Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
See detailCutting in real time in corotational elasticity and perspectives on simulating cuts
Courtecuisse, H.; Kerfriden, P.; Bordas, Stéphane UL

Book published by Springer (2013)

We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of ... [more ▼]

We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of magnitude smaller than that of the organ. [less ▲]

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailCu–Zn disorder and band gap fluctuations in Cu2ZnSn(S,Se)4: Theoretical and experimental investigations
Scragg, Jonathan J. S.; Larsen, Jes K. UL; Kumar, Mukesh et al

in Physica Status Solidi B. Basic Research (2016), 253(2), 247-254

Detailed reference viewed: 108 (0 UL)
See detailLe Cvce.eu, une infrastructure numérique
Gabellini, Marco UL

Presentation (2017, December 18)

Présentation des publications numériques sur le processus de la construction européenne analysé dans une perspective transnationale et multidimensionnelle sur le site cvce.eu. Les collections de ... [more ▼]

Présentation des publications numériques sur le processus de la construction européenne analysé dans une perspective transnationale et multidimensionnelle sur le site cvce.eu. Les collections de publications thématiques et le programme d’histoire orale, comprenant près de 100 interviews de personnalités européennes, constituent une approche innovante de la construction européenne. [less ▲]

Detailed reference viewed: 14 (5 UL)
Full Text
Peer Reviewed
See detailCVH Malach – Centrum vizuální historie Konference a workshop o novém přístupu a využití video databáze Fortunoff
Bronec, Jakub UL

in Marginalia Historica (2020)

On May 18, I took part in a very interesting workshop organized by the Malach Centre for Visual History at the Faculty of Mathematics and Physics of the Charles University in Prague. This exceptional ... [more ▼]

On May 18, I took part in a very interesting workshop organized by the Malach Centre for Visual History at the Faculty of Mathematics and Physics of the Charles University in Prague. This exceptional association provides local access to the extensive digital archives of the USC Shoah Foundation - the Institute for Visual history and Education (USC), the Refugee Voices archive of the Association of Jewish Refugees and the testimony collection of the Jewish Holocaust Centre in Melbourne. Nevertheless, the workshop focused on the newly incorporated Fortunoff Video Archive (FVA) that belongs to the category of long-awaited ingestion, and the path to get a licence was more than difficult. The archive represents a new source for all scholars including me, but in this short comment, I would like to critically point out to several minor drawbacks. [less ▲]

Detailed reference viewed: 36 (3 UL)
Peer Reviewed
See detailCyber bullying among school aged children in Luxembourg
Steffgen, Georges UL; Pfetsch, Jan UL; König, Andreas UL et al

Scientific Conference (2009, August)

Detailed reference viewed: 62 (3 UL)
See detailCyber bullying in Luxemburg: Aus nationaler Sicht
Steffgen, Georges UL

Presentation (2007, November)

Detailed reference viewed: 40 (0 UL)
Peer Reviewed
See detailCyber bullying: Current research findings
Steffgen, Georges UL

Scientific Conference (2009, April)

Detailed reference viewed: 21 (0 UL)
Peer Reviewed
See detailCyber bullying: The role of empathy
Steffgen, Georges UL

Scientific Conference (2009, April)

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailCyber bullying: The role of traditional bullying and empathy
Steffgen, Georges UL; König, Andreas UL

in Sapeo, B.; Haddon, L.; Mante-Meijer, E. (Eds.) et al The good, the bad and the challenging. Conference Proceedings (Vol. II) (2009)

Detailed reference viewed: 315 (2 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 163 (8 UL)
Full Text
Peer Reviewed
See detailCyber-attack detection based on controlled invariant sets
Rosich, Albert; Voos, Holger UL; Darouach, Mohamed

in European Control Conference (ECC), Strasbourg, France, 24-27 June 2014 (2014, June)

This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the ... [more ▼]

This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control laws and its vulnerability can be reduced by limiting its accessibility. Finally, a simple but significant example is presented in order to show the benefits and the flaws of the proposed methodology. [less ▲]

Detailed reference viewed: 96 (2 UL)
Full Text
Peer Reviewed
See detailCyberbullying as an act of revenge?
König, Andreas UL; Gollwitzer, Mario; Steffgen, Georges UL

in Australian Journal of Guidance & Counselling (2010), 20(2), 210-224

Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and ... [more ▼]

Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and retaliation as a motive to engage in acts of cyberbullying has not yet been examined systematically. As a first step, this study investigates whether and to what extent traditional victims, when they become cyberbullies, actually choose their former (traditional) perpetrators as targets of their own cyberbullying behavior. Furthermore, the impact of individual differences in relevant traits, such as vengefulness and justice sensitivity, on the choice of cybervictims is examined. Data from 473 students were collected via an online survey. Of these, 149 were identified as traditional victims/cyberbullies. Results show that traditionally bullied students indeed tend to choose their former perpetrators as cybervictims, and that individual differences play a role in the choice of their victims. Implications for further research, as well as for interventions and prevention programmes, are discussed. [less ▲]

Detailed reference viewed: 221 (0 UL)
Full Text
Peer Reviewed
See detailCyberbullying in the Benelux-Countries: First findings and ways to address the problem
Steffgen, Georges UL; Vandebosch, Heidi; Völlink, Trijntje et al

in Mora-Merchan, J.; Jäger, T. (Eds.) Cyberbullying: a cross-national comparison (2010)

Detailed reference viewed: 76 (2 UL)
See detailCyberbullying through the new media: Findings from an international network
Smith, Peter K.; Steffgen, Georges UL

Book published by Psychology Press (2013)

Detailed reference viewed: 387 (13 UL)
Full Text
See detailCyberbullying: Missbrauch mittels neuer elektronischer Medien
Steffgen, Georges UL

in Willems, Helmut; Ferring, Dieter (Eds.) Macht und Missbrauch in Institutionen (2014)

Detailed reference viewed: 325 (10 UL)
Full Text
Peer Reviewed
See detailCyberbullying: Recent Areas of Research, and the Work of COST IS0801
Smith, Peter K.; Steffgen, Georges UL

in Bulletin of the International Society for Research on Aggression (2013), 35(1), 20-23

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailLes cybercafés dans la France des années 1990, espaces médiatiques et médiatisés
Schafer, Valerie UL

in Le temps des médias (2017), 28

À la croisée de l’histoire de l’innovation et des entreprises, de celle des médias et des TIC et de la sociologie des usages, saisis via des archives audiovisuelles et de la presse, mais aussi celles du ... [more ▼]

À la croisée de l’histoire de l’innovation et des entreprises, de celle des médias et des TIC et de la sociologie des usages, saisis via des archives audiovisuelles et de la presse, mais aussi celles du Web et des Newsgroups, ces espaces intermédiaires que sont les cybercafés, à la fois médiatiques et médiatisés, incarnent tout à la fois les enjeux techniques, économiques, sociaux et culturels que pose l’arrivée du Web au cours de la seconde moitié de la décennie 1990 en France5 et témoignent des empreintes profondé- ment matérielles des mondes virtuels. [less ▲]

Detailed reference viewed: 67 (1 UL)
See detailCyberharcèlement - Quoi faire?
Steffgen, Georges UL

Presentation (2015, November 28)

Detailed reference viewed: 66 (4 UL)
Full Text
Peer Reviewed
See detailCybersecurity of Robotics and Autonomous Systems: Privacy and Safety
Rodriguez Lera, Francisco Javier UL; Llamas, Camino Fernández; Guerrero, Ángel Manuel et al

in Dekoulis, George (Ed.) Robotics - Legal, Ethical and Socioeconomic Impacts (2017)

Robots and autonomous systems in general are set to suffer similar cybersecurity problems that computers have been facing for decades. This is not only worrying for critical tasks such as those performed ... [more ▼]

Robots and autonomous systems in general are set to suffer similar cybersecurity problems that computers have been facing for decades. This is not only worrying for critical tasks such as those performed by surgical, or military robots but also for household robots such as vacuum cleaners or for teleconference robots compromise privacy and safety of their owners. What will happen if these robots are hacked? This study presents a survey on the cybersecurity attacks associated with service robots, and as a result, a taxonomy that classifies the risks faced by users when using service robots, distinguish ing between security and safety threads, is presented. We also present the robot software development phase as one the most relevant ones for the security of robots. [less ▲]

Detailed reference viewed: 95 (6 UL)