References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
See detail-

(-)

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 191 (6 UL)
Full Text
Peer Reviewed
See detailA Look into Privacy-Preserving Blockchains
Khan, Nida UL; Nassar, Mohamed

in IEEE BCA @AICCSA 2019 - Workshop on Blockchain and it's Applications (in press)

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems ... [more ▼]

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems remains to address data privacy. While in Bitcoin and similar e-cash systems, privacy was limited to anonymity and addressed by using cryptographic pseudonyms for identification and authentication of parties, the question of privacy has more breadth in systems maintaining actual data such as medical records or energy meters. In this paper, we look into recently proposed privacy-preserving blockchains, analyze their strengths and weaknesses, and highlight research questions requiring future investigation. We conclude that privacy-preserving blockchains are still in their infancy and more research is definitely needed in this area. [less ▲]

Detailed reference viewed: 73 (8 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 99 (5 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 80 (12 UL)
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in Proceedings of the International Institute of Space Law (in press)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 49 (1 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 68 (1 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 63 (0 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 143 (6 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2019 (in press)

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die ... [more ▼]

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die neue wirtschaftliche Realität der digitalisierten Welt vor. Auf Ebene der Europäischen Union (EU) gilt die Verabschiedung der im März 2018 von der Europäischen Kommission vorgestellten Richtlinien-Vorschläge (RL-Vorschläge) zu einer Digitalsteuer und einer sog. signifikanten digitalen Präsenz, nach intensiver Diskussion im Rat, als unwahrscheinlich. Der Gerichtshof der Europäischen Union beschäftigt sich derzeit mit der unionsrechtlichen Vereinbarkeit nationaler Sonderabgaben, die umsatzbasiert erhoben werden. Dieser Beitrag bietet einen Überblick über wesentliche Entwicklungen im internationalen und europäischen Steuerrecht bzgl. der Besteuerung digitalisierter Unternehmen. Der Beitrag knüpft an den Vortrag von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademie 2018 in Bochum, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailFeasibility of Stellar as a Blockchain-based Micropayment System
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain (in press)

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time ... [more ▼]

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time. The divisibility of a blockchain cryptocurrency to even fractions of a cent, caused microtransactions to become feasible to formerly non-existent denominations. These microtransactions have spurred the development of novel ways of monetizing online resources and hold the potential to aid in alleviation of poverty. The paper conducts a feasibility study on Stellar as a blockchain-based micropayment system. It highlights the computational and other issues that impedes its progress and utilizes a characterization model for micropayment systems to evaluate the efficacy of the Stellar platform. The paper conducts a comparison with the micropayment solutions from Bitcoin, Ethereum and PayPal. The paper analyzes a subset of transactions from the Stellar blockchain to aid in drawing a conclusion on the undertaken study and elaborates on the mitigation tools to enable fraud prevention in online monetary transactions. [less ▲]

Detailed reference viewed: 102 (15 UL)
Full Text
Peer Reviewed
See detailUsing Passive Data Collection Methods to Learn Complex Mobility Patterns: An Exploratory Analysis
Toader, Bogdan UL; Cantelmo, Guido UL; Popescu, Mioara et al

Scientific Conference (in press)

Detailed reference viewed: 85 (10 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in 3rd Central European Cybersecurity Conference (in press)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 47 (6 UL)
Full Text
Peer Reviewed
See detailQuantifying information flow in interactive systems
Mestel, David UL

in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (in press)

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is ... [more ▼]

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic. [less ▲]

Detailed reference viewed: 71 (6 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 55 (1 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 93 (11 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 247 (66 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 364 (7 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 248 (24 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 132 (9 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 90 (0 UL)
Peer Reviewed
See detailA short Survey on the Cyber Security in Control Systems
Bezzaoucha, Souad UL; Voos, Holger UL

Scientific Conference (2020, July)

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due ... [more ▼]

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due to a highest degree of connectivity in modern systems, new related control-specific cyber-physical systems security challengesarise and novel approaches integrating the cyber aspect are developed.Our goal in this paper is then to provide an overview of attack-modeling and security analysis approaches in recent works thatexplore networked control systems subject to cyber-attacks attacks. To this end, we look at the control, estimation, and modeling problems. [less ▲]

Detailed reference viewed: 49 (2 UL)
See detailConstcamer Paintings as Epistemic Images: Early Modern Theaters of Wisdom
Koeleman, Floor UL

Scientific Conference (2020, April)

This paper argues, against existing literature, that 17th-cent. constcamer paintings were objects to think with, functioning as the two-dimensional space of artificial memory. In turn, these artworks ... [more ▼]

This paper argues, against existing literature, that 17th-cent. constcamer paintings were objects to think with, functioning as the two-dimensional space of artificial memory. In turn, these artworks complicate conventional definitions of epistemic images more broadly. I focus on an analysis of constcamer paintings accounting for the reception of the ancients and the mnemonic and propaedeutic role of images, entailing concepts such as wonder or thauma (from Greek θεάομαι), the drive to gather knowledge, memory as the locus of this ‘collection’, and recollecting as the intellectual process of interaction with memorized knowledge. The term inventor, referring to the creator of a given collection, is derived from the rhetorical technique for the retrieval of information. The theatre or ‘place for viewing’ provided the physical context for the collected wisdom. Inventors of constcamer paintings – often artists themselves – vitally participated in knowledge formation contributing to contemporary intellectual debates. [less ▲]

Detailed reference viewed: 87 (2 UL)
Full Text
Peer Reviewed
See detailAdversarial Embedding: A robust and elusive Steganography and Watermarking technique
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

Scientific Conference (2020)

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image ... [more ▼]

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to extract it. The key properties of adversarial attacks (invisible perturbations, nontransferability, resilience to tampering) offer guarantees regarding the confidentiality and the integrity of the hidden messages. We empirically evaluate adversarial embedding using more than 100 models and 1,000 messages. Our results confirm that our embedding passes unnoticed by both humans and steganalysis methods, while at the same time impedes illicit retrieval of the message (less than 13% recovery rate when the interceptor has some knowledge about our model), and is resilient to soft and (to some extent) aggressive image tampering (up to 100% recovery rate under jpeg compression). We further develop our method by proposing a new type of adversarial attack which improves the embedding density (amount of hidden information) of our method to up to 10 bits per pixel. [less ▲]

Detailed reference viewed: 138 (19 UL)
Full Text
Peer Reviewed
See detailWhy is the Market Skewness-Return Relationship Negative?
Lehnert, Thorsten UL

Scientific Conference (2019, December 13)

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we ... [more ▼]

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we consider the usual interpretation of e.g. option-implied skewness as an indicator of jump risk or downside risk. One possible explanation for this inconsistency is that there are factors affecting option-implied market skewness other than jump risk in the stock market. In this paper, I find that price pressure associated with “crowded trades” of mutual funds is an important endogenous factor. Given that retail investors are prone to herding, the directional trading of mutual funds is correlated, and their collective actions can generate short-term price pressure on aggregate stock prices. Short sellers systematically exploit these patterns not only in the equity lending market, but also in the options market. In line with this economic channel, I find that firstly, the significant negative relationship between market skewness and returns becomes insignificant, once I control for price pressure. Secondly, the negative relationship is only present for the “bad” downside component of risk-neutral skewness, associated with out-of-the-money put options. For the “good” upside component of risk-neutral skewness, associated with out-of-the-money call options, the relationship is always positive. Thirdly, price pressure affects the skewness-return relationship, which can be clearly distinguished from the impact of flows on the volatility-return relationship in terms of the leverage effect. [less ▲]

Detailed reference viewed: 5 (2 UL)
Full Text
Peer Reviewed
See detailWhy is the Market Skewness-Return Relationship Negative?
Lehnert, Thorsten UL

Scientific Conference (2019, December 13)

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we ... [more ▼]

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we consider the usual interpretation of e.g. option-implied skewness as an indicator of jump risk or downside risk. One possible explanation for this inconsistency is that there are factors affecting option-implied market skewness other than jump risk in the stock market. In this paper, I find that price pressure associated with “crowded trades” of mutual funds is an important endogenous factor. Given that retail investors are prone to herding, the directional trading of mutual funds is correlated, and their collective actions can generate short-term price pressure on aggregate stock prices. Short sellers systematically exploit these patterns not only in the equity lending market, but also in the options market. In line with this economic channel, I find that firstly, the significant negative relationship between market skewness and returns becomes insignificant, once I control for price pressure. Secondly, the negative relationship is only present for the “bad” downside component of risk-neutral skewness, associated with out-of-the-money put options. For the “good” upside component of risk-neutral skewness, associated with out-of-the-money call options, the relationship is always positive. Thirdly, price pressure affects the skewness-return relationship, which can be clearly distinguished from the impact of flows on the volatility-return relationship in terms of the leverage effect. [less ▲]

Detailed reference viewed: 4 (1 UL)
Full Text
Peer Reviewed
See detailJoint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

Scientific Conference (2019, December 09)

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam ... [more ▼]

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam coverage with a large number of users and limited frame length lead to the scheduling of only a few users. Moreover, in emerging aggressive frequency reuse systems, scheduling is coupled with precoding. This is addressed in this work, through the joint design of scheduling and precoding for frame-based MGMC satellite systems. This aim is formulated as the maximization of the sum-rate under per beam power constraint and minimum SINR requirement of scheduled users. Further, a framework is proposed to transform the non-smooth SR objective with integer scheduling and nonconvex SINR constraints as a difference-of-convex problem that facilitates the joint update of scheduling and precoding. Therein, an efficient convex-concave procedure based algorithm is proposed. Finally, the gains (up to 50%) obtained by the jointed design over state-of-the-art methods is shown through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 84 (19 UL)
Full Text
Peer Reviewed
See detailThe Impact of Human Mobility on Edge Data Center Deployment in Urban Environments
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]

Detailed reference viewed: 66 (8 UL)
Full Text
Peer Reviewed
See detailTemporal 3D Human Pose Estimation for Action Recognition from Arbitrary Viewpoints
Adel Musallam, Mohamed; Baptista, Renato UL; Al Ismaeil, Kassem UL et al

in 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas 5-7 December 2019 (2019, December)

This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from ... [more ▼]

This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from different viewpoints remains an extremely challenging problem, due to depth ambiguities, occlusion, and a large variety of appearances and scenes. Moreover, using only the information from the 2D perspective gives different interpretations for the same action seen from different viewpoints. Our system operates in two subsequent stages. The first stage estimates the 2D human pose using a convolution neural network. In the next stage, the 2D human poses are lifted to 3D human poses, using a temporal convolution neural network that enforces the temporal coherence over the estimated 3D poses. The estimated 3D poses from different viewpoints are then aligned to the same camera reference frame. Finally, we propose to use a temporal convolution network-based classifier for cross-view action recognition. Our results show that we can achieve state of art view-invariant action recognition accuracy even for the challenging viewpoints by only using RGB videos, without pre-training on synthetic or motion capture data. [less ▲]

Detailed reference viewed: 139 (0 UL)
Full Text
Peer Reviewed
See detailFrom tech to bench: Deep Learning pipeline for image segmentation of high-throughput high-content microscopy data
Garcia Santa Cruz, Beatriz UL; Jarazo, Javier UL; Saraiva, Claudia UL et al

Poster (2019, November 29)

Automation of biological image analysis is essential to boost biomedical research. The study of complex diseases such as neurodegenerative diseases calls for big amounts of data to build models towards ... [more ▼]

Automation of biological image analysis is essential to boost biomedical research. The study of complex diseases such as neurodegenerative diseases calls for big amounts of data to build models towards precision medicine. Such data acquisition is feasible in the context of high-throughput screening in which the quality of the results relays on the accuracy of image analysis. Although the state-of-the-art solutions for image segmentation employ deep learning approaches, the high cost of manual data curation is hampering the real use in current biomedical research laboratories. Here, we propose a pipeline that employs deep learning not only to conduct accurate segmentation but also to assist with the creation of high-quality datasets in a less time-consuming solution for the experts. Weakly-labelled datasets are becoming a common alternative as a starting point to develop real-world solutions. Traditional approaches based on classical multimedia signal processing were employed to generate a pipeline specifically optimized for the high-throughput screening images of iPSC fused with rosella biosensor. Such pipeline produced good segmentation results but with several inaccuracies. We employed the weakly-labelled masks produced in this pipeline to train a multiclass semantic segmentation CNN solution based on U-net architecture. Since a strong class imbalance was detected between the classes, we employed a class sensitive cost function: Dice coe!cient. Next, we evaluated the accuracy between the weakly-labelled data and the trained network segmentation using double-blind tests conducted by experts in cell biology with experience in this type of images; as well as traditional metrics to evaluate the quality of the segmentation using manually curated segmentations by cell biology experts. In all the evaluations the prediction of the neural network overcomes the weakly-labelled data quality segmentation. Another big handicap that complicates the use of deep learning solutions in wet lab environments is the lack of user-friendly tools for non-computational experts such as biologists. To complete our solution, we integrated the trained network on a GUI built on MATLAB environment with non-programming requirements for the user. This integration allows conducting semantic segmentation of microscopy images in a few seconds. In addition, thanks to the patch-based approach it can be employed in images with different sizes. Finally, the human-experts can correct the potential inaccuracies of the prediction in a simple interactive way which can be easily stored and employed to re-train the network to improve its accuracy. In conclusion, our solution focuses on two important bottlenecks to translate leading-edge technologies in computer vision to biomedical research: On one hand, the effortless obtention of high-quality datasets with expertise supervision taking advantage of the proven ability of our CNN solution to generalize from weakly-labelled inaccuracies. On the other hand, the ease of use provided by the GUI integration of our solution to both segment images and interact with the predicted output. Overall this approach looks promising for fast adaptability to new scenarios. [less ▲]

Detailed reference viewed: 51 (8 UL)
Full Text
See detailA professional development course in translanguaging: Challenges and opportunities
Aleksic, Gabrijela UL; Dzoen, Bebic-Crestany

Scientific Conference (2019, November 27)

In Luxembourg, the new law in 2017 has declared multilingual early education mandatory. Not only that teachers need to help children develop their Luxembourgish, but also they need to familiarize them ... [more ▼]

In Luxembourg, the new law in 2017 has declared multilingual early education mandatory. Not only that teachers need to help children develop their Luxembourgish, but also they need to familiarize them with French and value their home languages. In order to support preschool teachers in this endeavour, our project aims to: (1) offer a professional development (PD) course in translanguaging, (2) involve children’s families to reinforce home-school collaboration, and (3) foster children’s cognitive, linguistic, and socio-emotional engagement in the classroom. We use a panoply of measures to reach our aims: focus groups and teacher questionnaires (aim 1), parent questionnaires and interviews (aim 2), a test in early literacy and numeracy in school and home languages, teacher assessment of children’s socio-emotional development and video observations with children (aim 3). Translanguaging, the main topic of our 22 hour PD course (June – December 2019), is the use of a full linguistic repertoire to make meaning (Otheguy, García, & Reid, 2015). In eight sessions, we explore multilingual ecology, parental involvement, and oracy and early literacy. We will present preliminary findings of the focus groups with teachers and tests in early literacy and numeracy in children’s home and school languages. Challenges and opportunities that emerged during the course will be explored as well. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailDreaming of Constructivist Technology Integration Strategies in Future Teacher Students
Reuter, Bob UL; Busana, Gilbert UL

Scientific Conference (2019, November 27)

Based on previous experiences in preparing future teachers for technology integration (Reuter & Busana, 2017), and based on the recommendations from Kolb’s (2017) Triple E framework about effective uses ... [more ▼]

Based on previous experiences in preparing future teachers for technology integration (Reuter & Busana, 2017), and based on the recommendations from Kolb’s (2017) Triple E framework about effective uses of ICT in education, we have adapted the Educational Technology course in our Initial Teacher Training. Over the years, we have indeed observed that, when given the choice of the type of technology integration strategies, many students designed ICT-based learning and teaching scenarios that implemented a rather teacher-centred teaching model (Roblyer & Doering, 2013). These scenarios were often far from innovative nor did they implement the disruptive potential of ICT in education (Christensen, Horn & Johnson, 2008). In the winter semester 2018-2019 we thus decided to ask our students to design and develop constructivist technology integration scenarios. We assessed the success of this adaptation with the help of our own observations, the semester reports produced by our students and their answers to an end-of-semester course evaluation. In general, we saw that students were able to design rather attractive constructivist learning activities. We also observed that our students were quite surprised that such activities do not require complicated and expensive tools, but that they can be implemented with standard productivity tools. [less ▲]

Detailed reference viewed: 11 (3 UL)
Peer Reviewed
See detailDie Entstehung einer Hauptstadtregion als deutsch-belgische Beziehungsgeschichte
Brüll, Christoph UL

Scientific Conference (2019, November 22)

Vom 14. Mai - 23. Juli und vom 19. September - 31.Oktober 1972 fand zunächst im Kölner Museum Schnütgen und dann in den Brüsseler Musées Royaux d’Art et d’Histoire die bis heute größte Schau rheinisch ... [more ▼]

Vom 14. Mai - 23. Juli und vom 19. September - 31.Oktober 1972 fand zunächst im Kölner Museum Schnütgen und dann in den Brüsseler Musées Royaux d’Art et d’Histoire die bis heute größte Schau rheinisch-maasländischer Kunst statt. Unter dem Titel „Rhein und Maas. Kunst und Kultur 800-1400“ wurde sie zu einem großen Publikumserfolg, der auch in der Scientific Community der Kunsthistoriker einige Aufmerksamkeit erregte. Die Entstehung der Ausstellung sagt einiges über die Geschichte der Wissenschaftsbeziehungen zwischen Deutschland und Belgien seit 1945 aus, aber auch, so die Ausgangshypothese meines Beitrags, über die Veränderungen der in Belgien vorherrschenden Mental Maps von Deutschland seit der Verlagerung des politischen Schwerpunktes an den Rhein mit der Gründung der Bundesrepublik. Der belgische Deutschlanddiskurs knüpfte dabei durchaus an bereits bestehende Deutschlandbilder an, die gerade das Maasland als Zwischenraum inszenierten , doch kam durch das Zusammenrücken der westeuropäischen Länder im Zuge von Kaltem Krieg und beginnender europäischer Integration, gerade auch unter dem Signum des Abendlandes, eine neue Dimension ins Spiel. Mentalitätsgeschichtlich hob die rheinische Bonner Republik die durch den Ersten Weltkrieg hervorgerufene Distanz zwischen dem belgischen Staat und (West-)Deutschland auf, politikgeschichtlich fanden deutsche und belgische „Suche nach Sicherheit“ (E. Conze) ein enges Kooperationsfeld. Zum Zentrum der belgischen Aktivität im Rheinland wurde Köln, das nach dem durch die Wahl als Regierungssitz notwendig gewordenen Verlassen Bonns durch die belgischen Truppen in Deutschland 1950 zu deren neuem Hauptquartier wurde. Dort etablierte sich zudem rasch das Belgische Haus als Drehscheibe für politischen, konsularischen, aber auch kulturellen Austausch. Die Ausstellung „Rhein und Maas“ dient als Aufhänger für den Beitrag, der sowohl das Ende einer langen Nachkriegszeit als auch das Ankommen Belgiens in der Bonner Republik herausstellen kann. Auch die Anfang der 1970er Jahre erfolgten ersten gegenseitigen Staatsbesuche geben Aufschluss über Inszenierung und Wahrnehmung der Hauptstadtregion. Der Beitrag wirft somit eine beziehungsgeschichtliche Perspektive auf Bonn-Köln-Düsseldorf zwischen 1949 und den 1970er Jahren und fragt mit Bezug auf die Hauptstadtregion auf die belgische(n) Wahrnehmung(en) des Rheinischen, aber auch nach Rückwirkungen auf Brüssel als belgischer und europäischer Hauptstadt. [less ▲]

Detailed reference viewed: 69 (0 UL)
Full Text
Peer Reviewed
See detailAu-delà du cours magistral: Vers des apprentissages autonomes et collaboratifs basés sur de « grandes questions »
Busana, Gilbert UL; Reuter, Bob UL

Scientific Conference (2019, November 22)

Nous enseignions depuis quelques années un cours de première année sur "l'éducation à l'ère numérique", dans la formation initiale des futur-e-s enseignant-e-s du fondamental, sous forme d’un cours ... [more ▼]

Nous enseignions depuis quelques années un cours de première année sur "l'éducation à l'ère numérique", dans la formation initiale des futur-e-s enseignant-e-s du fondamental, sous forme d’un cours magistral afin de véhiculer certaines connaissances théoriques et pratiques dans ce domaine. Cependant, nous avons observé au cours des dernières années que (1) de nombreux étudiants échouaient à l'examen et que (2) beaucoup d'entre eux, lorsqu'ils étaient en 4e année, avaient oublié la plupart des fondements. Ces considérations nous ont amenés à repenser et à remanier nos méthodes d'enseignement et notre façon d'évaluer les résultats d'apprentissage des étudiant-e-s. Après une première implémentation de notre nouvelle approche pédagogique combinant diverses méthodes actives d'apprentissage au semestre d’hiver 2018 (décrite et réfléchie dans Reuter & Busana, 2018), nous avons effectué quelques modifications basées (a) sur nos propres observations et réflexions ainsi que (b) sur les commentaires des étudiant-e-s tirées de l’évaluation du cours (organisée par notre université). Dès à présent, plutôt que de les faire travailler sur de « grandes questions » (c.-à-d. des questions pour lesquelles il n'y a pas de réponses simples et faciles à consulter) au cours des séances en présentiel, nous demandons maintenant à nos étudiant-e-s (1) de construire individuellement des connaissances en amont du séminaire sur base de ressources fournies ou tirés de recherches bibliographiques autonomes ; (2) de les présenter, discuter et développer de manière collaborative en petits groupes pendant les séminaires ; puis (3) de les partager et discuter avec nous et leurs pairs et finalement (4) de les conserver dans un portfolio numérique personnel. L’évaluation des apprentissages des étudiant-e-s est effectuée à l’aide de ce portfolio numérique en fin de semestre. [less ▲]

Detailed reference viewed: 74 (4 UL)
Peer Reviewed
See detailThe 2004 Afghan Constitution and Islam Merits and Challenges
Al Hajjaji, Shams Al Din UL

Scientific Conference (2019, November 11)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailPOSTER: Traffic Splitting to Counter Website Fingerprinting
de La Cadena Ramos, Augusto Wladimir UL; Mitseva, Asya UL; Pennekamp, Jan et al

Poster (2019, November 11)

Detailed reference viewed: 34 (4 UL)
Peer Reviewed
See detailNeed for Cognition across school tracks: The importance of learning environments
Colling, Joanne UL; Wollschläger, Rachel UL; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 52 (5 UL)
See detailDimensional and Social Comparison Effects on Domain-Specific Academic Self-Concepts and Interests with First- and Third-Grade Students
van der Westhuizen, Lindie UL; Arens, Katrin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Academic self-concepts (ASCs) are self-perceptions of one’s own academic abilities. The internal/external frame of reference (I/E) model (Marsh, 1986) explains the formation of domain-specific ASCs ... [more ▼]

Academic self-concepts (ASCs) are self-perceptions of one’s own academic abilities. The internal/external frame of reference (I/E) model (Marsh, 1986) explains the formation of domain-specific ASCs through a combination of social (i.e. comparing one’s achievement in one domain with the achievement of others in the same domain) and dimensional (i.e. comparing one’s achievement in one domain with one’s achievement in another domain) comparisons. This results into positive achievement-self-concept relations within the math and verbal domains, but into negative achievement-self-concept relations across these domains. The generalized internal/external frame of reference (GI/E) model (Möller, Müller-Kalthoff, Helm, Nagy, & Marsh, 2015) extends the I/E model to the formation of other domain-specific academic self-beliefs such as interest. Research on the validity of the (G)I/E model for elementary school children is limited, especially for first-graders. This study examined the associations between verbal and math achievement and corresponding domain-specific self-concepts and interests for first-graders and third-graders. Two fully representative Luxembourgish first-grader cohorts and two fully representative third-graders cohorts (N=21,192) were used. The analyses were based on structural equation modeling. The findings fully supported the (G)I/E model for third-graders: Achievement was positively related to self-concept and interest within matching domains. Negative relations were found between achievement and self-concept and between achievement and interest across domains. For first-graders, achievement was positively related to self-concept and interest within matching domains. However, the majority of cross-domain relations were non-significant, except for the negative path between math achievement and verbal interest. Hence, while the formation of domain-specific ASCs and interests seem to rely on social and dimensional comparisons for third-graders, only social comparisons seem to be in operation for first-graders. Gender and cohort invariance was established for both grade levels. The findings are discussed within the framework of ASC differentiation and dimensional comparison theory applied to elementary school students. [less ▲]

Detailed reference viewed: 42 (1 UL)
Peer Reviewed
See detailThe stability of academic self-concept profiles – a latent transition analysis
Franzen, Patrick UL; Arens, A. Katrin; Niepel, Christoph UL

Poster (2019, November 06)

Detailed reference viewed: 64 (2 UL)
Peer Reviewed
See detailMath and Reading Difficulties in a Multilingual Educational Setting
Martini, Sophie Frédérique UL; Fischbach, Antoine UL; Ugen, Sonja UL

Scientific Conference (2019, November 06)

Detailed reference viewed: 28 (2 UL)
Peer Reviewed
See detailSimilarities and differences of value-added scores from models with different covariates: A cluster analysis
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 44 (3 UL)
See detailVon Eupen-Malmedy nach Ostbelgien. Eine deutsch-belgische Beziehungsgeschichte seit 1920
Brüll, Christoph UL

Scientific Conference (2019, November 01)

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailA Personalized Sentiment Model with Textual and Contextual Information
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in The SIGNLL Conference on Computational Natural Language Learning, Hong Kong 3-4 November 2019 (2019, November)

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In ... [more ▼]

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In particular, we construct a hierarchical neural network that leverages valuable information from a person's past expressions, and offer a better understanding of the sentiment from the expresser's perspective. Additionally, we investigate how a person's sentiment changes over time so that recent incidents or opinions may have more effect on the person's current sentiment than the old ones. Psychological studies have also shown that individual variation exists in how easily people change their sentiments. In order to model such traits, we develop a modified attention mechanism with Hawkes process applied on top of a recurrent network for a user-specific design. Implemented with automatically labeled Twitter data, the proposed model has shown positive results employing different input formulations for representing the concerned information. [less ▲]

Detailed reference viewed: 196 (6 UL)
Full Text
See detailUser Terminal Wideband Modem for Very High Throughput Satellites
Kisseleff, Steven UL; Maturo, Nicola UL; Chatzinotas, Symeon UL et al

in 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019 (2019, November)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailCharacterization of the MSE Region under a Total Power Budget for Asynchronous Two-Way Relay Networks
Rahimi, Razgar; Shahbazpanahi, Shahram UL; Ottersten, Björn UL

in The Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, 3-6 November 2019 (2019, November)

Detailed reference viewed: 77 (0 UL)
Full Text
See detailA New Optimization Tool for Mega-Constellation Design and its Application to Trunking Systems
Kisseleff, Steven UL; Shankar, Bhavani UL; Spano, Danilo UL et al

in 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019 (2019, November)

Detailed reference viewed: 25 (2 UL)
Full Text
Peer Reviewed
See detailA Multilayer Low-Altitude Airspace Model for UAV Traffic Management
Samir Labib, Nader UL; Danoy, Grégoire UL; Musial, Jedrzej et al

in Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (2019, November)

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼]

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲]

Detailed reference viewed: 82 (20 UL)
Full Text
Peer Reviewed
See detailEnhanced Sketchnoting through Semantic Integration of Learning Material
Atashpendar, Aryobarzan UL; Grevisse, Christian UL; Rothkugel, Steffen UL

in Applied Informatics (2019, November)

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in ... [more ▼]

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in popularity, especially in teaching and learning. While current solutions already reduce the burden of organizing and searching through stacks of paper, they provide little support in finding additional information related to the notes, and search capabilities are mostly limited to textual queries and content. In this paper, we present a novel solution for digital sketchnoting aimed at enhancing the learning experience of students. In addition to common capabilities such as handwriting recognition, our note-taking app integrates semantic annotation and drawing recognition. Handwritten notes are recognized and passed through concept recognition and entity linking tools to enable a knowledge graph-based integration of contextually relevant learning resources. We extend traditional search capabilities by including the semantic metadata from the related material as well as enabling visual queries to find recognized sketches. Finally, resembling the exchange of paper notes among students, our app allows to share the semantically enhanced notes with other devices. [less ▲]

Detailed reference viewed: 87 (19 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 80 (12 UL)
Full Text
Peer Reviewed
See detailTeachers’ translanguaging stance, design, and shifts in a professional development course
Aleksic, Gabrijela UL; Bebic, Dzoen Dominique UL

Scientific Conference (2019, October 28)

Classrooms in Luxembourg are highly socially, culturally, and linguistically diverse. About 65% of 4 year-old children do not speak Luxembourgish, of which 28% speak Portuguese (MENJE, 2018). In 2017, the ... [more ▼]

Classrooms in Luxembourg are highly socially, culturally, and linguistically diverse. About 65% of 4 year-old children do not speak Luxembourgish, of which 28% speak Portuguese (MENJE, 2018). In 2017, the new law has declared multilingual early education mandatory. Until that time, the focus was solely on the development of Luxemburgish, whereas now teachers should also familiarize children with French and value their home languages. To support preschool teachers, our project aims to: (1) offer a professional development (PD) course in translanguaging, (2) involve children’s families to reinforce home-school collaboration, and (3) foster children’s cognitive, linguistic, and socio-emotional engagement in the classroom. We use focus groups, questionnaires, and language portraits with teachers and a test in early literacy and numeracy in school and home language and video observations with children. Translanguaging, the main topic of our 22 hour PD course (June – December 2019), is the use of a full linguistic repertoire to make meaning (Otheguy, García, & Reid, 2015). Through focus groups, we identified teachers’ negative translanguaging stance towards children’s proficiency in their home language that hinders the development of Luxembourgish. Translanguaging design was related to teachers’ use of multilingual stories and morning greetings, while translanguaging shifts concerned frequent translations by involving older children. Our main goal is to address the negative translanguaging stance by offering practical activities during the course and collaborating with parents, children, and organisational stakeholders. References Ministry of National Education, Childhood and Youth [MENJE]. (2018). Key numbers of the national education: statistics and indicators – School year 2016-2017. Retrieved from http://www.men.public.lu/fr/actualites/publications/themes-transversaux/statistiques-analyses/chiffres-cles/index.html Otheguy, R., García, O., & Reid, W. (2015). Clarifying translanguaging and deconstructing named languages: A perspective from linguistics. Applied Linguistic Review, 6(3), 281–307. [less ▲]

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailFacing parallel inventions: the French telecommunications strategies in the digital field (mid-1950s to mid-1990s)
Schafer, Valerie UL

Scientific Conference (2019, October 26)

This panel on parallel inventions is an opportunity to rethink 15-years of research on data networks and digitization from the perspective of simultaneity. The subject of parallel inventions in the field ... [more ▼]

This panel on parallel inventions is an opportunity to rethink 15-years of research on data networks and digitization from the perspective of simultaneity. The subject of parallel inventions in the field of data networks immediately brings to mind the outset of packet switching, a key concept of Arpanet and Internet (Bay, 2019) that was developed in the 1960s by several players, namely Paul Baran at the RAND Corporation, Leonard Kleinrock at UCLA and Donald Davies at the NPL (National Physical Laboratory) in Great Britain. Yet this Zeitgeist surrounding packet switching is not the only example of parallel ideas and projects within the history of data networks, nor is it limited to the US context. My presentation therefore aims to shift the focus to deepen our understanding of simultaneous inventions, turning away from the cumbersome examination of the “great figures” towards collective innovation and adoption. To do so, we will look at the telecommunications sector. Since the 1950s, this sector in the United States, France, Great Britain and other European countries has been confronted with computer needs and the challenge of building data networks based on their infrastructure – communication lines were mainly monopolized by telecommunication companies in Europe until the end of the 1980s. Several parallel paths were experimented during the period from the transition to electronic switching in phone equipment to the development of standards such as X25, which competed with Internet protocols in the 1980s and 1990s, demonstrating that innovation is not a linear process. Rather than discuss AT&T’s hostility towards packet switching as implemented in Arpanet, which has already been well documented (Abbate, 1999), this study will look at the French telecommunications administration and show how those responsible for the communication lines needed for French networks were positioning themselves to face the changes that had begun in the 1950s, whilst assessing parallel inventions that were either internal or external to the administration. Our paper will therefore focus less on invention per se than on the response to simultaneous inventions, and will review several simultaneous paths in the history of digital networks that French telecommunications had to face, and the associated process of collective decision-making. We will start by presenting the parallel development of spatial and temporal switching in the second half of the 1950s, then look at the simultaneous experiment of Caducée and Hermès networks (early 1970s). Complementary case studies will cover the debate about virtual circuits and datagrams from the 1970s to the 1990s, standardization within the field of telematics and the first Web offers in the transition period from the Minitel to the Web in the 1990s. Our analysis aims to establish a typology of the administration’s choices and attitudes, which differ according to whether the alternative is an internal solution or from an external source, but also according to the periods, from the telecommunications monopoly to the 1990s deregulation. In this way, we aim to reveal how inventions were not only connected to the technical context and knowledge, but were also shaped by those who were interested in the resulting technology. [less ▲]

Detailed reference viewed: 32 (3 UL)
See detailThe Occupied Museum. Culture and Science in Luxemburg during the Nazi Occupation, 1940–1944
Spirinelli, Fabio UL

Scientific Conference (2019, October 24)

Detailed reference viewed: 51 (2 UL)
Full Text
Peer Reviewed
See detailInformation Content of Systematic and Idiosyncratic Risk Disclosure
Weber, Véronique UL; Muessig, Anke UL

Scientific Conference (2019, October 24)

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailSoftware Engineering for Dataset Augmentation using Generative Adversarial Networks
Jahic, Benjamin UL; Guelfi, Nicolas UL; Ries, Benoît UL

Scientific Conference (2019, October 19)

Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity ... [more ▼]

Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity. In this work, we present a novel software engineering approach for dataset augmentation using neural networks. We propose a rigorous process for generating synthetic data to improve the training of neural networks. Also, we demonstrate our approach to successfully improve the recognition of handwritten digits using conditional generative adversarial networks (cGAN). Finally, we shortly discuss selected important issues of our process, presenting related work and proposing some improvements. [less ▲]

Detailed reference viewed: 118 (88 UL)
See detailRussische Immigration nach Luxemburg 1918-1935: Einwanderer aus einem nicht-existierenden Land
Ganschow, Inna UL

Scientific Conference (2019, October 18)

Die Einwanderer_innen aus dem früheren Russischen Reich trugen zur Arbeiterlandschaft im Süden, Norden und Osten Luxemburgs nach dem Ersten Weltkrieg bei. Nimmt man diese „Russen“ genauer unter die Lupe ... [more ▼]

Die Einwanderer_innen aus dem früheren Russischen Reich trugen zur Arbeiterlandschaft im Süden, Norden und Osten Luxemburgs nach dem Ersten Weltkrieg bei. Nimmt man diese „Russen“ genauer unter die Lupe, zeigen sich mindestens drei neue Gruppen, die die bereits vor 1914 bestehende russische Gemeinde vergrößerten. Die ersten sind die ehemaligen Kriegsgefangenen aus den Lagern in Frankreich, Belgien und Deutschland. Ein Teil ist vor Kriegsende als Flüchtlinge im Lande, die anderen kommen nach dem Waffenstillstand im November 1918. Sie wollen nicht zurück nach Russland, wo der Bürgerkriegt tobt. Die zweite Gruppe kommt im Laufe des Bürgerkrieges um 1926-1929 aus Bulgarien und Serbien nach. Es handelt sich um noch zusammenhaltende Weißgardisten, die zu der über die Krim in die Türkei evakuierte Armee von Petr Wrangel gehörten. Schließlich ist die dritte Gruppe der zivilen politischen Flüchtlinge zu erwähnen, die seit den frühen 1920ern meistens über Deutschland nach Luxemburg kamen und öfters Angehörigen der jüdischen Glaubensgemeinschaft waren. Viele von ihnen sind bereits seit den intensivierten Pogromen der ersten russischen Revolution von 1905 in Europa. Die Wanderungsstrukturen dieser verschiedenen und sehr heterogenen Gruppen von „Russen“ stehen im Mittelpunkt des Vortrags. [less ▲]

Detailed reference viewed: 5 (0 UL)
See detailDiscussion of "Do ETFs Increase Liquidity?" by Mehmet Saglam, Tugkan Tuzun and Russ Wermers
Holcblat, Benjamin UL

Scientific Conference (2019, October 18)

Detailed reference viewed: 31 (2 UL)
See detailApproche européenne sur l'entreprise : de la nouveauté ?
Corbisier, Isabelle UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 34 (5 UL)
See detailRegards allemands sur le Luxembourg
Brüll, Christoph UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 33 (1 UL)
See detailRegards belges sur le Luxembourg 1919-1921
Brüll, Christoph UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 27 (0 UL)
See detailMonitoring du système scolaire – Le modèle luxembourgeois (invited talk)
Fischbach, Antoine UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 40 (6 UL)
Full Text
Peer Reviewed
See detailTravail frontalier en Suisse et au Luxembourg : mobilités, profils et défis
Pigeron-Piroth, Isabelle UL; Helfer, Malte UL; Belkacem, Rachid

Scientific Conference (2019, October 15)

La Suisse et le Luxembourg sont particulièrement concernés par le travail frontalier. Ces deux pays accueillent à eux seuls plus d’un demi-million de travailleurs frontaliers et recourent à la main ... [more ▼]

La Suisse et le Luxembourg sont particulièrement concernés par le travail frontalier. Ces deux pays accueillent à eux seuls plus d’un demi-million de travailleurs frontaliers et recourent à la main-d’œuvre frontalière depuis plusieurs décennies. Petits pays dynamiques ayant d’importants besoins de main-d’œuvre, ils se caractérisent par des différentiels liés à la présence de frontières (différentiels de prix immobiliers, de taux de chômage, de salaires, de niveaux d’activité économique … avec les pays voisins). Ces différentiels entretiennent la dynamique du travail frontalier (Belkacem et Pigeron-Piroth, 2016). [less ▲]

Detailed reference viewed: 32 (3 UL)
See detailInside the Trading Zone: Doing Digital Hermeneutics in an Interdisciplinary Setting
van der Heijden, Tim UL; Tatarinov, Juliane UL

Scientific Conference (2019, October 11)

Our contribution examines the conference theme of digital hermeneutics from the perspective of the Doctoral Training Unit (DTU) in ‘Digital History and Hermeneutics’, a four-year interdisciplinary ... [more ▼]

Our contribution examines the conference theme of digital hermeneutics from the perspective of the Doctoral Training Unit (DTU) in ‘Digital History and Hermeneutics’, a four-year interdisciplinary research and training program hosted by the Centre for Contemporary and Digital History (C²DH) at the University of Luxembourg. The DTU is designed as an experimental platform for collaboration or ‘trading zone’, in which thirteen doctoral candidates with different disciplinary backgrounds – from history, linguistics and philosophy to computer and information science – study and reflect on the epistemological and methodological implications of the ‘digital turn’ on historical research. This presentation reflects on the project’s first year, in which the doctoral candidates were introduced to various skills and methods in digital humanities, including text mining, digital source criticism, database structures, data visualization, GIS analysis, tool criticism and algorithmic critique; and its second year, when data collections had been created and research tools identified that were going to be applied to it. By doing so, it presents some of the main practical and epistemological opportunities and challenges of “thinkering” with digital tools and technologies in the Digital History Lab of the C2DH, and it reflects scientific dissemination strategies for the group and the individual. The analysis is informed by studies on interdisciplinarity, digital humanities infrastructures and communities of practice. It furthermore draws on a series of semi-structured interviews and self-reflexive training reports, in which the doctoral candidates of the DTU reflect on their experiences in doing digital hermeneutics in an interdisciplinary setting. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailDeep Learning Quality Control for High-Throughput High-Content Screening Microscopy Images
Garcia Santa Cruz, Beatriz UL; Jarazo, Javier UL; Schwamborn, Jens Christian UL et al

Poster (2019, October 10)

Automation of biological image analysis is essential to boost biomedical research. The study of complex diseases such as neurodegenerative diseases calls for big amounts of data to build models towards ... [more ▼]

Automation of biological image analysis is essential to boost biomedical research. The study of complex diseases such as neurodegenerative diseases calls for big amounts of data to build models towards precision medicine. Such data acquisition is feasible in the context of high-throughput high-content screening (HTHCS) in which the quality of the results relays on the accuracy of image analysis. Deep learning (DL) yields great performance in image analysis tasks especially with big amounts of data such as the produced in HTHCS contexts. Such DL and HTHCS strength is also their biggest weakness since DL solutions are highly sensitive to bad quality datasets. Hence, accurate Quality Control (QC) for microscopy HTHCS becomes an essential step to obtain reliable pipelines for HTHCS analysis. Usually, artifacts found on these platforms are the consequence of out-of-focus and undesirable density variations. The importance of accurate outlier detection becomes essential for both the training process of generic ML solutions (i.e. segmentation or classification) and the QC of the input data such solution will predict on. Moreover, during the QC of the input dataset, we aim not only to discard unsuitable images but to report the user on the quality of its dataset giving the user the choice to keep or discard the bad images. To build the QC solution we employed fluorescent microscopy images of rosella biosensor generated in the HTHCS platform. A total of 15 planes ranging from -6z to +7z steps to the two optimum planes. We evaluated 27 known focus measure operators and concluded that they have low sensitivity in noisy conditions. We propose a CNN solution which predicts the focus error based on the distance to the optimal plane, outperforming the evaluated focus operators. This QC allows for better results in cell segmentation models based on U-Net architecture as well as promising improvements in image classification tasks. [less ▲]

Detailed reference viewed: 45 (3 UL)
See detailThe ESP estimator
Holcblat, Benjamin UL; Sowell, Fallaw

Scientific Conference (2019, October 08)

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailSoftwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection
Rinaldi, Giulia UL; Adamsky, Florian UL; Soua, Ridha UL et al

in 10th International Conference on Networks of the Future (NoF) (2019, October 04)

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼]

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲]

Detailed reference viewed: 85 (13 UL)
Full Text
Peer Reviewed
See detailOptimized and flexible scheduling of AGVs and process machines in Re- manufacturing 4 .0 Systems using multi-agent technology and simultaneous scheduling
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Ramírez Fernández, Francisco Javier; Honrubia Escribano, Andrés (Eds.) Abstracts III International Workshop on Autonomous Remanufacturing 2019 (2019, October 02)

In remanufacturing processes the condition of the used products is unknown. This leads to many challenges which are special to the domain of remanufacturing and not known from manufacturing. One of these ... [more ▼]

In remanufacturing processes the condition of the used products is unknown. This leads to many challenges which are special to the domain of remanufacturing and not known from manufacturing. One of these challenges is the stochastic routing of products based on the unknown product conditions. This problem in particular requires a flexible scheduling and control system for the remanufacturing system as well as the intralogistics. The aim of this research is to optimize the scheduling and control of remanufacturing systems considering the flexible material transport by AGVs. Therefore the networking of all resources is organized as an embedded system treating the remanufacturing system as a cyber-physical system in the context of industry 4.0. The scheduling and control of the remanufacturing system will be achieved by a combination of multi-agent technology to deal with unexpected events and the optimization of the schedule by simultaneous scheduling of machines and AGVs. Machine scheduling and transport scheduling have been vastly studied by many researchers, but most of the works address both problems separately. However, these two problems are closely linked and influence each other. By looking at them together, it is possible to achieve an improvement in the overall schedule. In the first step of the research work, the simultaneous scheduling of machines and AGVs has been compared with the currently used sequential scheduling within a simulation study. For this purpose, benchmark instances known in the literature were used. The simulation results show the superiority of the simultaneous scheduling of machines and AGVs. [less ▲]

Detailed reference viewed: 93 (0 UL)
Full Text
Peer Reviewed
See detailUser Experience Design for E-Voting: How mental models align with security mechanisms
Zollinger, Marie-Laure UL; Distler, Verena UL; Roenne, Peter UL et al

in Electronic Voting (2019, October)

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]

Detailed reference viewed: 82 (5 UL)
Full Text
Peer Reviewed
See detailEFFECTS OF MULTIPLE OSCILLATOR PHASE NOISE IN PRECODING PERFORMANCE
Martinez Marrero, Liz UL

Scientific Conference (2019, October)

Satellite Precoding is a promising technique to meet the target data rates of the future high throughput satellite systems and the costs per bit as required by 5G applications and networks, but it ... [more ▼]

Satellite Precoding is a promising technique to meet the target data rates of the future high throughput satellite systems and the costs per bit as required by 5G applications and networks, but it requires strict synchronization among the transmitted waveforms, in addition to accurate channel state information. Most of the published work about this topic consider ideal oscillators, but in practice, the output of an oscillator is not a single spectral line at the nominal frequency. This paper proposes a model for the oscillator phase noise and analyzes the resulting received signal to interference plus noise ratio (SNIR) in a satellite communication system using Precoding. Simulations of a communication satellite system with a two-beam transponder and two receivers were performed to compute the effective SNIR. This work uses a simulator which also considers practical impairments such as time misalignment, errors in the channel state information, interference, thermal noise and phase noise masks for satellite oscillators. The Precoding methods used for the analysis are Zero Forcing (ZF) and Minimum Mean Square Error (MMSE). The obtained results prove that there is a degradation in the performance due to the use of independent oscillators but this effect is compensated by the precoding matrix. [less ▲]

Detailed reference viewed: 49 (9 UL)
See detailDie Maske des Bösen : Lombroso, Fu-Manchu, Mabuse
Kohns, Oliver UL

Scientific Conference (2019, October)

Detailed reference viewed: 30 (0 UL)
See detailL’UniGR-Center for Border Studies et ses outils d’analyse
Wille, Christian UL; Dethier, Perrine

Scientific Conference (2019, October)

Detailed reference viewed: 42 (1 UL)
Full Text
Peer Reviewed
See detailSDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October)

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼]

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲]

Detailed reference viewed: 96 (15 UL)
Full Text
Peer Reviewed
See detailOn the Event-based Attack-tolerant Control: A Polytopic Representation
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant ... [more ▼]

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant control, and scheduling co-design strategy are proposed. From the event triggering definition (sample-and-hold strategy), polytopic writing of the event-triggered feedback control is first presented and then incorporated into the system dynamics for analysis. Our goal is to present a unique model that is able to deal with the co-design problem simultaneously and that can be handled by classical control synthesis tools. The novel representation, including data deception and attack tolerant control is formulated as a BMI optimization problem ensuring both stability and some level performance requirements (L2 attenuation of the cyber-attack). [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailSimultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time ... [more ▼]

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time-varying parameters with a multiplicative effect on the actuator input signal and the sensor output signal, respectively. Based on the sector non-linearity approach and the convex polytopic transformation, the nonlinear model is written in a Linear Parameter-Varying (LPV) form, then an observer allowing both state and attack reconstruction is designed by solving an LMI optimization problem. [less ▲]

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailP3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming
Decouchant, Jérémie UL; Boutet, Antoine; Yu, Jiangshan et al

Scientific Conference (2019, October)

Video consumption is one of the most popular Internet activities worldwide. The emergence of sharing videos directly recorded with smartphones raises important privacy concerns. In this paper we propose ... [more ▼]

Video consumption is one of the most popular Internet activities worldwide. The emergence of sharing videos directly recorded with smartphones raises important privacy concerns. In this paper we propose P3LS , the first practical privacy-preserving peer-to-peer live streaming system. To protect the privacy of its users, P3LS relies on k-anonymity when users subscribe to streams, and on plausible deniability for the dissemination of video streams. Specifically, plausible deniability during the dissemination phase ensures that an adversary is never able to distinguish a user’s stream of interest from the fake streams from a statistical analysis (i.e., using an analysis of variance). We exhaustively evaluate P3LS and show that adversaries are not able to identify the real stream of a user with very high confidence. Moreover, P3LS consumes 30% less bandwidth than the standard k-anonymity approach where nodes fully contribute to the dissemination of k streams. [less ▲]

Detailed reference viewed: 91 (10 UL)
Full Text
Peer Reviewed
See detailThree models of flexible talent management
Usanova, Ksenia; Geraudel, Mickaël UL; D'Armagnac, Sophie et al

Scientific Conference (2019, September 30)

Detailed reference viewed: 36 (1 UL)
Peer Reviewed
See detailHow To Attract And Retain Talents In Not-For-Profit Organizations?
Usanova, Ksenia; Telitsina, Aleksandra; Geraudel, Mickaël UL

Scientific Conference (2019, September 30)

Detailed reference viewed: 29 (0 UL)
Peer Reviewed
See detailQualitative interviewing in multilingual research
Kalocsanyiova, Erika UL; Shatnawi, Malika

Scientific Conference (2019, September 27)

A growing body of research in super-diverse societies is conducted, by necessity, in multiple languages. Multilingual research practices can play a fundamental role in empowering participants and ... [more ▼]

A growing body of research in super-diverse societies is conducted, by necessity, in multiple languages. Multilingual research practices can play a fundamental role in empowering participants and privileging their voices, especially in migration-related studies. Yet, questions of cross-language interviewing are for the most part avoided or ignored in mainstream research. This contribution seeks to bring cross-language communication back into the focus of methodological discussions. Our paper builds on multilingual interview material extracted from a two-year linguistic ethnographic research project on forced migrants’ integration trajectories in Luxembourg. It looks at interpreter-mediated research encounters, as well as interviewees’ translation and translanguaging moves. Audio recordings and field notes from collaborative data analysis sessions underpin the data for this contribution. Our examples show that there is merit in fixing our analytical gaze on the minute details of language use across different codes, as these allow for a novel inquiry into specific moments of meaning making, role performances and rapport-building in qualitative interviewing. [less ▲]

Detailed reference viewed: 40 (0 UL)
See detailThe Discovery of Ghijsbrecht Donckere’s Perpetuum Mobile: Visual Proof of the First Barometer?
Koeleman, Floor UL

Scientific Conference (2019, September 27)

Ghijsbrecht Donckere is sometimes associated with the invention of the barometer, based on two textual sources from about 1620. No visual record was known of Donckere’s instrument, which was referred to ... [more ▼]

Ghijsbrecht Donckere is sometimes associated with the invention of the barometer, based on two textual sources from about 1620. No visual record was known of Donckere’s instrument, which was referred to as a perpetuum mobile, until now. The rediscovery of a third source, and more importantly, the identification of his device on a contemporary painting, calls for a reassessment. The surroundings of the perpetual motion machine as represented in paint place this instrument at the intersection of natural philosophy and mechanical engineering. Donckere’s invention appears to be loosely based on Cornelis Drebbel’s perpetuum mobile (ca. 1607), and was commissioned by a courtly couple that was already partially informed about the hidden cause of motion of this machine. Nevertheless, the symbolic meaning of the object, rather than an understanding of its actual workings, is put on display. Donckere’s instrument is thus inextricably linked to one of the Aristotelian senses, and to concepts of astronomy and harmony, such as the primum mobile and musica universalis. Even though the textual evidence suggests that the device was at some point used to predict the weather, a reinterpretation particularly emphasizes the rhetoric of the time. The sources do not indicate that the effect of atmospheric pressure was already known. Taking these observations into account, the label of barometer does not seem applicable to Donckere’s perpetuum mobile. The newly revealed visual proof portrays the instrument instead as a collector’s item to be interpreted intellectually by an elite clientele in the early seventeenth century. [less ▲]

Detailed reference viewed: 67 (3 UL)
Full Text
Peer Reviewed
See detailNoCry: No More Secure Encryption Keys for Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in 2nd International Workshop on Emerging Technologies for Authorization and Authentication (2019, September 27)

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific ... [more ▼]

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific strategy they implement, and all have pros and cons. However, three requirements concern them all: their implementation must be secure, be effective, and be efficient. Recently, Genç et al. proposed to stop a specific class of ransomware, the cryptographically strong one, by blocking unauthorized calls to cryptographically secure pseudo-random number generators, which are required to build strong encryption keys. Here, in adherence to the requirements, we discuss an implementation of that solution that is more secure (with components that are not vulnerable to known attacks), more effective (with less false negatives in the class of ransomware addressed) and more efficient (with minimal false positive rate and negligible overhead) than the original, bringing its security and technological readiness to a higher level. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailThe impact of resilience on perceived chronic stress in undergraduate psychology students
Lenz, Hannah; Steffgen, Georges UL

Poster (2019, September 26)

The purpose of this exploratory study was to analyze the relationship between academic stressors and chronic stress in undergraduate psychology students, and to identify whether resilience and/or social ... [more ▼]

The purpose of this exploratory study was to analyze the relationship between academic stressors and chronic stress in undergraduate psychology students, and to identify whether resilience and/or social support function as mediators amid this relationship. Students from the University of Luxembourg and the University of Trier (N = 152) were recruited to fill out an online questionnaire consisting of the Trier inventory of chronic stress (Schulz et al., 2004), the resilience scale (Leppert et al., 2008), the perceived social support scale (Kliem et al., 2015), and five dimensions of academic stressors (Herbst et al., 2016). Results show a positive correlation between academic stressors and chronic stress. Multiple regression analysis prove that neither gender, home university, additional occupation nor social support are significant predictors of chronic stress. Compared to academic stressors and resilience, which account for more than 56% of the variance of students’ experienced chronic stress. Furthermore, academic stressors and chronic stress are mediated by resilience but not by perceived social support. The implications of the findings are discussed in terms of their relevance for the development of intervention programs against chronic stress of undergraduate students. [less ▲]

Detailed reference viewed: 59 (7 UL)
Full Text
Peer Reviewed
See detailTHE MARKET SKEWNESS-RETURN RELATIONSHIP, Plenary Talk
Lehnert, Thorsten UL

Scientific Conference (2019, September 25)

Detailed reference viewed: 28 (3 UL)
Full Text
See detailEvaluation von bauphysikalischen Vormessungen im Rahmen von komplexen Innendämmprojekten
Latz, Sebastian Joachim UL; Thewes, Andreas; Scholzen, Frank UL et al

in Vogel, Albert (Ed.) Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer ... [more ▼]

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer reduces the temperature of the masonry during the heating period and considerably reduces the drying potential. If the moisture content is too high due to the absorption of driving rain from the outside and moisture from the interior climate, the masonry may be permanently damaged and mould may form. The proof of function can be achieved by hygrothermal simulations. These simulations require the input of sensitive boundary conditions and different material parameters. In order to obtain precise simulation results, these input values should be validated by building physics measurements. In order to be able to better assess the simulation parameters, various physical measurements for the preparation of a field test for interior insulation systems in a conference room were carried out on behalf of the administration of the bâtiments publics at the University of Luxembourg as part of the research project "Possibilities and limitations of interior insulation in the renovation of public buildings in Luxembourg". [less ▲]

Detailed reference viewed: 72 (9 UL)
See detailMoney Laundering and Cryptocurrencies
Allegrezza, Silvia UL

Scientific Conference (2019, September 24)

Detailed reference viewed: 48 (2 UL)
Full Text
Peer Reviewed
See detailEarly-stage topological and technological choices for TSN-based communication architectures
Navet, Nicolas UL; Villanueva, Josetxo; Migge, Jörn

Scientific Conference (2019, September 24)

A main issue in the design of automotive communication architectures is that the most important design choices pertaining to the topology of the networks and the technologies to use (protocols, data rate ... [more ▼]

A main issue in the design of automotive communication architectures is that the most important design choices pertaining to the topology of the networks and the technologies to use (protocols, data rate, hardware) have to be made at a time when the communication requirements are not entirely known. Indeed, many functions only becomes available along the development cycle, and vehicle platforms have to support incremental evolutions of the embedded system that may not be fully foreseeable at the time design choices are made. The problem is becoming even more difficult and crucial with the introduction of dynamically evolving communication requirements requiring network re-configuration at run-time. We present how the use of synthetic data, that is data generated programmatically based on past vehicle projects and what can be foreseen for the current project, enables the designers to make such early stage choices based on quantified metrics. The proposals are applied to Groupe Renault's FACE service-oriented E/E architecture with the use of a software-implemented function we called “Topology Stress Test”. [less ▲]

Detailed reference viewed: 52 (2 UL)
Full Text
Peer Reviewed
See detailProceedings of the Deduktionstreffen 2019
Schon, Claudia; Steen, Alexander UL

Scientific Conference (2019, September 23)

The annual meeting Deduktionstreffen is the prime activity of the Special Interest Group on Deduction Systems (FG DedSys) of the AI Section of the German Society for Informatics (GI-FBKI). It is a meeting ... [more ▼]

The annual meeting Deduktionstreffen is the prime activity of the Special Interest Group on Deduction Systems (FG DedSys) of the AI Section of the German Society for Informatics (GI-FBKI). It is a meeting with a familiar, friendly atmosphere, where everyone interested in deduction can report on their work in an informal setting. [less ▲]

Detailed reference viewed: 34 (1 UL)
Full Text
Peer Reviewed
See detailBODYFITR: Robust Automatic 3D Human Body Fitting
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Cherenkova, Kseniya UL et al

in Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP) (2019, September 22)

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications ... [more ▼]

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications related to healthcare, digital ergonomics, avatar creation and security, especially in industrial contexts for large-scale product design. Existing works either make prior assumptions on the pose, require manual annotation of the data or have difficulty handling complex poses. This work addresses these limitations by providing a novel automatic fitting pipeline with carefully integrated building blocks designed for a systematic and robust approach. It is validated on the 3DBodyTex dataset, with hundreds of high-quality 3D body scans, and shown to outperform prior works in static body pose and shape estimation, qualitatively and quantitatively. The method is also applied to the creation of realistic 3D avatars from the high-quality texture scans of 3DBodyTex, further demonstrating its capabilities. [less ▲]

Detailed reference viewed: 63 (7 UL)
See detailWann kam die Grenze auf die Karte? Zur Konstruktion von Herrschaftsgebieten zwischen Reich und Frankreich in der Frühen Neuzeit
Uhrmacher, Martin UL

Scientific Conference (2019, September 19)

Feste politische Grenzen, wie man sie heute kennt, die ein Staatsgebiet nach innen wie nach außen umfassend begrenzen, sind im Raum zwischen Maas und Rhein ein Produkt des späten 18. Jahrhunderts. Für ... [more ▼]

Feste politische Grenzen, wie man sie heute kennt, die ein Staatsgebiet nach innen wie nach außen umfassend begrenzen, sind im Raum zwischen Maas und Rhein ein Produkt des späten 18. Jahrhunderts. Für diese Region wird nach dem Ursprung dieser festen Grenzlinien gesucht, die heute ein selbstverständlicher Bestandteil von Karten sind. Seit dem späten 16. Jahrhundert wurden im Westen des Heiligen Römischen Reiches erstmals historische Karten publiziert und im Druck verbreitet, die unser Bild der territorialen Landschaft bis heute prägen. Ab wann aber werden solche Grenzlinien zur Darstellung territorial-räumlicher Verhältnisse verwendet? Und welche Rolle kommt ihnen bei der Konstruktion von Herrschaft im Raum zu? Diesen Fragen widmet sich der Beitrag für die Region zwischen Maas und Rhein. Sie liegt an der Schnittstelle von Germania und Romania und ist durch Einflüsse beiderseits der Sprachgrenze geprägt. [less ▲]

Detailed reference viewed: 34 (4 UL)
Peer Reviewed
See detail(Im)mobilizing languages
Kalocsanyiova, Erika UL

Scientific Conference (2019, September 19)

This presentation is concerned with the impact of multilingualism on forced migrants’ trajectories. It reports the findings of a two-year qualitative research project, which used ethnographic research ... [more ▼]

This presentation is concerned with the impact of multilingualism on forced migrants’ trajectories. It reports the findings of a two-year qualitative research project, which used ethnographic research methods, including narrative and go-along interviews, classroom and participant observations and linguistic analysis of interactional data. The project set out to investigate how forced migrants reflect, position, and affirm themselves – through languages – in multilingual societies. Our contribution aligns itself with the body of research that challenges hegemonic monolingual and monocultural practices (Grzymala-Kazlowska/Phillimore 2018, Van Avermaet 2009). Other major influences were Juffermans and Tavares’s (2017) research on south-north trajectories and linguistic repertoires, Stevenson’s (2014, 2017) work on language (hi)stories and Busch’s (2017) biographical explorations of Spracherleben. In this talk, the focus will be on the experiences of three men from Syria and Iraq who have obtained humanitarian protection in Luxembourg, but aspire to fulfil their integration aspirations across multiple locations and countries. A careful analysis of divergent trajectories sheds light on how experiences of linguistic inequality and/or success are imprinted on forced migrants’ repertoires and shape their understanding of (successful) integration. [less ▲]

Detailed reference viewed: 30 (0 UL)
See detailSize-dependent spatial magnetization profile of Manganese-Zinc ferrite nanoparticles
Bersweiler, Mathias UL

Scientific Conference (2019, September 18)

Detailed reference viewed: 33 (0 UL)
Peer Reviewed
See detailMale vs female gamers: Testing the stereotype threat effect in video gaming
Holl, Elisabeth UL; Wagener, Gary Lee; Melzer, André UL

Scientific Conference (2019, September 17)

Stereotype threat (ST), defined as the risk of confirming a negative stereotype about one’s own group, has been demonstrated in various social contexts. Regarding video games, for example, informing ... [more ▼]

Stereotype threat (ST), defined as the risk of confirming a negative stereotype about one’s own group, has been demonstrated in various social contexts. Regarding video games, for example, informing female participants that men would outperform women in gaming leads to gender differences in performance. To date, however, these studies have not looked into the mechanisms of this ST effect in gaming. In two lab studies (N=186), some participants were confronted with ST-related information before playing a video game. In Study 1, half of the participants read a bogus article confirming the “standard” gender stereotype (“men outperform women”). In Study 2, a reverse stereotype was presented to half of the participants (“women have outpaced men in some game genres”). In contrast to hypotheses, both studies failed to show the expected significant interaction effect of gender and ST condition on performance, although female participants confronted with the “standard” gender stereotype reported greater frustration in Study 1, for example. In sum, results indicate a complex relationship between gender, social identity, experience with the game genre, and behavior. Identifying oneself as a gamer and being experienced in a particular game genre were found to be better performance predictors than reading stereotype threatening information. [less ▲]

Detailed reference viewed: 66 (3 UL)
Full Text
Peer Reviewed
See detailImpact of reinforcement to moment resistance of composite slabs
Zhang, Qingjie UL; Schäfer, Markus UL; Kurz, Wolfgang

in The 2019 World Congress on Advances in Structural Engineering and Mechanics (ASEM19) (2019, September 17)

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based ... [more ▼]

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based on plastic design methods. The current version of Eurocode 4 does not consider explicitly additional reinforcement in the ribs for sagging moment resistance. However, the construction industry requires this possibility in order to provide economical and flexible design. Regarding this situation, further investigations are necessary to prove the applicability of plastic design methods. In the case of high bottom reinforcement ratio, a deep position of the plastic neutral axis occurs, and concrete compression failure may happen before most parts of the profiled steel sheeting and reinforcement yield. This leads to an overestimation of the bending resistance according to the plastic design method. A parametric study, based on approximately 290.000 different combinations of various cross-section geometries and materials, is provided to compare the plastic moment resistance with the resistance determined by strain-limited design. The results show that limitations are necessary to be enabled for the general application of plastic design methods. [less ▲]

Detailed reference viewed: 32 (2 UL)