Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailTowards an integrative view of cognitive biases in pain.
Van Ryckeghem, Dimitri UL; Vervoort, Tine

in European journal of pain (London, England) (2016), 20(8), 1201-2

Detailed reference viewed: 42 (4 UL)
Full Text
Peer Reviewed
See detailTowards an understanding of biculturalism: The dynamic tension of being bicultural
Murdock, Elke UL

Scientific Conference (2019, August 22)

One facet of contemporary societies is their increasingly diverse composition – a consequence of accelerated movement of people across the globe. There is a growing number of individuals who are living ... [more ▼]

One facet of contemporary societies is their increasingly diverse composition – a consequence of accelerated movement of people across the globe. There is a growing number of individuals who are living with more than one cultural influence. This requires new theoretical understanding of biculturalism. How do individuals with significant and prolonged second culture exposure negotiate their cultural identities? Past research has relied on additive models, which conceptualize biculturalism simply as the sum of their cultural experiences, emphasizing the relative influence of each culture. The transformative theory of biculturalism goes beyond this model by focusing on the process of negotiation (hybridization, integrating and frame switching) recognizing that this process itself is already transforming the cultural experience. I will present a theory of biculturalism as a self-stabilizing tensegrity network. Previous models fall short in understanding the process of bicultural identity construal. Building on Dialogical Self theory and the idea of tensional integrity or tensegrity (Marsico & Tateo, 2017) I will show how applying such a framework captures the everyday reality of those living in a boundary-crossing world. Human beings are involved in constant positioning and counter-positioning the forms of which go beyond simple dual systems views – a co-genetic logic being more appropriate allowing for a third way. Tension may lead to a dialectical synthesis—a concept that will be elaborated in concrete ways. Tension is viewed as a positive force, stabilizing the self and at the same time dynamic allowing for the emergence of a qualitatively new whole. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailTowards asymmetric searchable encryption with message recovery and flexible search authorization
Tang, Qiang UL; Chen, Xiaofeng

in Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (2013)

Detailed reference viewed: 85 (4 UL)
Full Text
Peer Reviewed
See detailTowards automated testing and fixing of re-engineered feature models
Henard, Christopher UL; Papadakis, Mike UL; Perrouin, Gilles UL et al

in Proceedings of the 2013 International Conference on Software Engineering (2013)

Detailed reference viewed: 958 (8 UL)
Full Text
Peer Reviewed
See detailTowards Automatic Human Body Model Fitting to a 3D Scan
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in D'APUZZO, Nicola (Ed.) Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (2017, October)

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing ... [more ▼]

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing clothing. The underlying body shape is thus partially or completely occluded. Yet, it is very desirable to recover the shape of a covered body as it provides non-invasive means of measuring and analysing it. This is particularly convenient for patients in medical applications, customers in a retail shop, as well as in security applications where suspicious objects under clothing are to be detected. To recover the body shape from the 3D scan of a person in any pose, a human body model is usually fitted to the scan. Current methods rely on the manual placement of markers on the body to identify anatomical locations and guide the pose fitting. The markers are either physically placed on the body before scanning or placed in software as a postprocessing step. Some other methods detect key points on the scan using 3D feature descriptors to automate the placement of markers. They usually require a large database of 3D scans. We propose to automatically estimate the body pose of a person from a 3D mesh acquired by standard 3D body scanners, with or without texture. To fit a human model to the scan, we use joint locations as anchors. These are detected from multiple 2D views using a conventional body joint detector working on images. In contrast to existing approaches, the proposed method is fully automatic, and takes advantage of the robustness of state-of-art 2D joint detectors. The proposed approach is validated on scans of people in different poses wearing garments of various thicknesses and on scans of one person in multiple poses with known ground truth wearing close-fitting clothing. [less ▲]

Detailed reference viewed: 188 (33 UL)
Full Text
Peer Reviewed
See detailTowards Autonomous Self-localization of Small Mobile Robots using Reservoir Computing and Slow Feature Analysis
Antonelo, Eric Aislan UL; Schrauwen, Benjamin

in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2009)

Biological systems such as rats have special brain structures which process spatial information from the environment. They have efficient and robust localization abilities provided by special neurons in ... [more ▼]

Biological systems such as rats have special brain structures which process spatial information from the environment. They have efficient and robust localization abilities provided by special neurons in the hippocampus, namely place cells. This work proposes a biologically plausible architecture which is based on three recently developed techniques: Reservoir Computing (RC), Slow Feature Analysis (SFA), and Independent Component Analysis (ICA). The bottom layer of our RC-SFA architecture is a reservoir of recurrent nodes which process the information from the robot's distance sensors. It provides a temporal kernel of rich dynamics which is used by the upper two layers (SFA and ICA) to autonomously learn place cells. Experiments with an e-puck robot with 8 infra-red sensors (which measure distances in [4-30] cm) show that the learning system based on RC-SFA provides a self-organized formation of place cells that can either distinguish between two rooms or to detect the corridor connecting them. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailTowards Bidirectional Engineering of Satellite Control Procedures Using Triple Graph Grammars
Gottmann, Susann UL; Hermann, Frank UL; Ermel, Claudia et al

in Jacquet, Christophe; Balasubramanian, Daniel; Jones, Edward (Eds.) et al Proc. Int. Workshop on Multi-Paradigm Modeling 2013 (MPM'13) (2013)

The development and maintenance of satellite control software are very complex, mission-critical and cost-intensive tasks that require expertise from different domains. In order to adequately address ... [more ▼]

The development and maintenance of satellite control software are very complex, mission-critical and cost-intensive tasks that require expertise from different domains. In order to adequately address these challenges, we propose to use visual views of the software to provide concise abstractions of the system from different perspectives. This paper introduces a visual language for process flow models of satellite control procedures that we developed in cooperation with the industrial partner SES for the satellite control language SPELL. Furthermore, we present a general and formal bidirectional engineering approach for automatically translating satellite control procedures into corresponding process flow visualisations. The bidirectional engineering framework is supported by a visual editor based on Eclipse GMF, the transformation tool HenshinTGG, and additional extensions to meet requirements set up by the specific application area of satellite control languages. [less ▲]

Detailed reference viewed: 82 (21 UL)
Full Text
Peer Reviewed
See detailTowards Black Box Testing of Android Apps
Zhauniarovich, Yury; Philippov, Anton; Gadyatskaya, Olga UL et al

in Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES) (2015, August)

Many state-of-art mobile application testing frameworks (e.g., Dynodroid, EvoDroid) enjoy Emma or other code coverage libraries to measure the coverage achieved. The underlying assumption for these ... [more ▼]

Many state-of-art mobile application testing frameworks (e.g., Dynodroid, EvoDroid) enjoy Emma or other code coverage libraries to measure the coverage achieved. The underlying assumption for these frameworks is availability of the app source code. Yet, application markets and security researchers face the need to test third-party mobile applications in the absence of the source code. There exists a number of frameworks both for manual and automated test generation that address this challenge. However, these frameworks often do not provide any statistics on the code coverage achieved, or provide coarse-grained ones like a number of activities or methods covered. At the same time, given two test reports generated by different frameworks, there is no way to understand which one achieved better coverage if the reported metrics were different (or no coverage results were provided). To address these issues we designed a framework called BBOXTESTER that is able to generate code coverage reports and produce uniform coverage metrics in testing without the source code. Security researchers can automatically execute applications exploiting current stateof- art tools, and use the results of our framework to assess if the security-critical code was covered by the tests. In this paper we report on design and implementation of BBOXTESTER and assess its efficiency and effectiveness. [less ▲]

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailTowards Characterizing Bluetooth Discovery in a Vehicular Context
Bronzi, Walter UL; Derrmann, Thierry UL; Castignani, German UL et al

in Vehicular Networking Conference (VNC), 2016 IEEE (2016, December)

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever ... [more ▼]

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever increasing number of discoverable devices both inside and outside a populated area gives us an encouraging insight on future research directions for this technology. In this paper, based on a sensing system developed as an Android application, we evaluate Bluetooth Classic and Low Energy discovery characteristics from a vehic- ular perspective. By recording information about devices nearby (e.g. the number of discovered devices, their signal strength, manufacturer information) and the GPS location we can derive interesting information about a driver’s situation, as well as his/her environment. Presented results indicate that the amount of discovered devices and signal strengths are dependent on velocity and road category. Finally, future work and discussions address potential use-case applications based only on Bluetooth discovery, such as low energy and privacy friendly road and traffic context awareness. The sensing system used in this article is free online under the MIT License. [less ▲]

Detailed reference viewed: 178 (23 UL)
Full Text
Peer Reviewed
See detailTowards Cognitive Internet: an Evolutionary Vision
Granelli, Fabrizio; Kliazovich, Dzmitry UL; Malheiros, Neumar

in Cognitive Radio and Networking for Heterogeneous Wireless Networks (2014)

Detailed reference viewed: 49 (1 UL)
Full Text
Peer Reviewed
See detailTowards Collaborative Traffic Sensing using Mobile Phones
Frank, Raphaël UL; Mouton, Maximilien UL; Engel, Thomas UL

in Proceedings of the IEEE Vehicular Networking Conference 2012 (2012)

Participatory mobile sensing applications are becoming increasingly popular. The growing population of privately-held mobile smartphones enables a plethora of new services. One of the most promising ... [more ▼]

Participatory mobile sensing applications are becoming increasingly popular. The growing population of privately-held mobile smartphones enables a plethora of new services. One of the most promising application areas is collaborative traffic sensing. Here, smartphones are used as mobile sensors to collect and share relevant location information in order to reconstruct a global picture of the traffic situation in a monitored area. There are several challenges that need to be addressed in order to provide an efficient and ubiquitous service. In this talk we present how low-cost mobile smartphones can be used for such services without compromising the everyday usage of the device. We first test several sensing policies and evaluate how they affect location accuracy and battery life. We then perform a penetration rate study to identify the proportion of participants required to provide good service by varying several parameters. The outcome shows that if configured correctly, smartphones can be used as accurate mobile traffic sensors providing important information even at low penetration rates. [less ▲]

Detailed reference viewed: 86 (3 UL)
Full Text
See detailTowards combined global monthly gravity field solutions
Jäggi, Adrian; Meyer, Ulrich; Weigelt, Matthias UL et al

Scientific Conference (2014, April)

Detailed reference viewed: 71 (0 UL)
Full Text
See detailTowards combined global monthly gravity field solutions
Jäggi, A.; Meyer, U.; Beutler, G. et al

Scientific Conference (2013, October)

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailTowards Computational Models for a Long-term Interaction with an Artificial Conversational Companion
Danilava, Sviatlana UL; Busemann, Stephan; Schommer, Christoph UL et al

in Proceedings "5th International Conference on Agents an Artificial Intelligence" (2013)

Detailed reference viewed: 134 (12 UL)
Peer Reviewed
See detailTowards computerized analysis of folksong
Sagrillo, Damien UL

in Muzyka, XLVIII (2003), 1

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailTowards Connectivity Improvement in VANETs using Bypass Links
Dorronsoro, Bernabé UL; Ruiz, Patricia UL; Danoy, Grégoire UL et al

in Abstract book of 2009 IEEE Congress on Evolutionary Computation (2009)

Detailed reference viewed: 166 (7 UL)
Full Text
See detailTowards consolidated methods for the design and evaluation of user experience
Lallemand, Carine UL

Doctoral thesis (2015)

In the “third wave” of Human-Computer Interaction (HCI), the emergence of User Experience (UX) as a key concept has opened up both exciting perspectives and hard challenges. The conceptual shift to a more ... [more ▼]

In the “third wave” of Human-Computer Interaction (HCI), the emergence of User Experience (UX) as a key concept has opened up both exciting perspectives and hard challenges. The conceptual shift to a more comprehensive and emotional view of human-computer interactions has been accompanied by the development of numerous methods and tools for the design and evaluation of interactive systems. UX research has thus been mainly driven by novelty and innovation and to date a majority of the developed tools lack validation and consolidation. UX research undoubtedly raises new concerns and challenges common conceptual and methodological practice. Thus the primary objective of this thesis is to contribute to UX consolidation. We addressed this objective by relying on a mixed-methods approach for the empirical part of this thesis, involving comparatively large and representative samples. This part encompasses six studies, representing a variety of perspectives related to UX research consolidation. More specifically, this dissertation includes a replication study (Paper A, N = 758), the translation and validation of a tool (Paper B, N = 381), the development of new design and evaluation methods (Paper C and D, N = 137 and 33), the empirical assessment of the relevance of established HCI methods for the evaluation of UX (Paper E, N = 103) and finally an investigation on how to bridge UX research and practice through a design approach (Paper F). The contributions of this thesis to UX research and practice regard both UX as a concept and its methodologies. Main findings inform about the benefits, challenges, and limitations of UX consolidation strategies as derived from our respective studies (papers A to F). Each study provides advances to both research and practice, while the combination of our studies pushes forward consolidation of UX. This is an essential step with regards to an emerging concept and informs an overarching research agenda aiming at a continuous interdisciplinary fostering of the UX field. [less ▲]

Detailed reference viewed: 754 (57 UL)
Full Text
Peer Reviewed
See detailTowards Dependable CPS Infrastructures: Architectural and Operating-System Challenges
Volp, Marcus UL; Asmussen, Nils; Härtig, Hermann et al

Scientific Conference (2015)

Detailed reference viewed: 155 (25 UL)
Full Text
See detailTowards Dialogue Games for the Down-Admissible and Up-Complete Procedures
Caminada, Martin; Booth, Richard UL

E-print/Working paper (2014)

Recently, two operators - the down-admissible and up-complete operators - have been proposed, in the context of aggregating argument labellings, for repairing a given initial labelling so that it becomes ... [more ▼]

Recently, two operators - the down-admissible and up-complete operators - have been proposed, in the context of aggregating argument labellings, for repairing a given initial labelling so that it becomes rational, in the sense that it respects the attack relation between the arguments. The purpose of this research note is to give some initial thoughts on defining dialogue games for each of them, as well as for their combination. [less ▲]

Detailed reference viewed: 51 (1 UL)