Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailAvant-propos in Malaise dans la ville
Freyermuth, Sylvie UL; Bonnot, Jean-François Pierre

in Freyermuth, Sylvie; Bonnot, Jean-François Pierre (Eds.) Malaise dans la ville (2014)

Detailed reference viewed: 62 (4 UL)
Peer Reviewed
See detail« Avant-Propos »
Roelens, Nathalie UL

in Jacques Derrida et l’esthétique (2000)

Detailed reference viewed: 22 (3 UL)
Full Text
Peer Reviewed
See detailAvant-propos. Habiter l’espace post-yougoslave
Blondel, Cyril UL; Javourez, Guillaume; van Effenterre, Marie

in Revue d'Etudes Comparatives Est-Ouest (2015), 46(4), 7-34

Detailed reference viewed: 90 (19 UL)
Full Text
Peer Reviewed
See detailAvant-Propos: Les systèmes d'aide au vote: défis et potentialités
Dumont, Patrick UL; Kies, Raphaël UL

in Revue Internationale de Politique Comparée (2015), 23(2), 159-174

Detailed reference viewed: 85 (27 UL)
Full Text
Peer Reviewed
See detailThe AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures
Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran UL et al

in Proceedings of 18th International Conference "Tools and Algorithms for the Construction and Analysis of Systems", as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. (2012)

The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of ... [more ▼]

The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our custom languages) and features three validation backends (CL-AtSe, OFMC, and SATMC), which provide a range of complementary automated reasoning techniques (including service orchestration, compositional reasoning, model checking, and abstract interpretation). We have applied the platform to a large number of industrial case studies, collected into the AVANTSSAR Library of validated problem cases. In doing so, we unveiled a number of problems and vulnerabilities in deployed services. These include, most notably, a serious flaw in the SAML-based Single Sign-On for Google Apps (now corrected by Google as a result of our findings). We also report on the migration of the platform to industry. [less ▲]

Detailed reference viewed: 112 (5 UL)
Peer Reviewed
See detailAvatar Sex Moderates Aggression in Violent Video Games, But Only for Women
Melzer, André UL; Schmidt, Alexander F.

Poster (2017, September 07)

Three studies tested findings reported by Yang, Huesmann, and Bushman (2014) that playing a male avatar in a violent video game leads to greater aggression than playing a female avatar in the same game ... [more ▼]

Three studies tested findings reported by Yang, Huesmann, and Bushman (2014) that playing a male avatar in a violent video game leads to greater aggression than playing a female avatar in the same game. The male avatar effect was confirmed in Study 1 (N=79) for post-game aggression: compared to playing a female character, participants who had played the male fighter in a violent mixed martials arts game chose more Hot Sauce for another participant who allegedly disliked spicy food. In contrast to Yang et al. (2014), however, the male avatar effect was qualified by participant sex, indicating that the effect was more strongly pronounced and only significant for female participants. A similar interaction effect was observed in Study 2 (N=76) and Study 3 (N=70) for in-game aggression: only female participants playing a male avatar showed a greater hit ratio in a mixed martials arts game (Study 2) or a greater number of attacks in a brawler game (Study 3) than their colleagues who played a female avatar. At this stage, the reason for this cross-gender effect is unclear. Given that games allow for behavior (i.e., aggression) independent of socially shared gender norms, we may speculate that for women, male avatars may provide the opportunity to “step out” of prevailing social norms regarding non-aggressive female behavior and adopt the role of the (hyper-)aggressive male. However, this hypothesis needs to be tested in future studies. All three studies additionally tested the mediating effect of male gender stereotype activation that was hypothesized by Yang et al. (2014). In addition to priming violent behavior, and in line with the General Aggression Model, the authors had speculated that playing the male avatar automatically activated male gender stereotypes (i.e., aggressive thoughts and behavior) which then caused aggressive behavior. In order to address this activation hypothesis, we designed an indirect cognitive measure of gender role identity using the Positive-Negative Sex-Role Inventory (PN-SRI: Berger & Krahé, 2013). After participants played the violent game, positive and negative aspects of masculinity and femininity were presented as word fragments in a five-minute response window in Study 1 and 2. Fragment completion rates served as indicators of cognitive activation of male stereotypes. In Study 3, participants used the intact PN-SRI gender attributes to rate the avatar after playing the game. However, both direct and indirect measures failed to corroborate the stereotype activation hypothesis in the present studies: word fragments related to male stereotypes were not completed more often than fragments related to female stereotypes (Study 1 and 2). Also, neither in-game aggression nor success in the game was associated with how masculine participants perceived their fighter (Study 3). At the present stage, thus, the mechanisms underlying the gender effect that participants respond differently when playing a male or female avatar in a violent video game remain unclear. [less ▲]

Detailed reference viewed: 568 (3 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 177 (18 UL)
See detailAVEC BNT - Analysis and Comparison of European and Chinese Design Codes - B. Script & Examples
Schäfer, Markus UL; Zhang, Qingjie UL; Bender, Michel et al

Book published by BNT (2018)

In recent years, half of the newly constructed building floor areas in the world are built in China, thus it is important and interesting to know the Chinese design codes for buildings and compare them ... [more ▼]

In recent years, half of the newly constructed building floor areas in the world are built in China, thus it is important and interesting to know the Chinese design codes for buildings and compare them with Eurocodes, which are one of the most advanced design codes in the world. Funded by “Erasmus+ Strategic Partnerships” the project “AVEC BNT” was started in 2016 to compare the design codes mainly related to concrete structures and composite structures. This script is the main intellectual outputs from this project. It comprises codes background analysis, direct codes terms comparison and design examples. The script covers most of the design topics related to design of concrete structures and composite structure for building design as well as the design basics such as safety concept. It is a common achievements of students, researchers and professors from different universities and instructions of different countries. The main work is done at University of Luxembourg especially for the design basics part and the design of composite structure of steel and concrete. For design of concrete structure part, University of Applied Science Trier (Germany) and Thei (Hong Kong, China) has offered great helps and contributed many parts. To conform with the goals of Erasmus+ to promote the cooperation and mobility with the EU’ partner countries and to promote the sustainable development of its partners in the field of higher education and contribute to achieving the objectives of the EU Youth Strategy, the script involves many student’s work. The students could participate in the project through either joining special courses offered by the project partners, as well as, doing a student project, bachelor or master thesis related to this project. Further more the students participated within the transnational teaching activity weeks. With the guidance, the students were able to learn and compare difference design methods by EuroCodes and Chinese design codes and to cooperate with their colleges from different countries. To achieve good quality of the final script, which can be used as additional information and learn material for other students and engineers to learn about Eurocodes and Chinese codes for structural design. Also the work was edited into a uniform formatting to make it constant in style and easy to read. Although, besides the contribution from students, many other topics were added to make the documents complete, it was not possible to cover every topic in the codes due to the limited time and resources. Thus, topics such as fire design, seismic design, bridge design, pre-stressed structures and others are not within the scope of the work. The scripts are divided into 7 sub chapters and many small topics. Each topic has two main documents for Eurocodes and Chinese codes. The main documents have same list of contents, which allows readers to compare the design aspects from the two codes systems easily side by side. Besides that, each topic is also provided with a general summary of comparison, which points out the most important difference and general overview of the design. In the documents not only the content of the codes but also the background information is discussed, which will help students and engineers to understand not only the difference of design but also the reasons behind it. [less ▲]

Detailed reference viewed: 106 (6 UL)
Full Text
Peer Reviewed
See detailAvec Hjelmslev et Zilberberg au cinéma : intensités de l’audio-vision, rhétoriques audiovisuelles
Tore, Gian Maria UL

in Ablali, Driss; Badir, Sémir (Eds.) Analytiques du sensible. Pour Claude Zilberberg (2009)

Detailed reference viewed: 29 (0 UL)
Full Text
See detailAvec le bonjour de Napoléon et de Jean-Théodore Laurent
Scuto, Denis UL

Article for general public (2015)

Weekly column on contemporary history ("L'histoire du temps présent") in Luxembourg newspaper Tageblatt, here on history of relations between Catholic Church and State in Luxembourg (19th-21st century)

Detailed reference viewed: 63 (1 UL)
Full Text
See detailAvec le bonjour de René Schneider
Scuto, Denis UL

Article for general public (2016)

Detailed reference viewed: 83 (4 UL)
Full Text
See detailL'avenir de la famille : Analyse sous l'angle de l'égalité de traitement (Rapport luxembourgeois)
Chaouche, Fatima UL

Presentation (2017)

Un nombre croissant de communautés de vie existent en dehors du mariage, en particulier les concubins, mais également les familles recomposées, les familles monoparentales ou les partenaires de même sexe ... [more ▼]

Un nombre croissant de communautés de vie existent en dehors du mariage, en particulier les concubins, mais également les familles recomposées, les familles monoparentales ou les partenaires de même sexe. Or, la législation suisse privilégie l’institution du mariage, au détriment d’autres formes de communautés de vie et en décalage avec l’évolution de la société. Cette situation provoque des traitements différenciés entre les individus fondés sur le sexe ou sur le choix d’un mode de vie. Elle conduit également à choisir l’institution du mariage pour bénéficier de ses effets en droit public, au détriment du principe d’autonomie et, parfois, des convictions personnelles. Ce projet a pour but d’examiner l’opportunité d’une reconnaissance juridique des autres communautés de vie. Le débat sur une modernisation du droit de la famille existe en Suisse depuis de nombreuses années sous l’angle du droit civil. Il a été notamment relancé en 2014, suite à la publication de trois expertises mandatées par l’Office fédéral de la justice sur le thème de l’avenir du droit de la famille en Suisse. La discussion doit toutefois se poursuivre en dehors du droit privé, afin d’obtenir une vision globale des effets de droits publics accordés à certaines formes de communautés de vie dans les domaines tels que les assurances sociales, le droit des étrangers, le droit fiscal. Cette analyse constitue le préalable nécessaire vers un examen plus large visant à identifier un ou plusieurs critères de rattachement plus respectueux du principe de l’égalité de traitement ancré à l’art. 8 de la Constitution fédérale. Pour permettre la cohérence d’une telle réflexion, fondée sur l’évolution de la société, la comparaison internationale est nécessaire. Elle permet, d’une part, de s’inspirer de solutions convaincantes déjà adoptées par certains pays et, d’autre part, d’intégrer les questions de droit international privé auxquelles la Suisse est confrontée en raison d’autres communautés de vie déjà reconnues juridiquement à l’étranger et susceptibles d’arriver en Suisse, compte tenu des flux migratoires. Une telle comparaison devra dès lors notamment se réaliser à l’aide d’un réseau d’experts de l’étranger. Une étude portant sur le droit de la famille ne doit pas se limiter à reconnaître les différentes communautés de vie, mais doit conduire à une analyse systématique des conditions applicables à ces communautés dans différents domaines juridiques. Elle doit avoir pour fil rouge le principe de l’égalité de traitement, de manière à déterminer si les distinctions fondées sur le mode de vie, l’orientation sexuelle ou le sexe se justifient encore aujourd’hui. A l’issue de ces considérations, des propositions de modifications législatives pourront être formulées dans le respect du principe de l’égalité de traitement. cf. https://libra.unine.ch/Projets/Par-ann%E9e/Y-2016/32271 [less ▲]

Detailed reference viewed: 84 (19 UL)
Full Text
Peer Reviewed
See detailAversive associative conditioning of prepulses in a startle inhibition paradigm
Nees, F.; Hahn, M.; Schulz, André UL et al

in Psychophysiology (2009), 46(3), 481-486

Detailed reference viewed: 62 (0 UL)
Full Text
Peer Reviewed
See detailAviophobia: evaluation of a treatment program reducing the anxiety of flying.
Steffgen, Georges UL; Recchia, Sophie UL; Kinnen, Danielle

in International Journal of Psychiatry in Clinical Practice (2012), 16

Detailed reference viewed: 108 (0 UL)
Full Text
See detailAvis juridiques indépendants en cas de délégation par un dépositaire d'OPCVM
Riassetto, Isabelle UL

in Revue de Droit Bancaire et Financier (2019), (1), 64

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailAvis sur l'Avant-projet de loi portant organisation du Conseil national de la justice
Heuschling, Luc UL

in Hess, Burkhard (Ed.) Judicial Reforms in Luxembourg and Europe (2014)

Detailed reference viewed: 160 (9 UL)
Full Text
See detailL'avocat et l'historien
Scuto, Denis UL

Article for general public (2015)

Weekly column on contemporary history ("L'histoire du temps présent") in Luxembourg newspaper Tageblatt, here on an open letter of lawyer Gaston Vogel about the Artuso Report on collaboration between ... [more ▼]

Weekly column on contemporary history ("L'histoire du temps présent") in Luxembourg newspaper Tageblatt, here on an open letter of lawyer Gaston Vogel about the Artuso Report on collaboration between Luxembourgish authorities and German occupying forces in antisemitic persecutions [less ▲]

Detailed reference viewed: 54 (2 UL)
Full Text
Peer Reviewed
See detailAvoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control
Volp, Marcus UL; Lackorzynski, Adam; Decouchant, Jérémie UL et al

Scientific Conference (2016, December 12)

Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified ... [more ▼]

Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified vulnerabilities that allow an untrusted management OS to extract secret information from Intel SGX's enclaves, and to violate their integrity by exploiting concurrency bugs. In this work, we re-investigate delayed preemption (DP) in the context of Intel SGX. DP is a mechanism originally proposed for L4-family microkernels as disable-interrupt replacement. Recapitulating earlier results on language-based information-flow security, we illustrate the construction of leakage-free code for enclaves. However, as long as adversaries have fine-grained control over preemption timing, these solutions are impractical from a performance/complexity perspective. To overcome this, we resort to delayed preemption, and sketch a software implementation for hypervisors providing enclaves as well as a hardware extension for systems like SGX. Finally, we illustrate how static analyses for SGX may be extended to check confidentiality of preemption-delaying programs. [less ▲]

Detailed reference viewed: 320 (28 UL)