Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
See detailInterview: E Liewen an Zwangsrekrutéierung a Gefaangenschaft
Ganschow, Inna UL; Elsen, Frank

Speeches/Talks (2020)

„Op deenen 320 Säite gëtt déi russesch Emigratioun op a bannent Lëtzebuerg erkläert. Ënnert anerem erzielen Eenzelpersounen a Familljen hir Geschichten.“

Detailed reference viewed: 22 (0 UL)
See detailInterview: International University Projects between Luxemburg and Tambov, Russia
Ganschow, Inna UL; Khomutova, Marina

Speeches/Talks (2019)

The interview treats two main topics: 1. the interdisciplinary student project between Universities of Luxembourg and University of Tambov, Russia, dedicated to the Luxembourgish-Russian crossroads of ... [more ▼]

The interview treats two main topics: 1. the interdisciplinary student project between Universities of Luxembourg and University of Tambov, Russia, dedicated to the Luxembourgish-Russian crossroads of history and 2. the meaning of the city of Tambov in the contemporary history of Luxembourg, connected to the Luxembourger forcibly recruited soldiers in the soviet captivity. [less ▲]

Detailed reference viewed: 25 (1 UL)
See detailInterview: Research on the Russian Migration at the University of Luxembourg
Ganschow, Inna UL; Khomutova, Marina

Speeches/Talks (2019)

Detailed reference viewed: 20 (0 UL)
See detailInterview: Who were "the first Russians" in Luxembourg?
Ganschow, Inna UL; Khomutova, Marina

Speeches/Talks (2019)

"The first Russian" in Luxembourg, which arrived in the 1920ths, were not the first ones. The pre-history of the Russian presence in the Grand Duchy before WWI and the further development regarding the ... [more ▼]

"The first Russian" in Luxembourg, which arrived in the 1920ths, were not the first ones. The pre-history of the Russian presence in the Grand Duchy before WWI and the further development regarding the two world wars and the post-war situation were the topic of this radio interview. [less ▲]

Detailed reference viewed: 105 (6 UL)
Full Text
See detailInterview: Women in Research
Ganschow, Inna UL

Conference given outside the academic context (2021)

We invite you to take part in a round table with international participation "My country - my Russia: a single educational space for young compatriots living abroad." The event will be held on March 21st ... [more ▼]

We invite you to take part in a round table with international participation "My country - my Russia: a single educational space for young compatriots living abroad." The event will be held on March 21st, 2021 at 12.00 (Moscow time) in the meeting room of the Academic Council of the Russian State Humanitarian University with the direct participation of the Ministry of Education of Russia, the Ministry of Science and Higher Education of the Russian Federation, the Federal Agency for the Commonwealth of Independent States, compatriots living abroad, and on international humanitarian cooperation and television representatives. Within the framework of the event, the presentation of the 18th season of the All-Russian competition of youth copyright projects and projects in the field of education aimed at the social and economic development of Russian territories "My country is my Russia" (hereinafter - the Competition), including the international nomination "The Commonwealth of Our Countries », Speeches of specialized experts and specialists. The event will be attended by organizers, experts, graduates of the Competition, as well as representatives of educational organizations and youth public associations from more than 40 countries (Australia, Egypt, Germany, USA, Turkey, etc.). The event will be held in a hybrid format: face-to-face participation is possible, as well as online connection. [less ▲]

Detailed reference viewed: 62 (0 UL)
Full Text
See detailInterweave/Underlay Cognitive Radio Techniques and Applications in Satellite Communication Systems
Sharma, Shree Krishna UL

Doctoral thesis (2014)

The demand for precious radio spectrum is continuously increasing while the available radio frequency resource has become scarce due to spectrum segmentation and the dedicated frequency allocation of ... [more ▼]

The demand for precious radio spectrum is continuously increasing while the available radio frequency resource has become scarce due to spectrum segmentation and the dedicated frequency allocation of standardized wireless systems. This scarcity has led to the concept of cognitive radio communication which comprises a variety of techniques capable of allowing the coexistence of licensed and unlicensed systems over the same spectrum. In this context, this thesis focuses on interweave and underlay cognitive radio paradigms which are widely considered as important enablers for realizing cognitive radio technology. In the interweave paradigm, an unlicensed user explores the spectral holes by means of some spectrum awareness methods and utilizes the available spectral availabilities opportunistically while in the underlay paradigm, an unlicensed user is allowed to coexist with the licensed user only if sufficient protection to the licensed user can be guaranteed. Starting with a detailed overview of the existing techniques, this thesis provides contributions in both theoretical and the practical aspects of these paradigms. This thesis is structured into two main parts as described below. One of the important capabilities required for a cognitive radio transceiver is to be able to acquire the knowledge of its surrounding radio environment in order to utilize the available spectral opportunities efficiently. The higher the level of information it can acquire, the better becomes the spectrum utilization. In this context, the first part of this thesis focuses on spectrum awareness techniques such as spectrum sensing, signal to noise ratio estimation and sparsity order estimation which are useful for realizing interweave and underlay based cognitive transceivers as well as a hybrid cognitive transceiver, which overcomes the drawbacks of both the above approaches. The effects of noise and channel correlations, which are often neglected in the existing literature, are considered in our analysis. In the above context, firstly, we propose new sensing thresholds for the eigenvalue based sensing approach using recent results from random matrix theory in order to achieve the improved sensing in correlated scenarios. Then we study the signal to noise ratio estimation problem for both narrowband and wideband transceivers with the help of a detailed theoretical analysis under the signal plus noise hypothesis for a range of correlated scenarios. Subsequently, we study the problem of compressive sparsity order estimation in order to estimate the sparsity order of the carrier occupancy over the wide spectrum using a compressive sensing approach. In addition, we carry out the performance analysis of a hybrid cognitive transceiver which combines the spectrum sensing approach with a power control-based underlay approach. The second part of this thesis introduces the concept of cognitive satellite communications which is a rather unexplored area in the literature despite its significant benefits to both satellite and terrestrial operators. This concept has been motivated due to the limited availability of the satellite spectrum as well as the continuously increasing demand of broadband multimedia, broadcast and interactive satellite services. Subsequently, we study the applications of various cognitive radio techniques in satellite communication systems focusing on the following two scenarios: (i) Hybrid cognitive satellite communication which deals with the spectral coexistence of satellite systems with the terrestrial systems, and (ii) Dual cognitive satellite communication which deals with the spectral coexistence of two satellite systems operating over the same coverage area. Understanding the characteristics of coexisting systems is of great importance while applying a suitable cognitive radio technique. In this context, this thesis exploits the specific characteristics of satellite systems in order to map a suitable cognitive radio technique to a specific scenario. For hybrid cognitive scenarios, we propose the following enabling techniques: (a) Interference modeling, (b) Harmful interference detection, (c) Cognitive beamforming including both transmit and receive beamforming, and (d) Dual-polarized spectrum sensing. Similarly, for dual cognitive scenarios, we propose the following techniques: (i) Cognitive interference alignment, (ii) Cognitive beamhopping, and (iii) Dual-polarized spectrum sensing. Finally, we provide interesting open research issues in the considered domain. [less ▲]

Detailed reference viewed: 818 (92 UL)
Full Text
Peer Reviewed
See detailInterword and intraword pause threshold in writing
Chenu, Florence; Pellegrino, François; Jisa, Harriet et al

in Frontiers in Psychology (2014), 5

Writing words in real life involves setting objectives, imagining a recipient, translating ideas into linguistic forms, managing grapho-motor gestures, etc. Understanding writing requires observation of ... [more ▼]

Writing words in real life involves setting objectives, imagining a recipient, translating ideas into linguistic forms, managing grapho-motor gestures, etc. Understanding writing requires observation of the processes as they occur in real time. Analysis of pauses is one of the preferred methods for accessing the dynamics of writing and is based on the idea that pauses are behavioral correlates of cognitive processes. However, there is a need to clarify what we are observing when studying pause phenomena, as we will argue in the first section. This taken into account, the study of pause phenomena can be considered following two approaches. A first approach, driven by temporality, would define a threshold and observe where pauses, e.g., scriptural inactivity occurs. A second approach, linguistically driven, would define structural units and look for scriptural inactivity at the boundaries of these units or within these units. Taking a temporally driven approach, we present two methods which aim at the automatic identification of scriptural inactivity which is most likely not attributable to grapho-motor management in texts written by children and adolescents using digitizing tablets in association with Eye and Pen© (Chesnet and Alamargot, 2005). The first method is purely statistical and is based on the idea that the distribution of pauses exhibits different Gaussian components each of them corresponding to a different type of pause. After having reviewed the limits of this statistical method, we present a second method based on writing dynamics which attempts to identify breaking points in the writing dynamics rather than relying only on pause duration. This second method needs to be refined to overcome the fact that calculation is impossible when there is insufficient data which is often the case when working with young scriptors. [less ▲]

Detailed reference viewed: 124 (3 UL)
Full Text
Peer Reviewed
See detailIntestinal-Cell Kinase and Juvenile Myoclonic Epilepsy.
Lerche, Holger; Berkovic, Sam F.; Lowenstein, Daniel H. et al

in New England Journal of Medicine (2019), 380(16), 24

With regard to the article by Bailey et al. (March 15, 2018, issue) on the potential role of variants in the gene encoding intestinal cell kinase (ICK) in genetic generalized epilepsies, including ... [more ▼]

With regard to the article by Bailey et al. (March 15, 2018, issue) on the potential role of variants in the gene encoding intestinal cell kinase (ICK) in genetic generalized epilepsies, including juvenile myoclonic epilepsy: We attempted replication by rechecking for enrichment of ICK variants in two previously published analyses of mainly familial cases of genetic generalized epilepsy, which included a total of 1149 cases of genetic generalized epilepsy and 5911 ethnically matched controls. We analyzed the burden of single-gene rare variants with the use of whole exome sequencing data, applying population stratification and both sample and variant quality control. We found no evidence of an enrichment of ICK variants in genetic generalized epilepsies or juvenile myoclonic epilepsy. Specifically, we did not detect a nonsynonymous variant in 357 persons with juvenile myoclonic epilepsy at a minor allele frequency at or below 0.1%. Although we cannot exclude the possibility that ICK variants may be population-specific risk factors for juvenile myoclonic epilepsy, the lack of validation in our cohorts does not support a true disease association but rather suggests that the authors’ results may be due to chance, possibly owing to methodologic issues (see the Supplementary Appendix, available with the full text of this letter at NEJM.org). [less ▲]

Detailed reference viewed: 201 (9 UL)
Full Text
Peer Reviewed
See detailIntJect: Vulnerability Intent Bug Seeding
PETIT, Benjamin; Khanfir, Ahmed UL; Soremekun, Ezekiel UL et al

in 22nd IEEE International Conference on Software Quality, Reliability, and Security (2022)

Studying and exposing software vulnerabilities is important to ensure software security, safety, and reliability. Software engineers often inject vulnerabilities into their programs to test the ... [more ▼]

Studying and exposing software vulnerabilities is important to ensure software security, safety, and reliability. Software engineers often inject vulnerabilities into their programs to test the reliability of their test suites, vulnerability detectors, and security measures. However, state-of-the-art vulnerability injection methods only capture code syntax/patterns, they do not learn the intent of the vulnerability and are limited to the syntax of the original dataset. To address this challenge, we propose the first intent-based vulnerability injection method that learns both the program syntax and vulnerability intent. Our approach applies a combination of NLP methods and semantic-preserving program mutations (at the bytecode level) to inject code vulnerabilities. Given a dataset of known vulnerabilities (containing benign and vulnerable code pairs), our approach proceeds by employing semantic-preserving program mutations to transform the existing dataset to semantically similar code. Then, it learns the intent of the vulnerability via neural machine translation (Seq2Seq) models. The key insight is to employ Seq2Seq to learn the intent (context) of the vulnerable code in a manner that is agnostic of the specific program instance. We evaluate the performance of our approach using 1275 vulnerabilities belonging to five (5) CWEs from the Juliet test suite. We examine the effectiveness of our approach in producing compilable and vulnerable code. Our results show that INTJECT is effective, almost all (99%) of the code produced by our approach is vulnerable and compilable. We also demonstrate that the vulnerable programs generated by INTJECT are semantically similar to the withheld original vulnerable code. Finally, we show that our mutation-based data transformation approach outperforms its alternatives, namely data obfuscation and using the original data. [less ▲]

Full Text
Peer Reviewed
See detailInto the ground
Hesse, Markus UL

in Arch + (2018), (231), 78-83

How the financialization of property markets and land use puts cities under pressure.

Detailed reference viewed: 182 (22 UL)
See detailInto the wild? Freie Dramaturgie und freie Szene
Tropper, Elisabeth UL

Conference given outside the academic context (2011)

Detailed reference viewed: 67 (2 UL)
Full Text
Peer Reviewed
See detailInto the Μaze of Legitimacy and Efficiency; the Single Resolution Board as a Necessity
Asimakopoulos, Ioannis UL; Lamaris-Adamis, Christos

in Dogaru, Tatiana-Camelia (Ed.) (Re)forming Public Administration Paradigms in Global Governance Context (2018)

Detailed reference viewed: 122 (8 UL)
Peer Reviewed
See detailDie Intonation final fallender Nuklei. Eine kontrastive Untersuchung zum Hamburgischen und Berlinischen
Gilles, Peter UL

in Germanistische Linguistik (2001), 157-158

Detailed reference viewed: 108 (2 UL)
See detailIntonation regionaler Varietäten des Deutschen. Vorstellung eines Forschungsprojekts
Auer, Peter; Gilles, Peter UL; Peters, Jörg et al

in Stellmacher, Dieter (Ed.) Dialektologie zwischen Tradition und Neuansätzen. Beiträge der Internationalen Dialektologentagung. Göttingen, 19.-21. Oktober 1998 (2000)

Detailed reference viewed: 138 (2 UL)
Full Text
See detailIntorno al-i concetto-i di datore di lavoro. A proposito di The Concept of The Employer di Jeremias Prassl
Ratti, Luca UL

in Giornale di Diritto del Lavoro e di Relazioni Industriali (2016)

Detailed reference viewed: 214 (5 UL)
Full Text
Peer Reviewed
See detailIntra-household allocation with shared expenditure choices: experimental evidence from Filipino migrants
Joxhe, Majlinda UL; De Arcangelis, Giuseppe

in Review of Economics of the Household (2020)

This paper shows that sharing information concerning expenditure choices between a migrant and the recipient affects the migrant’s allocation patterns. In a lab-in-the-field experiment, Filipino migrants ... [more ▼]

This paper shows that sharing information concerning expenditure choices between a migrant and the recipient affects the migrant’s allocation patterns. In a lab-in-the-field experiment, Filipino migrants are asked to earmark an in-kind budget to be delivered to their most closely connected household (MCCH). When the MCCH is fully aware of the migrant’s decisions (i.e., symmetric information), we observe that the migrant raises the portion for consumption goods in the range of 10.0-10.5% with respect to the case when the migrant’s choices are not disclosed (i.e., asymmetric information). Moreover, when sharing information, the migrant relies on more involvement of the recipient household and lowers by 7-9% the allocation to expenses she could monitor ex-post more strictly. The former result is consistent with the signaling motive, whereas the latter supports the presence of strategic behavior by the migrant remitter. These findings are more significant for intra- rather than inter-household transfers and provide insights for conditional cash transfer policies. [less ▲]

Detailed reference viewed: 61 (6 UL)
Full Text
See detailThe Intra-Party Effects of Open List Design
Schmit, Dan UL

Doctoral thesis (2021)

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailIntra-query Adaptivity for MapReduce Query Processing Systems
Lucas Filho, Edson Ramiro UL; Cunha De Almeida, Eduardo UL; Le Traon, Yves UL

in IDEAS 2014 : 18th International Database Engineering Applications Symposium (2014)

Detailed reference viewed: 309 (8 UL)
Full Text
Peer Reviewed
See detailIntracellular metabolite profiling of platelets: evaluation of extraction processes and chromatographic strategies.
Paglia, Giuseppe; Magnusdottir, Manuela; Thorlacius, Steinunn et al

in Journal of Chromatography. B, Analytical Technologies in the Biomedical and Life Sciences (2012), 898

An extraction method for intracellular metabolite profiling should ideally be able to recover the broadest possible range of metabolites present in a sample. However, the development of such methods is ... [more ▼]

An extraction method for intracellular metabolite profiling should ideally be able to recover the broadest possible range of metabolites present in a sample. However, the development of such methods is hampered by the diversity of the physico-chemical properties of metabolites as well as by the specific characteristics of samples and cells. In this study, we report the optimization of an UPLC-MS method for the metabolite analysis of platelet samples. The optimal analytical protocol was determined by testing seven different extraction methods as well as by employing two different LC-MS methods, in which the metabolites were separated by using hydrophilic interaction liquid chromatography (HILIC) and reversed phase liquid chromatography (RPLC). The optimal conditions were selected using the coverage of the platelets' metabolome, the response of the identified metabolites, the reproducibility of the analytical method, and the time of the analysis as main evaluation criteria. Our results show that methanol-water (7:3) extraction coupled with HILIC-MS method provides the best compromise, allowing identification of 107 metabolites in a platelet cell extract sample, 91% of them with a RSD% lower than 20. A higher number of metabolites could be detected when analyzing the platelet samples with two different LC-MS methods or when using complementary extraction methods in parallel. [less ▲]

Detailed reference viewed: 135 (2 UL)