![]() Bund, Andreas ![]() Poster (2007, June) Detailed reference viewed: 59 (0 UL)![]() ; Marichal, Jean-Luc ![]() in International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (2001), 9(5), 539-561 An overview of the use of the discrete Sugeno integral as either an aggregation tool or a preference functional is presented in the qualitative framework of two decision paradigms: multi-criteria decision ... [more ▼] An overview of the use of the discrete Sugeno integral as either an aggregation tool or a preference functional is presented in the qualitative framework of two decision paradigms: multi-criteria decision-making and decision-making under uncertainty. The parallelism between the representation theorems in both settings is stressed, even if a basic requirement like the idempotency of the aggregation scheme should be explicitely stated in multi-criteria decision-making, while its counterpart is implicit in decision under uncertainty by equating the utility of a constant act with the utility of its consequence. Important particular cases of Sugeno integrals such as prioritized minimum and maximum operators, their ordered versions, and Boolean max-min functions are studied. [less ▲] Detailed reference viewed: 89 (5 UL)![]() ; Marichal, Jean-Luc ![]() in Colorni, A.; Paruccini, M.; Roy, B. (Eds.) AMCDA - Aide Multi Critère à la Décision (Multiple Criteria Decision Aiding) (2001) An overview of the use of the discrete Sugeno integral as either an aggregation tool or a utility function is presented in the qualitative framework of two decision paradigms: multi-criteria decision ... [more ▼] An overview of the use of the discrete Sugeno integral as either an aggregation tool or a utility function is presented in the qualitative framework of two decision paradigms: multi-criteria decision-making and decision-making under uncertainty. The parallelism between the representation theorems in both settings is stressed, even if a basic requirement like idempotency should be explicitely stated in multi-criteria decision-making, while its counterpart is implicit in decision under uncertainty by equating the utility of a constant act with the utility of its consequence. Important particular cases of Sugeno integrals such as prioritized minimum and maximum operators, their ordered versions, and Boolean max-min functions are studied. [less ▲] Detailed reference viewed: 72 (5 UL)![]() Marichal, Jean-Luc ![]() Scientific Conference (2000, January) We present a model allowing to aggregate decision criteria when the available information is of qualitative nature. The use of the Sugeno integral as an aggregation function is justified by an axiomatic ... [more ▼] We present a model allowing to aggregate decision criteria when the available information is of qualitative nature. The use of the Sugeno integral as an aggregation function is justified by an axiomatic approach. [less ▲] Detailed reference viewed: 54 (2 UL)![]() ; ; et al in EuroIntervention : journal of EuroPCR in collaboration with the Working Group on Interventional Cardiology of the European Society of Cardiology (2009), 5(2), 265-71 AIMS: The Terumo Heartrail catheter (Terumo Corp., Tokyo, Japan) allows extra deep catheter intubation of coronary vessels and has been shown to be useful in CTO lesions. The aim of this study is to ... [more ▼] AIMS: The Terumo Heartrail catheter (Terumo Corp., Tokyo, Japan) allows extra deep catheter intubation of coronary vessels and has been shown to be useful in CTO lesions. The aim of this study is to assess the safety and efficacy of using the Heartrail II catheter as a distal stent delivery system in PCI following failure of conventional techniques. METHODS AND RESULTS: We prospectively identified cases performed over a 15-month period in which a Heartrail catheter was used to facilitate stent delivery following failure of conventional techniques. Stent delivery using the Heartrail catheter was performed in 35 cases and was successful in 31 cases. Success rates of 100% in grafts, 95% in RCA, 80% in LAD and 60% in circumflex cases were recorded respectively. Successful stent delivery was associated with intubation depth, with 29/29 succeeding when the intubation depth was > 2 cm and failure in 4/5 cases when the intubation depth <or= 2 cm. There were no complications related to deep intubation of the catheter. CONCLUSIONS: Use of the Heartrail catheter is safe and highly effective for aiding stent delivery across proximal obstructions in both left and right coronary systems. The small number of unsuccessful cases were related to inability of the catheter to traverse stenotic proximal obstructions within 2 cm of the RCA and LCA origins. [less ▲] Detailed reference viewed: 128 (0 UL)![]() ![]() Vlassis, Joëlle ![]() Poster (2013) Detailed reference viewed: 93 (5 UL)![]() ; ; et al in Catheterization and cardiovascular interventions : official journal of the Society for Cardiac Angiography & Interventions (2010), 75(4), 596-602 OBJECTIVE: The aim of this study is to investigate the feasibility of using a 6.5 Fr sheathless guide catheter as a default system in transradial (TRA) percutaneous coronary intervention (PCI). BACKGROUND ... [more ▼] OBJECTIVE: The aim of this study is to investigate the feasibility of using a 6.5 Fr sheathless guide catheter as a default system in transradial (TRA) percutaneous coronary intervention (PCI). BACKGROUND: TRA PCI has been shown to reduce mortality rates through a reduction in access site related bleeding complications compared with procedures performed though a femoral approach. Complications associated with the TRA route increase with the size of sheath used. These complications may be reduced by the use of a sheathless guide catheter system (Asahi Intecc, Japan) that is 1-2 Fr sizes smaller in diameter than the corresponding introducer sheath. METHODS: We performed PCI in 100 consecutive cases using 6.5 Fr sheathless guides to determine the procedural success, rates of symptomatic radial spasm and radial occlusion. RESULTS: Procedural success using the 6.5 Fr sheathless guide catheter system was 100% with no cases requiring conversion to a conventional guide and catheter system. There were no procedural complications recorded associated with the use of the catheter. Adjunctive devices used in this cohort included IVUS, stent delivery catheters, distal protection devices, and simple thrombectomy catheters. The rate of radial spasm was 5% and the rate of radial occlusion at 2 months was 2%. CONCLUSION: Use of the 6.5 Fr sheathless guide catheter system, which has an outer diameter <5 Fr sheath, as the default system in routine PCI is feasible with a high rate of procedural success via the radial artery. [less ▲] Detailed reference viewed: 139 (0 UL)![]() ; ; et al in EuroIntervention : journal of EuroPCR in collaboration with the Working Group on Interventional Cardiology of the European Society of Cardiology (2012), 7(10), 1170-80 AIMS: The Sideguard(R) stent (Cappella Medical Devices Ltd, Galway, Ireland), is a novel nitinol self-expanding dedicated bifurcation stent that flares proximally at the ostium of the side branch (SB ... [more ▼] AIMS: The Sideguard(R) stent (Cappella Medical Devices Ltd, Galway, Ireland), is a novel nitinol self-expanding dedicated bifurcation stent that flares proximally at the ostium of the side branch (SB) into a trumpet shape thereby achieving full ostial coverage. The aim of this study is to report the utility and limitations of this stent in patients undergoing treatment to bifurcation coronary lesions in a real-world setting. METHODS AND RESULTS: We prospectively identified 20 successive patients admitted over a 6-month period in whom there was significant SB disease and who were suitable for a bifurcation procedure. The Sideguard(R) stent was successfully used in all 20 cases including several that would have been technically difficult using conventional bifurcation techniques. We highlight use of this system using five illustrative cases that illustrate its utility and limitations in the treatment of bifurcation lesions. CONCLUSIONS: The Sideguard(R) stent can be used to treat complex bifurcation lesions in a straight forward manner and is not subject to the limitations associated with conventional bifurcation PCI techniques including jailing of the SB ostium and inability to fully cover/scaffold the ostium of the SB. [less ▲] Detailed reference viewed: 122 (1 UL)![]() Nguyen, Viet Ha ![]() ![]() in Maia, NNM; Matos Neves, M.; Chedas Sampaio, R.P. (Eds.) International Conference on Structural Engineering Dynamics (ICEDyn 2013) - Sesimbra 17-19 June 2013 (2013, June) The aim of this paper is to apply both time- and frequency-domain-based approaches on real-life civil engineering structures and to assess their capability for damage detection. The first structure is the ... [more ▼] The aim of this paper is to apply both time- and frequency-domain-based approaches on real-life civil engineering structures and to assess their capability for damage detection. The first structure is the Champangshiehl Bridge located in Luxembourg. Several damage levels were intentionally created by cutting a growing number of prestressed tendons and vibration data were acquired by the University of Luxembourg for each damaged state. The second example consists in reinforced and prestressed concrete panels. Successive damages were introduced in the panels by loading heavy weights and by cutting steel wires. The illustrations show different consequences in damage identification by the considered techniques. [less ▲] Detailed reference viewed: 157 (17 UL)![]() Nguyen, Viet Ha ![]() ![]() ![]() in Shock and Vibration (2014), 2014 The aim of this paper is to apply both time- and frequency-domain-based approaches on real-life civil engineering structures and to assess their capability for damage detection. The methodology is based ... [more ▼] The aim of this paper is to apply both time- and frequency-domain-based approaches on real-life civil engineering structures and to assess their capability for damage detection. The methodology is based on Principal Component Analysis. The first structure is the Champangshiehl Bridge located in Luxembourg. Several damage levels were intentionally created by cutting a growing number of prestressed tendons and vibration data were acquired by the University of Luxembourg for each damaged state. The second example consists in reinforced and prestressed concrete panels. Successive damages were introduced in the panels by loading heavy weights and by cutting steel wires. The illustrations show different consequences in damage identification by the considered techniques [less ▲] Detailed reference viewed: 175 (14 UL)![]() ![]() Levy, Jessica ![]() ![]() Poster (2019, July) Value-added (VA) modeling aims to quantify the effect of pedagogical actions on students’ achievement, independent of students’ backgrounds. VA modeling is primarily used for accountability and high ... [more ▼] Value-added (VA) modeling aims to quantify the effect of pedagogical actions on students’ achievement, independent of students’ backgrounds. VA modeling is primarily used for accountability and high-stakes decisions. To date, there seems to be no consensus concerning the calculation of VA models. Our study aims to systematically analyze and compare different school VA models by using longitudinal large-scale data emerging from the Luxembourg School Monitoring Programme. Regarding the model covariates, first findings indicate the importance of language (i.e., language(s) spoken at home and prior language achievement) in VA models with either language or math achievement as a dependent variable, with the highest amount of explained variance in VA models for language. Concerning the congruence of different VA approaches, we found high correlations between school VA scores from the different models, but also high ranges between VA scores for single schools. We conclude that VA models should be used with caution and with awareness of the differences that may arise from methodological choices. Finally, we discuss the idea that VA models could be used for the identification of schools that perform “against the odds”, especially for those schools that have positive VA scores over several years. [less ▲] Detailed reference viewed: 98 (8 UL)![]() ; ; et al in Public Health Nutrition (2014), 17(4), 810-822 To examine the use of vitamin D supplements during infancy among the participants in an international infant feeding trial. Longitudinal study. Detailed reference viewed: 111 (0 UL)![]() Lehnert, Florence Kristin ![]() in Proceedings of IDC '19, the 18th ACM International Conference on Interaction Design and Children (2019, June 12) Computer-Based Assessment (CBA), i.e., the use of computers instead of paper & pencil for testing purposes is now increasingly used, both in education and in the workforce. Along with this trend, several ... [more ▼] Computer-Based Assessment (CBA), i.e., the use of computers instead of paper & pencil for testing purposes is now increasingly used, both in education and in the workforce. Along with this trend, several issues regarding the usage of computers in assessment can be raised. With respect to CBA, test validity and acceptance appear at stake during interacting with a complex assessment system. For instance, individual differences in computer literacy (i.e. ability to handle technology) might cause different outcomes that are not related to the problem-solving task. Prior investigation has shown that there is a scarcity of research on the User Experience (UX) in the context of CBA, also due to a focus on adult users. This doctoral thesis aims to adapt and develop new evaluation methods from the Human-Computer Interaction (HCI) field, applied in the context of CBA. The contributions will result in the development of best practices guidelines for both research and practitioners by adopting design and evaluation methods drawn from the field of Child-computer Interaction (CCI). [less ▲] Detailed reference viewed: 185 (12 UL)![]() Lehnert, Florence Kristin ![]() Poster (2019, June 12) Detailed reference viewed: 25 (0 UL)![]() Lehnert, Florence Kristin ![]() ![]() ![]() Presentation (2021, June) Detailed reference viewed: 80 (1 UL)![]() Stojkovski, Borce ![]() Doctoral thesis (2022) The increasing magnitude and sophistication of malicious cyber activities by various threat actors poses major risks to our increasingly digitized and inter-connected societies. However, threats can also ... [more ▼] The increasing magnitude and sophistication of malicious cyber activities by various threat actors poses major risks to our increasingly digitized and inter-connected societies. However, threats can also come from non-malicious users who are being assigned too complex security or privacy-related tasks, who are not motivated to comply with security policies, or who lack the capability to make good security decisions. This thesis posits that UX design methods and practices are necessary to complement security and privacy engineering practices in order to (1) identify and address user misperceptions of system security and privacy; and (2) inform the design of secure systems that are useful and appealing from end-users’ perspective. The first research objective in this thesis is to provide new empirical accounts of UX aspects in three distinct contexts that encompass security and privacy considerations, namely: cyber threat intelligence, secure and private communication, and digital health technology. The second objective is to empirically contribute to the growing research domain of mental models in security and privacy by investigating user perceptions and misperceptions in the afore-mentioned contexts. Our third objective is to explore and propose methodological approaches to incorporating users’ perceptions and misperceptions in the socio-technical security analyses of systems. Qualitative and quantitative user research methods with experts as well as end users of the applications and systems under investigation were used to achieve the first two objectives. To achieve the third objective, we also employed simulation and computational methods. Cyber Threat Intelligence: CTI sharing platforms Reporting on a number of user studies conducted over a period of two years, this thesis offers a unique contribution towards understanding the constraining and enabling factors of security information sharing within one of the leading CTI sharing platforms, called MISP. Further, we propose a conceptual workflow and toolchain that would seek to detect user (mis)perceptions of key tasks in the context of CTI sharing, such as verifying whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform, and discuss the benefits of our socio-technical approach as a potential security analysis tool, simulation tool, or educational / training support tool. Secure & Private Communication: Secure Email We propose and describe multi-layered user journeys, a conceptual framework that serves to capture the interaction of a user with a system as she performs certain goals along with the associated user beliefs and perceptions about specific security or privacy-related aspects of that system. We instantiate the framework within a use case, a recently introduced secure email system called p≡p, and demonstrate how the approach can be used to detect misperceptions of security and privacy by comparing user opinions and behavior against system values and objective technical guarantees offered by the system. We further present two sets of user studies focusing on the usability and effectiveness of p≡p’s security and privacy indicators and their traffic-light inspired metaphor to represent different privacy states and guarantees. Digital Health Technology: Contact Tracing Apps Considering human factors when exploring the adoption as well as the security and privacy aspects of COVID-19 contact tracing apps is a timely societal challenge as the effectiveness and utility of these apps highly depend on their widespread adoption by the general population. We present the findings of eight focus groups on the factors that impact people’s decisions to adopt, or not to adopt, a contact tracing app, conducted with participants living in France and Germany. We report how our participants perceived the benefits, drawbacks, and threat model of the contact tracing apps in their respective countries, and discuss the similarities and differences between and within the study groups. Finally, we consolidate the findings from these studies and discuss future challenges and directions for UX design methods and practices in cybersecurity and digital privacy. [less ▲] Detailed reference viewed: 526 (10 UL)![]() Zollinger, Marie-Laure ![]() ![]() ![]() in Electronic Voting (2019, October) This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼] This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲] Detailed reference viewed: 209 (17 UL)![]() Lallemand, Carine ![]() ![]() in Computers in Human Behavior (2015), (43), 35-48 For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this ... [more ▼] For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this concept. However, despite many attempts to understand, define and scope UX, one may still wonder whether a consensus has been reached on this concept. In a willingness to address the complexity of this research topic and bring the concept of UX to maturity, a replication of an international survey has been conducted. The main goal of the present study is to get a better understanding of practitioners’ view- points on the notion of UX and to analyze potential evolutions over time in the understanding and prac- tical use of the concept. As both practical and theoretical implications of UX are of the greatest importance for whoever designs interactive systems, the exploration of practitioners’ perspectives is a valuable step toward continual improvement of UX activities. The present survey has been conducted amongst 758 practitioners and researchers from 35 nationalities. It allows to better understand how this concept is understood and used throughout the world. Amongst interesting results, important differences were observed according to the geographical location and background of the respondents. [less ▲] Detailed reference viewed: 367 (34 UL)![]() Monzon Baeza, Victor ![]() in 2021 Global Congress on Electrical Engineering (GC-ElecEng) (2021, December) Detailed reference viewed: 16 (4 UL)![]() Kemman, Max ![]() in Linköping Electronic Conference Proceedings (2015, August 26), (116), 63-74 Although computational tools play an increasingly important role in the humanities, adoption of tools by scholars does not always reach its potential. One approach to this problem is user research to ... [more ▼] Although computational tools play an increasingly important role in the humanities, adoption of tools by scholars does not always reach its potential. One approach to this problem is user research to uncover the needs of the users. However, it is uncertain whether such user requirements can be generalized to a wider group of humanities scholars, and whether users are able to explicate their requirements for methodological innovation. We ask what the role of user research is in the Digital Humanities by discussing gathered user requirements for two projects. We categorized the requirements as within- or out-of-scope of the projects’ goals, and found a tension between the specificity of humanities’ research methods, and generalizability for a broader applicable tool. With the out-of-scope requirements we are able to map the wider research workflow, showing DH tools will most likely take a spot in the wider workflow, and that it is infeasible to create a tool for the entire workflow that is generic enough for a larger user group. However, the within-scope requirements led to features that were sufficiently generic for the tool to be adopted, also for unintended purposes. These insights show user research has a clear benefit for DH projects. [less ▲] Detailed reference viewed: 188 (11 UL) |
||