References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailBlockchain Governance: An Overview and Prediction of Optimal Strategies Using Nash Equilibrium
Khan, Nida UL; Ahmad, Tabrez; Patel, Anass et al

in 3rd AUE International Research Conference (in press)

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this ... [more ▼]

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this nascent technology. In this paper, the position of blockchain governance within the hierarchy of Institutional governance is discussed. Blockchain governance is analyzed from the perspective of IT governance using Nash equilibrium to predict the outcome of different governance decisions. A payoff matrix for blockchain governance is created and simulation of different strategy profiles is accomplished for computation of all Nash equilibria. We also create payoff matrices for different kinds of blockchain governance, which were used to propose novel mathematical formulae usable to predict the best governance strategy that minimizes the occurrence of a hard fork as well as predicts the behavior of the majority during protocol updates. [less ▲]

Detailed reference viewed: 269 (23 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 145 (0 UL)
See detailEsclavage, servitude, travail forcé : constitution et évolution d’un cadre conceptuel
Erpelding, Michel UL

in Marchadier, Fabien (Ed.) La prohibition de l'esclavage (in press)

This chapter examines the emergence, definition and evolution of the concepts of slavery, forced labour and servitude in international law.

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailUX Needs Cards – A Pragmatic Tool to Support Experience Design Through Psychological Needs
Lallemand, Carine UL

in IASDR 2021: 9th Congress of the International Association of Societies of Design Research (in press)

The psychological needs-driven UX approach is a well-explored area in UX research and a powerful framework for the design of optimal experiences with systems and products. However, the transfer from ... [more ▼]

The psychological needs-driven UX approach is a well-explored area in UX research and a powerful framework for the design of optimal experiences with systems and products. However, the transfer from research to practice is slow and this approach is not yet widely used by practitioners. As card- based methods have been shown to support designers in both the generation of ideas and the evaluation of their designs, we created the UX needs cards as a pragmatic tool able to support a needs-driven UX process. We present the iterative development of the card-set and its associated techniques and report on three use cases, demonstrating the effectiveness of this tool for user research, idea generation and UX evaluation. Our empirical findings suggest that the UX needs cards are a valuable tool able to support design practice, being easily understood by lay users and a source of inspiration for designers. Acting as a tangible translation of a research framework, the UX needs cards promote theory-driven design strategies and provide researchers, designers, and educators with a tool to clearly communicate the framework of psychological needs. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailAsynja: Sensorial Design for Running Motivation
Menheere, Daphne; Hilderink, Myrthe; Vos, Steven et al

in IASDR 2021: 9th Congress of the International Association of Societies of Design Research (in press)

If starting to run is an easy decision, committing to a long-term running routine proves to be a more challenging endeavor for many people. In this pictorial, we unravel the design process of Asynja, an ... [more ▼]

If starting to run is an easy decision, committing to a long-term running routine proves to be a more challenging endeavor for many people. In this pictorial, we unravel the design process of Asynja, an artefact that triggers exercise imagery by using natural scents related to running. Relying on peripheral interaction, this research probe subtly nudges users to go running, thereby supporting them to transform their positive intentions into actions. Exploring sensoriality as a design opportunity for behavior change interventions, we invite the community to expand the design space of exercise-related motivational products and systems. [less ▲]

Detailed reference viewed: 15 (0 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 121 (16 UL)
Full Text
Peer Reviewed
See detailOn the (M)iNTRU assumption in the integer case
Barthel, Jim Jean-Pierre UL; Müller, Volker UL; Rosie, Razvan UL

in Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU ... [more ▼]

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU. In this work, we break the integer case of the iNTRU assumption through elementary lattice reduction, and we describe how the attack might be generalized to polynomial rings and to the low dimensional MiNTRU assumption with small noise. [less ▲]

Detailed reference viewed: 103 (10 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 150 (1 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband DSRI-Herbstakademie 2020 (in press)

Im Berichtszeitraum dieses Updates rief die OECD zu einem zweiten Öffentlichkeitsbetei-ligungsverfahren auf und erarbeitete einen präziseren Lösungsansatz zur Besteuerung digitalisierter Geschäftsmodelle ... [more ▼]

Im Berichtszeitraum dieses Updates rief die OECD zu einem zweiten Öffentlichkeitsbetei-ligungsverfahren auf und erarbeitete einen präziseren Lösungsansatz zur Besteuerung digitalisierter Geschäftsmodelle, der in einer Veröffentlichung im Januar 2020 vorgestellt wurde. Auf Ebene der Europäischen Union gab es im Berichtszeitraum keine Weiterent-wicklung der Richtlinienvorschläge zu einer Digitalsteuer und dem Konzept der „signifi-kanten digitalen Präsenz“. Der EuGH urteilte am 3. März 2020 in Hinblick auf die unions-rechtliche Vereinbarkeit zweier ungarischer Umsatzsteuern. Dieses Urteil erlaubt erste Rückschlüsse bezüglich der Europarechtskonformität umsatzbasierter Steuern, wie bspw. auch im Berichtszeitraum eingeführte Digitalsteuern einzelner Mitgliedstaaten. Dieser Beitrag knüpft an die Vorträge von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademien 2018 in Bochum und 2019 in Oldenburg, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 81 (2 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 245 (6 UL)
Full Text
Peer Reviewed
See detailDiscrete-Phase Sequence Design with Stopband and PSL Constraints for Cognitive Radar
Alaeekerahroodi, Mohammad UL; Kumar, Sumit UL; Mysore Rama Rao, Bhavani Shankar UL et al

in Proceedings of EuRAD 2020 (in press)

We present the design of discrete-phase sequences considering simultaneously the peak sidelobe level (PSL) and avoiding reserved frequency bands which are occupied by narrowband interferers or ... [more ▼]

We present the design of discrete-phase sequences considering simultaneously the peak sidelobe level (PSL) and avoiding reserved frequency bands which are occupied by narrowband interferers or communications. We use the coordinate descent framework and propose an algorithm to design discrete-phase sequences with spectral power suppressed in arbitrary bands and with low auto-correlation sidelobes in terms of PSL. Our proposed algorithm exploits fast Fourier transform and is, therefore, computationally efficient. The over-the-air experiments using implementation on software-defined radio show reasonable agreement with numerical simulations and feasibility for field-deployment [less ▲]

Detailed reference viewed: 78 (6 UL)
Full Text
Peer Reviewed
See detailLes archevêques de Milan face aux premières expériences seigneuriales: stratégies et positionnements (milieu XIIIe-début XIVe s.)
Salemme, Timothy UL

in Barralis, Christine (Ed.) L’évêque face à son métier. Actes du colloque international, Metz. 15-17 novembre 2017 (in press)

Detailed reference viewed: 35 (1 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 115 (13 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 107 (1 UL)
Full Text
Peer Reviewed
See detailNIKE from Affine Determinant Programs
Barthel, Jim Jean-Pierre UL; Rosie, Razvan UL

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the ... [more ▼]

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the existence of indistinguishability obfuscation (iO). In this work, we revisit the original, iO-based, provably-secure NIKE construction by Boneh and Zhandry, aiming to simplify it. The core idea behind our protocol is to replace the functionality of the obfuscator with the one of an affine determinant program (ADP). Although ADPs have been designed with the purpose of attaining indistinguishability obfuscation, such implication is left open for general circuits. The ingredients enabling to prove the security of our scheme stem into a more careful analysis of the branching programs needed to build ADPs. In particular, we show: 1) An intuitive indistinguishability notion defined for ADPs of puncturable pseudorandom functions (PRFs) is sufficient to prove security for NIKE. 2) A set of simple conditions based on ADP's branching program topology that are sufficient for proving indistinguishability of ADPs. We leave open the question of finding ADPs satisfying them. [less ▲]

Detailed reference viewed: 46 (4 UL)
Full Text
Peer Reviewed
See detailVon Objekt- und Meta-Ebenen: Analyse der Softwareanforderungen computergestützter juristischer Entscheidungen
Adrian, Axel; Rapp, Max; Steen, Alexander UL

in Recht DIGITAL – 25 Jahre IRIS, Proceedings of the International Legal Informatics Symposium (IRIS 2022) (in press)

Die Interpretation und Anwendung von Gesetzestexten auf einem konkreten Lebenssachverhalt erfordert von menschlichen Experten ein hohes Maß an Wissen, Erfahrung und die Fähigkeit zahlreiche kontextuelle ... [more ▼]

Die Interpretation und Anwendung von Gesetzestexten auf einem konkreten Lebenssachverhalt erfordert von menschlichen Experten ein hohes Maß an Wissen, Erfahrung und die Fähigkeit zahlreiche kontextuelle Überlegungen anzustellen. Die Formalisierung und Automatisierung solch eines Prozesses in einem computergestützten Verfahren muss dies entsprechend reflektieren. Ausgehend von einer Fallstudie werden in dieser Arbeit erforderliche juridische Schritte der Rechtsanwendung identifiziert und verschiedenen Objekt- und Meta-Ebenen zugeordnet. Diese Zuordnung erlaubt eine abstrakte Analyse von Softwareanforderungen, die juristische Assistenzsysteme erfüllen müssen, um bei juristischen Fallentscheidungen unterstützen zu können. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 444 (12 UL)
Full Text
Peer Reviewed
See detailPartitioned Searchable Encryption
Barthel, Jim Jean-Pierre UL; Beunardeau, Marc; Rosie, Razvan et al

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the ... [more ▼]

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the search/update queries. In this work we put forth a new flavour of symmetric searchable encryption (SSE): Partitioned SSE is meant to capture the cases where the search rights must be partitioned among multiple individuals. We motivate through compelling examples the practical need for such a notion and discuss instantiations based on functional encryption and trapdoor permutations. First we leverage the power of functional encryption (FE). Our construction follows the general technique of encrypting the set of keywords and the presumably larger datafiles separately, a keyword acting as a ``pointer'' to datafiles it belongs to. To improve on the constraint factors (large ciphertext, slow encryption/decryption procedures) that are inherent in FE schemes, the keyword check is done with the help of a Bloom filter -- one per datafile: the crux idea is to split the filter into buckets, and encrypt each bucket separately under an FE scheme. Functional keys are given for binary \masks checking if relevant positions are set to 1 inside the underlying bit-vector of the Bloom filter. The second construction we present achieves forward security and stems from the scheme by Bost in CCS'16. We show that a simple tweak of the original construction gives rise to a scheme supporting updates in the partitioned setting. Moreover, the constructions take into account the possibility that some specific users are malicious while declaring their search results. [less ▲]

Detailed reference viewed: 122 (1 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 136 (4 UL)
Full Text
Peer Reviewed
See detailConservazione e ricezione dei documenti pontifici in Italia settentrionale: il caso del monastero cistercense di Chiaravalle Milanese (secoli XII-XVI)
Salemme, Timothy UL

in Salemme, Timothy; Renault, Jean-Baptiste (Eds.) Conservation et réception des documents pontificaux par les Ordres religieux (XIe-XVe siècles). Actes du colloque international. Nancy, 12-13 décembre 2013 (in press)

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailEduCHI 2022 - 4th Annual Symposium on HCI Education
McDonald, Craig; St-Cyr, Olivier; Gray, Colin M. et al

in Proceedings of the CHI 2022 Conference on Human Factors in Computing Systems (in press)

EduCHI 2022 will bring together an international community of scholars, practitioners, and researchers to shape the future of Human-Computer Interaction (HCI) education. Held as part of the CHI 2022 ... [more ▼]

EduCHI 2022 will bring together an international community of scholars, practitioners, and researchers to shape the future of Human-Computer Interaction (HCI) education. Held as part of the CHI 2022 conference, the two-day symposium will feature in- teractive discussions about trends, curricula, pedagogies, teaching practices, and current and future challenges facing HCI educators. In addition to providing a platform to share curriculum plans and teaching materials, EduCHI 2022 will also provide opportunities for HCI educators to learn new instructional strategies and deepen their pedagogical knowledge. [less ▲]

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailDISCOV: Stimulating Physical Activity through an Explorative Interactive Walking Experience
van Renswouw, Loes; Verhoef, Jasmijn; Vos, Steven et al

in IASDR 2021: 9th Congress of the International Association of Societies of Design Research (in press)

Aware of the consequences of their inactive lifestyles, many people still struggle to integrate enough physical activity into their busy lives. Interventions that nudge to reinforce existing active ... [more ▼]

Aware of the consequences of their inactive lifestyles, many people still struggle to integrate enough physical activity into their busy lives. Interventions that nudge to reinforce existing active behavior seem therefore more likely to be effective than those adding an activity to daily routines. To encourage people to increase their physical activity level, we designed Discov, a network of physical waypoints triggering people to lengthen their walks. Placed in a public park, Discov encourages people to explore their surroundings in a fun and challenging way by creating an interactive walking experience. Adopting a Research-through-Design approach, we explore the potential of the design of accessible infrastructures and human-environment interactions to impact public health by nudging citizens into being more physically active. We discuss insights gathered through this process and report on first user tests of this interactive walking experience. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailRefining Weakly-Supervised Free Space Estimation through Data Augmentation and Recursive Training
Robinet, François UL; Frank, Raphaël UL

in Proceedings of BNAIC/BeneLearn 2021 (in press)

Free space estimation is an important problem for autonomous robot navigation. Traditional camera-based approaches rely on pixel-wise ground truth annotations to train a segmentation model. To cover the ... [more ▼]

Free space estimation is an important problem for autonomous robot navigation. Traditional camera-based approaches rely on pixel-wise ground truth annotations to train a segmentation model. To cover the wide variety of environments and lighting conditions encountered on roads, training supervised models requires large datasets. This makes the annotation cost prohibitively high. In this work, we propose a novel approach for obtaining free space estimates from images taken with a single road-facing camera. We rely on a technique that generates weak free space labels without any supervision, which are then used as ground truth to train a segmentation model for free space estimation. We study the impact of different data augmentation techniques on the performances of free space predictions, and propose to use a recursive training strategy. Our results are benchmarked using the Cityscapes dataset and improve over comparable published work across all evaluation metrics. Our best model reaches 83.64% IoU (+2.3%), 91:75% Precision (+2.4%) and 91.29% Recall (+0.4%). These results correspond to 88.8% of the IoU, 94.3% of the Precision and 93.1% of the Recall obtained by an equivalent fully-supervised baseline, while using no ground truth annotation. Our code and models are freely available online. [less ▲]

Detailed reference viewed: 59 (17 UL)
Peer Reviewed
See detailBuffer XDEM
Mainassara Chekaraou, Abdoul Wahid UL; Besseron, Xavier UL; Rousset, Alban UL et al

Scientific Conference (in press)

Detailed reference viewed: 212 (72 UL)
Full Text
Peer Reviewed
See detailDifuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps
Samhi, Jordan UL; Li, Li; Bissyande, Tegawendé François D Assise UL et al

in 44th International Conference on Software Engineering (ICSE 2022) (2022, May 21)

One prominent tactic used to keep malicious behavior from being detected during dynamic test campaigns is logic bombs, where malicious operations are triggered only when specific conditions are satisfied ... [more ▼]

One prominent tactic used to keep malicious behavior from being detected during dynamic test campaigns is logic bombs, where malicious operations are triggered only when specific conditions are satisfied. Defusing logic bombs remains an unsolved problem in the literature. In this work, we propose to investigate Suspicious Hidden Sensitive Operations (SHSOs) as a step towards triaging logic bombs. To that end, we develop a novel hybrid approach that combines static analysis and anomaly detection techniques to uncover SHSOs, which we predict as likely implementations of logic bombs. Concretely, Difuzer identifies SHSO entry-points using an instrumentation engine and an inter-procedural data-flow analysis. Then, it extracts trigger-specific features to characterize SHSOs and leverages One-Class SVM to implement an unsupervised learning model for detecting abnormal triggers. We evaluate our prototype and show that it yields a precision of 99.02% to detect SHSOs among which 29.7% are logic bombs. Difuzer outperforms the state-of-the-art in revealing more logic bombs while yielding less false positives in about one order of magnitude less time. All our artifacts are released to the community. [less ▲]

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailJuCify: A Step Towards Android Code Unification for Enhanced Static Analysis
Samhi, Jordan UL; Gao, Jun UL; Daoudi, Nadia UL et al

in 44th International Conference on Software Engineering (ICSE 2022) (2022, May 21)

Native code is now commonplace within Android app packages where it co-exists and interacts with Dex bytecode through the Java Native Interface to deliver rich app functionalities. Yet, state-of-the-art ... [more ▼]

Native code is now commonplace within Android app packages where it co-exists and interacts with Dex bytecode through the Java Native Interface to deliver rich app functionalities. Yet, state-of-the-art static analysis approaches have mostly overlooked the presence of such native code, which, however, may implement some key sensitive, or even malicious, parts of the app behavior. This limitation of the state of the art is a severe threat to validity in a large range of static analyses that do not have a complete view of the executable code in apps. To address this issue, we propose a new advance in the ambitious research direction of building a unified model of all code in Android apps. The JuCify approach presented in this paper is a significant step towards such a model, where we extract and merge call graphs of native code and bytecode to make the final model readily-usable by a common Android analysis framework: in our implementation, JuCify builds on the Soot internal intermediate representation. We performed empirical investigations to highlight how, without the unified model, a significant amount of Java methods called from the native code are ``unreachable'' in apps' call-graphs, both in goodware and malware. Using JuCify, we were able to enable static analyzers to reveal cases where malware relied on native code to hide invocation of payment library code or of other sensitive code in the Android framework. Additionally, JuCify's model enables state-of-the-art tools to achieve better precision and recall in detecting data leaks through native code. Finally, we show that by using JuCify we can find sensitive data leaks that pass through native code. [less ▲]

Detailed reference viewed: 35 (2 UL)
Peer Reviewed
See detailAre Value-Added Scores Stable Enough for High-Stakes Decisions?
Emslander, Valentin UL; Levy, Jessica UL; Scherer, Ronny et al

Scientific Conference (2022, March)

Theoretical Background: Can we quantify the effectiveness of a teacher or a school with a single number? Researchers in the field of value-added (VA) models may argue just that (e.g., Chetty et al., 2014 ... [more ▼]

Theoretical Background: Can we quantify the effectiveness of a teacher or a school with a single number? Researchers in the field of value-added (VA) models may argue just that (e.g., Chetty et al., 2014; Kane et al., 2013). VA models are widely used for accountability purposes in education and quantify the value a teacher or a school adds to their students’ achievement. For this purpose, these models predict achievement over time and attempt to control for factors that cannot be influenced by schools or teachers (i.e., sociodemographic & sociocultural background). Following this logic, what is left must be due to teacher or school differences (see, e.g., Braun, 2005). To utilize VA models for high-stakes decision-making (e.g., teachers’ tenure, the allocation of funding), these models would need to be highly stable over time. School-level stability over time, however, has hardly been researched at all and the resulting findings are mixed, with some studies indicating high stability of school VA scores over time (Ferrão, 2012; Thomas et al., 2007) and others reporting a lack of stability (e.g., Gorard et al., 2013; Perry, 2016). Furthermore, as there is no consensus on which variables to use as independent or dependent variables in VA models (Everson, 2017; Levy et al., 2019), the stability of VA could vary between different outcome measures (e.g., language or mathematics). If VA models lack stability over time and across outcome measures, their use as the primary information for high-stakes decision-making is in question, and the inferences drawn from them could be compromised. Questions: With these uncertainties in mind, we examine the stability of school VA model scores over time and investigate the differences between language and mathematics achievement as outcome variables. Additionally, we demonstrate the real-life implications of (in)stable VA scores for single schools and point out an alternative, more constructive use of school VA models in educational research. Method: To study the stability of VA scores on school level over time and across outcomes, we drew on a sample of 146 primary schools, using representative longitudinal data from the standardized achievement tests of the Luxembourg School Monitoring Programme (LUCET, 2021). These schools included a heterogeneous and multilingual sample of 7016 students. To determine the stability of VA scores in the subject of mathematics and in languages over time, we based our analysis on two longitudinal datasets (from 2015 to 2017 and from 2017 to 2019, respectively) and generated two VA scores per dataset, one for language and one for mathematics achievement. We further analyzed how many schools displayed stable VA scores in the respective outcomes over two years, and compared the rank correlations of VA scores between language and mathematics achievement as an outcome variable. Results and Their Significance: Only 34-38 % of the schools showed stable VA scores from grade 1 to 3 with moderate rank correlations of r = .37 with language and r = .34 with mathematics achievement. We therefore discourage using VA models as the only information for high-stakes educational decisions. Nonetheless, we argue that VA models could be employed to find genuinely effective teaching or school practices—especially in heterogeneous student populations, such as Luxembourg, in which educational disparities are an important topic already in primary school (Hoffmann et al., 2018). Consequently, we contrast the school climate and instructional quality, which might be a driver of the differences between schools with stable high vs. low VA scores. Literature Braun, H. (2005). Using student progress to evaluate teachers: A primer on value-added models. Educational Testing Service. Chetty, R., Friedman, J. N., & Rockoff, J. E. (2014). Measuring the impacts of teachers I: Evaluating bias in teacher value-added estimates. American Economic Review, 104(9), 2593–2632. https://doi.org/10.1257/aer.104.9.2593 Everson, K. C. (2017). Value-added modeling and educational accountability: Are we answering the real questions? Review of Educational Research, 87(1), 35–70. https://doi.org/10.3102/0034654316637199 Ferrão, M. E. (2012). On the stability of value added indicators. Quality & Quantity, 46(2), 627–637. https://doi.org/10.1007/s11135-010-9417-6 Gorard, S., Hordosy, R., & Siddiqui, N. (2013). How unstable are “school effects” assessed by a value-added technique? International Education Studies, 6(1), 1–9. https://doi.org/10.5539/ies.v6n1p1 Kane, T. J., McCaffrey, D. F., Miller, T., & Staiger, D. O. (2013). Have We Identified Effective Teachers? Validating Measures of Effective Teaching Using Random Assignment. Research Paper. MET Project. Bill & Melinda Gates Foundation. https://files.eric.ed.gov/fulltext/ED540959.pdf Levy, J., Brunner, M., Keller, U., & Fischbach, A. (2019). Methodological issues in value-added modeling: An international review from 26 countries. Educational Assessment, Evaluation and Accountability, 31(3), 257–287. https://doi.org/10.1007/s11092-019-09303-w LUCET. (2021). Épreuves Standardisées (ÉpStan). https://epstan.lu Perry, T. (2016). English value-added measures: Examining the limitations of school performance measurement. British Educational Research Journal, 42(6), 1056–1080. https://doi.org/10.1002/berj.3247 Thomas, S., Peng, W. J., & Gray, J. (2007). Modelling patterns of improvement over time: Value added trends in English secondary school performance across ten cohorts. Oxford Review of Education, 33(3), 261–295. https://doi.org/10.1080/03054980701366116 [less ▲]

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailIML-GCN: Improved Multi-Label Graph Convolutional Network for Efficient yet Precise Image Classification
Singh, Inder Pal UL; Oyedotun, Oyebade UL; Ghorbel, Enjie UL et al

in AAAI-22 Workshop Program-Deep Learning on Graphs: Methods and Applications (2022, February)

In this paper, we propose the Improved Multi-Label Graph Convolutional Network (IML-GCN) as a precise and efficient framework for multi-label image classification. Although previous approaches have shown ... [more ▼]

In this paper, we propose the Improved Multi-Label Graph Convolutional Network (IML-GCN) as a precise and efficient framework for multi-label image classification. Although previous approaches have shown great performance, they usually make use of very large architectures. To handle this, we propose to combine the small version of a newly introduced network called TResNet with an extended version of Multi-label Graph Convolution Networks (ML-GCN); therefore ensuring the learning of label correlation while reducing the size of the overall network. The proposed approach considers a novel image feature embedding instead of using word embeddings. In fact, the latter are learned from words and not images making them inadequate for the task of multi-label image classification. Experimental results show that our framework competes with the state-of-the-art on two multi-label image benchmarks in terms of both precision and memory requirements. [less ▲]

Detailed reference viewed: 27 (4 UL)
Full Text
Peer Reviewed
See detailOn the Suitability of SHAP Explanations for Refining Classifications
Arslan, Yusuf UL; Lebichot, Bertrand UL; Allix, Kevin UL et al

in In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022) (2022, February)

In industrial contexts, when an ML model classifies a sample as positive, it raises an alarm, which is subsequently sent to human analysts for verification. Reducing the number of false alarms upstream in ... [more ▼]

In industrial contexts, when an ML model classifies a sample as positive, it raises an alarm, which is subsequently sent to human analysts for verification. Reducing the number of false alarms upstream in an ML pipeline is paramount to reduce the workload of experts while increasing customers’ trust. Increasingly, SHAP Explanations are leveraged to facilitate manual analysis. Because they have been shown to be useful to human analysts in the detection of false positives, we postulate that SHAP Explanations may provide a means to automate false-positive reduction. To confirm our intuition, we evaluate clustering and rules detection metrics with ground truth labels to understand the utility of SHAP Explanations to discriminate false positives from true positives. We show that SHAP Explanations are indeed relevant in discriminating samples and are a relevant candidate to automate ML tasks and help to detect and reduce false-positive results. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailThe Social Construction of Self-Sovereign Identity: An Extended Model of Interpretive Flexibility
Weigl, Linda UL; Barbereau, Tom Josua UL; Rieger, Alexander UL et al

in Proceedings of the Hawaii International Conference on System Sciences 2022 (2022, January)

User-centric identity management systems are gaining momentum as concerns about Big Tech and Big Government rise. Many of these systems are framed as offering Self-Sovereign Identity (SSI). Yet, competing ... [more ▼]

User-centric identity management systems are gaining momentum as concerns about Big Tech and Big Government rise. Many of these systems are framed as offering Self-Sovereign Identity (SSI). Yet, competing appropriation and the social embedding of SSI have resulted in diverging interpretations. These vague and value-laden interpretations can damage the public discourse and risk misrepresenting values and affordances that technology offers to users. To unpack the various social and technical understandings of SSI, we adopt an ‘interpretive flexibility’ lens. Based on a qualitative inductive interview study, we find that SSI’s interpretation is strongly mediated by surrounding institutional properties. Our study helps to better navigate these different perceptions and highlights the need for a multidimensional framework that can improve the understanding of complex socio-technical systems for digital government practitioners, researchers, and policy-makers. [less ▲]

Detailed reference viewed: 172 (39 UL)
Full Text
Peer Reviewed
See detailOn Frame Fingerprinting and Controller Area Networks Security in Connected Vehicles
Buscemi, Alessio UL; Turcanu, Ion; Castignani, German et al

in IEEE Consumer Communications & Networking Conference, Virtual Conference 8-11 January 2022 (2022, January)

Modern connected vehicles are equipped with a large number of sensors, which enable a wide range of services that can improve overall traffic safety and efficiency. However, remote access to connected ... [more ▼]

Modern connected vehicles are equipped with a large number of sensors, which enable a wide range of services that can improve overall traffic safety and efficiency. However, remote access to connected vehicles also introduces new security issues affecting both inter and intra-vehicle communications. In fact, existing intra-vehicle communication systems, such as Controller Area Network (CAN), lack security features, such as encryption and secure authentication for Electronic Control Units (ECUs). Instead, Original Equipment Manufacturers (OEMs) seek security through obscurity by keeping secret the proprietary format with which they encode the information. Recently, it has been shown that the reuse of CAN frame IDs can be exploited to perform CAN bus reverse engineering without physical access to the vehicle, thus raising further security concerns in a connected environment. This work investigates whether anonymizing the frames of each newly released vehicle is sufficient to prevent CAN bus reverse engineering based on frame ID matching. The results show that, by adopting Machine Learning techniques, anonymized CAN frames can still be fingerprinted and identified in an unknown vehicle with an accuracy of up to 80 %. [less ▲]

Detailed reference viewed: 82 (16 UL)
Full Text
Peer Reviewed
See detailDeFi, Not So Decentralized: The Measured Distribution of Voting Rights
Barbereau, Tom Josua UL; Smethurst, Reilly UL; Papageorgiou, Orestis UL et al

in Proceedings of the Hawaii International Conference on System Sciences 2022 (2022, January)

Bitcoin and Ethereum are frequently promoted as decentralized, but developers and academics question their actual decentralization. This motivates further experiments with public permissionless ... [more ▼]

Bitcoin and Ethereum are frequently promoted as decentralized, but developers and academics question their actual decentralization. This motivates further experiments with public permissionless blockchains to achieve decentralization along technical, economic, and political lines. The distribution of tokenized voting rights aims for political decentralization. Tokenized voting rights achieved notoriety within the nascent field of decentralized finance (DeFi) in 2020. As an alternative to centralized crypto-asset exchanges and lending platforms (owned by companies like Coinbase and Celsius), DeFi developers typically create non-custodial projects that are not majority-owned or managed by legal entities. Holders of tokenized voting rights can instead govern DeFi projects. To scrutinize DeFi’s distributed governance strategies, we conducted a multiple-case study of non-custodial, Ethereum-based DeFi projects: Uniswap, Maker, SushiSwap, Yearn Finance, and UMA. Our findings are novel and surprising: quantitative evaluations of DeFi’s distributed governance strategies reveal a failure to achieve political decentralization. [less ▲]

Detailed reference viewed: 601 (27 UL)
Full Text
Peer Reviewed
See detailPhysics-Based Cognitive Radar Modeling and Parameter Estimation
Sedighi, Saeid UL; Mysore Rama Rao, Bhavani Shankar UL; Mishra, Kumar Vijay et al

in IEEE Radar Conference (2022)

We consider the problem of channel response estimation in cognitive fully adaptive radar (CoFAR). We show that this problem can be expressed as a constrained channel estimation problem exploiting the ... [more ▼]

We consider the problem of channel response estimation in cognitive fully adaptive radar (CoFAR). We show that this problem can be expressed as a constrained channel estimation problem exploiting the similarity between the channel impulse responses (CIRs) of the adjacent channels. We develop a constrained CIR estimation (CCIRE) algorithm enhancing estimation performance compared to the unconstrained CIR estimation where the similarity between the CIRs of the adjacent channels is not employed. Further, we we derive the Cram\'{e}r-Rao bound (CRB) for the CCIRE and show the optimality of the proposed CCIRE through comparing its performance with the derived CRB. [less ▲]

Detailed reference viewed: 8 (2 UL)
Full Text
Peer Reviewed
See detailPrivacy-preserving Copy Number Variation Analysis with Homomorphic Encryption
Demirci, Huseyin UL; Lenzini, Gabriele UL

Scientific Conference (2022)

Innovative pharma-genomics and personalized medicine services are now possible thanks to the availability for processing and analysis of a large amount of genomic data. Operating on such databases, is ... [more ▼]

Innovative pharma-genomics and personalized medicine services are now possible thanks to the availability for processing and analysis of a large amount of genomic data. Operating on such databases, is possible to test for predisposition to diseases by searching for genomic variants on whole genomes as well as on exomes, which are collections of protein coding regions called exons. Genomic data are therefore shared amongst research institutes, public/private operators, and third parties, creating issues of privacy, ethics, and data protection because genome data are strictly personal and identifying. To prevent damages that could follow a data breach—a likely threat nowadays—and to be compliant with current data protection regulations, genomic data files should be encrypted, and the data processing algorithms should be privacy-preserving. Such a migration is not always feasible: not all operations can be implemented straightforwardly to be privacypreserving; a privacy-preserving version of an algorithm may not be as accurate for the purpose of biomedical analysis as the original; or the privacy-preserving version may not scale up when applied to genomic data processing because of inefficiency in computation time. In this work, we demonstrate that at least for a wellknown genomic data procedure for the analysis of copy number variants called copy number variations (CNV) a privacy-preserving analysis is possible and feasible. Our algorithm relies on Homomorphic Encryption, a cryptographic technique to perform calculations directly on the encrypted data. We test our implementation for performance and reliability, giving evidence that it is practical to study copy number variations and preserve genomic data privacy. Our proof-of-concept application successfully and efficiently searches for a patient’s somatic copy number variation changes by comparing the patient gene coverage in the whole exome with a healthy control exome coverage. Since all the genomics data are securely encrypted, the data remain protected even if they are transmitted or shared via an insecure environment like a public cloud. Being this the first study for privacy-preserving copy number variation analysis, we demonstrate the potential of recent Homomorphic Encryption tools in genomic applications. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailWith or Without Blockchain? Towards a Decentralized, SSI-based eRoaming Architecture
Höß, Alexandra UL; Roth, Tamara UL; Sedlmeir, Johannes UL et al

in Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS) (2022)

Fragmentation and limited accessibility of charging infrastructure impede the adoption of electric vehicles. To improve the availability of charging infrastructure independent of providers, eRoaming ... [more ▼]

Fragmentation and limited accessibility of charging infrastructure impede the adoption of electric vehicles. To improve the availability of charging infrastructure independent of providers, eRoaming offers a promising solution. Yet, current eRoaming systems are typically centralized, which raises concerns of market power concentration. While the use of blockchain technology can obviate such concerns, it comes with significant privacy challenges. To address these challenges, we explore a combination of blockchain with self-sovereign identity. Specifically, we apply a design science research approach, which helps us to identify requirements, derive a conceptual architecture, and deduce design principles for decentralized eRoaming and beyond. We find that blockchain may best leverage its benefits when it takes a backseat as a public registry for legal entities. Moreover, we find that the use of self-sovereign identities could improve compliance with privacy regulations, but they should not be overused. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailIntegral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
Cui, Jiamin; Hu, Kai; Wang, Qingju UL et al

in Topics in Cryptology - CT-RSA 2022 - The Cryptographers' Track at the RSA Conference 2022, San Francisco, CA, USA, February 7-10, 2022, Proceedings (2022)

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailBreaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV
Mueller, Johannes UL

in Workshop on Advances in Secure Electronic Voting 2022 (2022)

We revisit the e-voting protocol IVXV that is used for legally-binding political elections in Estonia from a privacy perspective. We demonstrate that IVXV is vulnerable to attacks against vote privacy in ... [more ▼]

We revisit the e-voting protocol IVXV that is used for legally-binding political elections in Estonia from a privacy perspective. We demonstrate that IVXV is vulnerable to attacks against vote privacy in those threat scenarios that were considered for IVXV originally. We explain how to improve IVXV so that it protects against the privacy issues we discovered. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailAggregating Energy Flexibility for Demand-Side Management in Manufacturing Companies – A Two-Step Method
Lindner, M; Wenninger, Simon; Fridgen, Gilbert UL et al

in Production at the Leading Edge of Technology (2022)

Towards greener production, manufacturing companies face several challenges, for example peak load shaving or flexible production planning as parts of demand-side management (DSM). DSM uses processes that ... [more ▼]

Towards greener production, manufacturing companies face several challenges, for example peak load shaving or flexible production planning as parts of demand-side management (DSM). DSM uses processes that can be shut down, shifted, or controlled. Advances in digitalization in the energy sector and manufacturing systems create transparency which in turn offers new opportunities to commercialize energy flexibility potentials as optimally and automatically as possible. The variety of flexibilities in manufacturing systems and various dependencies of different kinds of complex manufacturing processes complicate the modelling and aggregation of flexibility. To overcome this challenge, we developed a method for the aggregation of energy flexibilities that is based on a generic energy flexibility data model. The method proposes a two-step approach to aggregate flexibilities cost efficiently and considers manufacturing specific limitations. For cost-efficient aggregation, we use in the first step the merit-order model known from the energy industry and in the second step the bin-packing problem originating from combinatorial optimization, adapted according to the generic data model. The two-step approach allows energy flexibilities to be aggregated across industries, facilities, and systems, thus ensuring broad applicability. [less ▲]

Detailed reference viewed: 60 (5 UL)
Peer Reviewed
See detailModel-Based Systems Engineering to Design An Onboard Surround Vision System for Cooperative Automated Vehicles
Kemsaram, Narsimlu UL; Das, Anweshan; Dubbelman, Gijs

Scientific Conference (2021, December 17)

Detailed reference viewed: 43 (0 UL)
Peer Reviewed
See detailA SysML-based Design and Development of Stereo Vision System with Pose and Velocity Estimation for Cooperative Automated Vehicles
Kemsaram, Narsimlu UL; Das, Anweshan; Dubbelman, Gijs

Scientific Conference (2021, December 09)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailDual-DNN Assisted Optimization for Efficient Resource Scheduling in NOMA-Enabled Satellite Systems
Wang, Anyue UL; Lei, Lei UL; Lagunas, Eva UL et al

Scientific Conference (2021, December 08)

In this paper, we apply non-orthogonal multiple access (NOMA) in satellite systems to assist data transmission for services with latency constraints. We investigate a problem to minimize the transmission ... [more ▼]

In this paper, we apply non-orthogonal multiple access (NOMA) in satellite systems to assist data transmission for services with latency constraints. We investigate a problem to minimize the transmission time by jointly optimizing power allocation and terminal-timeslot assignment for accomplishing a transmission task in NOMA-enabled satellite systems. The problem appears non-linear/non-convex with integer variables and can be equivalently reformulated in the format of mixed-integer convex programming (MICP). Conventional iterative methods may apply but at the expenses of high computational complexity in approaching the optimum or near-optimum. We propose a combined learning and optimization scheme to tackle the problem, where the primal MICP is decomposed into two learning-suited classification tasks and a power allocation problem. In the proposed scheme, the first learning task is to predict the integer variables while the second task is to guarantee the feasibility of the solutions. Numerical results show that the proposed algorithm outperforms benchmarks in terms of average computational time, transmission time performance, and feasibility guarantee. [less ▲]

Detailed reference viewed: 98 (14 UL)
Full Text
See detailWeb Materialities
Schafer, Valerie UL

Scientific Conference (2021, December 03)

Although Web development was driven by a conceptual repertoire of dematerialisation, of eliminating borders between “Netizens” and ensuring the independence of cyberspace (John Perry Barlow), in the 1990s ... [more ▼]

Although Web development was driven by a conceptual repertoire of dematerialisation, of eliminating borders between “Netizens” and ensuring the independence of cyberspace (John Perry Barlow), in the 1990s the accessibility of the Web was largely subject to material challenges associated with infrastructures, equipment, Internet billing and regulation. They were also linked with groups of technicians and communities of practice, the development of ISPs, the acquisition of equipment or the use of cyber cafés. Taking the example of France in the 90s as a starting point, this contribution will shed light on the agencies at work in a bid to demonstrate why digital materiality matters in Web histories. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailWhat's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP
Stojkovski, Borce UL; Lenzini, Gabriele UL; Koenig, Vincent UL et al

in Annual Computer Security Applications Conference (ACSAC ’21) (2021, December)

The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse set of stakeholders and ... [more ▼]

The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse set of stakeholders and communities. CTI sharing platforms are becoming indispensable tools for cooperative and collaborative cybersecurity. Nevertheless, despite the growing research in this area, the emphasis is often placed on the technical aspects, incentives, or implications associated with CTI sharing, as opposed to investigating challenges encountered by users of such platforms. To date, user experience (UX) aspects remain largely unexplored. This paper offers a unique contribution towards understanding the constraining and enabling factors of security information sharing within one of the leading platforms. MISP is an open source CTI sharing platform used by more than 6,000 organizations worldwide. As a technically-advanced CTI sharing platform it aims to cater for a diverse set of security information workers with distinct needs and objectives. In this respect, MISP has to pay an equal amount of attention to the UX in order to maximize and optimize the quantity and quality of threat information that is contributed and consumed. Using mixed methods we shed light on the strengths and weaknesses of MISP from an end-users’ perspective and discuss the role UX could play in effective CTI sharing. We conclude with an outline of future work and open challenges worth further exploring in this nascent, yet highly important socio-technical context. [less ▲]

Detailed reference viewed: 192 (3 UL)
Full Text
Peer Reviewed
See detailEr ist Prinz. – Mehr noch: Er ist Mensch! Er ist Stimmbürger. Stimmrecht des Monarchen als Dispersionsprisma einer rechtswissenschaftlichen Monarchieanalyse
Heuschling, Luc UL

in Zeitschrift für Offentliches Recht (2021, December), 76(4), 1241-1289

In the literature on comparative constitutional law and constitutional theory, monarchies are, if they attract any attention at all, most frequently analyzed from the perspective of the monarch’s ... [more ▼]

In the literature on comparative constitutional law and constitutional theory, monarchies are, if they attract any attention at all, most frequently analyzed from the perspective of the monarch’s political power, after its more or less extensive “neutralization” in the name of the constitutional ideals of Enlightenment. Yet this classic approach, whose focus lies on the State organ’s competencies and the discretion of its royal incumbent, is incomplete as it ignores a second, increasingly important facet of the modernization process of monarchies: To what extent do Royals, including the monarch, have fundamental rights as individuals, as “human beings”? This paper considers in particular the even-more-overlooked issue of their political rights (right to vote, right to stand for election, and the right to use the instruments of direct democracy). The issue, which is a very old one, having being addressed first by Sieyès in his famous 1789 speech on royal veto and by the French Constitution of 1791, is far from being odd or futile. In some jurisdictions, like in Japan (1945), Luxembourg (2004-5), Liechtenstein (2002-3) or in Thailand (2019), it was at the core of quite controversial public debates which, eventually, lead to totally divergent outcomes. Beyond its (relative) importance in practice, it is a key parameter for theoretical purposes: combined with the criteria of the dualistic state organization, it provides a deeper insight into the complex structure of those regimes mixing, in various ways, both monarchical and democratic elements. This article sheds light on this new research field, starting with a broad historical and comparative survey, before presenting a typology in order to tackle the startling diversity of legal solutions. [less ▲]

Detailed reference viewed: 71 (7 UL)
Peer Reviewed
See detailGender Differences and Extreme Events
Lehnert, Thorsten UL

Scientific Conference (2021, December)

Detailed reference viewed: 17 (2 UL)
Peer Reviewed
See detailGender Differences and Extreme Events
Lehnert, Thorsten UL

Scientific Conference (2021, December)

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailMassive Superpoly Recovery with Nested Monomial Predictions
Hu, Kai; Sun, Siwei; Todo, Yosuke et al

in Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6-10, 2021, Proceedings, Part I (2021, December)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailLearning-Based Multiplexing of Grant-Based and Grant-Free Heterogeneous Services with Short Packets
Tran, Duc Dung UL; Sharma, Shree Krishna; Chatzinotas, Symeon UL et al

in Proceedings of 2021 IEEE Global Communications Conference (GLOBECOM) (2021, December)

In this paper, we investigate the multiplexing of grant-based (GB) and grant-free (GF) device transmissions in an uplink heterogeneous network (HetNet), namely GB-GF HetNet, where the devices transmit ... [more ▼]

In this paper, we investigate the multiplexing of grant-based (GB) and grant-free (GF) device transmissions in an uplink heterogeneous network (HetNet), namely GB-GF HetNet, where the devices transmit their information using low-rate short data packets. Specifically, GB devices are granted unique time-slots for their transmissions. In contrast, GF devices can randomly select time-slots to transmit their messages utilizing the GF non-orthogonal multiple access (NOMA), which has emerged as a promising enabler for massive access and reducing access latency. However, random access (RA) in the GF NOMA can cause collisions and severe interference, leading to system performance degradation. To overcome this issue, we propose a multiple access (MA) protocol based on reinforcement learning for effective RA slots allocation. The proposed learning method aims to guarantee that the GF devices do not cause any collisions to the GB devices and the number of GF devices choosing the same time-slot does not exceed a predetermined threshold to reduce the interference. In addition, based on the results of the RA slots allocation using the proposed method, we derive the approximate closed-form expressions of the average decoding error probability (ADEP) for all devices to characterize the system performance. Our results presented in terms of access efficiency (AE), collision probability (CP), and overall ADEP (OADEP), show that our proposed method can ensure a smooth operation of the GB and GF devices within the same network while significantly minimizing the collision and interference among the device transmissions in the GB-GF HetNet. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailFactors Affecting the Implementation of Computational Thinking in the Curriculum
Hennico, Jeff; Reuter, Robert UL; Weinberger, Armin

Scientific Conference (2021, November 24)

Computational thinking (CT) in fundamental education is an emerging topic in research about educational policies and practices around the globe. In Luxembourg, CT was introduced as a learning topic in ... [more ▼]

Computational thinking (CT) in fundamental education is an emerging topic in research about educational policies and practices around the globe. In Luxembourg, CT was introduced as a learning topic in fundamental schools in 2020. This situation offers a unique opportunity to investigate how various factors influence emerging CT teaching practices. Based on a revised version of the Technology Acceptance Model (Inan & Lowther, 2010), a research-based path model of CT teaching was developed, emphasising the influence of teachers’ beliefs and readiness on CT teaching practices. It investigated the effects of demographic factors, teaching approaches, ICT proficiency, previous CT experience, and overall support for technology integration on readiness, beliefs, and CT teaching practices. The current study reveals that teachers are interested in teaching CT. However, they hold a widespread misconception (Fessakis & Prantsoudi, 2019), confusing CT with programming or technology use. ICT proficiency is indeed associated with beliefs about CT and readiness for teaching CT. Readiness for teaching CT, beliefs about CT, and previous CT experience are the strongest predictors for CT teaching practices. In line with Cuny et al. (2010), the current study highlights the importance of training teachers to accurately define CT and to identify good practices. [less ▲]

Detailed reference viewed: 36 (7 UL)
Full Text
Peer Reviewed
See detailDeep Learning for Safe Human-Robot Collaboration
Duque, Nicolas; Mejia, Lina; Martinez Luna, Carol UL et al

in Advances in Automation and Robotics Research (2021, November 21)

Detailed reference viewed: 15 (0 UL)
Full Text
See detailHow to catch a space debris
Yalcin, Baris Can UL; Martinez Luna, Carol UL; Delisle, Maxime Hubert et al

Poster (2021, November 18)

The partnership between SpaceR and Spacety Luxembourg aims to develop cutting edge active space debris removal solutions that can be implemented into small cube sats The solution will take the advantage ... [more ▼]

The partnership between SpaceR and Spacety Luxembourg aims to develop cutting edge active space debris removal solutions that can be implemented into small cube sats The solution will take the advantage of latest advancements in many tech domains, such as gecko like sticky adhesives and energy efficient shape memory alloy materials. [less ▲]

Detailed reference viewed: 39 (18 UL)
Peer Reviewed
See detailThe need of standardised metadata to encode causal relationships: Towards safer data-driven machine learning biological solutions
Garcia Santa Cruz, Beatriz UL; Vega Moreno, Carlos Gonzalo UL; Hertel, Frank UL

Scientific Conference (2021, November 16)

In this paper, we discuss the importance of considering causal relations in the development of machine learning solutions to prevent factors hampering the robustness and generalisation capacity of the ... [more ▼]

In this paper, we discuss the importance of considering causal relations in the development of machine learning solutions to prevent factors hampering the robustness and generalisation capacity of the models, such as induced biases. This issue often arises when the algorithm decision is affected by confounding factors. In this work, we argue that the integration of causal relationships can identify potential confounders. We call for standardised meta-information practices as a crucial step for proper machine learning solutions development, validation, and data sharing. Such practices include detailing the dataset generation process, aiming for automatic integration of causal relationships. [less ▲]

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailAndroid Malware Detection: Looking beyond Dalvik Bytecode
Sun, Tiezhu UL; Daoudi, Nadia UL; Allix, Kevin UL et al

in 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW) (2021, November 15)

Machine learning has been widely employed in the literature of malware detection because it is adapted to the need for scalability in vetting large scale samples of Android. Feature engineering has ... [more ▼]

Machine learning has been widely employed in the literature of malware detection because it is adapted to the need for scalability in vetting large scale samples of Android. Feature engineering has therefore been the key focus for research advances. Recently, a new research direction that builds on the momentum of Deep Learning for computer vision has produced promising results with image representations of Android byte- code. In this work, we postulate that other artifacts such as the binary (native) code and metadata/configuration files could be looked at to build more exhaustive representations of Android apps. We show that binary code and metadata files can also provide relevant information for Android malware detection, i.e., that they can allow to detect Malware that are not detected by models built only on bytecode. Furthermore, we investigate the potential benefits of combining all these artifacts into a unique representation with a strong signal for reasoning about maliciousness. [less ▲]

Detailed reference viewed: 57 (11 UL)
Full Text
Peer Reviewed
See detailCookie Banners, What’s the Purpose? Analyzing Cookie Banner Text Through a Legal Lens
Santos, Cristiana; Rossi, Arianna UL; Sanchez Chamorro, Lorena UL et al

in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21) (2021, November 15)

A cookie banner pops up when a user visits a website for the first time, requesting consent to the use of cookies and other trackers for a variety of purposes. Unlike prior work that has focused on ... [more ▼]

A cookie banner pops up when a user visits a website for the first time, requesting consent to the use of cookies and other trackers for a variety of purposes. Unlike prior work that has focused on evaluating the user interface (UI) design of cookie banners, this paper presents an in-depth analysis of what cookie banners say to users to get their consent. We took an interdisciplinary approach to determining what cookie banners should say. Following the legal requirements of the ePrivacy Directive (ePD) and the General Data Protection Regulation (GDPR), we manually annotated around 400 cookie banners presented on the most popular English-speaking websites visited by users residing in the EU. We focused on analyzing the purposes of cookie banners and how these purposes were expressed (e.g., any misleading or vague language, any use of jargon). We found that 89% of cookie banners violated applicable laws. In particular, 61% of banners violated the purpose specificity requirement by mentioning vague purposes, including “user experience enhancement”. Further, 30% of banners used positive framing, breaching the freely given and informed consent requirements. Based on these findings, we provide recommendations that regulators can find useful. We also describe future research directions. [less ▲]

Detailed reference viewed: 68 (9 UL)
Full Text
Peer Reviewed
See detailA First Look at Security Risks of Android TV Apps
Liu, Yonhui; Li, Li; Kong, Pingfan UL et al

in A First Look at Security Risks of Android TV Apps (2021, November 15)

In this paper, we present to the community the first preliminary study on the security risks of Android TV apps. To the best of our knowledge, despite the fact that various efforts have been put into ... [more ▼]

In this paper, we present to the community the first preliminary study on the security risks of Android TV apps. To the best of our knowledge, despite the fact that various efforts have been put into analyzing Android apps, our community has not explored TV versions of Android apps. There is hence no publicly available dataset containing Android TV apps. To this end, We start by collecting a large set of Android TV apps from the official Google Play store. We then experimentally look at those apps from four security aspects: VirusTotal scans, requested permissions, security flaws, and privacy leaks. Our experimental results reveal that, similar to that of Android smartphone apps, Android TV apps can also come with different security issues. We hence argue that our community should pay more attention to analyze Android TV apps. [less ▲]

Detailed reference viewed: 26 (0 UL)
See detailGlobal land dampness characterization using reflectometry by students (GOLDCREST): mission and CubeSat design
Asadi, Niloofar; Gholami-Boroujeni, Farzaneh; Gogoi, Bishwajit et al

in Proceedings of the 12th European CubeSat symposium (2021, November 15)

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailHeterogeneously-Distributed Joint Radar Communications: Bayesian Resource Allocation
Wu, Linlong; Mishra, Kumar Vijay; Mysore Rama Rao, Bhavani Shankar UL et al

in 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2021, November 15)

Due to spectrum scarcity, the coexistence of radar and wireless communication has gained substantial research interest recently. Among many scenarios, the heterogeneously-distributed joint radar ... [more ▼]

Due to spectrum scarcity, the coexistence of radar and wireless communication has gained substantial research interest recently. Among many scenarios, the heterogeneously-distributed joint radar-communication system is promising due to its flexibility and compatibility of existing architectures. In this paper, we focus on a heterogeneous radar and communication network (HRCN), which consists of various generic radars for multiple target tracking (MTT) and wireless communications for multiple users. We aim to improve the MTT performance and maintain good throughput levels for communication users by a well-designed resource allocation. The problem is formulated as a Bayesian Cramér-Rao bound (CRB) based minimization subjecting to resource budgets and throughput constraints. The formulated nonconvex problem is solved based on an alternating descent-ascent approach. Numerical results demonstrate the efficacy of the proposed allocation scheme for this heterogeneous network. [less ▲]

Detailed reference viewed: 19 (5 UL)
Full Text
Peer Reviewed
See detailFrontières et pluralité des marchés du travail : l’exemple du Luxembourg
Pigeron-Piroth, Isabelle UL; Belkacem, rachid

Scientific Conference (2021, November 11)

L’objet de cette communication est d’aborder la structuration des marchés transfrontaliers du travail. La situation du Luxembourg est particulièrement riche d’enseignements empiriques et théoriques. Dans ... [more ▼]

L’objet de cette communication est d’aborder la structuration des marchés transfrontaliers du travail. La situation du Luxembourg est particulièrement riche d’enseignements empiriques et théoriques. Dans ce petit pays au cœur de la Grande Région SaarLorLux, les frontières se vivent au quotidien. Le marché du travail est ouvert sur ses régions frontalières ainsi que sur l’espace mondial. Dans ce contexte, deux questions organisent notre problématique : Quels sont les effets des frontières sur la structuration du marché du travail ? Et quelles grilles de lectures théoriques paraissent les plus appropriées pour analyser cette structuration particulière du marché du travail ? [less ▲]

Detailed reference viewed: 62 (0 UL)
Peer Reviewed
See detailDevelopment of a screeneing tool for functional vision impairments in early childhood
Monteiro, Sara UL; Esch, Pascale UL; Hipp, Géraldine et al

Scientific Conference (2021, November 11)

Cerebral Visual Impairment (CVI) is a term used to designate a neurological disorder of the visual pathways impacting visual processes at any given level (Lueck et al., 2019). Due to the advances n ... [more ▼]

Cerebral Visual Impairment (CVI) is a term used to designate a neurological disorder of the visual pathways impacting visual processes at any given level (Lueck et al., 2019). Due to the advances n perinatal and medicinal care, CVI’s occurrence has increased significantly over the last years (Chokron & Dutton, 2016). The condition almost always entails aggregated functional vision impairments, i.e., limitations on the use of binocular vision during everyday tasks (Dutton, 2015). CVI can have effects on school achievements if undetected. Early detection is thus key to offer appropriate aids to avoid a negative impact on learning processes. The aim of this project is to develop a large-scale screener at the beginning of formal schooling, to identify functional vision impairments early on. For this reason, a set of items assessing different visual functions will be incorporated into the Luxembourgish school monitoring program. Based on a theoretical model of object recognition (Humphreys and Riddoch, 1987), we developed items that can be administered in a classroom setting which target different stages of visual perceptual processing, as well as visual functions connected with both dorsal and ventral streams, visual spatial processing and visual memory. We will present the design of the large-scale screener in relation to the theoretical model, as well as the rationale used to include or exclude various perceptual visual functions in the final test. Furthermore, we will explain the foreseen data collection and tool validation processes. [less ▲]

Detailed reference viewed: 195 (4 UL)
See detailGenderrepräsentatiounen an de Schoulbicher vum Enseignement fondamental
Kerger, Sylvie UL; Brasseur, Laurence

Scientific Conference (2021, November 11)

Detailed reference viewed: 11 (1 UL)
Peer Reviewed
See detailFair Assessment of Cognitive Abilities in Multilingual Children
Kijamet, Dzenita UL; Ugen, Sonja UL

Scientific Conference (2021, November 11)

Detailed reference viewed: 74 (4 UL)
Peer Reviewed
See detailUsing Automatic Item Generation in the context of the Épreuves Standardisées (Épstan): A pilot study on effects of altering item characteristics and semantic embeddings
Michels, Michael Andreas UL; Hornung, Caroline UL; Inostroza Fernandez, Pamela Isabel UL et al

Scientific Conference (2021, November 11)

Assessing mathematical skills in national school monitoring programs such as the Luxembourgish Épreuves Standardisées (ÉpStan) creates a constant demand of developing high-quality items that is both ... [more ▼]

Assessing mathematical skills in national school monitoring programs such as the Luxembourgish Épreuves Standardisées (ÉpStan) creates a constant demand of developing high-quality items that is both expensive and time-consuming. One approach to provide high-quality items in a more efficient way is Automatic Item Generation (AIG, Gierl, 2013). Instead of creating single items, cognitive item models form the base for an algorithmic generation of a large number of new items with supposedly identical item characteristics. The stability of item characteristics is questionable, however, when different semantic embeddings are used to present the mathematical problems (Dewolf, Van Dooren, & Verschaffel, 2017, Hoogland, et al., 2018). Given culture-specific knowledge differences in students, it is not guaranteed that illustrations showing everyday activities do not differentially impact item difficulty (Martin, et al., 2012). Moreover, the prediction of empirical item difficulties based on theoretical rationales has proved to be difficult (Leighton & Gierl, 2011). This paper presents a first attempt to better understand the impact of (a) different semantic embeddings, and (b) problem-related variations on mathematics items in grades 1 (n = 2338), 3 (n = 3835) and 5 (n = 3377) within the context of ÉpStan. In total, 30 mathematical problems were presented in up to 4 different versions, either using different but equally plausible semantic contexts or altering the problem’s content characteristics. Preliminary results of IRT-scaling and DIF-analysis reveal substantial effects of both, the embedding, as well as the problem characteristics on general item difficulties as well as on subgroup level. Further results and implications for developing mathematic items, and specifically, for using AIG in the course of Épstan will be discussed. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
See detailOpening minds to translanguaging pedagogies: perspectives and practices of professionals in early childhood education and primary school.Keynote
Kirsch, Claudine UL

Scientific Conference (2021, November 09)

In Europe, migration, mobility, technology and globalisation have resulted in multilingualism at the societal and individual level. These changes require policy-makers and educationalists to adapt ... [more ▼]

In Europe, migration, mobility, technology and globalisation have resulted in multilingualism at the societal and individual level. These changes require policy-makers and educationalists to adapt teaching. For the last decades, institutions and scholars have called for multilingual education programmes that recognise the existence of the multiple languages spoken by children. The policies of the Council of Europe encourage ‘pluralistic approaches’ as well as early language learning. In the United States, García and her team developed multilingual pedagogies, later called translanguaging pedagogies, that draw on the students’ entire semiotic repertoire to leverage their learning. Research findings in monolingual, bilingual and multilingual contexts testify to the benefits of translanguaging for learning, well-being and identity-building. Such programmes are in line with the UN convention of children’s rights demanding respect for their language, culture and values. While multilingual programmes have been implemented in early childhood education and primary schools in several countries in Europe, professionals seem to be unsure of how to promote multilingualism and deal with language diversity. This presentation is based on the perspectives and practices of professionals in early education and primary schools in multilingual Luxembourg where a programme of plurilingual education has been implemented in the early years in 2017 and where children follow a trilingual curriculum in primary school. I will provide insights into the perspectives of practitioners by drawing on several research projects carried out over the last 6 years in Luxembourg. I will show excerpts of interviews and observations that indicate that early years practitioners have opened up to multilingual education over the last years and are tackling the multiple challenges they face during the implementation of the multilingual programme. Translanguaging also exists in primary schools but a clear language hierarchy is in place and teachers and children do not draw on their entire semiotic repertoire. The presentation concludes with implications for practitioners and policy-makers. [less ▲]

Detailed reference viewed: 16 (0 UL)
Peer Reviewed
See detailCentrality and city size effects on NO2 ground and tropospheric concentrations within European cities
Wei, Yufei UL; Caruso, Geoffrey UL; Lemoy, Rémi

Scientific Conference (2021, November 05)

Detailed reference viewed: 56 (6 UL)
See detailWARCnet WG2 activities: a report
Schafer, Valerie UL

Scientific Conference (2021, November 03)

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailComparing software frameworks of Augmented Reality solutions for manufacturing
Kolla, Sri Sudha Vijay Keshav UL; Sanchez, Andre UL; Plapper, Peter UL

in Procedia Manufacturing (2021, November 03), 55

Augmented reality (AR) is a technology that allows overlaying of virtual elements on top of the physical environment. This enhances the perception and conveys additional information to the user. With the ... [more ▼]

Augmented reality (AR) is a technology that allows overlaying of virtual elements on top of the physical environment. This enhances the perception and conveys additional information to the user. With the emergence of industry 4.0 concepts in manufacturing landscape, AR found its way to improve existing Human-Machine Interfaces (HMI) on the shop-floor. The industrial setting has a wide variety of application opportunities from AR, ranging from training and digital work instructions to quality inspection and remote maintenance. Even though its implementation in the industry is rising in popularity, it is still mainly restricted to large companies due the limited availability of resources in Small and Medium Size Enterprises (SME). However, SMEs can benefit from AR solutions in its production processes. Therefore, this research aims to develop and present the results of comparison of two simple and cost-effective AR software frameworks for Hand Held Device (HHD) and a Head Mounted Device (HMD), which can be applied for developing AR applications for manufacturing. Two AR applications are developed using these software frameworks which are presented in the case study section. Android device is chosen as a HHD and HoloLens is the HMD used in the case study. The development structure can be reproduced by a wider range of enterprises with diverse needs and resource availability. [less ▲]

Detailed reference viewed: 55 (1 UL)
Full Text
Peer Reviewed
See detailSDN for Gateway Diversity Implementation in Satellite Networks
Minardi, Mario UL; Politis, Christos; Zimmer, Frank et al

in International Symposium on Networks, Computers and Communications (ISNCC), Dubai 31 Oct.-2 Nov. 2021 (2021, November)

Detailed reference viewed: 38 (5 UL)
Peer Reviewed
See detailThe Impact of the COVID-19 Pandemic on the Luxembourgish Education System: Differences between students based on background characteristics in elementary and secondary school
Fischbach, Antoine UL; Colling, Joanne UL; Levy, Jessica UL et al

Scientific Conference (2021, November)

Policy responses to the COVID-19 pandemic (e.g., school closure, home-schooling) have affected students at various stages of education all over the world and were found to increase inequalities in ... [more ▼]

Policy responses to the COVID-19 pandemic (e.g., school closure, home-schooling) have affected students at various stages of education all over the world and were found to increase inequalities in academic achievement (OECD, 2021). The present study is based on fully representative large-scale data from the Luxembourg School Monitoring Programme (Épreuves Standardisées; ÉpStan; LUCET, 2021). The ÉpStan are assessing key competencies of primary and secondary school students in different subjects (e.g., German, French and Math). To allow a fair performance comparison, socio-economic and socio-cultural backgrounds of students (e.g., gender, migration and language background) are systematically taken into consideration. The ÉpStan 2020 entail data from approximatively 25.000 students from five different grades (elementary and secondary school), from 15.000 parents (elementary school) and comparative data from 160.000 students from previous cohorts, thus providing key empirical findings on the pandemic’s impact on the Luxembourgish education system. In the present contribution, we analyze a) how the results of standardized achievement tests compare to previous cohorts and under consideration of students’ socio-economical and socio-cultural background, as well as b) how parents and students perceived home-schooling with regard to aspects such as coping, technical equipment, motivation or contact to teachers. First results indicate that in Grades 1, 5, 7 and 9, standardized achievement scores were generally stable in comparison to previous years. However, in Grade 3, students’ competency scores in German (primary language of instruction in elementary school) listening comprehension worsened substantially. Furthermore, third graders from socio-economically disadvantaged households and/or students that do not speak Luxembourgish/German at home did worse in German reading comprehension than their peers from socio-economically advantaged households and/or speaking Luxembourgish/German at home. Concerning the perception of home-schooling, students coped rather well with the situation, with German being a bit more challenging in primary school and math in secondary school. Findings concerning motivation and enjoyment of home-schooling were mixed, with primary school students’ motivation being comparably to the regular school setting but approximately half of the secondary school students being less motivated than in the regular school setting. Furthermore, all households seem to have been well equipped, with the situation being slightly more favorable in socio-economically advantaged households. For the majority of students, the contact with teachers was frequent, with teachers having adapted their type of support to the needs of their students (e.g., more personal contact towards students from socio-economically disadvantaged households). To conclude, it can be said that no systematic negative trend has been identified in students’ achievement scores. Only German listening comprehension in Grade 3 has worsened substantially and these skills should therefore be fostered as early as possible. Overall, students coped rather well with home-schooling without, however, particularly enjoying it. While students entering the pandemic with favorable background characteristics (e.g., higher socio-economic status, speaking a language of instruction at home) managed better both regarding competencies and perception of home-schooling, students with less favorable background characteristics have received more differentiated support. These findings underline that already existing inequalities in the Luxembourgish school system have in parts been intensified by the pandemic. References LUCET. (2021). Épreuves Standardisées (ÉpStan). https://epstan.lu OECD. (2021). The State of School Education: One Year into the COVID Pandemic. OECD Publishing. https://doi.org/10.1787/201dde84-en [less ▲]

Detailed reference viewed: 129 (8 UL)
Full Text
Peer Reviewed
See detailSafeTraveller - A conversational assistant for BeNeLux travellers
kudryavtseva, kristina; Hoehn, Sviatlana UL

Scientific Conference (2021, November)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailPoster: A Methodology for Semi-Automated CAN Bus Reverse Engineering
Buscemi, Alessio UL; Turcanu, Ion; German, Castignani et al

Poster (2021, November)

Semi-automated Controller Area Network (CAN) reverse engineering has been shown to provide decoding accuracy comparable to the manual approach, while reducing the time required to decode signals. However ... [more ▼]

Semi-automated Controller Area Network (CAN) reverse engineering has been shown to provide decoding accuracy comparable to the manual approach, while reducing the time required to decode signals. However, current approaches are invasive, as they make use of diagnostic messages injected through the On-Board Diagnostics (OBD-II) port and often require a high amount of non-CAN external data. In this work, we present a non-invasive universal methodology for semi-automated CAN bus reverse engineering, which is based on the taxonomy of CAN signals. The data collection is simplified and its time reduced from the current standard of up to an hour to few minutes. A mean recall of around 80 % is obtained. [less ▲]

Detailed reference viewed: 88 (28 UL)
Full Text
Peer Reviewed
See detailWhy Do We Delegate to Intelligent Virtual Agents? Influencing Factors on Delegation Decisions
Sun, Ningyuan UL; Botev, Jean UL

in Proceedings of the 9th International Conference on Human-Agent Interaction (HAI) (2021, November)

Detailed reference viewed: 42 (7 UL)
Full Text
Peer Reviewed
See detailExploring the Relationship Between Subjective Age and Worry for Older Adults in Times of a Pandemic
Tingvold, Maiken UL; Albert, Isabelle UL; Murdock, Elke UL et al

in Innovation in Aging (2021, November), 5(Supplement_1), 593-593

Given the role of age as a risk factor in the covid pandemic, we examined the longitudinal cross-lagged relationship between subjective age and Covid-related worry, and possible moderators of this ... [more ▼]

Given the role of age as a risk factor in the covid pandemic, we examined the longitudinal cross-lagged relationship between subjective age and Covid-related worry, and possible moderators of this relationship. Data were obtained at two-time points (June and October 2020) by a phone/online survey, from N = 611 older participants (Mage = 69.92 years). Participants felt on average 10 and 8.5 years younger than their chronological ages at the two-time points, respectively. Younger subjective age at T1 increased the level of worry at T2 irrespective of age, perceived control and subjective health. Higher worry increased subjective age at T2, but only for those with worse subjective health. Our results show that subjective age and Covid-related worry interact over time. This relation needs to be explored further in order to understand the relationship between subjective age and well-being especially, but not only in the pandemic context. [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailLongitudinal Relations Between Views on Aging and Perceived Stress: Evidence for Mutual Associations
Wahl, Hans-Werner; Kornadt, Anna Elena UL; Wettstein, Markus

in Innovation in Aging (2021, November), 5(Supplement_1), 287-287

We investigated the reciprocal longitudinal relation between perceived stress and three established domains of views on aging (VoA): (1) subjective age; (2) attitude toward own aging [ATOA]; and (3) aging ... [more ▼]

We investigated the reciprocal longitudinal relation between perceived stress and three established domains of views on aging (VoA): (1) subjective age; (2) attitude toward own aging [ATOA]; and (3) aging-related cognitions including social loss, physical decline, and continuous growth. We also examined the potentially moderating role of chronological age. Data of the German Ageing Survey, comprising two measurement occasions (2014 and 2017) and a sample of 4,588 individuals aged between 40 and 95 years, were analyzed. Controlling for socio-demographic and health-related indicators, cross-lagged models indicated mutual longitudinal relations between VoA and stress. Whether the pathway from stress to VoA or the opposite pathway was stronger varied depending on the VoA considered. With increasing age, most VoA domains were less strongly associated with subsequent perceived stress. Our findings suggest that less favorable VoA predict higher perceived subsequent stress, but they are also preceded and predicted by higher levels of perceived stress. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailCorrelates of resilience of older people in times of crisis
Albert, Isabelle UL; Hoffmann, Martine; Murdock, Elke UL et al

in Innovation in Aging (2021, November), 5(S 1), 723

Since the beginning of the Covid-19 pandemic, efforts have been made to shield older adults from exposure to the virus due to an age-related higher risk for severe health outcomes. While a reduction of in ... [more ▼]

Since the beginning of the Covid-19 pandemic, efforts have been made to shield older adults from exposure to the virus due to an age-related higher risk for severe health outcomes. While a reduction of in-person contacts was necessary in particular during the first months of the pandemic, concerns about the immediate and longer-term secondary effects of these measures on subjective well-being were raised. In the present study, we focused on self-reported resilience of older people in a longitudinal design to examine risk and protective factors in dealing with the restrictions. Data from independently living people aged 60+ in Luxembourg were collected via a telephone/online survey after the first lockdown in June (N = 611) and September/October 2020 (N = 523), just before the second pandemic wave made restrictions necessary again. Overall, results showed an increase in life-satisfaction from T1 to T2, although life-satisfaction was still rated slightly lower than before the crisis. Also, about a fifth of participants indicated at T2 difficulties to recover from the crisis. Participants who reported higher resilience to deal with the Covid-19 crisis at T2 showed higher self-efficacy, agreed more strongly with measures taken by the country and felt better informed about the virus. In contrast, participants who reported more difficulties in dealing with the pandemic, indicated reduced social contacts to family and friends at T2, and also felt lonelier. Results will be discussed applying a life-span developmental and systemic perspective on risk and protective factors in dealing with the secondary impacts of the pandemic. [less ▲]

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailChronoPilot – Modulating Time Perception
Botev, Jean UL; Drewing, Knut; Hamann, Heiko et al

in Proceedings of the 4th IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR) (2021, November)

Detailed reference viewed: 61 (0 UL)
Peer Reviewed
See detailStability of Primary School Value-Added Scores over Time: A Comparison Between Math and Language Achievement as Outcome Variables
Emslander, Valentin UL; Levy, Jessica UL; Scherer, Ronny et al

Scientific Conference (2021, November)

Value-added (VA) models are widely used for accountability purposes in education. Tracking a teacher’s or a school’s VA score over time forms oftentimes the basis for high-stakes decision-making and can ... [more ▼]

Value-added (VA) models are widely used for accountability purposes in education. Tracking a teacher’s or a school’s VA score over time forms oftentimes the basis for high-stakes decision-making and can determine whether teachers can keep their jobs or schools may receive certain funding. Despite their high-stakes application, the stability of VA scores over time has not yet been investigated for primary schools. Moreover, it is unclear whether different outcome measures (e.g., language and mathematics) may differ in their stability over time. In the present study, we aimed to clarify the stability of VA scores over time and investigate the differences across outcome variables. Furthermore, we wanted to showcase the real-life implications of (in)stable VA scores for single schools, with a focus on an informative use of VA scores rather than an evaluative way. The exploration of school VA scores in primary schools is especially relevant for heterogeneous student populations, for instance, in Luxembourg. Thus, we drew on representative longitudinal data from the standardized achievement tests of the Luxembourg School Monitoring Programme and examined the stability of school VA scores over two years in 146 schools (N = 7016 students). The overall stability, as measured by correlation coefficients, was moderate with r = .37 for VA scores in language and r = .34 for VA scores in mathematics from grade one to grade three. Real-life implications for schools will be discussed. [less ▲]

Detailed reference viewed: 59 (10 UL)
See detailThe Zoom City: Working From Home and Urban Land Structure
Picard, Pierre M UL; Kyirakopoulou, Efthymia

Scientific Conference (2021, November)

How would cities change if working from home (WFH) persisted in the post-pandemic era? This paper investigates the impact of WFH in the internal structure of monocentric cities, where production is ... [more ▼]

How would cities change if working from home (WFH) persisted in the post-pandemic era? This paper investigates the impact of WFH in the internal structure of monocentric cities, where production is characterized by management and employee spillovers. We find that business land rents decrease, while residential land rents fall close to the business center and increase in the suburbs. WFH raises urban productivity and average wages only in large cities. The paper also studies the optimal fraction of WFH from a residents and welfare point of view. Our results suggest that workers-residents have incentives to adopt an inefficiently high WFH scheme. We finally discuss the implementation of remote work in the short run. We show that WFH implies higher benefits for long distance commuters and lower benefits or even losses for firms and short distance commuters. [less ▲]

Detailed reference viewed: 17 (1 UL)
See detailGrenzüberschreitende Identitäten in der Großregion?
Wille, Christian UL

Scientific Conference (2021, November)

Detailed reference viewed: 136 (0 UL)
See detailTowards incremental autonomy framework for on-orbit vision-based grasping
Barad, Kuldeep Rambhai UL; Martinez Luna, Carol UL; Dentler, Jan et al

in Proceedings of the International Astronautical Congress, IAC-2021 (2021, October 29)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailBead Width Prediction in Laser Wire Additive Manufacturing Process
Mbodj, Natago Guilé UL; Plapper, Peter UL

in Mbodj, Natago Guilé; Plapper, Peter (Eds.) Bead Width Prediction in Laser Wire Additive Manufacturing Process (2021, October 22)

In laser wire Additive manufacturing (LWAM), the final geometry is produced using layer-by-layer deposition principle of beads. To achieve good geometrical accuracy of the final product, proper ... [more ▼]

In laser wire Additive manufacturing (LWAM), the final geometry is produced using layer-by-layer deposition principle of beads. To achieve good geometrical accuracy of the final product, proper implementation of the bead geometry is essential. The process parameters have a direct influence on the bead geometry, thus to the printed part. In this paper, we propose a bead width prediction model to improve deposition accuracy. A regression algorithm is applied to the experimental results to predict the bead width dimension. Bead prediction equation relating the bead width growth for each layer is obtained for a given set of process parameters. The prediction equations show similar evolution trends and confirm the influence of deposition process parameters on the bead width. The proposed method demonstrates a prospective insight on a more proper selection of process or physical parameter intervening in laser wire additive manufacturing process. [less ▲]

Detailed reference viewed: 60 (5 UL)
Peer Reviewed
See detailDevelopment of a large-scale screener for functional vision impairments in early childhood
Monteiro, Sara UL; Esch, Pascale UL; Hipp, Géraldine et al

Scientific Conference (2021, October 21)

Cerebral Visual Impairment (CVI) is a term used to designate a neurological disorder of the visual pathways impacting visual processes at any given level (Lueck et al., 2019). Due to the advances in ... [more ▼]

Cerebral Visual Impairment (CVI) is a term used to designate a neurological disorder of the visual pathways impacting visual processes at any given level (Lueck et al., 2019). Due to the advances in perinatal and medicinal care, CVI’s occurrence has increased significantly over the last years (Chokron & Dutton, 2016). The condition almost always entails aggregated functional vision impairments, i.e., limitations on the use of binocular vision during everyday tasks (Dutton, 2015). CVI can have effects on school achievements if undetected. Early detection is thus key to offer appropriate aids to avoid a negative impact on learning processes. The aim of this project is to develop a large-scale screener at the beginning of formal schooling, to identify functional vision impairments early on. For this reason, a set of items assessing different visual functions will be incorporated into the Luxembourgish school monitoring program. Based on a theoretical model of visual perceptual processing (Humphreys and Riddoch, 1987), we developed timed and non-timed items that can be administered in a large-scale classroom setting which target different stages of visual perceptual processing. Furthermore, we included visual functions connected with both dorsal and ventral streams, visual spatial processing, visual exploration and visual memory. We will present the design of the large-scale screener in relation to the theoretical model, as well as the rationale used to include or exclude various perceptual visual functions in the final test. Furthermore, we will explain the planned data collection and tool validation processes. [less ▲]

Detailed reference viewed: 142 (11 UL)
Full Text
See detailThe Past Web as Heritage: Practices, Challenges and Uses of Web Archives
Schafer, Valerie UL

Scientific Conference (2021, October 20)

Detailed reference viewed: 66 (1 UL)
Full Text
See detailChemical contamination of the sea – (management of the knowns and) Research on the unknowns
Schymanski, Emma UL

Scientific Conference (2021, October 20)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailTwo centuries of music education in Luxembourg. 'Learning to teach' in the focus of two traditions
Sagrillo, Damien François UL

Scientific Conference (2021, October 15)

Mit der Teilung Luxemburgs zu Beginn des 19. Jahrhunderts wird das Land einsprachig. Es verbleibt der luxemburgischsprachige (moselfränkische) Teil. Zum besseren Verständnis der kulturellen Entwicklung ... [more ▼]

Mit der Teilung Luxemburgs zu Beginn des 19. Jahrhunderts wird das Land einsprachig. Es verbleibt der luxemburgischsprachige (moselfränkische) Teil. Zum besseren Verständnis der kulturellen Entwicklung Luxemburgs – sie setzt für die musikalische Bildung um die Mitte des 19. Jahrhunderts ein – ist das Wissen um den historischen Kontext unerlässlich. Publikationen erster musikpädagogischer Werke, in der Mehrzahl Liederbücher, werden mit didaktischen Anweisungen eingeleitet, stehen nicht selten unter der Einflussnahme der katholischen Kirche und werden in einschlägigen Publikationsorganen behandelt. Dabei spielt die Bewegung des Cäcilianismus eine herausgehobene Rolle. Der erste spezialisierte Musikunterricht (Instrumentalunterricht und Gesangsunterricht) erfolgt in Privatinitiative, bis im Jahr 1844 der Gemeinderat der Stadt Luxemburg der Gründung der ersten öffentlichen Musikschule im Großherzogtum zustimmt. Die Besetzung von Direktorenposten und Lehrern abwechselnd mit deutsch- und mit französischsprachigen Persönlichkeiten führt zu einem Sonderweg musikpädagogischen Wirkens. Seit dem Jahrhundertwechsel sind die Grundsteine des spezialisierten Musikunterrichts gelegt. Die geographische Nähe zum Pariser bzw. zum Brüsseler Konservatorium führen jedoch überwiegend zur Übernahme der dort vorherrschenden Traditionen. Das Thema des Symposiums 'Das Lehren lernen' bewahrheitet sich hier in der Negation. Angehende Lehrer sind zuerst Musiker, dann Lehrer. Das Erwerben von Expertise erfolgt vielfach durch Lernen in der Praxis. Diese Tendenz setzt sich z.T. bis heute fort. Studiengänge für musikpädagogische Praxis werden in französischsprachigen Ländern sehr spät angeboten und existieren in Luxemburg bis heute nicht. Auf der anderen Seite folgt der Musikunterricht (Gesangunterricht) in Grund- und Sekundarschulen eher der Vorgehensweise in deutschsprachigen Ländern. Die gegenseitige Beeinflussung im Fokus der beiden Traditionen ist in diesem Bereich weniger ausgeprägt. Für meinen Vortrag schlage ich einen historischen Überblick über die Entwicklung der Musikpädagogik in Luxemburg anhand von der Organisation des spezialisierten Musikunterrichts vor. Die Ausbildung der Lehrenden im Bereich der Kirchenmusik gehört als integrativer Bestandteil in den Vortrag mit einbezogen. [less ▲]

Detailed reference viewed: 60 (2 UL)
Full Text
Peer Reviewed
See detailEphemeriShield - Defence Against Cyber-Antisatellite Weapons
Graczyk, Rafal UL; Volp, Marcus UL

Scientific Conference (2021, October 14)

Mitigating the risks associated with space system operations, especially in Low Earth Orbit, requires a holistic approach, which addresses, in particular, cybersecurity challenges, in addition to meeting ... [more ▼]

Mitigating the risks associated with space system operations, especially in Low Earth Orbit, requires a holistic approach, which addresses, in particular, cybersecurity challenges, in addition to meeting the data acquisition requirements the mission needs. Space traffic management systems form no exception to this rule, but are further constrained by backward compatibility requirements that sometimes are based on decades old foundations. As a result, some space situational awareness systems continue to operate with object catalogues and data dissemination architectures that are prone to failures, not to mention adversarial actions. Proof-of-Concept papers, demonstrating this vulnerability in example attacks on space object ephemerides distribution channels have already been published and show the urgency in rethinking the way we build such high-critical infrastructure. Leveraging recent developments of distributed systems theory and concepts from multi-party consensus in limited-trust environments and in the presence of malicious actors, we designed a more secure system for orbital object ephemerides distribution, ultimately targeting at increasing the safety of satellite operations. This paper presents EphemeriShield, a distributed ephemerides storage and distribution system, aiming at maintaining safety and security guarantees in presence of active attacker or unfortunate fault. Using our EphemeriShield prototype setup, we were able to prove its ability to mask attacks and local faults that otherwise would lead to unnecessary maneuvers. Wide adoption of EphemeriShield may help satellite system operations to become safer and less vulnerable to intentionally adversarial activities, which improves the overall sustainability of space. [less ▲]

Detailed reference viewed: 21 (0 UL)
See detailLes soldats de la Wehrmacht d'Eupen-Malmedy
Brüll, Christoph UL

Scientific Conference (2021, October 14)

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailPost-Urban Mining Automation and Digitalisation for a Closed- Loop Circular Construction
Akbarieh, Arghavan UL; Schäfer, Markus UL; Waldmann, Daniele UL et al

Poster (2021, October 13)

The large volume of in- and out-flow of raw materials to construction projects has a huge potential to be optimised for resource efficiency and waste reduction. With the recent awareness of the importance ... [more ▼]

The large volume of in- and out-flow of raw materials to construction projects has a huge potential to be optimised for resource efficiency and waste reduction. With the recent awareness of the importance of the circular economy, construction actors are aligning their practices to be more circular and sustainable. The concept of material banks is born out of this awareness in order to document the lifecycle information of materials and facilitate re-using them. The introduction of new cycles before individual materials reach their final lifecycle stages results in reduced negative environmental impacts. This paper presents a workflow by positioning different digital technologies to automate the procedures for reuse assessment: from the deconstructed building to M/C bank to new construction projects. This automation supports a practical material and component reuse, while it provides the necessary infrastructure to digitise and digitalise the post-deconstruction materials to be visualised, selected and used by future designers in Building Information Modelling (BIM)-based design and management environments. To this aim, the coupling of BIM, reality capturing technologies, additive manufacturing techniques, IoT and RFID sensors is also anticipated. [less ▲]

Detailed reference viewed: 66 (4 UL)
Full Text
Peer Reviewed
See detailRecension d' European Drama and Performance Studies n° 16 : « Percevoir et transmettre le spectacle vivant »
Deregnoncourt, Marine UL

Scientific Conference (2021, October 11)

Cette recension, divisée en trois temps, va suivre les différents points de vue adoptés par les participants au seizième numéro de la revue European Drama and Performance Studies, consacré à la perception ... [more ▼]

Cette recension, divisée en trois temps, va suivre les différents points de vue adoptés par les participants au seizième numéro de la revue European Drama and Performance Studies, consacré à la perception et à la transmission du spectacle vivant et dirigé par Françoise Gomez et Daniel Loayza : 1. Le regard du chercheur (Florence Naugrette, Julia Gros de Gasquet et Patrice Pavis) ; 2. Le regard du praticien de la scène (Emmanuel Demarcy-Mota et Don Kent) ; 3. L’archivage mémoriel (Sandrine Siméon et Daniel Loayza). [less ▲]

Detailed reference viewed: 48 (1 UL)
See detailL’UEBL et les relations belgo-luxembourgeoises au XXème siècle
Brüll, Christoph UL

Scientific Conference (2021, October 06)

Detailed reference viewed: 31 (0 UL)
See detailSix provocations for 6G
Schafer, Valerie UL

Scientific Conference (2021, October 06)

Detailed reference viewed: 10 (0 UL)