Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailPostcolonial ideologies of language in education: Voices from below on English and local language(s) in The Gambia
Van Camp, Kirsten; Juffermans, Kasper UL

in Cuvelier, Pol; du Plessis, Theodorus; Meeuwis, Michael (Eds.) et al Multilingualism from Below (2010)

Detailed reference viewed: 67 (0 UL)
See detailPostdramatisches Theater als transkulturelles Theater. Eine transdisziplinäre Annäherung
Nonoa, Koku Gnatuloma UL; Kovacs, Teresa

Book published by Forum Modernes Theater - 1st ed. (2018)

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailPoster Abstract: An Optimizing Framework for Real-Time Scheduling
Sundharam, Sakthivel Manikandan UL; Altmeyer, Sebastian UL; Navet, Nicolas UL

in Proceedings of 22nd IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2016) (2016, April 12)

Scheduling is crucial in real-time applications. For any real-time system, the desired scheduling policy can be selected based on the scheduling problem itself and the underlying system constraints. This ... [more ▼]

Scheduling is crucial in real-time applications. For any real-time system, the desired scheduling policy can be selected based on the scheduling problem itself and the underlying system constraints. This paper discusses a novel optimization framework which automates the selection and configuration of the scheduling policy. The objective is to let designer state the permissible timing behavior of the system in a declarative manner. The system synthesis step involving both analysis and optimization then generates a scheduling solution which at runtime is enforced by the execution environment. [less ▲]

Detailed reference viewed: 225 (59 UL)
Full Text
Peer Reviewed
See detailPoster: Characterizing Driving Behaviors Through a Car Simulation Platform
Faye, Sébastien UL; Jafarnejad, Sasan UL; Costamagna, Juan UL et al

Poster (2017, November 27)

Human mobility has opened up to many themes in recent years. Human behavior and how a driver might react to certain situations, whether dangerous (e.g. an accident) or simply part of the evolution of new ... [more ▼]

Human mobility has opened up to many themes in recent years. Human behavior and how a driver might react to certain situations, whether dangerous (e.g. an accident) or simply part of the evolution of new technologies (e.g. autonomous driving), leaves many avenues to be explored. Although experiments have been deployed in real situations, it remains difficult to encounter the conditions that certain studies may require. For this reason, we have set up a driving simulator (comprising several modules) that is able to reproduce a realistic driving environment. Although, as the literature has already demonstrated, the conditions are often far from reality, simulation platforms are nonetheless capable of reproducing an incredibly large number of scenarios on the fly. In this poster, we explain how we conceived the simulator, as well as the system we developed for collecting metrics on both the driver and the simulation environment. In addition, we take advantage of this conference to publicly share a dataset consisting of 25 drivers performing the same road circuit on the "Project Cars" game. [less ▲]

Detailed reference viewed: 183 (18 UL)
Full Text
Peer Reviewed
See detailPOSTER: Context-adaptive user-centric privacy scheme for VANET
Emara, Karim Ahmed Awad El-Sayed UL; Woerndl, Wolfgang; Schlichter, Johann

in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2015)

Vehicular adhoc network allows vehicles to exchange their information for safety and traffic efficiency. However, exchanging information may threaten the driver privacy because it includes spatiotemporal ... [more ▼]

Vehicular adhoc network allows vehicles to exchange their information for safety and traffic efficiency. However, exchanging information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly on a periodical basis. In this paper, we propose a context-adaptive privacy scheme which lets a vehicle decide autonomously when to change its pseudonym and how long it should remain silent to ensure unlinkability. This scheme adapts dynamically based on the density of the surrounding traffic and the user privacy preferences. According to the experimental results, the proposed scheme demonstrates a significant reduction in traceability with a better quality of forward collision warning application compared with the random silent period scheme. \textcopyright Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015. [less ▲]

Detailed reference viewed: 108 (4 UL)
Peer Reviewed
See detailPOSTER: Critique of the CISSP Common Body of Knowledge of Cryptography
Neuhaus, Stephan; Gheorghe, Gabriela UL

Poster (2013)

Detailed reference viewed: 146 (6 UL)
Full Text
Peer Reviewed
See detailPOSTER: Destabilizing BitTorrent’s Clusters to Attack High Bandwidth Leechers
Adamsky, Florian UL; Khan, Hassan; Rajarajan, Muttukrishnan et al

in In 18th ACM Conference on Computer and Communications Security (ACM CCS) (2011)

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailPOSTER: Detection of Information Leaks via Reflection in Android Apps
Gajrani, Jyoti; Li, Li UL; Laxmi, Vijay et al

in The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017) (2017)

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage ... [more ▼]

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks. [less ▲]

Detailed reference viewed: 120 (5 UL)
Full Text
Peer Reviewed
See detailPOSTER: Fingerprinting Tor Hidden Services
Mitseva, Asya UL; Panchenko, Andriy UL; Lanze, Fabian et al

Poster (2016, October)

Detailed reference viewed: 263 (30 UL)
Full Text
Peer Reviewed
See detailPoster: Impact of ground truth errors on Wi-Fi localization accuracy
Popleteev, Andrei UL

Poster (2017, June)

This study investigates the impact of small ground truth (GT) errors on indoor positioning systems based on Wi-Fi fingerprinting. The results demonstrate that even centimeter-scale GT deviations cause ... [more ▼]

This study investigates the impact of small ground truth (GT) errors on indoor positioning systems based on Wi-Fi fingerprinting. The results demonstrate that even centimeter-scale GT deviations cause severe degradation of measured localization accuracy. [less ▲]

Detailed reference viewed: 69 (1 UL)
Peer Reviewed
See detailPoster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity
Derrmann, Thierry UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Poster (2016, December 08)

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of ... [more ▼]

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of this trend. They become increasingly interesting, not only as sensors, but also as participants in Intelligent Transportation System (ITS) applications. More specifically, their pervasive connectivity to cellular networks enables them as passive and active sensing units. In this paper, we introduce LuST-LTE, a package of open-source simulation tools that allows the simulation of vehicular traffic along with pervasive LTE connectivity. [less ▲]

Detailed reference viewed: 231 (22 UL)
Full Text
Peer Reviewed
See detailPoster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet
Xu, Teng Andrea; Adamsky, Florian UL; Turcanu, Ion UL et al

Poster (2018)

Automotive Ethernet (AE) is becoming more and more relevant to the automotive industry due to its support of emerging in-car applications, which have high bandwidth demands and stringent requirements in ... [more ▼]

Automotive Ethernet (AE) is becoming more and more relevant to the automotive industry due to its support of emerging in-car applications, which have high bandwidth demands and stringent requirements in terms of latency and time synchronization. One of the standards under consideration for AE is IEEE 802.1 Audio Video Bridging (AVB)/Time Sensitive Networking (TSN) that provides deterministic data link layer and bounded latency to real-time traffic classes. So far, this protocol stack has only been evaluated using either simulations or proprietary and expensive platforms. In this paper, we design a real testbed system for AE using general-purpose single-board computers and conduct experiments to assess the real-time performance of an open-source AVB/TSN implementation. Our preliminary results show that even under heavy load, AVB/TSN can fulfil the latency requirements of AE while keeping a constant latency variation. [less ▲]

Detailed reference viewed: 232 (22 UL)
Peer Reviewed
See detailPOSTER: Preserving Privacy and Accountability for Personal Devices
Gheorghe, Gabriela UL; Neuhaus, Stephan

Poster (2013)

Detailed reference viewed: 140 (13 UL)
Full Text
Peer Reviewed
See detailPoster: PREXT: Privacy Extension for Veins VANET Simulator
Emara, Karim Ahmed Awad El-Sayed UL

Poster (2016)

Preserving location privacy is an important aspect in vehicular ad-hoc networks. Although location privacy is thoroughly studied in the past decade, it is usually skipped in VANET simulators. In this ... [more ▼]

Preserving location privacy is an important aspect in vehicular ad-hoc networks. Although location privacy is thoroughly studied in the past decade, it is usually skipped in VANET simulators. In this paper, we propose a location privacy extension, PREXT, for Veins framework. Currently, PREXT supports seven privacy schemes of different approaches including silent period, context-based and cryptographic mix-zone. It can be also easily extended to include more schemes. It includes adversary modules that can eavesdrop vehicle messages and track their movements. This adversary is used in measuring the gained privacy in terms of several popular metrics such as entropy, traceability and pseudonym usage statistics. We utilize this extension to compare among different schemes in an urban scenario. [less ▲]

Detailed reference viewed: 140 (5 UL)
Full Text
Peer Reviewed
See detailPOSTER: Traffic Splitting to Counter Website Fingerprinting
de La Cadena Ramos, Augusto Wladimir UL; Mitseva, Asya UL; Pennekamp, Jan et al

Poster (2019, November 11)

Detailed reference viewed: 74 (6 UL)
Full Text
Peer Reviewed
See detailPOSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
Adamsky, Florian UL; Retunskaia, Tatiana UL; Schiffner, Stefan UL et al

in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June)

Detailed reference viewed: 284 (14 UL)
Full Text
Peer Reviewed
See detailA posteriori error estimation for extended finite elements by an extended global recovery
Duflot, M.; Bordas, Stéphane UL

in International Journal for Numerical Methods in Engineering (2008), 76(8), 1123-1138

This contribution presents an extended global derivative recovery for enriched finite element methods (FEMs), such as the extended FEM along with an associated error indicator. Owing to its simplicity ... [more ▼]

This contribution presents an extended global derivative recovery for enriched finite element methods (FEMs), such as the extended FEM along with an associated error indicator. Owing to its simplicity, the proposed scheme is ideally suited to industrial applications. The procedure is based on global minimization of the L2 norm of the difference between the raw strain field (C-1) and the recovered (C0) strain field. The methodology engineered in this paper extends the ideas of Oden and Brauchli (Int. J. Numer. Meth. Engng 1971; 3) and Hinton and Campbell (Int. J. Numer. Meth. Engng 1974; 8) by enriching the approximation used for the construction of the recovered derivatives (strains) with the gradients of the functions employed to enrich the approximation employed for the primal unknown (displacements). We show linear elastic fracture mechanics examples, both in simple two-dimensional settings, and for a three-dimensional structure. Numerically, we show that the effectivity index of the proposed indicator converges to unity upon mesh refinement. Consequently, the approximate error converges to the exact error, indicating that the error indicator is valid. Additionally, the numerical examples suggest a novel adaptive strategy for enriched approximations in which the dimensions of the enrichment zone are first increased, before standard h- and p-adaptivities are applied; we suggest to coin this methodology e-adaptivity. Copyright © 2008 John Wiley & Sons, Ltd. [less ▲]

Detailed reference viewed: 156 (0 UL)
Full Text
See detailPostface - Innovations et interventions sociales
Houssemand, Claude UL

in Ben Mrad, Fathi; Distler, Frédéric; Méloni, Jean-Paul (Eds.) Innovations et interventions sociales: initiatives, adaptations et créations (2020)

Detailed reference viewed: 28 (2 UL)