Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailTutorial d'installation de la distribution Debian
Varrette, Sébastien UL

Report (2005)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailA Tutorial on Bayesian Inference to Identify Material Parameters in Solid Mechanics
Rappel, Hussein UL; Beex, Lars UL; Hale, Jack UL et al

in Archives of Computational Methods in Engineering (2019)

The aim of this contribution is to explain in a straightforward manner how Bayesian inference can be used to identify material parameters of material models for solids. Bayesian approaches have already ... [more ▼]

The aim of this contribution is to explain in a straightforward manner how Bayesian inference can be used to identify material parameters of material models for solids. Bayesian approaches have already been used for this purpose, but most of the literature is not necessarily easy to understand for those new to the field. The reason for this is that most literature focuses either on complex statistical and machine learning concepts and/or on relatively complex mechanical models. In order to introduce the approach as gently as possible, we only focus on stress–strain measurements coming from uniaxial tensile tests and we only treat elastic and elastoplastic material models. Furthermore, the stress–strain measurements are created artificially in order to allow a one-to-one comparison between the true parameter values and the identified parameter distributions. [less ▲]

Detailed reference viewed: 377 (69 UL)
Full Text
See detailA tutorial on multiple crack growth and intersections with XFEM
Sutula, Danas; Bordas, Stéphane UL

Presentation (2015, May 12)

Detailed reference viewed: 174 (10 UL)
Full Text
See detailTutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges
Varrette, Sébastien UL

Learning material (2016)

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper ... [more ▼]

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper such as the code, data, etc. that can be used to reproduce the results and create new work based on the research.” Source: Wikipedia. The need for reproducibility is increasing dramatically as data analyses become more complex, involving larger datasets and more sophisticated computations. Obviously, the advent of the Cloud Computing paradigm is expected to provide the appropriate means for RR. This tutorial is meant to provide an overview of sensible tools every researcher (in computer science but not only) should be aware of to enable RR in its own work. In particular, and after a general talk presenting RR and the existing associated tools and workflow, this tutorial will propose several practical exercises and hands-on meant to be performed on each attendee’s laptop, to cover the management of sharable Development environment using Vagrant. Resources of this tutorial will be available on Github. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
See detailTutorials for using the Digraph3 Python software collection
Bisdorff, Raymond UL

Learning material (2019)

The documentation contains a set of tutorials introducing the main objects like digraphs, outranking digraphs and performance tableaux. There is also a tutorial provided on undirected graphs. Some ... [more ▼]

The documentation contains a set of tutorials introducing the main objects like digraphs, outranking digraphs and performance tableaux. There is also a tutorial provided on undirected graphs. Some tutorials are problem oriented and show how to compute the winner of an election, how to build a best choice recommendation, or how to linearly rank with multiple incommensurable ranking criteria. Other tutorials concern more specifically operational aspects of computing maximal independent sets (MISs) and kernels in graphs and digraphs. The tutorial about split, interval and permutation graphs is inspired by Martin Ch. Golumbic’s book on Algorithmic Graph Theory and Perfect Graphs. Finally, we provide a tutorial on tree graphs and spanning forests. [less ▲]

Detailed reference viewed: 77 (9 UL)
Peer Reviewed
See detailTutoring and its effect on teachers.
Weber, Jean-Marie UL; Voynova, Ruzhena UL

Scientific Conference (2017, July)

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailTweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
Cogliati, Benoît-Michel UL

in Designs, Codes and Cryptography (2018)

In this paper, we present a generic construction to create a secure tweakable block cipher from a secure block cipher. Our construction is very natural, requiring four calls to the underlying block cipher ... [more ▼]

In this paper, we present a generic construction to create a secure tweakable block cipher from a secure block cipher. Our construction is very natural, requiring four calls to the underlying block cipher for each call of the tweakable block cipher. Moreover, it is provably secure in the standard model while keeping the security degradation minimal in the multi-user setting. In more details, if the underlying blockcipher E uses n-bit blocks and 2n-bit keys, then our construction is proven secure against multi-user adversaries using up to roughly 2n time and queries as long as E is a secure block cipher. [less ▲]

Detailed reference viewed: 52 (5 UL)
See detailTwentieth-Century Fiction From Text to Context
Weber, Jean-Jacques UL; Verdonk, Peter

Book published by Routledge (1995)

Detailed reference viewed: 59 (0 UL)
See detailTwenty Years of Bialowieza: A Mathematical Anthology Aspects of differential geometric methods in physics
Ali, Syed Twareque UL; Emch, Gerald; Odzijewicz, Anatol et al

Book published by World Scientific (2005)

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailTwenty years of Escaping the Java Sandbox
Bartel, Alexandre UL; Doe, John

Article for general public (2018)

The Java platform is broadly deployed on billions of devices, from servers and desktop workstations to consumer electronics. It was originally designed to implement an elaborate security model, the Java ... [more ▼]

The Java platform is broadly deployed on billions of devices, from servers and desktop workstations to consumer electronics. It was originally designed to implement an elaborate security model, the Java sandbox, that allows for the secure execution of code retrieved from potentially untrusted remote machines without putting the host machine at risk. Concretely, this sandboxing approach is used to secure the execution of untrusted Java applications such as Java applets in the web browser. Unfortunately, critical security bugs -- enabling a total bypass of the sandbox -- affected every single major version of the Java platform since its introduction. Despite major efforts to fix and revise the platform's security mechanisms over the course of two decades, critical security vulnerabilities are still being found. In this work, we review the past and present of Java insecurity. Our goal is to provide an overview of how Java platform security fails, such that we can learn from the past mistakes. All security vulnerabilities presented here are already known and fixed in current versions of the Java runtime, we discuss them for educational purposes only. This case study has been made in the hope that we gain insights that help us design better systems in the future. [less ▲]

Detailed reference viewed: 47 (8 UL)
See detailTwin Studies.
Spinath, F.M.; Gottschling, Juliana UL

in Encyclopedia of Personality and Individual Differences (2017)

Detailed reference viewed: 13 (4 UL)
Full Text
See detailThe twin-PhD model contributs to knowledge production in Africa
Cubaka, Vincent Kalumire; Schriver, Michael; Uwizihiwe, Jean Paul et al

in The Lancet (2019), 393(10191), 2590

Detailed reference viewed: 63 (0 UL)
Full Text
Peer Reviewed
See detailTwisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Chu, Dalin; Groszschädl, Johann UL; Liu, Zhe UL et al

in Chen, Kefei; Xie, Qi; Qiu, Weidong (Eds.) et al Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress ... [more ▼]

Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve Cryptography (ECC) for WSNs is still a very active research topic and techniques to further reduce the time and energy cost of ECC are eagerly sought. This paper presents an optimized ECC implementation that we developed from scratch to comply with the severe resource constraints of 8-bit sensor nodes such as the MICAz and IRIS motes. Our ECC software uses Optimal Prime Fields (OPFs) as underlying algebraic structure and supports two different families of elliptic curves, namely Weierstraß-form and twisted Edwards-form curves. Due to the combination of efficient field arithmetic and fast group operations, we achieve an execution time of 5.8*10^6 clock cycles for a full 158-bit scalar multiplication on an 8-bit ATmega128 microcontroller, which is 2.78 times faster than the widely-used TinyECC library. Our implementation also shows that the energy cost of scalar multiplication on a MICAz (or IRIS) mote amounts to just 19 mJ when using a twisted Edwards curve over a 160-bit OPF. This result compares fairly well with the energy figures of two recently-presented hardware designs of ECC based on twisted Edwards curves. [less ▲]

Detailed reference viewed: 268 (41 UL)
Full Text
Peer Reviewed
See detailTwistor space observables and quasi-amplitudes in 4D higher spin gravity
Colombo, Nicolo UL; Sundell, Per

in Journal of High Energy Physics [=JHEP] (2010)

Vasiliev equations facilitate globally defined formulations of higher-spin gravity in various correspondence spaces associated with different phases of the theory. In the four-dimensional case this ... [more ▼]

Vasiliev equations facilitate globally defined formulations of higher-spin gravity in various correspondence spaces associated with different phases of the theory. In the four-dimensional case this induces a map from a generally covariant formulation in spacetime with higher-derivative interactions to a formulation in terms of a deformed symplectic structure on a noncommutative doubled twistor space, sending spacetime boundary conditions to various sectors of an associative star-product algebra. We look at observables given by integrals over twistor space defining composite zero-forms in spacetime that do not break any local symmetries and that are closed on shell. They can be evaluated locally in spacetime and interpreted as building blocks for dual amplitudes. To regularize potential twistor-space divergencies arising in their curvature expansion, we propose a closed-contour prescription that respects associativity and hence higher-spin gauge symmetry. As a sample calculation, we examine next-to-leading corrections to quasi-amplitudes for twistor-space plane waves, and find cancellations that we interpret using transgression properties in twistor space. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailTwitter data as primary sources for historians: a critical approach
Clavert, Frédéric UL; Papastamkou, Sofia

Scientific Conference (2018, October 25)

Detailed reference viewed: 56 (7 UL)