Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailCrack nucleation and propagation in highly heterogeneous microstructure models based on X-ray CT images of real materials
Nguyen, Thanh Tung UL; Yvonnet, Julien; Zhu, Qizhi et al

in 12e Colloque national en calcul des structures (2015)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailCRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Beierle, Christof UL; Leander, Gregor; Moradi, Amir et al

in IACR Transactions on Symmetric Cryptology (2019), 2019(1), 5-45

Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of ... [more ▼]

Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security. This picture has been changed by the introduction of PICARO, ZORRO, and FIDES, where efficient protection against Side-Channel Analysis (SCA) attacks has been considered in their design. In this work we present the tweakable block cipher CRAFT: the efficient protection of its implementations against Differential Fault Analysis (DFA) attacks has been one of the main design criteria, while we provide strong bounds for its security in the related-tweak model. Considering the area footprint of round-based hardware implementations, CRAFT outperforms the other lightweight ciphers with the same state and key size. This holds not only for unprotected implementations but also when fault-detection facilities, side-channel protection, and their combination are integrated into the implementation. In addition to supporting a 64-bit tweak, CRAFT has the additional property that the circuit realizing the encryption can support the decryption functionality as well with very little area overhead. [less ▲]

Detailed reference viewed: 173 (4 UL)
Full Text
Peer Reviewed
See detailCrafting Conversational Agents' Personality in a User-Centric Context
Mano Ferreira, Cátia; Höhn, Sviatlana UL

in Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019) (2019, November)

Detailed reference viewed: 35 (0 UL)
See detailCraftsmen and Guilds in the Medieval and Early Modern Periods
Pauly, Michel UL; Jullien, Eva UL

Book published by Steiner (2016)

Detailed reference viewed: 101 (2 UL)
Peer Reviewed
See detailCraniofacial abnormalities induced by ectopic expression of the homeobox gene Hox-1.1 in transgenic mice.
Balling, Rudi UL; Mutter, G.; Gruss, P. et al

in Cell (1989), 58(2), 337-47

Hox-1.1 is a murine homeobox-containing gene expressed in a time- and cell-specific manner during embryogenesis. We have generated transgenic mice that ectopically express Hox-1.1 from the chicken beta ... [more ▼]

Hox-1.1 is a murine homeobox-containing gene expressed in a time- and cell-specific manner during embryogenesis. We have generated transgenic mice that ectopically express Hox-1.1 from the chicken beta-actin promoter. In these mice Hox-1.1 expression was changed to an almost ubiquitous pattern. Ectopic expression of Hox-1.1 leads to death of the transgenic animals shortly after birth and is associated with multiple craniofacial anomalies, such as cleft palate, open eyes at birth, and nonfused pinnae. This phenotype is similar to the effects seen after systemic administration of retinoic acid during gestation. This suggests that retinoic acid embryopathy and the specific developmental defects caused by ectopic expression of a potential developmental control gene share a common pathogenic mechanism. [less ▲]

Detailed reference viewed: 94 (0 UL)
Peer Reviewed
See detailCraving for violence: The role of Dark Personality traits in violent video game preference
Melzer, André UL

Scientific Conference (2019, June)

Background: Violent and antisocial video games are popular, but little is known why players are drawn to these kinds of games. This present research tested whether there is a connection between player ... [more ▼]

Background: Violent and antisocial video games are popular, but little is known why players are drawn to these kinds of games. This present research tested whether there is a connection between player preferences for violent games and characteristics of so called “dark” personality traits. Method: Relying on a user-centered approach, three online studies (N=662) examined the role of “dark” personality traits together with a novel violent game preference short scale. Results: Study 1 and 2 indicated strong correlations between trait aggression and players’ interest in explicit depictions of blood and gore and games that provide experiences of domination and antisocial behavior. In Study 3, the new scale was tested together with participants’ trait aggression, trait empathy, and the Dark Triad traits of psychopathy, Machiavellianism, and narcissism. Games featuring violence and the possibility of antisocial behavior were found to meet the needs of players who lack empathy and show callous, impulsive, and exploitive (but not narcissistic) attributes. Conclusions: Findings of individual motivators for game violence significantly extend the literature that is predominantly focusing on the effects of playing these games. Apparently, game preferences and playing habits fulfill individual needs that are at least partly determined by particular, i.e. “dark”, personality characteristics. [less ▲]

Detailed reference viewed: 398 (2 UL)
Full Text
Peer Reviewed
See detailCreating a Pindh: Place-Making within a Sikh Diasporic Community in Malaya
Kaur, Narveen UL

in Sikh Formations (2016), 12(1), 28-52

This paper examines a diaspora group's claiming and contesting of physical space and actively engaging in host country multiracial spaces, I co-opted the Pindh, a Sikh concept incorporating relationships ... [more ▼]

This paper examines a diaspora group's claiming and contesting of physical space and actively engaging in host country multiracial spaces, I co-opted the Pindh, a Sikh concept incorporating relationships with the landscape and social structure, re-defining its original meaning to encompass this unique consolidation of identity, home and belonging. Addressing the use and meaning of space and the transformation of Peraktown, the geographical location, I explore this transformation to a place of meaning through the practices of everyday life within the Sikh community. It describes the concepts of spatial relationships and their impact on the construction and solidification of the Peraktown Sikh community in contrast to their inherited connection to the land and inherent romantic nostalgia for Punjab, as they recreated the meanings it contained and inscribed these on the physical map of the town. In the four spaces addressed, the home, the Gurdwara, the school and the gendered work spaces, I demonstrate the ways that space altered, through claiming, adoption and subversion. The lens of the Pindh offers a uniquely Sikh way to view and analyse the constitution of common identity and a place to belong. The Peraktown Sikhs extend the discourse of diaspora beyond postcolonial and Western modes of thought of being ‘other’ yet simultaneously belonging ‘here', ‘back there’ and to multiple places of home. [less ▲]

Detailed reference viewed: 63 (2 UL)
See detail'Creating access to Europe's televisual heritage'. VIDEO ACTIVE - ein Projektbericht
Fickers, Andreas UL

in Rundfunk und Geschichte (2007)

Detailed reference viewed: 114 (2 UL)
Full Text
See detailCreating better ground truth to further understand Android malware: A large scale mining approach based on antivirus labels and malicious artifacts
Hurier, Médéric UL

Doctoral thesis (2019)

Mobile applications are essential for interacting with technology and other people. With more than 2 billion devices deployed all over the world, Android offers a thriving ecosystem by making accessible ... [more ▼]

Mobile applications are essential for interacting with technology and other people. With more than 2 billion devices deployed all over the world, Android offers a thriving ecosystem by making accessible the work of thousands of developers on digital marketplaces such as Google Play. Nevertheless, the success of Android also exposes millions of users to malware authors who seek to siphon private information and hijack mobile devices for their benefits. To fight against the proliferation of Android malware, the security community embraced machine learning, a branch of artificial intelligence that powers a new generation of detection systems. Machine learning algorithms, however, require a substantial number of qualified samples to learn the classification rules enforced by security experts. Unfortunately, malware ground truths are notoriously hard to construct due to the inherent complexity of Android applications and the global lack of public information about malware. In a context where both information and human resources are limited, the security community is in demand for new approaches to aid practitioners to accurately define Android malware, automate classification decisions, and improve the comprehension of Android malware. This dissertation proposes three solutions to assist with the creation of malware ground truths. The first contribution is STASE, an analytical framework that qualifies the composition of malware ground truths. STASE reviews the information shared by antivirus products with nine metrics in order to support the reproducibility of research experiments and detect potential biases. This dissertation reports the results of STASE against three typical settings and suggests additional recommendations for designing experiments based on Android malware. The second contribution is EUPHONY, a heuristic system built to unify family clusters belonging to malware ground truths. EUPHONY exploits the co-occurrence of malware labels obtained from antivirus reports to study the relationship between Android applications and proposes a single family name per sample for the sake of facilitating malware experiments. This dissertation evaluates EUPHONY on well-known malware ground truths to assess the precision of our approach and produce a large dataset of malware tags for the research community. The third contribution is AP-GRAPH, a knowledge database for dissecting the characteristics of malware ground truths. AP-GRAPH leverages the results of EUPHONY and static analysis to index artifacts that are highly correlated with malware activities and recommend the inspection of the most suspicious components. This dissertation explores the set of artifacts retrieved by AP-GRAPH from popular malware families to track down their correlation and their evolution compared to other malware populations. [less ▲]

Detailed reference viewed: 137 (15 UL)
Full Text
Peer Reviewed
See detailCreating local contrast in small-angle neutron scattering by dynamic nuclear polarization
van den Brandt, B.; Glattli, H.; Hautle, P. et al

in Journal of Applied Crystallography (2007), 40(s), 106-110

Low-resolution small-angle neutron scattering measurements can benefit from polarized protons to generate scattering contrast profiles. In a recently developed technique, time-resolved polarized SANS ... [more ▼]

Low-resolution small-angle neutron scattering measurements can benefit from polarized protons to generate scattering contrast profiles. In a recently developed technique, time-resolved polarized SANS tries to make use of spatial polarization gradients created around paramagnetic centres at the onset of dynamic nuclear polarization. The time constants which describe the build-up of polarization around the paramagnetic centre and the subsequent diffusion of polarization in the solvent were determined by analysing the temporal evolution of the nuclear polarization. The possible use and the limitations of this technique as a spectroscopic tool are discussed. [less ▲]

Detailed reference viewed: 85 (0 UL)
Full Text
Peer Reviewed
See detailCreating multiferroic and conductive domain walls in common ferroelastic compounds
Zhao, Hong Jian; Iñiguez, Jorge UL

in NPJ COMPUTATIONAL MATERIALS (2019), 5

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailCreating participatory discourse for teaching and research in early childhood science
Siry, Christina UL; Lang, Diane

in Journal of Science Teacher Education (2010), 21(1), 1-12

This paper presents the results of a study conducted with second grade students and pre-service teachers. This study examined the possibilities for engaging children in critical discourse about their ... [more ▼]

This paper presents the results of a study conducted with second grade students and pre-service teachers. This study examined the possibilities for engaging children in critical discourse about their classroom science experiences. At the heart of this discussion lies the desire to provide a space for teachers and children to develop relationships and to explore the learning of science together. Findings include: (1) on-going, focused, critical dialogue between children and teachers supported children in developing agency in the classroom, and (2) on-going conversations created the opportunity for children to reveal their ways of knowing and developing interpretations of the practice of science. [less ▲]

Detailed reference viewed: 82 (3 UL)
Full Text
Peer Reviewed
See detailCreating sign hierarchies: Social representation in its dynamic context
Valsiner, Jaan UL

in Papers on Social Representations = Textes sur les représentations sociales (2013)

Detailed reference viewed: 44 (0 UL)
See detailCreating the future in the present: the embodied practice of artifactual design
Fletcher, Denise Elaine UL; Seldes, Paul

Presentation (2017, February)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailCreation and analysis of biochemical constraint-based models using the COBRA Toolbox v.3.0.
Heirendt, Laurent UL; Arreckx, Sylvain; Pfau, Thomas UL et al

in Nature protocols (2019), 14(3), 639-702

Constraint-based reconstruction and analysis (COBRA) provides a molecular mechanistic framework for integrative analysis of experimental molecular systems biology data and quantitative prediction of ... [more ▼]

Constraint-based reconstruction and analysis (COBRA) provides a molecular mechanistic framework for integrative analysis of experimental molecular systems biology data and quantitative prediction of physicochemically and biochemically feasible phenotypic states. The COBRA Toolbox is a comprehensive desktop software suite of interoperable COBRA methods. It has found widespread application in biology, biomedicine, and biotechnology because its functions can be flexibly combined to implement tailored COBRA protocols for any biochemical network. This protocol is an update to the COBRA Toolbox v.1.0 and v.2.0. Version 3.0 includes new methods for quality-controlled reconstruction, modeling, topological analysis, strain and experimental design, and network visualization, as well as network integration of chemoinformatic, metabolomic, transcriptomic, proteomic, and thermochemical data. New multi-lingual code integration also enables an expansion in COBRA application scope via high-precision, high-performance, and nonlinear numerical optimization solvers for multi-scale, multi-cellular, and reaction kinetic modeling, respectively. This protocol provides an overview of all these new features and can be adapted to generate and analyze constraint-based models in a wide variety of scenarios. The COBRA Toolbox v.3.0 provides an unparalleled depth of COBRA methods. [less ▲]

Detailed reference viewed: 169 (15 UL)
Full Text
Peer Reviewed
See detailCréation d'une association européenne de droit international privé
Cuniberti, Gilles UL

in Recueil Dalloz (2020)

Detailed reference viewed: 12 (0 UL)
See detailLa création d'une liste électorale féminine à Luxembourg dans les années vingt.
Wagener, Renée UL

in Peemans-Poullet, Hedwige (Ed.) La démocratie à l'épreuve du féminisme : actes du colloque Bruxelles, 13 et 14 mars 1998 (1998)

Detailed reference viewed: 34 (3 UL)
Peer Reviewed
See detailCréation de l'autorité des marchés financiers
Conac, Pierre-Henri UL

in Revue de Droit Bancaire et Financier (2003), (5), 299-299

Detailed reference viewed: 42 (2 UL)