Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailTowards Autonomous Self-localization of Small Mobile Robots using Reservoir Computing and Slow Feature Analysis
Antonelo, Eric Aislan UL; Schrauwen, Benjamin

in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2009)

Biological systems such as rats have special brain structures which process spatial information from the environment. They have efficient and robust localization abilities provided by special neurons in ... [more ▼]

Biological systems such as rats have special brain structures which process spatial information from the environment. They have efficient and robust localization abilities provided by special neurons in the hippocampus, namely place cells. This work proposes a biologically plausible architecture which is based on three recently developed techniques: Reservoir Computing (RC), Slow Feature Analysis (SFA), and Independent Component Analysis (ICA). The bottom layer of our RC-SFA architecture is a reservoir of recurrent nodes which process the information from the robot's distance sensors. It provides a temporal kernel of rich dynamics which is used by the upper two layers (SFA and ICA) to autonomously learn place cells. Experiments with an e-puck robot with 8 infra-red sensors (which measure distances in [4-30] cm) show that the learning system based on RC-SFA provides a self-organized formation of place cells that can either distinguish between two rooms or to detect the corridor connecting them. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailTowards Bidirectional Engineering of Satellite Control Procedures Using Triple Graph Grammars
Gottmann, Susann UL; Hermann, Frank UL; Ermel, Claudia et al

in Jacquet, Christophe; Balasubramanian, Daniel; Jones, Edward (Eds.) et al Proc. Int. Workshop on Multi-Paradigm Modeling 2013 (MPM'13) (2013)

The development and maintenance of satellite control software are very complex, mission-critical and cost-intensive tasks that require expertise from different domains. In order to adequately address ... [more ▼]

The development and maintenance of satellite control software are very complex, mission-critical and cost-intensive tasks that require expertise from different domains. In order to adequately address these challenges, we propose to use visual views of the software to provide concise abstractions of the system from different perspectives. This paper introduces a visual language for process flow models of satellite control procedures that we developed in cooperation with the industrial partner SES for the satellite control language SPELL. Furthermore, we present a general and formal bidirectional engineering approach for automatically translating satellite control procedures into corresponding process flow visualisations. The bidirectional engineering framework is supported by a visual editor based on Eclipse GMF, the transformation tool HenshinTGG, and additional extensions to meet requirements set up by the specific application area of satellite control languages. [less ▲]

Detailed reference viewed: 103 (21 UL)
Full Text
Peer Reviewed
See detailTowards Black Box Testing of Android Apps
Zhauniarovich, Yury; Philippov, Anton; Gadyatskaya, Olga UL et al

in Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES) (2015, August)

Many state-of-art mobile application testing frameworks (e.g., Dynodroid, EvoDroid) enjoy Emma or other code coverage libraries to measure the coverage achieved. The underlying assumption for these ... [more ▼]

Many state-of-art mobile application testing frameworks (e.g., Dynodroid, EvoDroid) enjoy Emma or other code coverage libraries to measure the coverage achieved. The underlying assumption for these frameworks is availability of the app source code. Yet, application markets and security researchers face the need to test third-party mobile applications in the absence of the source code. There exists a number of frameworks both for manual and automated test generation that address this challenge. However, these frameworks often do not provide any statistics on the code coverage achieved, or provide coarse-grained ones like a number of activities or methods covered. At the same time, given two test reports generated by different frameworks, there is no way to understand which one achieved better coverage if the reported metrics were different (or no coverage results were provided). To address these issues we designed a framework called BBOXTESTER that is able to generate code coverage reports and produce uniform coverage metrics in testing without the source code. Security researchers can automatically execute applications exploiting current stateof- art tools, and use the results of our framework to assess if the security-critical code was covered by the tests. In this paper we report on design and implementation of BBOXTESTER and assess its efficiency and effectiveness. [less ▲]

Detailed reference viewed: 109 (1 UL)
Full Text
Peer Reviewed
See detailTowards Characterizing Bluetooth Discovery in a Vehicular Context
Bronzi, Walter UL; Derrmann, Thierry UL; Castignani, German UL et al

in Vehicular Networking Conference (VNC), 2016 IEEE (2016, December)

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever ... [more ▼]

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever increasing number of discoverable devices both inside and outside a populated area gives us an encouraging insight on future research directions for this technology. In this paper, based on a sensing system developed as an Android application, we evaluate Bluetooth Classic and Low Energy discovery characteristics from a vehic- ular perspective. By recording information about devices nearby (e.g. the number of discovered devices, their signal strength, manufacturer information) and the GPS location we can derive interesting information about a driver’s situation, as well as his/her environment. Presented results indicate that the amount of discovered devices and signal strengths are dependent on velocity and road category. Finally, future work and discussions address potential use-case applications based only on Bluetooth discovery, such as low energy and privacy friendly road and traffic context awareness. The sensing system used in this article is free online under the MIT License. [less ▲]

Detailed reference viewed: 237 (23 UL)
Full Text
Peer Reviewed
See detailTowards Cognitive Internet: an Evolutionary Vision
Granelli, Fabrizio; Kliazovich, Dzmitry UL; Malheiros, Neumar

in Cognitive Radio and Networking for Heterogeneous Wireless Networks (2014)

Detailed reference viewed: 91 (1 UL)
Full Text
Peer Reviewed
See detailTowards Collaborative Traffic Sensing using Mobile Phones
Frank, Raphaël UL; Mouton, Maximilien UL; Engel, Thomas UL

in Proceedings of the IEEE Vehicular Networking Conference 2012 (2012)

Participatory mobile sensing applications are becoming increasingly popular. The growing population of privately-held mobile smartphones enables a plethora of new services. One of the most promising ... [more ▼]

Participatory mobile sensing applications are becoming increasingly popular. The growing population of privately-held mobile smartphones enables a plethora of new services. One of the most promising application areas is collaborative traffic sensing. Here, smartphones are used as mobile sensors to collect and share relevant location information in order to reconstruct a global picture of the traffic situation in a monitored area. There are several challenges that need to be addressed in order to provide an efficient and ubiquitous service. In this talk we present how low-cost mobile smartphones can be used for such services without compromising the everyday usage of the device. We first test several sensing policies and evaluate how they affect location accuracy and battery life. We then perform a penetration rate study to identify the proportion of participants required to provide good service by varying several parameters. The outcome shows that if configured correctly, smartphones can be used as accurate mobile traffic sensors providing important information even at low penetration rates. [less ▲]

Detailed reference viewed: 107 (3 UL)
Full Text
See detailTowards combined global monthly gravity field solutions
Jäggi, A.; Meyer, U.; Beutler, G. et al

Scientific Conference (2013, October)

Detailed reference viewed: 60 (1 UL)
Full Text
See detailTowards combined global monthly gravity field solutions
Jäggi, Adrian; Meyer, Ulrich; Weigelt, Matthias UL et al

Scientific Conference (2014, April)

Detailed reference viewed: 96 (0 UL)
Full Text
Peer Reviewed
See detailTowards Computational Models for a Long-term Interaction with an Artificial Conversational Companion
Danilava, Sviatlana UL; Busemann, Stephan; Schommer, Christoph UL et al

in Proceedings "5th International Conference on Agents an Artificial Intelligence" (2013)

Detailed reference viewed: 219 (14 UL)
Full Text
Peer Reviewed
See detailTowards Computer-Aided, Iterative TSN-and Ethernet-based E/E Architecture Design
Creighton, Oliver; Navet, Nicolas UL; Keller, Patrick UL et al

Scientific Conference (2020, September 16)

In this presentation we would like to propose a novel approach towards studying and simulating candidate designs of next generation Ethernet architectures at established OEMs that intend to employ 100BASE ... [more ▼]

In this presentation we would like to propose a novel approach towards studying and simulating candidate designs of next generation Ethernet architectures at established OEMs that intend to employ 100BASE-T1, 1000BASE-T1 and, for increased flexibility and lower cost, 10BASE-T1S. Typical design goals of next generation architectures are future extensibility and cost optimization of the lowest-end. We propose to introduce guidance to an otherwise standard Monte-Carlo simulation by providing certain fixed points (e.g., mandated connections of ECUs to certain bridges, complete re-use of ECUs) and “hot spots” in the topology (e.g., ECUs with the highest variability pressure) that are known in advance from BMW’s experience with their vehicles in the field. Several important practical considerations must be integrated in the generation of candidate architectures: - Topological constraints: ECU proximity to sensors, daisy chain connections between ECUs to minimize cable length, number of switch ports in a certain ECU, etc. - Security and reliability requirements: segregation between mixed-criticality streams, proxy ECUs, and redundant paths. Our position statement explores the ability of algorithmic tools to synthesize Ethernet-based architectures based on a minimal fixed core TSN topology, design goals, design constraints, assumptions about next generation applications and data from past projects (capturing part of the OEM domain knowledge). [less ▲]

Detailed reference viewed: 183 (4 UL)
Peer Reviewed
See detailTowards computerized analysis of folksong
Sagrillo, Damien UL

in Muzyka, XLVIII (2003), 1

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailTowards Connectivity Improvement in VANETs using Bypass Links
Dorronsoro, Bernabé UL; Ruiz, Patricia UL; Danoy, Grégoire UL et al

in Abstract book of 2009 IEEE Congress on Evolutionary Computation (2009)

Detailed reference viewed: 247 (13 UL)
Full Text
See detailTowards consolidated methods for the design and evaluation of user experience
Lallemand, Carine UL

Doctoral thesis (2015)

In the “third wave” of Human-Computer Interaction (HCI), the emergence of User Experience (UX) as a key concept has opened up both exciting perspectives and hard challenges. The conceptual shift to a more ... [more ▼]

In the “third wave” of Human-Computer Interaction (HCI), the emergence of User Experience (UX) as a key concept has opened up both exciting perspectives and hard challenges. The conceptual shift to a more comprehensive and emotional view of human-computer interactions has been accompanied by the development of numerous methods and tools for the design and evaluation of interactive systems. UX research has thus been mainly driven by novelty and innovation and to date a majority of the developed tools lack validation and consolidation. UX research undoubtedly raises new concerns and challenges common conceptual and methodological practice. Thus the primary objective of this thesis is to contribute to UX consolidation. We addressed this objective by relying on a mixed-methods approach for the empirical part of this thesis, involving comparatively large and representative samples. This part encompasses six studies, representing a variety of perspectives related to UX research consolidation. More specifically, this dissertation includes a replication study (Paper A, N = 758), the translation and validation of a tool (Paper B, N = 381), the development of new design and evaluation methods (Paper C and D, N = 137 and 33), the empirical assessment of the relevance of established HCI methods for the evaluation of UX (Paper E, N = 103) and finally an investigation on how to bridge UX research and practice through a design approach (Paper F). The contributions of this thesis to UX research and practice regard both UX as a concept and its methodologies. Main findings inform about the benefits, challenges, and limitations of UX consolidation strategies as derived from our respective studies (papers A to F). Each study provides advances to both research and practice, while the combination of our studies pushes forward consolidation of UX. This is an essential step with regards to an emerging concept and informs an overarching research agenda aiming at a continuous interdisciplinary fostering of the UX field. [less ▲]

Detailed reference viewed: 1118 (65 UL)
Full Text
Peer Reviewed
See detailTowards context-aware automated writing evaluation systems
Patout, Pierre-André; Cordy, Maxime UL

in Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (2019, August 26)

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailTowards Dependable CPS Infrastructures: Architectural and Operating-System Challenges
Volp, Marcus UL; Asmussen, Nils; Härtig, Hermann et al

Scientific Conference (2015)

Detailed reference viewed: 214 (27 UL)
Full Text
See detailTowards Dialogue Games for the Down-Admissible and Up-Complete Procedures
Caminada, Martin; Booth, Richard UL

E-print/Working paper (2014)

Recently, two operators - the down-admissible and up-complete operators - have been proposed, in the context of aggregating argument labellings, for repairing a given initial labelling so that it becomes ... [more ▼]

Recently, two operators - the down-admissible and up-complete operators - have been proposed, in the context of aggregating argument labellings, for repairing a given initial labelling so that it becomes rational, in the sense that it respects the attack relation between the arguments. The purpose of this research note is to give some initial thoughts on defining dialogue games for each of them, as well as for their combination. [less ▲]

Detailed reference viewed: 65 (1 UL)
Full Text
Peer Reviewed
See detailTowards discovering problem similarity through deep learning: combining problem features and user behavior.
Mussack, Dominic UL; Flemming, Rory; Schrater, Paul et al

in Proceedings of The 12th International Conference on Educational Data Mining (EDM 2019) (2019)

Detailed reference viewed: 57 (1 UL)
Peer Reviewed
See detailTowards Disentangling Sentiment from Risk Premia
Lehnert, Thorsten UL

Scientific Conference (2015)

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailTowards Domain Completeness for Model Transformations Based on Triple Graph Grammars
Nachtigall, Nico UL; Hermann, Frank UL; Braatz, Benjamin UL et al

in Amrani, Moussa; Syriani, Eugene; Wimmer, Manuel (Eds.) Proceedings of the Third International Workshop on Verification of Model Transformations - co-located with Software Technologies: Applications and Foundations (STAF 2014) (2014)

The analysis of model transformations is a challenging research area within model driven engineering. Triple graph grammars (TGGs) have been applied in various transformation scenarios and their formal ... [more ▼]

The analysis of model transformations is a challenging research area within model driven engineering. Triple graph grammars (TGGs) have been applied in various transformation scenarios and their formal foundation has been a vital ground for general results concerning notions of correctness and completeness. This paper addresses existing gaps between practical scenarios and the formal results of TGGs concerning the notion of completeness. Since the source domain language of a model transformation is usually specified independently from the TGG, we use the notion of domain completeness, which requires that the model transformation has to provide a corresponding target model for each model of the source domain language. As main result, we provide a general method for showing that the source domain language is included in the language that is generated by the source rules of the TGG. This provides the first of two components for verifying domain completeness. The running example is the well studied object-relational mapping. [less ▲]

Detailed reference viewed: 95 (12 UL)
Full Text
Peer Reviewed
See detailTowards Dynamic Zero Emission Zone Management for Plug-in Hybrid Buses
Seredynski, Marcin UL; Viti, Francesco UL

Scientific Conference (2019, November)

Detailed reference viewed: 34 (8 UL)