistic automotive networks, shows that ensembles of 32 GNN models features a prediction accuracy ranging from 79.3% to 90% for Ethernet networks using priorities as the Quality-of-Service mechanism. The use of ensemble models provides a speedup factor ranging from 77 to 1715 compared to schedulability analysis, which allows a far more extensive design space exploration. [less ▲]

Detailed reference viewed: 244 (23 UL)
See detailBeeinträchtigung und soziale Partizipation in Familie und Schule
Stöcker, Anne UL; Zurbriggen, Carmen

Presentation (2021, October)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailThe Digital Humanities Classroom as a “Node”. From Toolbox to Mindset?
Armaselu, Florentina UL

in DH Benelux Journal (2021), 3(Autumn 2021), 103-115

The paper describes a framework for digital pedagogy and evaluation that combines different approaches – theoretical, application-oriented and project-based –, underpinned by a view of the digital ... [more ▼]

The paper describes a framework for digital pedagogy and evaluation that combines different approaches – theoretical, application-oriented and project-based –, underpinned by a view of the digital humanities classroom metaphorically defined as a “node”. The metaphor encompasses the hybrid character of digital humanities teaching, as a crossing or convergence of paths, which involves the use of various categories of study materials, themes, examples, methodologies and skills, as well as exchange, circulation of ideas and connection with other disciplines. It is assumed that the application of this type of hybrid approach in the course design, together with the coverage of a variety of tools to be studied in class, might foster a reflective mindset, enabling the students to contextualise the digital technologies within different humanities areas, beyond the acquisition of technical skills and knowledge of computational methods and tools usually referred to as the toolbox-based education paradigm. [less ▲]

Detailed reference viewed: 38 (5 UL)
Full Text
Peer Reviewed
See detailSeeking 'truth' after devastating, multi-layered conflict: The complex case of transitional justice in South Sudan
Owiso, Owiso UL

in Journal of International Humanitarian Legal Studies (2021)

In August 2015, the Government of South Sudan and other parties to the country’s civil conflict signed a peace agreement, the Agreement on the Resolution of the Conflict in the Republic of South Sudan ... [more ▼]

In August 2015, the Government of South Sudan and other parties to the country’s civil conflict signed a peace agreement, the Agreement on the Resolution of the Conflict in the Republic of South Sudan, aimed at ending the civil conflict that broke out on 15 December 2013. After this agreement failed to hold, South Sudan descended into a second wave of civil conflict. A recommitment to the agreement was secured through regional efforts on 12 September 2018. Dubbed the Revitalised Agreement on the Resolution of the Conflict in the Republic of South Sudan, the agreement provides a transitional justice architecture which includes a truth commission, a hybrid court and a reparations authority. This paper examines the potential of the proposed Commission for Truth, Reconciliation and Healing to contribute towards sustainable transitional justice solutions in South Sudan, based on contemporary standards and practice of transitional justice. Through historical, descriptive and analytical approaches, the paper grapples with South Sudan’s complex truth-seeking journey following years of multi-layered conflict. [less ▲]

Detailed reference viewed: 222 (10 UL)
Full Text
See detailChronique de droit des marchés financiers
Conac, Pierre-Henri UL

in Revue des Sociétés (2021)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailIntegrated STEAM Approach in Outdoor Trails with Elementary School Pre-service Teachers in Luxemburg
Haas, Ben; Kreis, Yves UL; Lavicza, Zsolt

in Journal of Educational Technology and Society (2021), 24(4), 205-219

Due to the COVID-19 pandemic it was impossible to carry out on-campus teaching and examinations as planned for the first-year elementary school Bachelor’s degree teacher training courses during the summer ... [more ▼]

Due to the COVID-19 pandemic it was impossible to carry out on-campus teaching and examinations as planned for the first-year elementary school Bachelor’s degree teacher training courses during the summer term of 2019/2020. Therefore, we moved our on-campus STEAM (Science, Technology, Engineering, Arts and Mathematics) related courses to schooling at home. For their course examination, students designed outdoor trails in groups with the educational technology MathCityMap based on an integrated STEAM approach. Hence, they combined STEAM with real-world situations (e.g., monuments, marketplaces, playgrounds). The tasks within the trails required the use of technologies such as augmented reality (AR), digital modelling (e.g., GeoGebra 3D Graphing Calculator), and GPS. Analogue measuring tools (e.g., triangle ruler) were also used in the task designs. We collected data from 21 trails with 259 tasks from 49 pre-service teachers to analyse the effects on professional growth in STEAM education. Through hierarchical cluster analysis we identified three different clusters with patterns regarding STEAM in outdoor trails. This paper will describe a pedagogical framework for the integrated STEAM approach to designing and evaluating outdoor trails. Furthermore, we will explain patterns pre-service teachers developed during this professional development. [less ▲]

Detailed reference viewed: 97 (8 UL)
Full Text
Peer Reviewed
See detailLocal Forms of Morphisms of Colored Supermanifolds
Covolo, Tiffany; Kwok, Stephen; Poncin, Norbert UL

in Journal of Geometry and Physics (2021), 168

Detailed reference viewed: 124 (1 UL)
Full Text
Peer Reviewed
See detailThe role of economic complexity on the formation of gender roles
Zanaj, Skerdilajda UL

E-print/Working paper (2021)

Detailed reference viewed: 46 (13 UL)
See detailErnährungssouveränität: Katzentisch statt Mitbestimmung
Adami, Joël; Reckinger, Rachel UL

Article for general public (2021)

Detailed reference viewed: 20 (3 UL)