Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailExpediting in Two-Echelon Spare Parts Inventory Systems
Drent, Melvin UL; Arts, Joachim UL

in Manufacturing and Service Operations Management (in press)

We consider a two-echelon spare parts inventory system consisting of one central warehouse and multiple local warehouses. Each warehouse keeps multiple types of repairable parts to maintain several types ... [more ▼]

We consider a two-echelon spare parts inventory system consisting of one central warehouse and multiple local warehouses. Each warehouse keeps multiple types of repairable parts to maintain several types of capital goods. The local warehouses face Poisson demand and are replenished by the central warehouse. We assume that unsatisfied demand is backordered at all warehouses. Furthermore, we assume deterministic lead times for the replenishments of the local warehouses. The repair shop at the central warehouse has two repair options for each repairable part: a regular repair option and an expedited repair option. Both repair options have stochastic lead times. Irrespective of the repair option, each repairable part uses a certain resource for its repair. Assuming a dual-index policy at the central warehouse and base stock control at the local warehouses, an exact and efficient evaluation procedure for a given control policy is formulated. To find an optimal control policy, we look at the minimization of total investment costs under constraints on both the aggregate mean number of backorders per capital good type and the aggregate mean fraction of repairs that are expedited per repair resource. For this non-linear non-convex integer programming problem, we develop a greedy heuristic and an algorithm based on decomposition and column generation. Both solution approaches perform very well with average optimality gaps of 1.56 and 0.23 percent, respectively, across a large test bed of industrial size. Based on a case study at Netherlands Railways, we show how managers can significantly reduce the investment in repairable spare parts when dynamic repair policies are leveraged to prioritize repair of parts whose inventory is critically low. [less ▲]

Detailed reference viewed: 626 (122 UL)
See detailL’expérience américaine de l’enseignement transétatique du droit
Cuniberti, Gilles UL

in Ancel, Pascal; Heuschling, Luc (Eds.) La transnationalisation de l’enseignement du droit (2016)

Detailed reference viewed: 35 (1 UL)
Peer Reviewed
See detailExperience Design for Digital Cultural Heritage
Morse, Christopher UL

Scientific Conference (2019, September)

The experience of visiting museums has evolved to extend beyond the walls of the institutions themselves into digital spaces, where online galleries, exhibitions, and virtual tours invite audiences to ... [more ▼]

The experience of visiting museums has evolved to extend beyond the walls of the institutions themselves into digital spaces, where online galleries, exhibitions, and virtual tours invite audiences to explore arts and culture from their personal devices. However, generating interest from the public around these platforms remains a challenge, and the digital experience rarely compares to an in-person visit. Building on research that demonstrates the effectiveness of emotional design as a way to generate public engagement with physical museum spaces and exhibitions, this project adopts a user-centered design approach to develop novel experiences around digitized museum collections. [less ▲]

Detailed reference viewed: 65 (6 UL)
Peer Reviewed
See detail«L'expérience du paysage»
Roelens, Nathalie UL

in Poésie et description (1999)

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailL'expérience gastronomique : comment faire signifier la nourriture
Colas-Blaise, Marion UL

in Indagini Semiotiche (2013), (14),

Detailed reference viewed: 135 (5 UL)
Peer Reviewed
See detail«L'expérience gustative au péril de ses excès»
Roelens, Nathalie UL

in Voir (2004)

Detailed reference viewed: 88 (3 UL)
Full Text
Peer Reviewed
See detailExperience matters: Bridging the gap between experience- and functionality-driven design in technology-enhanced learning
Rohles, Björn UL; Koenig, Vincent UL; Fischbach, Antoine UL et al

in International Journal on Interaction Design & Architecture(s) (2019), 42

With the growing importance of digital technologies in learning and assessment, it is important to consider user experience (UX) to ensure that tools provide useful functionalities for learning without ... [more ▼]

With the growing importance of digital technologies in learning and assessment, it is important to consider user experience (UX) to ensure that tools provide useful functionalities for learning without overwhelming users, to motivate users and ensure that they have positive learning experiences, and to allow users to realize their potential with the help of technology. Building on a case study of concept mapping for technology-enhanced learning, we combined experience-driven and functionality-driven approaches in co-design sessions in four school classes (67 students). We investigated the anticipated experiences that students imagined as well as the functionalities and characteristics they expected. We found that combining experience-driven and functionality-driven approaches is a valuable method for improving technology-enhanced learning. [less ▲]

Detailed reference viewed: 155 (11 UL)
Peer Reviewed
See detailThe experience of ageing: Views from without and within
Ferring, Dieter UL

in Rosa, Alberto; Valsiner, Jaan (Eds.) The Cambridge handbook of socio-cultural psychology (in press)

This chapter contrasts two different views on ageing. An external “view from without” starts in a first step with the description of phenomena associated with human ageing including the notions of death ... [more ▼]

This chapter contrasts two different views on ageing. An external “view from without” starts in a first step with the description of phenomena associated with human ageing including the notions of death and dying. This is followed by presenting an overview of central and mostly psychological models and theories about human ageing. Here, life span conceptions as well as theories on self-regulation of the ageing self are described and discussed. Furthermore, a specific focus is put on the differing qualifications that the term ageing has received in diverse theoretical models. The internal “view from within” finally starts with three case stories presenting excerpts of individual biographic narratives that highlight the importance of life events and adaptive processes within the family in the subjective construction of the self and the life course. The conclusion elaborates a person-centred approach in the study of human ageing taking into account that both family and culture interact in forming development in general as well as life in advancing age in particular. [less ▲]

Detailed reference viewed: 107 (26 UL)
Peer Reviewed
See detailThe Experience of Cognitive Intrusion of Pain: scale development and validation.
Attridge, Nina; Crombez, Geert; Van Ryckeghem, Dimitri UL et al

in Pain (2015), 156(10), 1978-90

Patients with chronic pain often report their cognition to be impaired by pain, and this observation has been supported by numerous studies measuring the effects of pain on cognitive task performance ... [more ▼]

Patients with chronic pain often report their cognition to be impaired by pain, and this observation has been supported by numerous studies measuring the effects of pain on cognitive task performance. Furthermore, cognitive intrusion by pain has been identified as one of 3 components of pain anxiety, alongside general distress and fear of pain. Although cognitive intrusion is a critical characteristic of pain, no specific measure designed to capture its effects exists. In 3 studies, we describe the initial development and validation of a new measure of pain interruption: the Experience of Cognitive Intrusion of Pain (ECIP) scale. In study 1, the ECIP scale was administered to a general population sample to assess its structure and construct validity. In study 2, the factor structure of the ECIP scale was confirmed in a large general population sample experiencing no pain, acute pain, or chronic pain. In study 3, we examined the predictive value of the ECIP scale in pain-related disability in fibromyalgia patients. The ECIP scale scores followed a normal distribution with good variance in a general population sample. The scale had high internal reliability and a clear 1-component structure. It differentiated between chronic pain and control groups, and it was a significant predictor of pain-related disability over and above pain intensity. Repairing attentional interruption from pain may become a novel target for pain management interventions, both pharmacologic and nonpharmacologic. [less ▲]

Detailed reference viewed: 49 (1 UL)
See detailThe Experience of Security in Human-Computer Interactions: Understanding Security Perceptions Through the Concept of User Experience
Distler, Verena UL

Doctoral thesis (2021)

In traditional interactions that do not rely on technology, most people are able to assess risks to their privacy and security and understand how to mitigate these risks. However, risk assessment and ... [more ▼]

In traditional interactions that do not rely on technology, most people are able to assess risks to their privacy and security and understand how to mitigate these risks. However, risk assessment and mitigation is more challenging when interacting with technology, and people’s perceptions of security and privacy risks are not always aligned with reality. It is important for those who design technologies to understand how people perceive the security of technologies in order to avoid having their designs contribute to erroneous perceptions. Instead, interactions with technology should be deliberately designed to ensure that people do not over- or underestimate the security provided by the system. This dissertation contributes to a better understanding of users’ perceptions of security in human-computer interactions. It investigates which factors induce a perception of security and privacy risks and how user-centered design can influence these factors to deliberately design for or against perceived security. I use a mixed-methods approach to address these objectives, including a systematic literature review, empirical data collection with focus groups, expert co-creation sessions, user tests in a controlled environment and a quantitative survey experiment. The first research objective is to analyze how security and privacy researchers induce a perception of security and privacy risks with research participants. We conducted a systematic literature review and focused our analysis on study methods; risk representation; the use of prototypes, scenarios, and educational interventions; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy. The second research objective is to explore the factors that contribute to the acceptance of privacy and security risks in situations where people need to weigh the potential advantages of a technology against its associated privacy or security risks. We conducted a series of focus groups and highlighted the reasons why people accept compromises to their privacy and security, finding that perceived usefulness and the fulfilment of the psychological needs for autonomy and control were important factors. Our results suggest potential links between technology acceptance models and user experience models in the context of privacy-relevant interactions. The third research objective is to design and evaluate examples of visible representations of security mechanisms, with a focus on encryption. We studied the effects of these visual and textual representations empirically to understand the impact of these visible security mechanisms on user experience, perceptions of security and users’ understanding of encryption. We addressed this question in a series of studies, both lab studies and online experiments. In a vignette experiment, we find that more complex descriptions of encryption can lead to a better understanding and higher perceived security when designed carefully. However, we find no effect of novel visualizations of encryption on user experience (UX), perceived security or understanding of encryption. The fourth objective is to explore how we might make the link from subjective experience to more secure behaviors. We introduce a new framework of security-enhancing friction design. The framework suggests helping users behave more securely by designing for moments of negative UX in security-critical situations while also ensuring that overall UX remains at an acceptable level to avoid disuse of secure technologies. Overall, this doctoral dissertation contributes to research in the field of human-computer interaction, and more specifically, usable privacy and security. It improves our understanding of the methods used by researchers in the field of usable privacy and security use to create a perception of risk, and the factors that make people accept or reject certain privacy trade-offs. This dissertation also makes contributions to helping researchers and creators of technology understand how their designs influence perceptions of security, UX and understanding of encryption. This enables them to design for or against a perception of security, depending on the actual level of security provided by the technology. Finally, we conceptualize security-enhancing friction, a framework that suggests helping users to behave more securely by designing for moments of negative UX. [less ▲]

Detailed reference viewed: 103 (13 UL)
See detailExpérience religieuse et modernité
Sosoe, Lukas UL

Scientific Conference (2015, April)

Detailed reference viewed: 61 (0 UL)
Full Text
Peer Reviewed
See detailAn Experience Report On Applying Software Testing Academic Results In Industry: We Need Usable Automated Test Generation
Arcuri, Andrea UL

in Empirical Software Engineering (2018), 23(4),

What is the impact of software engineering research on current practices in industry? In this paper, I report on my direct experience as a PhD/post-doc working in software engineering research projects ... [more ▼]

What is the impact of software engineering research on current practices in industry? In this paper, I report on my direct experience as a PhD/post-doc working in software engineering research projects, and then spending the following five years as an engineer in two different companies (the first one being the same I worked in collaboration with during my post-doc). Given a background in software engineering research, what cutting-edge techniques and tools from academia did I use in my daily work when developing and testing the systems of these companies? Regarding validation and verification (my main area of research), the answer is rather short: as far as I can tell, only FindBugs. In this paper, I report on why this was the case, and discuss all the challenging, complex open problems we face in industry and which somehow are ``neglected'' in the academic circles. In particular, I will first discuss what actual tools I could use in my daily work, such as JaCoCo and Selenium. Then, I will discuss the main open problems I faced, particularly related to environment simulators, unit and web testing. After that, popular topics in academia are presented, such as UML, regression and mutation testing. Their lack of impact on the type of projects I worked on in industry is then discussed. Finally, from this industrial experience, I provide my opinions about how this situation can be improved, in particular related to how academics are evaluated, and advocate for a greater involvement into open-source projects. [less ▲]

Detailed reference viewed: 255 (20 UL)
Full Text
Peer Reviewed
See detailExperience report: How to extract security protocols’ specifications from C libraries
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (2018, June)

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code ... [more ▼]

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code, and with little or no help from the developers to better understand it. Security protocols implementations frequently use services provided by libraries coded in the C programming language; automatic tools for codelevel reverse engineering offer good support to comprehend the behavior of code in object-oriented languages but are ineffective to deal with libraries in C. Here we propose a systematic, yet human-dependent approach, which combines the capabilities of state-of-the-art tools in order to help the analyst to retrieve, step by step, the security protocol specifications from a library in C. Those specifications can then be used to create the formal model needed to carry out the analysis. [less ▲]

Detailed reference viewed: 191 (31 UL)
Full Text
See detailL’expérience utilisateur : Relations entre utilisabilité et esthétique, affects et comportements dans une tâche de recherche d’information sur tablettes numériques
Pere, Maxime UL

Bachelor/master dissertation (2016)

While the study of human-machine interactions is fairly well established regarding usability dimensions, the approach of the user experience, more recent, incorporates new dimensions in order to bring to ... [more ▼]

While the study of human-machine interactions is fairly well established regarding usability dimensions, the approach of the user experience, more recent, incorporates new dimensions in order to bring to light on these interactions. This work takes part in this approach and aims to clarify the relationship between a non-functional quality and a functional quality of a system, the main effect of these qualities on the affects experienced during the interaction with the system and finally the effect of the system qualities on behaviours. A research information task on 4 Websites corresponding to both crossed variables, aesthetics (high vs low) and usability (high vs low), should allow us to explore these questions through self-reports measures and behavioural recording. In addition, we attempt to identify relevant indicators which have not been used much yet. This study is run on touch tablet computers on Windows systems. [less ▲]

Detailed reference viewed: 178 (15 UL)
Full Text
Peer Reviewed
See detailL’expérience utilisateur : un concept sans consensus? Enquête sur le point de vue des professionnels
Lallemand, Carine UL; Gronier, Guillaume; Koenig, Vincent UL

in van de Leemput, Cécile; Chauvin, Christine; Hellemans, Catherine (Eds.) Activités humaines, Technologies et Bien-être (2013)

Depuis une dizaine d’années, le concept d’expérience utilisateur (UX) se répand dans le domaine des Interactions Homme-Machine (IHM). Centré sur l’utilisateur et son expérience subjective vécue de ... [more ▼]

Depuis une dizaine d’années, le concept d’expérience utilisateur (UX) se répand dans le domaine des Interactions Homme-Machine (IHM). Centré sur l’utilisateur et son expérience subjective vécue de l’interaction avec un système interactif, l’UX s’intéresse, entre autres, aux aspects émotionnels, hédoniques ou encore esthétiques composant l’interaction. Cependant, bien que déjà très utilisé par les professionnels, ce concept souffre notamment d’un manque de recherche empirique. De plus, de nombreuses définitions et perspectives sur l’UX cohabitent sans donner lieu à un consensus scientifique clair. Or, pour progresser dans ce champ de recherche, l’enseigner, ou pour communiquer sur celui-ci, il est nécessaire de mieux le comprendre et le délimiter. Une enquête par questionnaire (adaptée de Law et al., 2009) réalisée sur 758 professionnels et chercheurs de plus de 35 nationalités permet de mieux comprendre comment ce concept est compris et utilisé à travers le monde. Les résultats montrent des divergences entre les profils des participants. [less ▲]

Detailed reference viewed: 193 (5 UL)
Peer Reviewed
See detailL’expérience utilisateur de l’évaluation numérique: un facteur des performances mesurées ?
Pere, Maxime UL

Scientific Conference (2018, January)

Detailed reference viewed: 119 (13 UL)
Full Text
Peer Reviewed
See detailExperience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering
Garousi, Vahid UL; Felderer, Michael

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June)

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction ... [more ▼]

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction is one of the main phases (activities) when conducting an SM or an SLR, whose objective is to extract required data from the primary studies and to accurately record the information researchers need to answer the questions of the SM/SLR study. Based on experience in a large number of SM/SLR studies, we and many other researchers have found the data extraction in SLRs to be time consuming and error-prone, thus raising the real need for heuristics and guidelines for effective and efficient data extraction in these studies, especially to be learnt by junior and young researchers. As a ‘guideline’ paper, this paper contributes a synthesized list of challenges usually faced during SLRs’ data extraction phase and the corresponding solutions (guidelines). For our synthesis, we consider two data sources: (1) the pool of 16 SLR studies in which the authors have been involved in, as well as (2) a review of challenges and guidelines in the existing literature. Our experience in utilizing the presented guidelines in the near past have helped our junior colleagues to conduct data extractions more effectively and efficiently. [less ▲]

Detailed reference viewed: 152 (7 UL)
See detailExperiences and Perspectives of European Higher Education
Hoenig, Barbara UL

in Langer, Josef; Vlasic, Goran; Krce Miocic, Bozena (Eds.) EU Local Imprints: The Case of South Central Europe (2012)

Detailed reference viewed: 33 (4 UL)
Full Text
Peer Reviewed
See detailExpériences économiques de l’entre-deux-guerres et projets européistes
Clavert, Frédéric UL

in Guieu, Jean-Michel; Le Dréau, Christophe (Eds.) Autour du Congrès de l'Europe à La Haye (2009)

Expériences économiques de l’entre-deux-guerres et projets européistes. Publication du colloque « Autour du Congrès de l’Europe à La Haye », PIE – Peter Lang, 2009.

Detailed reference viewed: 45 (0 UL)
See detailExpériences migratoires et vieillissement au Luxembourg
Karl, Ute UL; Kühn, Boris; Ramos, Anne Carolina UL

in Aktiv am Liewen (2014), 49

Detailed reference viewed: 44 (1 UL)