Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailSatisfiability of general intruder constraints with a set constructor
Avanesov, Tigran UL; Chevalier, Yannick; Rusinowitch, Michael et al

in CRiSIS 2010, Proceedings of the Fifth International Conference on Risks and Security of Internet and Systems, Montreal, QC, Canada, October 10-13, 2010. (2010)

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of ... [more ▼]

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intruder constraints (that do not have these properties). Our result extends a first work by L. Mazaré in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also give several new applications of the result. [less ▲]

Detailed reference viewed: 114 (4 UL)
Full Text
Peer Reviewed
See detailA Satisficing Agreements Model
Boella, Guido UL; Pigozzi, Gabriella UL; Slavkovik, Marija UL et al

in Proceedings of the 13th International Workshop on Coordination, Organization, Institutions and Norms (COIN@WI-IAT) (2011)

Satisficing, the concept proposed by Herbert Simon, as an approach to reaching agreements is little explored. We propose a model for satisficing agreement reaching for an adaptive collaborative group of ... [more ▼]

Satisficing, the concept proposed by Herbert Simon, as an approach to reaching agreements is little explored. We propose a model for satisficing agreement reaching for an adaptive collaborative group of agents. The group consists of one human agent familiar with the problem and arbitrarily many artificial agents. Our model raises to the team level the recognition-primed decision model constructed in the field of cognitive decision-making by using social choice for reaching group opinions. [less ▲]

Detailed reference viewed: 114 (0 UL)
Full Text
Peer Reviewed
See detailSavant: Automatic generation of a parallel scheduling heuristic for map-reduce
Pinel, Frédéric UL; Dorronsoro, Bernabé

in International Journal of Hybrid Intelligent Systems (2014), 11(4), 287--302

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailSavant: Automatic parallelization of a scheduling heuristic with machine learning
Pinel, Frédéric UL; Dorronsoro, Bernabé UL; Bouvry, Pascal UL et al

in Nature and Biologically Inspired Computing (NaBIC), 2013 World Congress on (2013, August 13)

Detailed reference viewed: 175 (2 UL)
Full Text
Peer Reviewed
See detailSaving jobs, promoting democracy: worker co-operatives
Nolan, Stephen; Perrin, Eleonore UL; Gorman, Tomas

in Irish Journal of Sociology (2013), 21(2), 103-115

The article examines transformative alternatives that may offer pathways to a more participative, sustainable and equitable social order. It focuses on one form of alternative, worker-owned co-operatives ... [more ▼]

The article examines transformative alternatives that may offer pathways to a more participative, sustainable and equitable social order. It focuses on one form of alternative, worker-owned co-operatives, and argues this existing form of democratic and economic relations has already proven capacity to generate more equitable socio-economic outcomes and residual social capital. The worker-owned model is located within an ideological framework that focuses on the inherent democratising principles of their praxis that can in the right circumstances underpin firm strategic foundations for radical social change. It examines the development of worker-owned co-ops in Ireland north and south and the obstacles that need to be overcome to make these a more feasible and common form of economic ownership. Reflecting on the current debate in Ireland it argues such co-ops cannot work effectively without a secure legal framework governing their status and softer supports including entrepreneurship development, leadership training, market research, accessing loan finance and grant aid, inter-cooperative networking and federation building. The article poses workers’ co-operatives as sites of political struggle and consciousness, expressed in co-operatives’ core values including sovereignty of labour, the subordinate nature of capital, democracy, inter-cooperation and sustainability, and in tangible democratic experiences and transformative praxis. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailSaving Rates and Portfolio Choice with Subsistence Consumption
Koulovatianos, Christos UL; Achury, Carolina; Hubar, Sylwia

in Review of Economic Dynamics (2012), 105(1), 108-126

We analytically show that a common across rich/poor individuals Stone-Geary utility function with subsistence consumption in the context of a simple two-asset portfolio-choice model is capable of ... [more ▼]

We analytically show that a common across rich/poor individuals Stone-Geary utility function with subsistence consumption in the context of a simple two-asset portfolio-choice model is capable of qualitatively and quantitatively explaining: (i) the higher saving rates of the rich, (ii) the higher fraction of personal wealth held in risky assets by the rich, and (iii) the higher volatility of consumption of the wealthier. On the contrary, time-variant "keeping-up-with-the-Joneses" weighted average consumption which plays the role of moving benchmark subsistence consumption gives the same portfolio composition and saving rates across the rich and the poor, failing to reconcile the model with what micro data say. [less ▲]

Detailed reference viewed: 142 (6 UL)
Full Text
Peer Reviewed
See detailSaving the Baby While Discarding the Bathwater: the application of policy coherence for development analysis to payment for watershed services
Koff, Harlan UL; Maganda, Carmen

in Madera y Bosques (2019), 25(3), 2531760

One of the most debated tools for the implementation of sustainable development is “payment for ecosystem services”, of which “payment for watershed services” (PWS) is one of the most developed. While ... [more ▼]

One of the most debated tools for the implementation of sustainable development is “payment for ecosystem services”, of which “payment for watershed services” (PWS) is one of the most developed. While proponents argue that such payments provide market value to the services that ecosystems provide for development, opponents claim that this approach commodifies the environment and promotes inequalities. This article presents an analysis of PWS programs by applying methodologies based on policy coherence for development (PCD), defined as a policy tool aimed at eliminating incoherence within sustainable development strategies that undermine their effectiveness as well as between such strategies and other policy arenas, which are also considered harmful to sustainability. By employing a PCD methodology, the article aims to identify policy mechanisms that undermine PWS programs so that stakeholders can make adjustments, thus, metaphorically ensuring that “the baby” (PWS) is not discarded with “the bathwater” (policy incoherence for sustainable development). [less ▲]

Detailed reference viewed: 137 (2 UL)
See detailSavoirs et engagements: Hommage à Georges Wirtgen
Berg, Charles UL; Kerger, Lucien UL; Meisch, Nico et al

Book published by éditions PHI (2009)

Le volume se veut un hommage à Georges Wirtgen, docteur en psychologie, directeur honoraire de l'ISERP, président du Conseil permanent de la langue luxembourgeoise et président-fondateur honoraire du ... [more ▼]

Le volume se veut un hommage à Georges Wirtgen, docteur en psychologie, directeur honoraire de l'ISERP, président du Conseil permanent de la langue luxembourgeoise et président-fondateur honoraire du CESIJE (Centre d'études sur la situation des jeunes en Europe asbl). Le projet réunit en tant que contributeurs les disciples, collègues et amis de Georges Wirtgen qu'il a côtoyés dans les différents domaines de ses activités professionnelles et scientifiques. "Savoirs et engagements" représente un document important donnant un regard original sur le paysage de la recherche et de l'enseignement supérieur et universitaire au Luxembourg. Il met notamment l'accent sur l'importance d'une osmose entre savoirs et engagements qui doit se faire dans l'intérêt de l'environnement social direct de l'Université. [less ▲]

Detailed reference viewed: 177 (26 UL)
Full Text
Peer Reviewed
See detailSAVVY-WS at a glance: supporting verifiable dynamic service compositions
Bianculli, Domenico UL; Ghezzi, Carlo

in Proceedings of the 1st International Workshop on Automated engineeRing of Autonomous and run-tiMe evolvIng Systems (ARAMIS 2008), co-located with ASE 2008 (2008)

Detailed reference viewed: 94 (0 UL)
Full Text
Peer Reviewed
See detailSay it in Croatian--Croatian translation of the EGPRN definition of multimorbidity using a Delphi consensus technique.
Lazic, Durdica Kasuba; Le Reste, Jean-Yves; Murgic, Lucija et al

in Collegium antropologicum (2014), 38(3), 1027-32

Patients coming to their family physician (FP) usually have more than one condition or problem. Multimorbidity as well as dealing with it, is challenging for FPs even as a mere concept. The World Health ... [more ▼]

Patients coming to their family physician (FP) usually have more than one condition or problem. Multimorbidity as well as dealing with it, is challenging for FPs even as a mere concept. The World Health Organization (WHO) has simply defined multimorbidity as two or more chronic conditions existing in one patient. However, this definition seems inadequate for a holistic approach to patient care within Family Medicine. Using systematic literature review the European General Practitioners Research Network (EGPRN) developed a comprehensive definition of multimorbidity. For practical and wider use, this definition had to be translated into other languages, including Croatian. Here presented is the Croatian translation of this comprehensive definition using a Delphi consensus procedure for forward/backward translation. 23 expert FPs fluent in English were asked to rank the translation from 1 (absolutely disagreeable) to 9 (fully agreeable) and to explain each score under 7. It was previously defined that consensus would be reached when 70% of the scores are above 6. Finally, a backward translation from Croatian into English was undertaken and approved by the authors of the English definition. Consensus was reached after the first Delphi round with 100% of the scores above 6; therefore the Croatian translation was immediately accepted. The authors of the English definition accepted the backward translation. A comprehensive definition of multimorbidity is now available in English and Croatian, as well as other European languages which will surely make further implications for clinicians, researchers or policy makers. [less ▲]

Detailed reference viewed: 95 (0 UL)
Peer Reviewed
See detailSay you want a revolution... Suggestions for the impossibile future of critical pedagogy.
Biesta, Gert UL

in Educational Theory (1998), 48(4), 499-510

Detailed reference viewed: 107 (0 UL)
Full Text
See detailSays Who? Edward Steichen, son oeuvre et sa réception à Luxembourg
Poos, Françoise UL

Article for general public (2012)

This article is part of the Forum special issue about the relations between Luxembourg and the United States. In this context, 'Says Who?' analyses the complex reception of the work of Luxembourg born ... [more ▼]

This article is part of the Forum special issue about the relations between Luxembourg and the United States. In this context, 'Says Who?' analyses the complex reception of the work of Luxembourg born American artist and curator, Edward Steichen, in his native country. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailSC2Share: Smart Contract for Secure Car Sharing
Akash, Madhusudan; Symeonidis, Iraklis UL; A. Mustafa, Mustafa et al

in International Conference on Information Systems Security and Privacy (ICISSP) (2019, January 24)

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized ... [more ▼]

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized manner, annulling the need of an intermediary. Our solution, named SC2Share, leverages smart contracts and uses them to carry out secure and private car booking and payments. Our experiments on SC2Share on the Ethereum testnet guarantee high security and privacy to its users and confirm that our system is cost-efficient and ready for practical use. [less ▲]

Detailed reference viewed: 627 (13 UL)
Peer Reviewed
See detailScaffolding children’s production of representations along the three years of ECE: a longitudinal study.
Monteira, Sabela Fernandez; Jiménez, María Pilar; Siry, Christina UL

in Research in Science Education (2020)

Detailed reference viewed: 120 (4 UL)
Full Text
Peer Reviewed
See detailScaffolding support through integration of learning material
Grevisse, Christian UL; Rothkugel, Steffen UL; Reuter, Robert UL

in Smart Learning Environments (2019), 6(28),

The ever-growing amount of learning material poses a challenge to both learners and teachers. In order to perform a learning task, students often need to search for additional information. Inquiry might ... [more ▼]

The ever-growing amount of learning material poses a challenge to both learners and teachers. In order to perform a learning task, students often need to search for additional information. Inquiry might be hampered if they do not know what exactly to search for, especially if they lack prior knowledge in a domain. Furthermore, they might need to recall meta-information, e.g., the implicit links between learning resources or the location of an explanation within a document. In addition, their performance in a learning task might suffer from the constant need for further information. As the authoring of learning material is a time-intensive task, reusability of resources in different contexts should be enabled. In this paper, we present the ALMA-Yactul ecosystem, a holistic approach for student-centered integration of learning material. Based on semantic annotations, learners are provided with scaffolding support for retrieving material related to their current study task. This integration of resources is showcased in a variety of applications and domains, such as a plugin for an IDE or an enhanced sketchnoting app. Moreover, we show how Yactul, a gamified student response platform, can benefit from semantic annotations and integration of learning material. Additionally, teachers are provided with semi-automatic annotation support in the popular Office 365 suite to foster the reusability of their content. Apart from presenting the results of its usage in university classes, we also show how high school students without prior knowledge benefitted from this scaffolding support. A significantly better performance in resolving programming-related tasks could be observed compared to a traditional search process. Finally, the ecosystem is evaluated against a state-of-the-art technology integration model. [less ▲]

Detailed reference viewed: 199 (16 UL)
See detailscala-tptp-parser
Steen, Alexander UL

Software (2021)

scala-tptp-parser is a library for parsing the input languages of the TPTP infrastructure. The package contains a data structure for the abstract syntax tree (AST) of the parsed input as well as the ... [more ▼]

scala-tptp-parser is a library for parsing the input languages of the TPTP infrastructure. The package contains a data structure for the abstract syntax tree (AST) of the parsed input as well as the parser for the different language of the TPTP, see http://tptp.org for details. In particular, the parser supports: - THF (TH0/TH1): Monomorphic and polymorphic higher-order logic, - TFF (TF0/TF1): Monomorphic and polymorphic typed first-order logic, - FOF: Untyped first-order logic, - CNF: (Untyped) clause-normal form, and - TPI: TPTP Process Instruction language. [less ▲]

Detailed reference viewed: 83 (6 UL)
Full Text
Peer Reviewed
See detailScalability and Replicability Analysis of Grid Management Services in Low Voltage Networks in Local Flexibility Markets: an InterFlex analysis
Potenciano Menci, Sergio UL; Herndler, Barbara; Kupzog, Friederuch et al

in PowerTech 2021 (2021, July 29)

The numerous changes in the power grid, due to the current and foreseeable increase of Renewable Energy Sources (RES) within the electrical network has resulted in a new perception of the modern ... [more ▼]

The numerous changes in the power grid, due to the current and foreseeable increase of Renewable Energy Sources (RES) within the electrical network has resulted in a new perception of the modern distribution network. A key aspect in this regard is the efficient utilisation of flexibility in demand and generation. This paper focuses on the impact of RES when used to provide flexibility for grid management services. In the European project InterFlex, grid management services were offered in local flexibility markets in distribution networks. The results of the Scalability and Replicability Analysis (SRA) of the smart grid Dutch demonstration is presented. Furthermore, the challenges of replicating and analysing a real system based on a high number of interconnected tools, where seasonality effects and realistic large scale deployments which are to be forecasted, are considered and discussed [less ▲]

Detailed reference viewed: 176 (6 UL)
Full Text
See detailA Scalable and Accurate Hybrid Vulnerability Analysis Framework
Thome, Julian UL

Doctoral thesis (2018)

As the Internet has become an integral part of our everyday life for activities such as e-mail, online-banking, shopping, entertainment, etc., vulnerabilities in Web software arguably have greater impact ... [more ▼]

As the Internet has become an integral part of our everyday life for activities such as e-mail, online-banking, shopping, entertainment, etc., vulnerabilities in Web software arguably have greater impact than vulnerabilities in other types of software. Vulnerabilities in Web applications may lead to serious issues such as disclosure of confidential data, integrity violation, denial of service, loss of commercial confidence/customer trust, and threats to the continuity of business operations. For companies these issues can result in significant financial losses. The most common and serious threats for Web applications include injection vulnerabilities, where malicious input can be “injected” into the program to alter its intended behavior or the one of another system. These vulnerabilities can cause serious damage to a system and its users. For example, an attacker could compromise the systems underlying the application or gain access to a database containing sensitive information. The goal of this thesis is to provide a scalable approach, based on symbolic execution and constraint solving, which aims to effectively find injection vulnerabilities in the server-side code of Java Web applications and which generates no or few false alarms, minimizes false negatives, overcomes the path explosion problem and enables the solving of complex constraints. [less ▲]

Detailed reference viewed: 338 (62 UL)
Full Text
Peer Reviewed
See detailA Scalable and Accurate Hybrid Vulnerability Analysis Framework
Thome, Julian UL

in Doctoral Symposium co-located with 26th IEEE International Symposium on Software Reliability Engineering (2015) (2015)

Software security assurance is an important process in software development that protects the sensitive data and resources contained in and controlled by the software. Addressing security vulnerabilities ... [more ▼]

Software security assurance is an important process in software development that protects the sensitive data and resources contained in and controlled by the software. Addressing security vulnerabilities at an early phase could decrease the cost of addressing them in later stages by two orders of magnitude. In order to detect vulnerabilities in Web services and Web applications in a scalable and accurate manner, we aim at developing a hybrid vulnerability analysis framework which combines program analysis, symbolic execution and machine learning. We use program analysis to identify potential vulnerable execution branches within the source code for the purpose of guiding the symbolic execution along the potentially vulnerable execution paths. We also propose scalable constraint solving techniques for vulnerability analysis. To further enhance scalability and accuracy, we also apply machine learning by incorporating predictors for identifying potentially vulnerable paths of the program based on known vulnerable cases. [less ▲]

Detailed reference viewed: 257 (57 UL)