Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailOperational semantics and verification of security protocols
Cremers, Cas; Mauw, Sjouke UL

Book published by Springer-Verlag (2012)

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or ... [more ▼]

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology’s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols. [less ▲]

Detailed reference viewed: 130 (3 UL)
Full Text
Peer Reviewed
See detailOperational semantics for MSC'96
Mauw, Sjouke UL; Reniers, M. A.

in Computer Networks & ISDN Systems (1999), 31(17), 1785-1799

Detailed reference viewed: 121 (3 UL)
Full Text
Peer Reviewed
See detailOperational Semantics for SPARQL Update
Horne, Ross James UL; Sassone, Vladimiro; Gibbins, Nicholas

in The Semantic Web - Joint International Semantic Technology Conference JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings (2011)

Detailed reference viewed: 86 (1 UL)
Full Text
Peer Reviewed
See detailOperational Space Control of a Lightweight Robotic Arm Actuated By Shape Memory Alloy (SMA) Wires
Quintanar Guzman, Serket UL; Kannan, Somasundar UL; Olivares Mendez, Miguel Angel UL et al

in ASME 2016 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems, Vermont 28-30 September 2016 (2016, September)

Detailed reference viewed: 250 (33 UL)
Full Text
Peer Reviewed
See detailOperational space control of a lightweight robotic arm actuated by shape memory alloy wires: A comparative study
Quintanar Guzman, Serket UL; Kannan, Somasundar UL; Aguilera Gonzalez, Adriana UL et al

in Journal of Intelligent Material Systems and Structures (2017)

This article presents the design and control of a two-link lightweight robotic arm using shape memory alloy wires as actuators. Both a single-wire actuated system and an antagonistic configuration system ... [more ▼]

This article presents the design and control of a two-link lightweight robotic arm using shape memory alloy wires as actuators. Both a single-wire actuated system and an antagonistic configuration system are tested in open and closed loops. The mathematical model of the shape memory alloy wire, as well as the kinematics and dynamics of the robotic arm, are presented. The operational space control of the robotic arm is performed using a joint space control in the inner loop and closed-loop inverse kinematics in the outer loop. In order to choose the best joint space control approach, a comparative study of four different control approaches (proportional derivative, sliding mode, adaptive, and adaptive sliding mode control) is carried out for the proposed model. From this comparative analysis, the adaptive controller was chosen to perform operational space control. This control helps us to perform accurate positioning of the end-effector of shape memory alloy wire–based robotic arm. The complete operational space control was successfully tested through simulation studies performing position reference tracking in the end-effector space. Through simulation studies, the proposed control solution is successfully verified to control the hysteretic robotic arm. [less ▲]

Detailed reference viewed: 167 (10 UL)
Full Text
Peer Reviewed
See detailOperationalisierungen von Beeinträchtigung und Behinderung bei Kindern und Jugendlichen – eine illustrative Replikation aus dem Teilhabebericht
Stöcker, Anne UL; Zurbriggen, Carmen UL

in Empirische Sonderpädagogik (2021), 13(4), 354-364

Der Kurzbeitrag repliziert die dem ersten Teilhabebericht (BMAS, 2013) zugrundeliegende Berechnung von Beeinträchtigung und Behinderung bei Kindern und Jugendlichen auf Basis der für Deutschland ... [more ▼]

Der Kurzbeitrag repliziert die dem ersten Teilhabebericht (BMAS, 2013) zugrundeliegende Berechnung von Beeinträchtigung und Behinderung bei Kindern und Jugendlichen auf Basis der für Deutschland repräsentativen „Studie zur Gesundheit von Kindern und Jugendlichen in Deutschland“ (KiGGS). Ausgangspunkt für die statistische Illustration unterschiedlicher Modelle von Beeinträchtigung ist der „Children with Special Health Care Needs (CSHCN) Screener“. Die Bandbreite der Anteile an Beeinträchtigung bei Kindern und Jugendlichen in Deutschland bewegt sich je nach Operationalisierung zwischen 9.3 % und 23.8 %, wobei die erste Angabe das im Teilhabebericht gewählte Modell darstellt. Der Anteil an Behinderung beläuft sich diesem entsprechend auf 2 %. Die Ergebnisse verdeutlichen die Bedeutsamkeit von Transparenz hinsichtlich der zugrundeliegenden theoretischen Modelle und Operationalisierungen bei statistischen Angaben zu Behinderung und Beeinträchtigung. [less ▲]

Detailed reference viewed: 36 (2 UL)
Full Text
Peer Reviewed
See detailLes opérations de restructuration : échanges avec Gérard Rameix
Conac, Pierre-Henri UL; Rameix, Gérard

in Cahier de droit de l'entreprise (2016), 1

Detailed reference viewed: 153 (1 UL)
Full Text
Peer Reviewed
See detailOperations on Conversational Mind-Graphs
Poray, Jayanta UL; Schommer, Christoph UL

in Proceedings "4th International Conference on Agents and Artificial Intelligence" (2012)

Detailed reference viewed: 127 (7 UL)
Full Text
See detailOperations on Finite Sets, Functional Composition, and Ordered Sets
Lehtonen, Erkko UL

Doctoral thesis (2007)

The unifying theme of this research work is functional composition. We study operations on a nonempty set A, an important particular case being that of Boolean functions when A = {0, 1}. A class of ... [more ▼]

The unifying theme of this research work is functional composition. We study operations on a nonempty set A, an important particular case being that of Boolean functions when A = {0, 1}. A class of operations is a subset of the set of all operations on A. A clone on A is a class of operations on A that contains all projection maps and is closed under functional composition. The first part of this thesis is a study of compositions of the clones of Boolean functions. The clone of all Boolean functions can be decomposed in various ways into minimal clones, and we observe that such decompositions correspond to different normal form systems: the disjunctive normal form (DNF), conjunctive normal form (CNF), Zhegalkin polynomial, dual Zhegalkin polynomial, and so-called median normal form. These normal form systems are compared in terms of efficiency, and we establish that the median normal form system provides in a certain sense more efficient representations than the other four normal form systems mentioned above. The second part of this thesis is a study of certain order relations on the set of all operations on A. For a fixed class C of operations on A, we say that f is a C-subfunction of g, if f can be obtained by composing g from inside with operations from C. We say that f and g are C-equivalent, if f and g are C-subfunctions of each other. The C-subfunction relation is a quasiorder (a reflexive and transitive relation) on the set of all operations on A if and only if the parametrizing class C is a clone. The simplest example of C-subfunction relations is obtained when C is the smallest clone I of projections on A. Forming I-subfunctions corresponds to simple manipulation of variables, namely addition and deletion of dummy variables, permutation of variables, and identification of variables. None of these operations increases the number of essential variables, and only variable identification may decrease this number. We study more carefully the effect of variable identification on the number of essential variables of operations on finite base sets. We then study certain order-theoretical properties of various C-subfunction partial orders defined by larger clones C on finite base sets A. We are mostly concerned about the descending chain condition and the existence of infinite antichains, and as it turns out, these properties on the defining clone C. Homomorphisms of labeled posets (or k-posets) are applied in our analysis of subfunction relations defined by clones of monotone functions. The third part of this thesis is a study of the homomorphicity order of finite k-posets on its own right. We establish that this order is a distributive lattice, and furthermore, it is universal in the sense that every countable poset can be embedded into it. This result implies universality of the subfunction partial orders defined by clones of monotone functions on finite sets of more than two elements. In this way, we also obtain a new proof for the well-known universality of the homomorphicity order of graphs. [less ▲]

Detailed reference viewed: 56 (8 UL)
Full Text
Peer Reviewed
See detailOperations Research in BASF's Supply Chain Operations
Blackburn, Robert; Kallrath, Josef; Klosterhalfen, Steffen UL

in International Transactions in Operational Research (2015), 22

In this paper, we highlight the application of operations research (OR) at BASF in the area of supply chain management (SCM) by using selected examples with annual cost savings ranging between several ... [more ▼]

In this paper, we highlight the application of operations research (OR) at BASF in the area of supply chain management (SCM) by using selected examples with annual cost savings ranging between several hundred thousand and several million euros. We address special characteristics of the process industry that should be dealt with and identify future research needs. The examples cover strategic, tactical, and operational topics encountered at BASF. We share our lessons learned, based on our experience from past OR projects in SCM, about challenges as well as benefits of standard and tailor-made OR solutions. In general, we find that the special characteristics often call for a modification or enhancement of standard OR models. Providing appropriate solutions therefore requires a joint effort of SCM, IT, and OR experts. [less ▲]

Detailed reference viewed: 208 (7 UL)
Full Text
Peer Reviewed
See detailOperationsvorbereitung
Vögele, Claus UL

in Kohlmann, Carl-Walter; Salewski, Christel; Wirtz, Markus Antonius (Eds.) Psychologie in der Gesundheitsförderung (2018)

Detailed reference viewed: 127 (5 UL)
Full Text
Peer Reviewed
See detailOperationsvorbereitung, psychologische.
Vögele, Claus UL

in Wirtz, Markus (Ed.) Dorsch – Lexikon der Psychologie (2013)

Detailed reference viewed: 70 (1 UL)
Full Text
Peer Reviewed
See detailOperator Kernels for Irreducible Unitary Representations of Solvable Exponential Lie Groups
Abdennadher, Jawhar; Molitor-Braun, Carine UL

in Journal of Lie Theory (2006), 16

Detailed reference viewed: 39 (1 UL)
See detailOpfer werden im Kontext fremdenfeindlicher Gewalt: Gewalttätige Übergriffe trotz beschwichtigendem Opferverhalten.
Willems, Helmut UL; Steigleder, Sandra

Article for general public (2004)

Detailed reference viewed: 52 (0 UL)
See detailOpfer werden im Kontext fremdenfeindlicher Gewalt: Gewalttätige Übergriffe trotz beschwichtigendem Opferverhalten.
Steigleder, Sandra; Willems, Helmut UL

in Zeitschrift für Gewaltprävention (2003)

Detailed reference viewed: 79 (2 UL)
Full Text
Peer Reviewed
See detail« L’OPHÉLISATION MYSTIQUE » DANS PELLÉAS ET MÉLISANDE DE MAURICE MAETERLINCK ET PARTAGE DE MIDI DE PAUL CLAUDEL
Deregnoncourt, Marine UL

in Journal of Philology and Intercultural Communication (2019), 2(2018), 227-239

In this article we will see how a « mystic ophelisation » is pregnant in « Pelléas and Mélisande » to Maurice Maeterlinck and « Noon Sharing » to Paul Claudel. To do so, this article will be divided into ... [more ▼]

In this article we will see how a « mystic ophelisation » is pregnant in « Pelléas and Mélisande » to Maurice Maeterlinck and « Noon Sharing » to Paul Claudel. To do so, this article will be divided into three parts. In the first part, the locution « mystic ophelisation » will be consider. What is it exactly ? Why do we associate this female name and this phenomenon ? In the second part, we will focus on « Pelléas and Mélisande » to Maurice Maeterlinck ; espacially on Mélisande. In the last part, we will being interested in « Noon Sharing » to Paul Claudel ; espacially on Ysé. How do Mélisande and Ysé look like Ophélia (in « Hamlet » to William Shakespeare) ? How do these female characters go into a transe ? What do they make on the male characters, Pelléas and Mesa ? By this article, we will try to answer these questions. [less ▲]

Detailed reference viewed: 62 (10 UL)
Full Text
Peer Reviewed
See detailOpiate and cocaine related Fatal Overdoses in Luxembourg from 1985 to 2011: a time-stratified
Origer, Alain UL; Baumann, Michèle UL

in Health Issues and Populations in Health Promotion (2013)

To describe trends in the national prevalence of fatal overdose (FOD) cases related to opiates and cocaine use between 1985 and 2011. To analyse male/female differences in FOD victims according to various ... [more ▼]

To describe trends in the national prevalence of fatal overdose (FOD) cases related to opiates and cocaine use between 1985 and 2011. To analyse male/female differences in FOD victims according to various time periods. Methods. A triangulation approach was chosen to cross-examining data from national law enforcement sources, the national drug use surveillance system (RELIS) and of forensic and toxicological evidence. Data have been stratified according to 3 time periods covering each 9 successive years in order to increase the visibility of long term variations and trends. Statistical analysis of male/female differences according to socio-demographic and forensic data as well as drug use trajectories was performed. Results. National FOD prevalence has been decreasing from the beginning of this century to reach a historically low rate of 1.71 cases/100,000 inhabitants in 2011. The burden of deaths caused by FOD on the general national mortality showed to be higher for men compared with women. Furthermore, the pathways towards a FOD revealed to be different for male and female victims referred to various aspects including age of decedents, criminal records, drug use trajectories, drug use patterns and the involvement of psychotropic prescription drugs. Conclusions. The time window for intervention between the onset of drug use and its potential fatal outcome might be shorter for women compared with men. Further research should address dynamics between socio-economic status of victims and various cultural components to assess their possible impact on drug overdose induced mortality. Early intervention in female drug users and increased attention to poly and psychotropic prescription drugs use should be considered in health promotion programmes and relevant research outcomes routinely provided to first line general health care providers to accelerate access to appropriate treatment if required and eventually contribute to prevent premature death and reduce gender inequalities. [less ▲]

Detailed reference viewed: 126 (6 UL)