Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailMultidimensionality of developmental conceptions
Mustafic, Maida UL; Freund, Alexandra M.

Scientific Conference (2012, September)

Detailed reference viewed: 41 (19 UL)
Full Text
Peer Reviewed
See detailMultidimensionality of Younger and Older Adults' Age Stereotypes: The Interaction of Life Domain and Adjective Dimension
Kuhlmann, Beatrice G.; Kornadt, Anna Elena UL; Bayen, Ute J. et al

in Journals of Gerontology. Series B, Psychological Sciences and Social Sciences (2017), 72(3), 436-440

Objectives: The authors investigated the sources of age-stereotype multidimensionality with the help of personal everyday statements that differed with respect to life domain (e.g., family and partnership ... [more ▼]

Objectives: The authors investigated the sources of age-stereotype multidimensionality with the help of personal everyday statements that differed with respect to life domain (e.g., family and partnership vs financial matters) and the adjective dimension reflected in the behavior (e.g., autonomous vs instrumental behavior). Method: A total of 368 statements reflecting autonomy-, instrumentality-, or integrity-related behaviors in five different life domains were generated. Sixty-nine younger (18-26 years) and 74 older (60-84 years) participants rated the typicality of each statement for either a "young adult" or an "old adult." Results: Occurrence and direction of age stereotypes varied by life domain and adjective dimension and ultimately depended on the specific combination of both factors (i.e., a significant interaction). For example, old adults were expected to be optimistic about religious aspects but not about their health, fitness, and appearance. Discussion: The findings highlight the multidimensionality and complexity of age stereotypes based on a wide array of personal everyday statements. [less ▲]

Detailed reference viewed: 49 (1 UL)
See detailMultidisciplinary investigations into offences against the financial interests of the EU: a quest for an integrated enforcement concept
Ligeti, Katalin UL; Simonato, Michele UL

in Galli, Francesca; Weyembergh, Anne (Eds.) Do labels still matter? Blurring boundaries between administrative and criminal law. The influence of the EU (2014)

Detailed reference viewed: 339 (24 UL)
Full Text
Peer Reviewed
See detailMultifaceted automated analyses for variability-intensive embedded systems
Lazreg, Sami; Cordy, Maxime UL; Collet, Philippe et al

in Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019, May)

Detailed reference viewed: 54 (2 UL)
Peer Reviewed
See detailMultifaceted Educational Pathways: Variation and Impact of Social Background in Switzerland
Hupka-Brunner, Sandra; Samuel, Robin UL; Bergman, Manfred Max

Scientific Conference (2010)

Detailed reference viewed: 46 (0 UL)
Full Text
See detailA multifaceted formal analysis of end-to-end encrypted email protocols and cryptographic authentication enhancements
Vazquez Sandoval, Itzel UL

Doctoral thesis (2020)

Largely owing to cryptography, modern messaging tools (e.g., Signal) have reached a considerable degree of sophistication, balancing advanced security features with high usability. This has not been the ... [more ▼]

Largely owing to cryptography, modern messaging tools (e.g., Signal) have reached a considerable degree of sophistication, balancing advanced security features with high usability. This has not been the case for email, which however, remains the most pervasive and interoperable form of digital communication. As sensitive information (e.g., identification documents, bank statements, or the message in the email itself) is frequently exchanged by this means, protecting the privacy of email communications is a justified concern which has been emphasized in the last years. A great deal of effort has gone into the development of tools and techniques for providing email communications with privacy and security, requirements that were not originally considered. Yet, drawbacks across several dimensions hinder the development of a global solution that would strengthen security while maintaining the standard features that we expect from email clients. In this thesis, we present improvements to security in email communications. Relying on formal methods and cryptography, we design and assess security protocols and analysis techniques, and propose enhancements to implemented approaches for end-to-end secure email communication. In the first part, we propose a methodical process relying on code reverse engineering, which we use to abstract the specifications of two end-to-end security protocols from a secure email solution (called pEp); then, we apply symbolic verification techniques to analyze such protocols with respect to privacy and authentication properties. We also introduce a novel formal framework that enables a system's security analysis aimed at detecting flaws caused by possible discrepancies between the user's and the system's assessment of security. Security protocols, along with user perceptions and interaction traces, are modeled as transition systems; socio-technical security properties are defined as formulas in computation tree logic (CTL), which can then be verified by model checking. Finally, we propose a protocol that aims at securing a password-based authentication system designed to detect the leakage of a password database, from a code-corruption attack. In the second part, the insights gained by the analysis in Part I allow us to propose both, theoretical and practical solutions for improving security and usability aspects, primarily of email communication, but from which secure messaging solutions can benefit too. The first enhancement concerns the use of password-authenticated key exchange (PAKE) protocols for entity authentication in peer-to-peer decentralized settings, as a replacement for out-of-band channels; this brings provable security to the so far empirical process, and enables the implementation of further security and usability properties (e.g., forward secrecy, secure secret retrieval). A second idea refers to the protection of weak passwords at rest and in transit, for which we propose a scheme based on the use of a one-time-password; furthermore, we consider potential approaches for improving this scheme. The hereby presented research was conducted as part of an industrial partnership between SnT/University of Luxembourg and pEp Security S.A. [less ▲]

Detailed reference viewed: 272 (16 UL)
Full Text
Peer Reviewed
See detailA multifactorial and integrative approach to impulsivity in neuropsychology: Insights from the UPPS model of impulsivity
Rochat, Lucien; Billieux, Joël UL; Gagnon, Jean et al

in Journal of Clinical and Experimental Neuropsychology (2018), 40(1), 45-61

Risky and excessive behaviors, such as aggressive and compulsive behaviors, are frequently described in patients with brain damage and have dramatic psychosocial consequences. Although there is strong ... [more ▼]

Risky and excessive behaviors, such as aggressive and compulsive behaviors, are frequently described in patients with brain damage and have dramatic psychosocial consequences. Although there is strong evidence that impulsivity constitutes a key factor at play in these behaviors, the literature about impulsivity in neuropsychology is to date scarce. In addition, examining and understanding these problematic behaviors requires the assumption that impulsivity is a multidimensional construct. Consequently, this article aims at shedding light on frequent risky and excessive behaviors in patients with brain damage by focusing on a unified, comprehensive, and well-validated model, namely, the UPPS model of impulsivity (Whiteside & Lynam, 2001). This model considers impulsivity as a multidimensional construct that includes four facets: urgency, (lack of) premeditation, (lack of) perseverance, and sensation seeking. Furthermore, we discuss the psychological mechanisms underlying the dimensions of impulsivity, as well as the laboratory tasks designed to assess each mechanism and their neural bases. We then present a scale specifically designed to assess these four dimensions of impulsivity in patients with brain damage and examine the data regarding this multidimensional approach to impulsivity in neuropsychology. This review supports the need to adopt a multifactorial and integrative approach toward impulsive behaviors, and the model presented provides a valuable rationale to disentangle the nature of brain systems and mechanisms underlying impulsive behaviors in patients with brain damage. It may also foster further relevant research in the field of impulsivity and improve assessment and rehabilitation of impulsive behaviors in clinical settings. [less ▲]

Detailed reference viewed: 170 (3 UL)
Full Text
Peer Reviewed
See detailA multifactorial evaluation framework for gene regulatory network reconstruction
Mombaerts, Laurent UL; Aalto, Atte UL; Markdahl, Johan UL et al

in Foundations of Systems Biology in Engineering (2019)

In the past years, many computational methods have been developed to infer the structure of gene regulatory networks from time series data. However, the applicability and accuracy presumptions of such ... [more ▼]

In the past years, many computational methods have been developed to infer the structure of gene regulatory networks from time series data. However, the applicability and accuracy presumptions of such algorithms remain unclear due to experimental heterogeneity. This paper assesses the performance of recent and successful network inference strategies under a novel, multifactorial evaluation framework in order to highlight pragmatic tradeoffs in experimental design. The effects of data quantity and systems perturbations are addressed, thereby formulating guidelines for efficient resource management. Realistic data were generated from six widely used benchmark models of rhythmic and nonrhythmic gene regulatory systems with random perturbations mimicking the effect of gene knock-out or chemical treatments. Then, time series data of increasing lengths were provided to five state-of-the-art network inference algorithms representing distinctive mathematical paradigms. The performances of such network reconstruction methodologies are uncovered under various experimental conditions. We report that the algorithms do not benefit equally from data increments. Furthermore, at least for the studied rhythmic system, it is more profitable for network inference strategies to be run on long time series rather than short time series with multiple perturbations. By contrast, for the non-rhythmic systems, increasing the number of perturbation experiments yielded better results than increasing the sampling frequency. We expect that future benchmark and algorithm design would integrate such multifactorial considerations to promote their widespread and conscientious usage. [less ▲]

Detailed reference viewed: 105 (8 UL)
Full Text
See detailA multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks.
Signorello, Salvatore UL

Doctoral thesis (2018)

Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the emerging future Internet proposals, the promising Information-Centric Networking ... [more ▼]

Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the emerging future Internet proposals, the promising Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols to promote a shift in focus from hosts to contents. Among the ICN architectures, the Named-Data Networking (NDN) envisions users' named content requests to be forwarded and recorded by their names in routers along the path from one consumer to 1-or-many sources. The Pending Interest Table (PIT) is the NDN's data-plane component which temporarily records forwarded content requests in routers. On one hand, the PIT stateful mechanism enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard to satisfy requests with the aim to overload both the network infrastructure and the content producers. Countermeasures against IFA have been proposed since the early attack discovery. However, a fair understanding of the defense mechanisms' real efficacy is missing since those have been tested under simplistic assumptions about the evaluation scenarios. Thus, overall, the IFA security threat still appears easy to launch but hard to mitigate. This dissertation work shapes a better understanding of both the implications of IFAs and the possibilities of improving the state-of-the-art defense mechanisms against these attacks. The contributions of this work include the definition of a more complete and realistic attacker model for IFAs, the design of novel stealthy IFAs built upon the proposed attacker model, a re-assessment of the most-efficient state-of-the-art IFA countermeasures against the novel proposed attacks, the theorization and one concrete design of a novel class of IFA countermeasures to efficiently address the novel stealthy IFAs. Finally, this work also seminally proposes to leverage the latest programmable data-plane technologies to design and test alternative forwarding mechanisms for the NDN which could be less vulnerable to the IFA threat. [less ▲]

Detailed reference viewed: 132 (9 UL)
Full Text
Peer Reviewed
See detailMultifractal properties of sample paths of ground state-transformed jump processes
Lorinczi, Jozsef; Yang, Xiaochuan UL

in Chaos, Solitons and Fractals (2019)

Detailed reference viewed: 174 (0 UL)
Full Text
Peer Reviewed
See detailMultifractality of jump diffusion processes
Yang, Xiaochuan UL

in Annales de L'Institut Henri Poincaré. Analyse Non Linéaire (2018)

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailMultifunctional responsive fibers produced by dual liquid crystal core electrospinning
Kye, Yoomee; Kim, Changsoon; Lagerwall, Jan UL

in Journal of Materials Chemistry C (2015), 3

We demonstrate that coaxial electrospinning with more than one core channel, each containing a different type of liquid crystal, can be used to produce multifunctional fibers in a one-step process. They ... [more ▼]

We demonstrate that coaxial electrospinning with more than one core channel, each containing a different type of liquid crystal, can be used to produce multifunctional fibers in a one-step process. They respond to more than one stimulus or with multiple threshold values, and the individual cores may feature different physical properties such as iridescent reflection in one core and birefringence in another. In order to ensure good fiber morphology and intact, unmixed and well separated cores, two important precautions must be taken. First, the fibers should not be collected on a hydrophilic substrate, as this will lead to severe fiber deformation and core mixing after collection, as a result of capillary forces from the water that condenses on the fiber during spinning. Second, the addition of surfactants to the polymer solution should be avoided, although it may appear beneficial for the spinning process as it reduces surface tension and increases conductivity. This is because the surfactant enters the liquid crystal core, possibly together with water in the form of inverse micelles, seriously degrading the performance of the liquid crystal. [less ▲]

Detailed reference viewed: 240 (40 UL)
Full Text
Peer Reviewed
See detailMultigroup Multicast Beamforming and Antenna Selection with Rate-Splitting in Multicell Systems
Tervo, Oskari; Trant, Le-Nam; Chatzinotas, Symeon UL et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

This paper studies energy-efficient joint coordinated beamforming and antenna selection in multi-cell multi-user multigroup multicast multiple-input single-output systems. We focus on interference-limited ... [more ▼]

This paper studies energy-efficient joint coordinated beamforming and antenna selection in multi-cell multi-user multigroup multicast multiple-input single-output systems. We focus on interference-limited scenarios, e.g., when the number of radio frequency (RF) chains is of the same order as the number of multicasting groups. To tackle the interference, we exploit rate-splitting to divide the group messages into common and group-specific sub-messages. We propose a per-cell rate-splitting approach, where the common message is locally designed to be decoded by the in-cell users, while treated as noise by the out-cell users. We consider the case where the number of RF chains is smaller than that of antennas, and consider a switching architecture, that is, the antenna selection is employed to choose the best antennas for transmission. Numerical results illustrate the potential of the proposed approach to significantly improve the energy efficiency in the interference-limited regime. [less ▲]

Detailed reference viewed: 101 (0 UL)
Full Text
Peer Reviewed
See detailMultigroup Multicast Precoding for Energy Optimization in SWIPT Systems with Heterogeneous Users
Gautam, Sumit UL; Lagunas, Eva UL; Bandi, Ashok UL et al

in IEEE Communications Society Magazine (2019)

The key to developing future generations of wireless communication systems lies in the expansion of extant methodologies, which ensures the coexistence of a variety of devices within a system. In this ... [more ▼]

The key to developing future generations of wireless communication systems lies in the expansion of extant methodologies, which ensures the coexistence of a variety of devices within a system. In this paper, we assume several multicasting (MC) groups comprising three types of heterogeneous users including Information Decoding (ID), Energy Harvesting (EH) and both ID and EH. We present a novel framework to investigate the multi-group (MG) - MC precoder designs for three different scenarios, namely, Separate Multicast and Energy Precoding Design (SMEP), Joint Multicast and Energy Precoding Design (JMEP), and Per-User Information and/or Energy Precoding Design (PIEP). In the considered system, a multi-antenna source transmits the relevant information and/or energy to the groups of corresponding receivers using more than one MC streams. The data processing users employ the conventional ID receiver architectures, the EH users make use of a non-linear EH module for energy acquisition, while the users capable of performing both ID and EH utilize the separated architecture with disparate ID and non-linear EH units. Our contribution is threefold. Firstly, we propose an optimization framework to i) minimize the total transmit power and ii) to maximize the sum harvested energy, the two key performance metrics of MG-MC systems. The proposed framework allows the analysis of the system under arbitrary given quality of service and harvested energy requirements. Secondly, to deal with the non-convexity of the formulated problems, we transform the original problems respectively into equivalent forms, which can be effectively solved by semi-definite relaxation (SDR) and alternating optimization. The convergence of the proposed algorithms is analytically guaranteed. Thirdly, a comparative study between the proposed schemes is conducted via extensive numerical results, wherein the benefits of adopting SMEP over JMEP and PIEP models are discussed [less ▲]

Detailed reference viewed: 171 (25 UL)
See detailMultikulturalismus - multiplicity
Murdock, Elke UL

Conference given outside the academic context (2015)

Detailed reference viewed: 93 (5 UL)
See detailMultikulturalismus : Sind salle Kulturen gleich ?
Sosoe, Lukas UL

Presentation (2014, December)

Detailed reference viewed: 69 (0 UL)
See detailMultikulturalität und Mehrsprachigkeit. Lehrerinnen- und Lehrerbildung in Luxembourg
Jovanovic, Victor UL; Priem, Karin UL

in Rangosch-Schneck, Elisabeth (Ed.) Lehrer Lernen Migration. Außen- und Innenperspektiven einer "interkulturellen Lehrerbildung" (2012)

Detailed reference viewed: 139 (12 UL)
Full Text
Peer Reviewed
See detailA Multilateral Interpretation of the Multilateral Instrument (and Covered Tax Agreements)?
Haslehner, Werner UL

in Bulletin for International Taxation (2020), 74(4/5),

The analysis of the multilateral nature of the interpretation processes created by the MLI shows that very little “true multilateralism” arises from its adoption. At its core, the international tax system ... [more ▼]

The analysis of the multilateral nature of the interpretation processes created by the MLI shows that very little “true multilateralism” arises from its adoption. At its core, the international tax system remains fragmented and built on bilateral agreements, with only a thin overlay of multilateral agreement on selected issues. The MLI does not set up a multilateral dispute resolution mechanism. The Conference of the Parties as the only true multilateral body created by the MLI plays a very small – if any – role in the interpretation and application of tax treaty rules. Neither has the MLI produced a system where national courts would have a stronger basis to enforce the harmonious interpretation of treaty terms in both contracting states (let alone among all Parties to the MLI) beyond the general appeal of such approach that already exists prior to – and outside the scope of – the MLI. If a coherent interpretation of CTAs with a view to achieve something like the elusive “single tax principle” was indeed a goal behind the project as a whole, the rules on interpretation applicable following the MLI’s adoption do not amount to a codification of that ideal, although the MLI can, in specific circumstances, have an interpretative effect on tax treaties even where it does not result in a modification of the norms in that treaty. Decision harmony among courts in different countries, therefore, remains an ideal that cannot be based in substance on the existence of the MLI. [less ▲]

Detailed reference viewed: 155 (16 UL)