Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailTo AND or To OR: On Energy-Efficient Distributed Spectrum Sensing with Combined Censoring and Sleeping
Maleki, Sina UL; Leus, Geert; Chatzinotas, Symeon UL et al

in IEEE Transactions on Wireless Communications (2015)

Distributed spectrum sensing improves the detection reliability of a cognitive radio network but generally comes at the price of a large power consumption. Since cognitive radios are generally low-power ... [more ▼]

Distributed spectrum sensing improves the detection reliability of a cognitive radio network but generally comes at the price of a large power consumption. Since cognitive radios are generally low-power sensors with limited batteries, a combined censoring and sleeping scheme is considered as an energy-efficient algorithm for distributed spectrum sensing. Each sensor switches off its sensing module with a specific sleeping rate. When the sensor is on, a censoring policy is employed in order to send the sensing result to the fusion center. The result is only transmitted, if it is deemed to be informative. Hence, the energy consumption of each sensor, including the sensing and transmission energies, is reduced. The underlying sensing parameters are derived by minimizing the maximum average energy consumption per sensor subject to a lower-bound on the global probability of detection and an upper-bound on the global probability of false alarm. We analyze the problem for the OR and the AND rule and provide a performance analysis for a case study based on the IEEE 802.15.4/ZigBee standard. It is shown that the combined censoring and sleeping scheme achieves a significant energy saving compared to the case where no censoring or sleeping is taken into account. [less ▲]

Detailed reference viewed: 170 (8 UL)
Full Text
Peer Reviewed
See detail"To be or not to be" is not "to kill or not to kill", a logic on action negation
Sun, Xin UL

Scientific Conference (2013)

Detailed reference viewed: 39 (5 UL)
Full Text
See detailTo be or not to be: How the Luxembourgish government is preparing for Brexit
Vysotskaya, Volha UL; Vukovich, Lilla UL; Bissinger, Jutta UL et al

E-print/Working paper (2019)

This article summarizes the potential impact of BREXIT on Luxembourg (as seen by April 2019).

Detailed reference viewed: 68 (23 UL)
Full Text
Peer Reviewed
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs UL; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the ... [more ▼]

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to maximize its pay- o while ensuring the desired level of integrity for the out- sourced computation. We de ne two Stackelberg games and analyze the optimal setting's sensitivity for the parameters of the model. [less ▲]

Detailed reference viewed: 93 (8 UL)
Full Text
Peer Reviewed
See detail„To force or not to force. That is the question!“ – Die Auswirkungen des Einsatzes von Forced-Response-Fragen auf die Befragungsergebnisse –
Mergener, Alexandra; Sischka, Philipp UL; Decieux, Jean Philippe Pierre UL

Poster (2014)

Die Methode der Onlinebefragung hat sich innerhalb des letzten Jahrzehnts als Befragungsroutine etabliert. Sie ist zumeist mit niedrigen Kosten verbunden und ermöglicht es innerhalb kürzester Zeit hohe ... [more ▼]

Die Methode der Onlinebefragung hat sich innerhalb des letzten Jahrzehnts als Befragungsroutine etabliert. Sie ist zumeist mit niedrigen Kosten verbunden und ermöglicht es innerhalb kürzester Zeit hohe Fallzahlen zu erzielen sowie „fundierte“ Ergebnisse zu generieren. Dies führte einerseits zu einer Demokratisierung der Umfrageforschung, denn mithilfe der Onlinebefragung ist es nahezu jedem möglich ein Befragungsprojekt durchzuführen. Andererseits resultiert daraus aber auch, dass viele Befragungen von Laien durchgeführt werden, dadurch eine schlechte Qualität aufweisen und zahlreiche Operationalisierungsfehler enthalten (Jacob/Heinz/Décieux 2013; Schnell/Hill/Esser 2011). Ein Beispiel hierfür ist die Verwendung der Forced Response Option, deren Auswirkungen innerhalb dieses Forschungsprojektes untersucht werden. Theoretischer Hintergrund des Projektes Als Forced-Response wird allgemein die Möglichkeit bezeichnet den Respondenten einer Umfrage zur Beantwortung einer Frage zu verpflichten. Bei den meisten Programmpaketen zur Durchführung eines Onlinesurveys ist dies auf einfachste Art und Weise zu realisieren. Diese Praxis kommt zuweilen sehr häufig auch zur Anwendung, ohne dass sich die Fragesteller über eventuelle Folgen ihrer Wahl bewusst sind. In den Handbüchern der Programme (bspw. EFS Survey Manual 9.0) wird diese Option als eine Lösung angepriesen, die den Item Non Response verringert. In der Methodenliteratur gibt es jedoch zahlreiche Bedenken und Gegenstimmen für diese Vor-gehens¬weise (Kaczmirek 2005, Peytchev/Crawford 2005, Dillman/Smyth/Christian 2009, Schnell/ Hill/Esser 2011, Jacob/Heinz/Décieux 2013). Diese Bedenken speisen sich aus der Über¬legung, dass der Befragte plausible Gründe haben kann, um nicht zu antworten (der Befragte versteht die Frage nicht, die entsprechende Antwortkategorie fehlt, der Befragte will die Frage aus persönlichen Gründen bewusst nicht beantworten, usw.). Verpflichtet man den Befragten unter diesen Umständen eine Antwort zu geben, könnte dies möglicherweise dazu führen, dass die Befragung abgebrochen wird oder der Befragte eine willkürliche/inhaltsunabhängige Antwort gibt. Zusammenfassend lassen sich damit zwei zentrale Thesen aufstellen: 1. Forced-Response führt zu erhöhtem Unit Non Response. 2. Forced-Response führt zu weniger validen Antworten (Lügen oder Zufallsantwort). Allerdings gibt es bisher kaum empirische Untersuchungen, die diese Behauptungen belegen. Ziel des Projektes Über Split Ballot Experimente werden die genauen Folgen der Implementierung einer Forced-Response-Option empirisch abgebildet. Die Folgen sollen über die Analyse von Abbruchquoten und Antwortreaktionszeiten dargestellt werden. Die Feldphase des Online-Experiments endet Mitte Juli 2014, sodass wir dann in der Lage sind, aktuelle und bisher nicht veröffentlichte Ergebnisse auf dem Kongress zu präsentieren. [less ▲]

Detailed reference viewed: 130 (32 UL)
Full Text
Peer Reviewed
See detail„To force or not to force. That is the question!“: Die Auswirkungen des Einsatzes von Forced-Response-Fragen auf die Qualität der Befragungsergebnisse
Mergener, Alexandra; Sischka, Philipp UL; Decieux, Jean Philippe Pierre UL

in Verhandlungen der Kongresse der Deutschen Gesellschaft für Soziologie (2015), 1

Die Methode der Onlinebefragung hat sich innerhalb des letzten Jahrzehnts als Befragungsroutine etabliert. Sie ist zumeist mit niedrigen Kosten verbunden und ermöglicht es innerhalb kürzester Zeit hohe ... [more ▼]

Die Methode der Onlinebefragung hat sich innerhalb des letzten Jahrzehnts als Befragungsroutine etabliert. Sie ist zumeist mit niedrigen Kosten verbunden und ermöglicht es innerhalb kürzester Zeit hohe Fallzahlen zu erzielen sowie „fundierte“ Ergebnisse zu generieren. Dies führte einerseits zu einer Demokratisierung der Umfrageforschung, denn mithilfe der Onlinebefragung ist es nahezu jedem möglich ein Befragungsprojekt durchzuführen. Andererseits resultiert daraus aber auch, dass viele Befragungen von Laien durchgeführt werden, dadurch eine schlechte Qualität aufweisen und zahlreiche Operationalisierungsfehler enthalten. Ein Beispiel hierfür ist die Verwendung der Forced Response Option, deren Auswirkungen innerhalb dieses Forschungsprojektes untersucht werden. Theoretischer Hintergrund des Projektes Als Forced-Response wird allgemein die Möglichkeit bezeichnet den Respondenten einer Umfrage zur Beantwortung einer Frage zu verpflichten. Bei den meisten Programmpaketen zur Durchführung eines Onlinesurveys ist dies auf einfachste Art und Weise zu realisieren. Diese Praxis kommt zuweilen sehr häufig auch zur Anwendung, ohne dass sich die Fragesteller über eventuelle Folgen ihrer Wahl bewusst sind. In den Handbüchern der Programme wird diese Option als eine Lösung angepriesen, die den Item Non Response verringert. In der Methodenliteratur gibt es jedoch zahlreiche Bedenken und Gegenstimmen für diese Vor-gehens¬weise. Diese Bedenken speisen sich aus der Über¬legung, dass der Befragte plausible Gründe haben kann, um nicht zu antworten (der Befragte versteht die Frage nicht, die entsprechende Antwortkategorie fehlt, der Befragte will die Frage aus persönlichen Gründen bewusst nicht beantworten, usw.). Verpflichtet man den Befragten unter diesen Umständen eine Antwort zu geben, könnte dies möglicherweise dazu führen, dass die Befragung abgebrochen wird oder der Befragte eine willkürliche/inhaltsunabhängige Antwort gibt. Forschungshypothesen und Design Zusammenfassend lassen sich damit zwei zentrale Thesen aufstellen: 1. Forced-Response führt zu erhöhtem Unit Non Response. 2. Forced-Response führt zu weniger validen Antworten (Lügen oder Zufallsantwort). Allerdings gibt es bisher kaum empirische Untersuchungen, die diese Behauptungen belegen. Hier setzt diese Studie an und untersucht über ein Split Ballot Experiment die Folgen der Implementierung der Forced-Response-Option. Ergebnisse Diese zeigen, dass die Respondenten früher abbrechen beziehungsweise die neu¬trale Antwortkategorie häufiger wählen. Weiterhin zeigt sich, dass unter Antwortzwang die sozial wünschenswerte Antwortkategorie signifikant häufiger gewählt wurde [less ▲]

Detailed reference viewed: 324 (33 UL)
See detailTo Google or not to Google, have a look at Ranke2!
Scagliola, Stefania UL

in Scagliola, Stefania (Ed.) To Google or not to Google, have a look at Ranke2! (2018)

Ranke 2 is a platform for digital source criticism with lessons in a variety of time effort and complexity. It is meant to lecturers and students to deal with critically questioning sources that can be ... [more ▼]

Ranke 2 is a platform for digital source criticism with lessons in a variety of time effort and complexity. It is meant to lecturers and students to deal with critically questioning sources that can be found on the web. [less ▲]

Detailed reference viewed: 13 (4 UL)
Full Text
Peer Reviewed
See detailTo Migrate With orWithout the Children—A Theoretical Note
Chen, Yiwen UL; Zou, Benteng UL

in Economics Bulletin (2017), 37(2), 686-696

Tens of millions of young children were left behind by their migrant parents who left to find a job elsewhere to gain a better income and improve their families' living standards. Many studies suggest ... [more ▼]

Tens of millions of young children were left behind by their migrant parents who left to find a job elsewhere to gain a better income and improve their families' living standards. Many studies suggest that migrant parents should bring their children rather than leave them behind, especially EU internal migrants. In this short note, we give an economic reasoning for the choice of migrant parents. Our finding shows that emotionally, bringing the children makes both children and parents better off; however, economically, that may not be the case. The ambiguity depends on the forgone opportunity cost, relocation cost of children, children's motivation, and the quality of the public school at the origin and destination. [less ▲]

Detailed reference viewed: 136 (14 UL)
Full Text
Peer Reviewed
See detailTo MigrateWith orWithout Ones’ Children in China - That is the Question
Chen, Yiwen UL; Fromentin, Vincent; Zou, Benteng UL

in Annals of Eceonomcis and statistics (2019)

Where should Chinese internal migrant parents locate their school-aged children: migrate with them or leave them behind? And should they invest in private education of their children? We investigate ... [more ▼]

Where should Chinese internal migrant parents locate their school-aged children: migrate with them or leave them behind? And should they invest in private education of their children? We investigate whether migrant parents can afford to take their children to migrate and thus provide theoretical optimum that maximizes migrant parents’ utility which includes the children’s educational performance. Depending on the educational investment parents make and the relocation cost of children, we provide necessary and sufficient conditions under which migrant parents should take their children to migrate and conditions under which migrant parents should provide their children with private education. [less ▲]

Detailed reference viewed: 42 (3 UL)
Full Text
See detailTo MigrateWith orWithout Ones’ Children in China - That is the Question
Chen, Yiwen UL; Fromentin, Vincent; Salagean, Ioana et al

E-print/Working paper (2017)

Where should Chinese internal migrant parents locate their school-aged children: migrate with them or leave them behind? And should they invest in private education of their children? Empirical evidence ... [more ▼]

Where should Chinese internal migrant parents locate their school-aged children: migrate with them or leave them behind? And should they invest in private education of their children? Empirical evidence based on the 2009 wave of the Rural-Urban Migration Survey in China (RUMiC) data is inconclusive. We use an overlapping generations model to find a theoretical optimum that maximizes parents’ utility which includes the children’s educational performance. Depending on the educational investment parents make and the relocation cost of children, we provide necessary and sufficient conditions for migrant parents to take their children to migrate and whether they should provide their children with private education. As the choices of migrant parents affect not only their children’s human capital accumulation, but also on the economic potential of their descendants, we present both short- and long-term consequences of the parents decision. [less ▲]

Detailed reference viewed: 98 (7 UL)
Full Text
See detailTo Pay or Not to Pay’: A Historical and Legal Overview of the Question of WWII Reparations, and its Impact On European (dis?) Integration
Paravantis, Spero UL

Presentation (2017, March 30)

The conference “Benelux, Europe and the Cold War, the power of non-powers”, which took place on 30 and 31 March 2017 at the University of Luxembourg, was the first of three events planned in the FNR ... [more ▼]

The conference “Benelux, Europe and the Cold War, the power of non-powers”, which took place on 30 and 31 March 2017 at the University of Luxembourg, was the first of three events planned in the FNR-funded CORE junior project “Benelux”, as part of its public outreach and academic output objectives. The conference sought to highlight asymmetrical power relations in the Cold War period of European integration by examining European security. What was/is European security in the context of the Cold War? How was and is it conceived? What role did “non-powers” play in European security, and how did they help define it? This conference investigated these and other related questions by re-examining the US/European relationship in the early Cold War and the role that developments during this period played in the European integration movement. In so doing, the conference also showcased findings which helped unify historiographies of the Cold War and European integration. [less ▲]

Detailed reference viewed: 71 (5 UL)
Full Text
See detailTo refer or not to refer - A confession by a national judge
Ravarani, Georges UL

in Livre jubilaire édite à l'occasion du 20e anniversaire de l'EFTA Court (2014)

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailTo Score and to Protect? Big Data (and Privacy) Meet SME Credit Risk in the UK
Robinson, Gavin UL; Marriott, Jane

in International Data Privacy Law (2017), 7(1), 48-69

Recent UK legislation facilitating the credit scoring of small and medium-sized enterprises using Big Data techniques and Open Data sources threatens to further hollow out information management norms and ... [more ▼]

Recent UK legislation facilitating the credit scoring of small and medium-sized enterprises using Big Data techniques and Open Data sources threatens to further hollow out information management norms and data subject rights enshrined in privacy and data protection law just as it is gathering unprecedented momentum in courts and on statute books across the EU. After examining the economic rationale for such measures and their envisaged impact on the credit risk industry, we argue that the associated regulatory re-shuffling and privacy-related safeguards are highly unlikely to address adequately the serious accuracy, transparency, and accountability concerns of individual data subjects. Would the effective, full enforcement of data protection principles and data subject rights really cripple the credit reference industry to the detriment of the nascent economic recovery, or is there a middle path and will the forthcoming EU General Data Protection Regulation provide it? [less ▲]

Detailed reference viewed: 111 (4 UL)
Full Text
Peer Reviewed
See detailTo Segregate or to Separate? Special Education Expansion and Divergence in the United States and Germany
Powell, Justin J W UL

in Comparative Education Review (2009), 53(2), 161-187

Over the past two hundred years in the United States and Germany, special educational systems have been institutionalized to facilitate access to learning opportunities for children with disabilities ... [more ▼]

Over the past two hundred years in the United States and Germany, special educational systems have been institutionalized to facilitate access to learning opportunities for children with disabilities, difficulties, and disadvantages. Originally heralded as innovative, the positive views of these mainly segregating and separating educational facilities have been increasingly challenged. Despite a multitude of local, national, and international reform initiatives, Germany continues to serve the vast majority of children with special educational needs (SEN) in segregated special schools, whereas in the United States nearly all children with SEN are integrated in general schools, though most spend part of their school day outside the general classroom. This institutional analysis compares the genesis, expansion, and persistence of special education as a multitrack, separating system in the United States and as a dual‐track, segregating system in Germany. [less ▲]

Detailed reference viewed: 136 (6 UL)
Full Text
See detailTo Share or not to Share: Access Control and Information Inference in Social Networks
Zhang, Yang UL

Doctoral thesis (2016)

Online social networks (OSNs) have been the most successful online applications during the past decade. Leading players in the business, including Facebook, Twitter and Instagram, attract a huge number of ... [more ▼]

Online social networks (OSNs) have been the most successful online applications during the past decade. Leading players in the business, including Facebook, Twitter and Instagram, attract a huge number of users. Nowadays, OSNs have become a primary way for people to connect, communicate and share life moments. Although OSNs have brought a lot of convenience to our life, users' privacy, on the other hand, has become a major concern due to the large amount of personal data shared online. In this thesis, we study users' privacy in social networks from two aspects, namely access control and information inference. Access control is a mechanism, provided by OSNs, for users themselves to regulate who can view their resources. Access control schemes in OSNs are relationship-based, i.e., a user can define access control policies to allow others who are in a certain relationship with him to access his resources. Current OSNs have deployed multiple access control schemes, however most of these schemes do not satisfy users' expectations, due to expressiveness and usability. There are mainly two types of information that users share in OSNs, namely their activities and social relations. The information has provided an unprecedented chance for academia to understand human society and for industry to build appealing applications, such as personalized recommendation. However, the large quantity of data can also be used to infer a user's personal information, even though not shared by the user in OSNs. This thesis concentrates on users' privacy in online social networks from two aspects, i.e., access control and information inference, it is organized into two parts. The first part of this thesis addresses access control in social networks from three perspectives. First, we propose a formal framework based on a hybrid logic to model users' access control policies. This framework incorporates the notion of public information and provides users with a fine-grained way to control who can view their resources. Second, we design cryptographic protocols to enforce access control policies in OSNs. Under these protocols, a user can allow others to view his resources without leaking private information. Third, major OSN companies have deployed blacklist for users to enforce extra access control besides the normal access control policies. We formally model blacklist with the help of a hybrid logic and propose efficient algorithms to implement it in OSNs. The second part of this thesis concentrates on the inference of users' information in OSNs, using machine learning techniques. The targets of our inference are users' activities, represented by mobility, and social relations. First, we propose a method which uses a user's social relations to predict his locations. This method adopts a user's social community information to construct the location predictor, and perform the inference with machine learning techniques. Second, we focus on inferring the friendship between two users based on the common locations they have been to. We propose a notion namely location sociality that characterizes to which extent a location is suitable for conducting social activities, and use this notion for friendship prediction. Experiments on real life social network datasets have demonstrated the effectiveness of our two inferences. [less ▲]

Detailed reference viewed: 102 (14 UL)
Peer Reviewed
See detailTo use or not to use? Investigating the validity argument for the use of short scales in research settings
Kemper, Christoph UL; Becker, N.; Baudson, T. G. et al

Scientific Conference (2017, July)

Detailed reference viewed: 44 (3 UL)
Peer Reviewed
See detailTo use or not to use? Investigating the validity argument for the use of short scales in research settings.
Kemper, C. J.; Becker, N.; Baudson, Tanja Gabriele UL et al

Scientific Conference (2017)

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailTOA Estimation in UWB: Comparison between Time and Frequency Domain Processing
Lagunas, Eva UL; Taponecco, Lorenzo; Najar, Montse et al

in 2nd International ICST Conference on Mobile Lightweight Wireless Systems (MOBILIGHT), Barcelona, Spain, 10-12 May, 2010. (2010)

Detailed reference viewed: 63 (1 UL)
Full Text
Peer Reviewed
See detailTocopherol derivative TFA-12 promotes myelin repair in experimental models of multiple sclerosis.
Blanchard, Benoit; Heurtaux, Tony UL; Nait Oumesmar, Brahim

in Journal of Neuroscience (2013), 33(28), 11633-42

Detailed reference viewed: 56 (2 UL)