Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
See detailA tutorial on multiple crack growth and intersections with XFEM
Sutula, Danas; Bordas, Stéphane UL

Presentation (2015, May 12)

Detailed reference viewed: 188 (10 UL)
Full Text
Peer Reviewed
See detailTutorial on Reasoning in Expressive Non-Classical Logics with Isabelle/HOL
Steen, Alexander UL; Wisniewski, Max; Benzmüller, Christoph UL

in Benzmüller, Christoph; Sutcliffe, Geoff; Rojas, Raul (Eds.) GCAI 2016, 2nd Global Conference on Artificial Intelligence (2016, September 29)

Detailed reference viewed: 38 (0 UL)
Full Text
See detailTutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges
Varrette, Sébastien UL

Learning material (2016)

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper ... [more ▼]

The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper such as the code, data, etc. that can be used to reproduce the results and create new work based on the research.” Source: Wikipedia. The need for reproducibility is increasing dramatically as data analyses become more complex, involving larger datasets and more sophisticated computations. Obviously, the advent of the Cloud Computing paradigm is expected to provide the appropriate means for RR. This tutorial is meant to provide an overview of sensible tools every researcher (in computer science but not only) should be aware of to enable RR in its own work. In particular, and after a general talk presenting RR and the existing associated tools and workflow, this tutorial will propose several practical exercises and hands-on meant to be performed on each attendee’s laptop, to cover the management of sharable Development environment using Vagrant. Resources of this tutorial will be available on Github. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
See detailTutorials for using the Digraph3 Python software collection
Bisdorff, Raymond UL

Learning material (2019)

The documentation contains a set of tutorials introducing the main objects like digraphs, outranking digraphs and performance tableaux. There is also a tutorial provided on undirected graphs. Some ... [more ▼]

The documentation contains a set of tutorials introducing the main objects like digraphs, outranking digraphs and performance tableaux. There is also a tutorial provided on undirected graphs. Some tutorials are problem oriented and show how to compute the winner of an election, how to build a best choice recommendation, or how to linearly rank with multiple incommensurable ranking criteria. Other tutorials concern more specifically operational aspects of computing maximal independent sets (MISs) and kernels in graphs and digraphs. The tutorial about split, interval and permutation graphs is inspired by Martin Ch. Golumbic’s book on Algorithmic Graph Theory and Perfect Graphs. Finally, we provide a tutorial on tree graphs and spanning forests. [less ▲]

Detailed reference viewed: 109 (12 UL)
Peer Reviewed
See detailTutoring and its effect on teachers.
Weber, Jean-Marie UL; Voynova, Ruzhena UL

Scientific Conference (2017, July)

Detailed reference viewed: 42 (3 UL)
Full Text
Peer Reviewed
See detailTweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
Cogliati, Benoît-Michel UL

in Designs, Codes and Cryptography (2018)

In this paper, we present a generic construction to create a secure tweakable block cipher from a secure block cipher. Our construction is very natural, requiring four calls to the underlying block cipher ... [more ▼]

In this paper, we present a generic construction to create a secure tweakable block cipher from a secure block cipher. Our construction is very natural, requiring four calls to the underlying block cipher for each call of the tweakable block cipher. Moreover, it is provably secure in the standard model while keeping the security degradation minimal in the multi-user setting. In more details, if the underlying blockcipher E uses n-bit blocks and 2n-bit keys, then our construction is proven secure against multi-user adversaries using up to roughly 2n time and queries as long as E is a secure block cipher. [less ▲]

Detailed reference viewed: 89 (6 UL)
See detailTwentieth-Century Fiction From Text to Context
Weber, Jean-Jacques UL; Verdonk, Peter

Book published by Routledge (1995)

Detailed reference viewed: 92 (0 UL)
See detailTwenty Years of Bialowieza: A Mathematical Anthology Aspects of differential geometric methods in physics
Ali, Syed Twareque UL; Emch, Gerald; Odzijewicz, Anatol et al

Book published by World Scientific (2005)

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailTwenty years of Escaping the Java Sandbox
Bartel, Alexandre UL; Doe, John

Article for general public (2018)

The Java platform is broadly deployed on billions of devices, from servers and desktop workstations to consumer electronics. It was originally designed to implement an elaborate security model, the Java ... [more ▼]

The Java platform is broadly deployed on billions of devices, from servers and desktop workstations to consumer electronics. It was originally designed to implement an elaborate security model, the Java sandbox, that allows for the secure execution of code retrieved from potentially untrusted remote machines without putting the host machine at risk. Concretely, this sandboxing approach is used to secure the execution of untrusted Java applications such as Java applets in the web browser. Unfortunately, critical security bugs -- enabling a total bypass of the sandbox -- affected every single major version of the Java platform since its introduction. Despite major efforts to fix and revise the platform's security mechanisms over the course of two decades, critical security vulnerabilities are still being found. In this work, we review the past and present of Java insecurity. Our goal is to provide an overview of how Java platform security fails, such that we can learn from the past mistakes. All security vulnerabilities presented here are already known and fixed in current versions of the Java runtime, we discuss them for educational purposes only. This case study has been made in the hope that we gain insights that help us design better systems in the future. [less ▲]

Detailed reference viewed: 115 (12 UL)
Full Text
Peer Reviewed
See detailTwin Research in the Post-Genomic Era: Dissecting the Pathophysiological Effects of Adversity and the Social Environment
Turner, Jonathan UL; D'Ambrosio, Conchita UL; Vögele, Claus UL et al

in International Journal of Molecular Sciences (2020), 21

The role of twins in research is evolving as we move further into the post-genomic era. With the re-definition of what a gene is, it is becoming clear that biological family members who share a specific ... [more ▼]

The role of twins in research is evolving as we move further into the post-genomic era. With the re-definition of what a gene is, it is becoming clear that biological family members who share a specific genetic variant may well not have a similar risk for future disease. This has somewhat invalidated the prior rationale for twin studies. Case co-twin study designs, however, are slowly emerging as the ideal tool to identify both environmentally induced epigenetic marks and epigenetic disease-associated processes. Here, we propose that twin lives are not as identical as commonly assumed and that the case co-twin study design can be used to investigate the effects of the adult social environment. We present the elements in the (social) environment that are likely to affect the epigenome and measures in which twins may diverge. Using data from the German TwinLife registry, we confirm divergence in both the events that occur and the salience for the individual start as early as age 11. Case co-twin studies allow for the exploitation of these divergences, permitting the investigation of the role of not only the adult social environment, but also the salience of an event or environment for the individual, in determining lifelong health trajectories. In cases like social adversity where it is clearly not possible to perform a randomised-controlled trial, we propose that the case cotwin study design is the most rigorous manner with which to investigate epigenetic mechanisms encoding environmental exposure. The role of the case co-twin design will continue to evolve, as we argue that it will permit causal inference from observational data. [less ▲]

Detailed reference viewed: 49 (1 UL)
See detailTwin Studies.
Spinath, F.M.; Gottschling, Juliana UL

in Encyclopedia of Personality and Individual Differences (2017)

Detailed reference viewed: 19 (4 UL)
Full Text
See detailThe twin-PhD model contributs to knowledge production in Africa
Cubaka, Vincent Kalumire; Schriver, Michael; Uwizihiwe, Jean Paul et al

in The Lancet (2019), 393(10191), 2590

Detailed reference viewed: 133 (0 UL)
Full Text
Peer Reviewed
See detailTwisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Chu, Dalin; Groszschädl, Johann UL; Liu, Zhe UL et al

in Chen, Kefei; Xie, Qi; Qiu, Weidong (Eds.) et al Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress ... [more ▼]

Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve Cryptography (ECC) for WSNs is still a very active research topic and techniques to further reduce the time and energy cost of ECC are eagerly sought. This paper presents an optimized ECC implementation that we developed from scratch to comply with the severe resource constraints of 8-bit sensor nodes such as the MICAz and IRIS motes. Our ECC software uses Optimal Prime Fields (OPFs) as underlying algebraic structure and supports two different families of elliptic curves, namely Weierstraß-form and twisted Edwards-form curves. Due to the combination of efficient field arithmetic and fast group operations, we achieve an execution time of 5.8*10^6 clock cycles for a full 158-bit scalar multiplication on an 8-bit ATmega128 microcontroller, which is 2.78 times faster than the widely-used TinyECC library. Our implementation also shows that the energy cost of scalar multiplication on a MICAz (or IRIS) mote amounts to just 19 mJ when using a twisted Edwards curve over a 160-bit OPF. This result compares fairly well with the energy figures of two recently-presented hardware designs of ECC based on twisted Edwards curves. [less ▲]

Detailed reference viewed: 327 (43 UL)
Full Text
Peer Reviewed
See detailTwistor space observables and quasi-amplitudes in 4D higher spin gravity
Colombo, Nicolo UL; Sundell, Per

in Journal of High Energy Physics [=JHEP] (2010)

Vasiliev equations facilitate globally defined formulations of higher-spin gravity in various correspondence spaces associated with different phases of the theory. In the four-dimensional case this ... [more ▼]

Vasiliev equations facilitate globally defined formulations of higher-spin gravity in various correspondence spaces associated with different phases of the theory. In the four-dimensional case this induces a map from a generally covariant formulation in spacetime with higher-derivative interactions to a formulation in terms of a deformed symplectic structure on a noncommutative doubled twistor space, sending spacetime boundary conditions to various sectors of an associative star-product algebra. We look at observables given by integrals over twistor space defining composite zero-forms in spacetime that do not break any local symmetries and that are closed on shell. They can be evaluated locally in spacetime and interpreted as building blocks for dual amplitudes. To regularize potential twistor-space divergencies arising in their curvature expansion, we propose a closed-contour prescription that respects associativity and hence higher-spin gauge symmetry. As a sample calculation, we examine next-to-leading corrections to quasi-amplitudes for twistor-space plane waves, and find cancellations that we interpret using transgression properties in twistor space. [less ▲]

Detailed reference viewed: 82 (3 UL)
Full Text
Peer Reviewed
See detailTwitter data as primary sources for historians: a critical approach
Clavert, Frédéric UL; Papastamkou, Sofia

Scientific Conference (2018, October 25)

Detailed reference viewed: 91 (9 UL)
See detailTwo Approaches to World Management
Katsikis, Nikolaos UL

in Brenner, Neil (Ed.) Implosions/Explosions: Towards a Study of Planetary Urbanization (2013)

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailTwo Conserved Histone Demethylases Regulate Mitochondrial Stress-Induced Longevity.
Merkwirth, Carsten; Jovaisaite, Virginija; Durieux, Jenni et al

in Cell (2016), 165(5), 1209-1223

Across eukaryotic species, mild mitochondrial stress can have beneficial effects on the lifespan of organisms. Mitochondrial dysfunction activates an unfolded protein response (UPR(mt)), a stress ... [more ▼]

Across eukaryotic species, mild mitochondrial stress can have beneficial effects on the lifespan of organisms. Mitochondrial dysfunction activates an unfolded protein response (UPR(mt)), a stress signaling mechanism designed to ensure mitochondrial homeostasis. Perturbation of mitochondria during larval development in C. elegans not only delays aging but also maintains UPR(mt) signaling, suggesting an epigenetic mechanism that modulates both longevity and mitochondrial proteostasis throughout life. We identify the conserved histone lysine demethylases jmjd-1.2/PHF8 and jmjd-3.1/JMJD3 as positive regulators of lifespan in response to mitochondrial dysfunction across species. Reduction of function of the demethylases potently suppresses longevity and UPR(mt) induction, while gain of function is sufficient to extend lifespan in a UPR(mt)-dependent manner. A systems genetics approach in the BXD mouse reference population further indicates conserved roles of the mammalian orthologs in longevity and UPR(mt) signaling. These findings illustrate an evolutionary conserved epigenetic mechanism that determines the rate of aging downstream of mitochondrial perturbations. [less ▲]

Detailed reference viewed: 15 (0 UL)