Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailThe Court of Justice of the European Union and the European Administrative Space
Hofmann, Herwig UL

in Trondal, Jarle; Bauer, Michael (Eds.) The European Administrative System (2014)

This chapter outlines the role of the judiciary in shaping the European administrative system, the major developmental stages of judicial review of administrative action and the evolution of concepts ... [more ▼]

This chapter outlines the role of the judiciary in shaping the European administrative system, the major developmental stages of judicial review of administrative action and the evolution of concepts under which judicial accountability has been exercised. In this context, it looks at the consequences for judicial accountability by the increasing integration of administrative procedures in the EU. This chapter argues that such procedural forms of cooperation have been established with a primary concern for efficiency of de-central administrative action but less with regard to possibilities of exercising judicial review ensuring compliance with written provisions and General Principles of EU law and rights of individuals. [less ▲]

Detailed reference viewed: 243 (8 UL)
Full Text
Peer Reviewed
See detailUne courte introduction à la cryptographie à courbes elliptiques
Bernard, Nicolas UL

in Sciences ENS (2004), (1),

Si tous les cryptologues amateurs connaissent les algorithmes de cryptographie à clef publique ``traditionnels'' tels que RSA, rares sont ceux qui connaissent plus que de nom la cryptographie à clef ... [more ▼]

Si tous les cryptologues amateurs connaissent les algorithmes de cryptographie à clef publique ``traditionnels'' tels que RSA, rares sont ceux qui connaissent plus que de nom la cryptographie à clef publique basée sur les courbes elliptiques. Le but de cet article est donc de présenter ce domaine de manière simple de façon à rester accessible au plus grand nombre. [less ▲]

Detailed reference viewed: 128 (10 UL)
Full Text
Peer Reviewed
See detailCourts in transition: Administration of justice and how to organize it
Meij, Arjen UL

in Common Market Law Review (2013), 50(1), 3-14

Detailed reference viewed: 33 (3 UL)
Full Text
See detailCoutumes ancestrales ou traditions inventées?
Kmec, Sonja UL

in Conzémius, Marguy (Ed.) Kalbasslamettanationalpilgeralbum. Traditions en migration (2006)

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailCovalent functionalization of graphene oxide with D-mannose: evaluating the hemolytic effect and protein corona formation
Sousa, Marcelo De; Martins, Carlos H. Z.; Franqui, Lidiane S. et al

in Journal of Materials Chemistry B (2018), 6(18), 2803--2812

In this work, graphene oxide (GO) was covalently functionalized with D-mannose (man-GO) using mannosylated ethylenediamine. XPS (C1s and N1s) confirmed the functionalization of GO through the binding ... [more ▼]

In this work, graphene oxide (GO) was covalently functionalized with D-mannose (man-GO) using mannosylated ethylenediamine. XPS (C1s and N1s) confirmed the functionalization of GO through the binding energies at 288.2 eV and 399.8 eV, respectively, which are attributed to the amide bond. ATR-FTIR spectroscopy showed an increase in the amine bond intensity, at 1625 cm−1 (stretching CO), after the functionalization step. Furthermore, the man-GO toxicity to human red blood cells (hemolysis) and its nanobiointeractions with human plasma proteins (hard corona formation) were evaluated. The mannosylation of GO drastically reduced its toxicity to red blood cells. SDS-PAGE analysis showed that the mannosylation process of GO also drastically reduced the amount of the proteins in the hard corona. Additionally, proteomics analysis by LC–MS/MS revealed 109 proteins in the composition of the man-GO hard corona. Finally, this work contributes to future biomedical applications of graphene-based materials functionalized with active biomolecules. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailCovariance and specificity in adolescent schizotypal and borderline trait expression.
Badoud, Deborah; Billieux, Joël UL; Eliez, Stephan et al

in Early intervention in psychiatry (2015), 9(5), 378-87

AIMS: The first aim of the present study is to assess the overlap between borderline and schizotypal traits during adolescence. The second objective is to examine whether some psychological factors (i.e ... [more ▼]

AIMS: The first aim of the present study is to assess the overlap between borderline and schizotypal traits during adolescence. The second objective is to examine whether some psychological factors (i.e. cognitive coping mechanisms, impulsivity and encoding style) are differentially related to borderline and schizotypal traits and may therefore improve the efficiency of clinical assessments. METHODS: One hundred nineteen community adolescents (57 male) aged from 12 to 19 years completed a set of questionnaires evaluating the expression of borderline and schizotypal traits as well as cognitive emotion regulation (CER), impulsivity and encoding style. RESULTS: Our data first yielded a strong correlation between borderline and schizotypal scores (r = 0.70, P < 0.001). Secondly, linear regression models indicated that the 'catastrophizing' CER strategy and the 'lack of premeditation' impulsivity facet accounted for the level of borderline traits, whereas an internal encoding style predominantly explained schizotypal traits. CONCLUSIONS: Our results support the abundant literature showing that borderline and schizotypal traits frequently co-occur. Moreover, we provide original data indicating that borderline and schizotypal traits during adolescence are linked to different specific psychological mechanisms. Thus, we underline the importance of considering these mechanisms in clinical assessments, in particular to help disentangle personality disorder traits in youths. [less ▲]

Detailed reference viewed: 89 (4 UL)
Peer Reviewed
See detailCovariance Matching Estimation Techniques for Array Signal Processing Applications
Ottersten, Björn UL; Stoica, Petre; Roy, R.

in Digital Signal Processing (1998), 8

Detailed reference viewed: 6 (0 UL)
See detailCovenants and Corporations
Baglayan, Basak UL

Presentation (2016, September)

Detailed reference viewed: 101 (3 UL)
See detailCovenants and Corporations
Baglayan, Basak UL

in Critical Quarterly for Legislation and Law (2017), 3

Detailed reference viewed: 111 (2 UL)
Full Text
Peer Reviewed
See detailCoverage Extension via Side-Lobe Transmission in Multibeam Satellite System
Gharanjik, Ahmad UL; Kmieciak, Jarek; Shankar, Bhavani UL et al

in 23rd Ka and Broadband Communications Conference (2017, October 16)

In this paper, we study feasibility of coverage extension of a multibeam satellite network by providing low-rate communications to terminals located outside the coverage of main beams. Focusing on the MEO ... [more ▼]

In this paper, we study feasibility of coverage extension of a multibeam satellite network by providing low-rate communications to terminals located outside the coverage of main beams. Focusing on the MEO satellite network, and using realistic link budgets from O3b networks, we investigate the performance of both forward and return-links for terminals stationed in the side lobes of the main beams. Particularly, multi-carrier transmission for forward-link and single carrier transmission for return-link are examined and the resulting coverage and data rate for different setups are evaluated. Simulation results verifies that side-lobe transmission can extend the coverage area and provide considerable data rate, thereby providing a solution for enhancing capacity of existing networks. [less ▲]

Detailed reference viewed: 84 (7 UL)
Full Text
Peer Reviewed
See detailCoverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics
Rosalie, Martin UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (2017, August 11)

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation ... [more ▼]

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation to swarm members in favor of achieving an efficient global behavior. In this paper, we address the problem of optimizing two adversary criteria for such a UAV swarm: (a) maximizing the area coverage, while (b) preserving network connectivity. Our approach, called CACOC², solves the problem with a novel chaotic ant colony optimization approach, which combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC² employs swarming behavior to obtain UAV clustering that result in maximized area coverage and preserved network connectivity. We show by extensive simulations how the size of the UAV swarm influences the coverage and connectivity. A metrics comparison chart shows the correlation of coverage and connectivity metrics. [less ▲]

Detailed reference viewed: 161 (29 UL)
Full Text
Peer Reviewed
See detailCoverage-based regression test case selection, minimization and prioritization: a case study on an industrial system
Di Nardo, Daniel UL; Alshahwan, Nadia; Briand, Lionel UL et al

in Software Testing, Verification & Reliability (2015), 25(4), 371-396

Detailed reference viewed: 400 (50 UL)
Full Text
Peer Reviewed
See detailCoverage-Based Test Case Prioritisation: An Industrial Case Study
Di Nardo, Daniel UL; Alshahwan, Nadia UL; Briand, Lionel UL et al

in IEEE International Conference on Software Testing, Verification and Validation (ICST) (2013, March)

Detailed reference viewed: 271 (25 UL)
Full Text
Peer Reviewed
See detailCoverage-based Test Cases Selection for XACML Policies
Bertolino, Antonia; Le Traon, Yves UL; Lonetti, Francesca et al

in IEEE International Conference on Software Testing Verification and Validation Workshops (2014)

XACML is the de facto standard for implementing access control policies. Testing the correctness of policies is a critical task. The test of XACML policies involves running requests and checking manually ... [more ▼]

XACML is the de facto standard for implementing access control policies. Testing the correctness of policies is a critical task. The test of XACML policies involves running requests and checking manually the correct response. It is therefore important to reduce the manual test effort by automatically selecting the most important requests to be tested. This paper introduces the XACML smart coverage selection approach, based on a proposed XACML policy coverage criterion. The approach is evaluated using mutation analysis and is compared on the one side with a not-reduced test suite, on the other with random and greedy optimal test selection approaches. We performed the evaluation on a set of six real world policies. The results show that our selection approach can reach good mutation scores, while significantly reducing the number of tests to be run. [less ▲]

Detailed reference viewed: 101 (1 UL)
See detailCovering Different Levels of Evaluation Needs by an Internet-Based Computer-Assisted Testing Framework for Collaborative Distributed Test Development and Delivery
Martin, Romain UL; Latour, T.; Burton, Réginald UL et al

in Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications (2005)

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailCovid-19 and labour law in Luxembourg
Ratti, Luca UL

in European Labour Law Journal (2020)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailCPAL: High-Level Abstractions for Safe Embedded Systems
Navet, Nicolas UL; Fejoz, Loïc

in DSM 2016: Proceedings of the International Workshop on Domain-Specific Modeling (2016)

Innovation in the field of embedded systems, and more broadly in cyber-physical systems, increasingly relies on software. The productivity gain in software development can hardly keep up with the demand ... [more ▼]

Innovation in the field of embedded systems, and more broadly in cyber-physical systems, increasingly relies on software. The productivity gain in software development can hardly keep up with the demand for software despite the increasing adoption of Model-Driven Development (MDD). In this context, we believe that major productivity and quality improvements are still ahead of us through better programming languages and environments. CPAL, the Cyber-Physical Action Language, is a contribution in that direction with the objective to speed-up the development of embedded systems with dependability constraints. The objective of this paper is to present and illustrate the use-cases of the high-level abstractions offered to the developer in CPAL with respect to real-time scheduling, introspection mechanisms, native support of Finite State Machines (FSMs), abstracting the hardware and decoupling functional concerns from non-functional concerns. [less ▲]

Detailed reference viewed: 104 (1 UL)
Full Text
Peer Reviewed
See detailCPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions
Rocchetto, Marco UL; Tippenhauer, Nils

in CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions (2016)

Detailed reference viewed: 129 (0 UL)
Full Text
Peer Reviewed
See detailCPU-Based Real-Time Surface and Solid Voxelization for Incomplete Point Cloud
Garcia Becerro, Frederic UL; Ottersten, Björn UL

in 22nd International Conference on Pattern Recognition (2014, August 27)

This paper presents a surface and solid voxelization approach for incomplete point cloud datasets. Voxelization stands for a discrete approximation of 3-D objects into a volumetric representation, a ... [more ▼]

This paper presents a surface and solid voxelization approach for incomplete point cloud datasets. Voxelization stands for a discrete approximation of 3-D objects into a volumetric representation, a process which is commonly employed in computer graphics and increasingly being used in computer vision. In contrast to surface voxelization, solid voxelization not only set those voxels related to the object surface but also those voxels considered to be inside the object. To that end, we first approximate the given point set, usually describing the external object surface, to an axis-aligned voxel grid. Then, we slice-wise construct a shell containing all surface voxels along each grid-axis pair. Finally, voxels inside the constructed shell are set. Solid voxelization results from the combination of all slices, resulting in a watertight and gap-free representation of the object. The experimental results show a high performance when voxelizing point cloud datasets, independently of the object’s complexity, robust to noise, and handling large portions of data missing. [less ▲]

Detailed reference viewed: 227 (6 UL)