References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 197 (6 UL)
Full Text
Peer Reviewed
See detailComparing Offline and Online Testing of Deep Neural Networks: An Autonomous Car Case Study
Ul Haq, Fitash UL; Shin, Donghwan UL; Nejati, Shiva UL et al

Scientific Conference (in press)

There is a growing body of research on developing testing techniques for Deep Neural Networks (DNN). We distinguish two general modes of testing for DNNs: Offline testing where DNNs are tested as ... [more ▼]

There is a growing body of research on developing testing techniques for Deep Neural Networks (DNN). We distinguish two general modes of testing for DNNs: Offline testing where DNNs are tested as individual units based on test datasets obtained independently from the DNNs under test, and online testing where DNNs are embedded into a specific application and tested in a close-loop mode in interaction with the application environment. In addition, we identify two sources for generating test datasets for DNNs: Datasets obtained from real-life and datasets generated by simulators. While offline testing can be used with datasets obtained from either sources, online testing is largely confined to using simulators since online testing within real-life applications can be time consuming, expensive and dangerous. In this paper, we study the following two important questions aiming to compare test datasets and testing modes for DNNs: First, can we use simulator-generated data as a reliable substitute to real-world data for the purpose of DNN testing? Second, how do online and offline testing results differ and complement each other? Though these questions are generally relevant to all autonomous systems, we study them in the context of automated driving systems where, as study subjects, we use DNNs automating end-to-end control of cars' steering actuators. Our results show that simulator-generated datasets are able to yield DNN prediction errors that are similar to those obtained by testing DNNs with real-life datasets. Further, offline testing is more optimistic than online testing as many safety violations identified by online testing could not be identified by offline testing, while large prediction errors generated by offline testing always led to severe safety violations detectable by online testing. [less ▲]

Detailed reference viewed: 35 (1 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 95 (11 UL)
Full Text
Peer Reviewed
See detailMajorization-Minimization Algorithms for Analog Beamforming with Large-Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 7th IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2019 (in press)

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly ... [more ▼]

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly increases the number of required radio-frequency (RF) chains, which may be prohibitive. Thus, analog beamforming based on a phase-shifting network driven by a variable gain amplifier (VGA) is a potential alternative technology. In this paper, we cast the beamforming vector design problem as a beampattern matching problem, with an unknown power gain. This is formulated as a unit-modulus least-squares (ULS) problem where the optimal gain of the VGA is also designed in addition to the beamforming vector. We also consider a scenario where the receivers have the additional processing capability to adjust the phases of the incoming signals to mitigate specular multipath components. We propose efficient majorization-minimization (MM) based algorithms with convergence guarantees to a stationary point for solving both variants of the proposed ULS problem. Numerical results verify the effectiveness of the proposed solution in comparison with the existing state-of-the-art techniques. [less ▲]

Detailed reference viewed: 19 (9 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 263 (25 UL)
Full Text
Peer Reviewed
See detailLes archevêques de Milan face aux premières expériences seigneuriales: stratégies et positionnements (milieu XIIIe-début XIVe s.)
Salemme, Timothy UL

in Barralis, Christine (Ed.) L’évêque face à son métier. Actes du colloque international, Metz. 15-17 novembre 2017 (in press)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 148 (6 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 64 (0 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Precoding Design for Satellite Systems
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 37th International Communications Satellite Systems Conference (ICSSC'19) (in press)

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then ... [more ▼]

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then considers an efficient implementation of the massive MIMO transmission through the use of hybrid analog/digital precoder. Efficient algorithmic solutions are proposed for the partially connected precoder architecture which enables efficiency in power/ hardware complexity and its performance evaluated. [less ▲]

Detailed reference viewed: 22 (10 UL)
Full Text
Peer Reviewed
See detailUsing Passive Data Collection Methods to Learn Complex Mobility Patterns: An Exploratory Analysis
Toader, Bogdan UL; Cantelmo, Guido UL; Popescu, Mioara et al

Scientific Conference (in press)

Detailed reference viewed: 97 (10 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 136 (9 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 107 (5 UL)
Full Text
Peer Reviewed
See detailConservazione e ricezione dei documenti pontifici in Italia settentrionale: il caso del monastero cistercense di Chiaravalle Milanese (secoli XII-XVI)
Salemme, Timothy UL

in Salemme, Timothy; Renault, Jean-Baptiste (Eds.) Conservation et réception des documents pontificaux par les Ordres religieux (XIe-XVe siècles). Actes du colloque international. Nancy, 12-13 décembre 2013 (in press)

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailMM-Based Solution for Partially Connected Hybrid Transceivers with Large Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 2019 IEEE Global Communications Conference (GLOBECOM) (in press)

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost ... [more ▼]

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost. In a hybrid analog-digital (A/D) transceiver, the pre/post-processing operation splits into a lower-dimensional baseband (BB) pre/postcoder, followed by a network of analog phase shifters. Primarily two kinds of hybrid architectures are proposed in the literature to implement hybrid transceivers namely, the fully-connected and the partially-connected. Implementation of fully-connected architecture has higher hardware complexity, cost and power consumption in comparison with partially-connected. In this paper, we focus on partially-connected hybrid architecture and develop a low-complexity algorithm for transceiver design for a single user point-to-point mmWave MIMO system. The proposed algorithm utilizes the variable elimination (projection) and the minorization-maximization (MM) frameworks and has convergence guarantees to a stationary point. Simulation results demonstrate that the proposed algorithm is easily scalable for LSAA systems and achieves significantly improved performance in terms of the spectral efficiency (SE) of the system compared to the state-of-the-art solution. [less ▲]

Detailed reference viewed: 39 (11 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 375 (7 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 103 (0 UL)
Full Text
Peer Reviewed
See detailDual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the 6th International Conference on Information Systems Security and Privacy (in press)

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware ... [more ▼]

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code. By methodically reverse-engineering 128 malware executables, we have found that, out of 21 ransomware samples, 9 contain copy-paste code from public resources. Thanks to this finding, we managed to retrieve the decryption keys with which to nullify the ransomware attacks. From this fact, we recall critical cases of code disclosure in the recent history of ransomware and, arguing that ransomware are components in cyber-weapons, reflect on the dual-use nature of this research. We further discuss benefits and limits of using cyber-intelligence and counter-intelligence strategies that could be used against this threat. [less ▲]

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailClimate Finance: The case of developing States and legal readiness towards a transition to climate resilience
Alexandraki, Chrysa UL

in Sustainability (in press)

Climate change poses one of the greatest challenges on an international scale. Responding to this challenge requires the collective effort of all States, however, primary burden has been placed on climate ... [more ▼]

Climate change poses one of the greatest challenges on an international scale. Responding to this challenge requires the collective effort of all States, however, primary burden has been placed on climate finance deriving from developed States, reflecting a dichotomy amongst the member States to the UN climate change regime. The climate finance obligation, albeit justified under the UNFCCC and the principle of differentiation, does not come without challenges for both categories of States. Most of these challenges have focused so far on the donor side, as well as the institutional design and policy weaknesses of the development institutions administering and disbursing climate finance. Considerable challenges, however, also exist on the beneficiary side, especially due to the lack of national climate finance readiness and solid institutional frameworks and policies in recipient countries. This paper focuses on the legal aspects of readiness for climate finance examining the regulatory tools currently deployed by developing States to strengthen their domestic capacities. First, it elaborates on the climate finance obligation per se, while embarking on analyzing this obligation and the challenges it entails under the UN climate change framework. Second, it examines the concept of legal readiness by analyzing what it means to be ready for climate finance, the rationale of legal readiness and the role of law in enhancing developing States’ readiness for climate finance. In doing so, the paper elaborates on the existing taxonomies and guidelines on legal readiness for climate finance, as well as the regulatory and policy tools extensively utilized for this purpose in developing countries. Third, the paper demonstrates the case study of Bangladesh as a country that has advanced and adjusted its national legislation and policies, in order to enhance its legal readiness for climate finance. [less ▲]

Detailed reference viewed: 42 (26 UL)
Full Text
Peer Reviewed
See detailWhich Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography
Rossi, Arianna UL; Lenzini, Gabriele UL

in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (in press)

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this ... [more ▼]

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this paper, we firstly critically review some of those proposals. We then examine the properties that icons and icon sets should arguably fulfill according to Art.12's transparency provisions. Lastly, we discuss metrics and evaluation procedures to measure compliance with the Article. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailA Look into Privacy-Preserving Blockchains
Khan, Nida UL; Nassar, Mohamed

in IEEE BCA @AICCSA 2019 - Workshop on Blockchain and it's Applications (in press)

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems ... [more ▼]

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems remains to address data privacy. While in Bitcoin and similar e-cash systems, privacy was limited to anonymity and addressed by using cryptographic pseudonyms for identification and authentication of parties, the question of privacy has more breadth in systems maintaining actual data such as medical records or energy meters. In this paper, we look into recently proposed privacy-preserving blockchains, analyze their strengths and weaknesses, and highlight research questions requiring future investigation. We conclude that privacy-preserving blockchains are still in their infancy and more research is definitely needed in this area. [less ▲]

Detailed reference viewed: 93 (14 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 58 (1 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 44 (4 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 81 (12 UL)
Full Text
Peer Reviewed
See detailImmersive Telepresence Framework for Remote Educational Scenarios
Botev, Jean UL; Rodríguez Lera, Francisco J.

in Proceedings of the 22nd International Conference on Human-Computer Interaction (HCI International) (in press)

Detailed reference viewed: 5 (1 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 81 (1 UL)
Peer Reviewed
See detailA short Survey on the Cyber Security in Control Systems
Bezzaoucha, Souad UL; Voos, Holger UL

Scientific Conference (2020, July)

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due ... [more ▼]

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due to a highest degree of connectivity in modern systems, new related control-specific cyber-physical systems security challengesarise and novel approaches integrating the cyber aspect are developed.Our goal in this paper is then to provide an overview of attack-modeling and security analysis approaches in recent works thatexplore networked control systems subject to cyber-attacks attacks. To this end, we look at the control, estimation, and modeling problems. [less ▲]

Detailed reference viewed: 74 (2 UL)
Full Text
Peer Reviewed
See detailPractical Posterior Error Bounds from Variational Objectives
Huggins, Jonathan; Kasprzak, Mikolaj UL; Campbell, Trevor et al

in Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics (AISTATS) (2020, June)

Detailed reference viewed: 6 (2 UL)
See detailConstcamer Paintings as Epistemic Images: Early Modern Theaters of Wisdom
Koeleman, Floor UL

Scientific Conference (2020, April)

This paper argues, against existing literature, that 17th-cent. constcamer paintings were objects to think with, functioning as the two-dimensional space of artificial memory. In turn, these artworks ... [more ▼]

This paper argues, against existing literature, that 17th-cent. constcamer paintings were objects to think with, functioning as the two-dimensional space of artificial memory. In turn, these artworks complicate conventional definitions of epistemic images more broadly. I focus on an analysis of constcamer paintings accounting for the reception of the ancients and the mnemonic and propaedeutic role of images, entailing concepts such as wonder or thauma (from Greek θεάομαι), the drive to gather knowledge, memory as the locus of this ‘collection’, and recollecting as the intellectual process of interaction with memorized knowledge. The term inventor, referring to the creator of a given collection, is derived from the rhetorical technique for the retrieval of information. The theatre or ‘place for viewing’ provided the physical context for the collected wisdom. Inventors of constcamer paintings – often artists themselves – vitally participated in knowledge formation contributing to contemporary intellectual debates. [less ▲]

Detailed reference viewed: 95 (2 UL)
Full Text
Peer Reviewed
See detailMetamorphic Security Testing for Web Systems
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020 (2020, March)

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input ... [more ▼]

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In many situations where potential vulnerabilities are tested, a test oracle may not exist, or it might be impractical due to the many inputs for which specific oracles have to be defined. In this paper, we propose a metamorphic testing approach that alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture security properties of the system. Such MRs are then used to automate testing and detect vulnerabilities. We provide a catalog of 22 system-agnostic MRs to automate security testing in Web systems. Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. It automatically detected 10 out of 12 vulnerabilities affecting two widely used systems, one commercial and the other open source (Jenkins). [less ▲]

Detailed reference viewed: 66 (7 UL)
Full Text
Peer Reviewed
See detailIdentifying Unintended Harms of Cybersecurity Measures
Chua, Yi Ting; Parkin, Simon; Edwards, Matthew et al

in Proceedings of ECRIME 2019 (2020, February 01)

Detailed reference viewed: 8 (0 UL)
See detailLocal Organiser, European Shadow Financial Regulatory Committee Meeting
Wolff, Christian UL

Scientific Conference (2020, February)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailPreventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach
Antoniadis, Nikolaos UL; Cordy, Maxime UL; Sifaleras, Angelo et al

Scientific Conference (2020, February)

Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that ... [more ▼]

Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that, the overload could trip the fuse, opening the circuit, and stopping the flow and heating. However, sustained overloads, even if they are below the safety limits, could also damage the wires. To prevent overload, smart grid operators can switch the fuses on or off to protect the circuits, or remotely curtail the over-producing/over-consuming users. Nevertheless, making the most appropriate decision is a daunting decision-making task, notably due to contractual and technical obligations. In this paper, we define and formulate the overloading prevention problem as a Multiobjective Mixed Integer Quadratically Constrained Program. We also suggest a solution method using a combinatorial optimization approach with a state-of-the-art exact solver. We evaluate this approach for this real-world problem together with Creos Luxembourg S.A., the leading grid operator in Luxembourg, and show that our method can suggest optimal countermeasures to operators facing potential overloading incidents. [less ▲]

Detailed reference viewed: 130 (18 UL)
Full Text
Peer Reviewed
See detailWhen a Master Dies: Speculation and Asset Float”
Penasse, Julien UL; Renneboog,, Luc; Scheinkman, José A.

Scientific Conference (2020, January 30)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailWhy is the Market Skewness-Return Relationship Negative?
Lehnert, Thorsten UL

Scientific Conference (2020, January 23)

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we ... [more ▼]

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we consider the usual interpretation of e.g. option-implied skewness as an indicator of jump risk or downside risk. One possible explanation for this inconsistency is that there are factors affecting option-implied market skewness other than jump risk in the stock market. In this paper, I find that price pressure associated with “crowded trades” of mutual funds is an important endogenous factor. Given that retail investors are prone to herding, the directional trading of mutual funds is correlated, and their collective actions can generate short-term price pressure on aggregate stock prices. Short sellers systematically exploit these patterns not only in the equity lending market, but also in the options market. In line with this economic channel, I find that firstly, the significant negative relationship between market skewness and returns becomes insignificant, once I control for price pressure. Secondly, the negative relationship is only present for the “bad” downside component of risk-neutral skewness, associated with out-of-the-money put options. For the “good” upside component of risk-neutral skewness, associated with out-of-the-money call options, the relationship is always positive. Thirdly, price pressure affects the skewness-return relationship, which can be clearly distinguished from the impact of flows on the volatility-return relationship in terms of the leverage effect. [less ▲]

Detailed reference viewed: 25 (3 UL)
Full Text
See detail„Entweder man kann’s oder man lässt es bleiben.“ Kritische Gedanken zur Ausbildung von Blasmusikdirigenten
Sagrillo, Damien UL

Scientific Conference (2020, January 17)

Diesen Karl Böhm in den Mund gelegten Satz passt zu seinem Naturell. Sein Sarkasmus und Zynismus waren bekannt. Karl Böhm hat nie ein Dirigierstudium absolviert. Dennoch gehörte er zu den Großen seines ... [more ▼]

Diesen Karl Böhm in den Mund gelegten Satz passt zu seinem Naturell. Sein Sarkasmus und Zynismus waren bekannt. Karl Böhm hat nie ein Dirigierstudium absolviert. Dennoch gehörte er zu den Großen seines Fachs. In der Fachzeitschrift „das Orchester“ ist im Zusammenhang mit dem berufsausbildenden Angebot für Blasorchesterdirigenten folgendes zu lesen: „Marschmusik oder leichtere Muse haben keinen Platz im Curriculum, die Konzentration liegt auf der Literatur für Sinfonisches Blasorchester“ Diese Aussage gehört kritisch hinterfragt. In meinem Vortrag steht infolgedessen zweierlei im Vordergrund. Zum einen: Was ist ein sinfonisches Blasorchester bzw. eine Bläserphilharmonie – wo kommen die Begriffe her, worauf zielen sie ab? Zum anderen: Marchmusik und sog. „leichte Muse“ gehören zum Wesen lokaler Musikvereine. Wieso finden diese als Tradition zu bezeichnenden Genres der Blasmusik in der Ausbildung keinen Platz? In der Zusammenfassung der beiden voraus gestellten Fragen lassen sich Schlussfolgerungen für die Ausbildung von Blasmusikdirigenten ziehen. [less ▲]

Detailed reference viewed: 2 (0 UL)
See detailStudents’ perceptions of instructional quality: Validating 3 dimensions on a lesson-to-lesson basis
Talic, Irma UL; Möller, Jens; Niepel, Christoph UL

Scientific Conference (2020, January 17)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailConditionality in the European Union External Migration Policy – A Critical Appraisal
Silga, Janine UL

Scientific Conference (2020, January)

Detailed reference viewed: 23 (3 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 263 (72 UL)
Full Text
Peer Reviewed
See detailApproximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification
Menghi, Claudio UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 42st International Conference on Software Engineering (2020)

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing ... [more ▼]

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute-intensive CPS (CI-CPS) models, where a single simulation may take hours to complete. We propose a novel approach, namely ARIsTEO, to enable effective and efficient testing of CI-CPS models. Our approach embeds black-box testing into an iterative approximation-refinement loop. At the start, some sampled inputs and outputs of the CI-CPS model under test are used to generate a surrogate model that is faster to execute and can be subjected to black-box testing. Any failure-revealing test identified for the surrogate model is checked on the original model. If spurious, the test results are used to refine the surrogate model to be tested again. Otherwise, the test reveals a valid failure. We evaluated ARIsTEO by comparing it with S-Taliro, an open-source and industry-strength tool for testing CPS models. Our results, obtained based on five publicly-available CPS models, show that, on average, ARIsTEO is able to find 24% more requirements violations than S-Taliro and is 31% faster than S-Taliro in finding those violations. We further assessed the effectiveness and efficiency of ARIsTEO on a large industrial case study from the satellite domain. In contrast to S-Taliro, ARIsTEO successfully tested two different versions of this model and could identify three requirements violations, requiring four hours, on average, for each violation. [less ▲]

Detailed reference viewed: 13 (11 UL)
Full Text
See detailVisualisierungen des Induktionsprinzips
Perucca, Antonella UL; Todorovic, Milko

in Beiträge zum Mathematikunterricht 2020 (2020)

Detailed reference viewed: 26 (5 UL)
Full Text
See detailKummer theory for number fields
Perucca, Antonella UL; Sgobba, Pietro UL; Tronto, Sebastiano UL

in Proceedings of the Roman Number Theory Association (2020)

Detailed reference viewed: 18 (5 UL)
Full Text
Peer Reviewed
See detailIntegrating Topological Proofs with Model Checking to Instrument Iterative Design
Menghi, Claudio UL; Rizzi, Alessandro Maria; Bernasconi, Anna

in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 (2020)

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous ... [more ▼]

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous verification can be performed after each refinement or revision step. To achieve practical adoption, formal verification must accommodate continuous verification efficiently and effectively. Model checking provides developers with information useful to improve their models only when a property is not satisfied, i.e., when a counterexample is returned. However, it is desirable to have some useful information also when a property is instead satisfied. To address this problem we propose TOrPEDO, an approach that supports verification in two complementary forms: model checking and proofs. While model checking is typically used to pinpoint model behaviors that violate requirements, proofs can instead explain why requirements are satisfied. In our work, we introduce a specific notion of proof, called Topological Proof. A topological proof produces a slice of the original model that justifies the property satisfaction. Because models can be incomplete, TOrPEDO supports reasoning on requirements satisfaction, violation, and possible satisfaction (in the case where satisfaction depends on unknown parts of the model). Evaluation is performed by checking how topological proofs support software development on 12 modeling scenarios and 15 different properties obtained from 3 examples from literature. Results show that: (i) topological proofs are ≈60% smaller than the original models; (ii) after a revision, in ≈78% of cases, the property can be re-verified by relying on a simple syntactic check. [less ▲]

Detailed reference viewed: 60 (1 UL)
Full Text
See detailL’édition de chartes à Luxembourg: de l’érudition aux nouvelles technologies (et vice-versa?)
Salemme, Timothy UL

in Bendheim, Amelie (Ed.) Tagungsband Mittelalter zwischen Faszination und Fortschritt (2020)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailThe low-dimensional algebraic cohomology of the Witt and the Virasoro algebra with values in natural modules
Ecker, Jill Marie-Anne UL; Schlichenmaier, Martin UL

in Banach Center Publications (2020)

The main aim of this contribution is to compute the low-dimensional algebraic cohomology of the Witt and the Virasoro algebra with values in the adjoint and the trivial module. The last section includes ... [more ▼]

The main aim of this contribution is to compute the low-dimensional algebraic cohomology of the Witt and the Virasoro algebra with values in the adjoint and the trivial module. The last section includes results for the general tensor densities modules, presented without proof. One of our main results is that the third algebraic cohomology of the Witt algebra with values in the adjoint module vanishes, while it is one-dimensional for the Virasoro algebra. The first and the second algebraic cohomology of the Witt and the Virasoro algebra with values in tensor densities modules vanish for almost all modules. In the case they do not vanish, we give explicit expressions for the generating cocycles. In our work, we consider algebraic cohomology and not only the sub-complex of continuous cohomology, meaning we do not put any continuity constraints on the cochains. Consequently, our results are independent of any choice of an underlying topology, and valid for any concrete realizations of the considered Lie algebras. [less ▲]

Detailed reference viewed: 69 (2 UL)
Full Text
Peer Reviewed
See detailAutomatic Testing and Improvement of Machine Translation
Sun, Zeyu; Zhang, Jie; Harman, Mark et al

in International Conference on Software Engineering (ICSE) (2020)

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailMeeting Designers Where They Are: Using Industry Events as a Research Venue for HCI and Design Methods Development
Lockton, Dan; Lallemand, Carine UL

Scientific Conference (2020)

There is much work in the CHI community about the ‘industry-academia divide’, and how to bridge it. One key crossover between HCI/UX scientists and practitioners is the development and use of tools and ... [more ▼]

There is much work in the CHI community about the ‘industry-academia divide’, and how to bridge it. One key crossover between HCI/UX scientists and practitioners is the development and use of tools and methods—boundary objects between academia and practice. Among other forms of collaboration, there is an underdeveloped opportunity for academics to make use of industry events (conferences, meetups, design jams) as a research venue in the context of tool and method development. This paper describes three cases from work in academia-industry engagement over the last decade, in which workshops or experiments have been run at industry events as a way of trialling and developing tools directly with practitioners. We discuss advantages of this approach and extract key insights and practical implications, highlighting how the CHI community might use this method more widely, gathering relevant research outcomes while contributing to knowledge exchange between academia and practice. [less ▲]

Detailed reference viewed: 91 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding Walking Meetings: Drivers and Barriers
Damen, Ida; Lallemand, Carine UL; Brankaert, Rens et al

Scientific Conference (2020)

There is increased interest in reducing sedentary behavior of office workers to combat the negative health effects of prolonged sitting. Walking meetings offer a promising solution to this problem as they ... [more ▼]

There is increased interest in reducing sedentary behavior of office workers to combat the negative health effects of prolonged sitting. Walking meetings offer a promising solution to this problem as they facilitate a physically active way of working. To inform future development of technologies supporting these type of meetings, in-depth qualitative insights into people’s experiences of walking meetings are needed. We conducted semi-structured walking interviews (N=16) to identify key drivers and barriers for walking meetings in a living lab setting by using the ‘WorkWalk’. The ‘WorkWalk’ is a 1.8 km walking route indicated by a dotted blue line with outdoor meeting points, integrated into the room booking system. Our findings provide insights into how walking meetings are experienced and affect the set-up and social dynamics of meetings. We propose design recommendations for the development of future technologies and service design elements to support walking meetings and active ways of working. [less ▲]

Detailed reference viewed: 89 (0 UL)
Full Text
Peer Reviewed
See detailAdversarial Embedding: A robust and elusive Steganography and Watermarking technique
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

Scientific Conference (2020)

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image ... [more ▼]

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to extract it. The key properties of adversarial attacks (invisible perturbations, nontransferability, resilience to tampering) offer guarantees regarding the confidentiality and the integrity of the hidden messages. We empirically evaluate adversarial embedding using more than 100 models and 1,000 messages. Our results confirm that our embedding passes unnoticed by both humans and steganalysis methods, while at the same time impedes illicit retrieval of the message (less than 13% recovery rate when the interceptor has some knowledge about our model), and is resilient to soft and (to some extent) aggressive image tampering (up to 100% recovery rate under jpeg compression). We further develop our method by proposing a new type of adversarial attack which improves the embedding density (amount of hidden information) of our method to up to 10 bits per pixel. [less ▲]

Detailed reference viewed: 166 (24 UL)
Full Text
Peer Reviewed
See detailA performance evaluation of weight-constrained conditioned portfolio optimization
Schiltz, Jang UL; Boissaux, Marc UL

Scientific Conference (2019, December 20)

Detailed reference viewed: 24 (0 UL)
Full Text
See detailHome literacy environment and family language policy of immigrant families in Luxembourg
Aleksic, Gabrijela UL; Bebic, Dzoen Dominique UL

Scientific Conference (2019, December 18)

Early literacy skills are critical for children’s later academic achievement. A wealth of research showed that children’s home languages should not be abandoned, as they are crucial for promoting dynamic ... [more ▼]

Early literacy skills are critical for children’s later academic achievement. A wealth of research showed that children’s home languages should not be abandoned, as they are crucial for promoting dynamic multilingualism, assuring cross-linguistic transfer and developing identities. To explore home literacy environment and family language policy of language minority preschool children in Luxembourg, we obtained 603 parent questionnaires, tested 226 children age 4 to 6 in their home languages and Luxembourgish, and interviewed 31 families. The results from the questionnaires showed that the home resources and parent involvement influenced children’s language awareness and their print knowledge irrespective of parent’s education and their wealth. Concerning children’s competences in Luxembourgish, children with positive attitudes towards their school did better than their peers in other schools. In the interviews, parents explained that maintaining home language is important for keeping connections with family, friends and their culture. This is the language parents feel emotionally connected to and the easiest to transmit to their children. Language maintenance is mostly achieved through conversations, movies, games and books in the home languages, children’s attendance of language schools on weekends, celebrations of traditions as well as holidays in the native country of the parents. The home language is, however, not something parents enforce too strictly, as they mostly correct the children’s linguistic mistakes by simple repetition. It is often with great pride that parents report their children having an excellent proficiency in their home language. Finally, through our professional development training in translanguaging we are helping teachers to integrate children’s different home languages and cultures into the classroom and strengthen the home-school collaboration in order to support children’s well-being, learning and identities. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
See detailFrom home to early childhood education: beliefs, language ideologies and OPOL
Kirsch, Claudine UL

Scientific Conference (2019, December 18)

Detailed reference viewed: 114 (0 UL)
Peer Reviewed
See detailYoung emergent multilingual children's agency in learning new language in trilingual Luxembourg
Mortini, Simone UL

Scientific Conference (2019, December 14)

Studies on translanguaging suggest that opportunities to use languages flexibly in the classroom may give children some agency over their language use and facilitate their language learning (García ... [more ▼]

Studies on translanguaging suggest that opportunities to use languages flexibly in the classroom may give children some agency over their language use and facilitate their language learning (García & Kleifgen, 2010). In the emerging field of preschool bilingual education, scholars investigate the concept of child agency in relation to the learning of multiple languages (Schwartz, 2018). Children were shown to actively and creatively contribute to their language learning through choosing to interact in a particular language. Studies on young children’s translanguaging and agency nevertheless remain scarce, especially in multilingual contexts involving more than two languages (Schwartz et al., forthcoming). The present study focuses on eight children’s agentive behaviour in multilingual practices in two formal and two non-formal early childhood education institutions participating in a larger longitudinal research project on the development of multilingual pedagogies in trilingual Luxembourg. I drew on multidimensional qualitative research methods, including 65 days of participant observations, fieldnotes, video-recordings and semi-structured interviews with the practitioners. The findings show that all the children made use of various non-linguistic strategies and at least four named languages and translanguaged for various purposes (e.g. demonstrating knowledge, meaning making). Moreover, they showed two types of agentive behaviour: ‘participatory agency’ (e.g. adapting learning to practitioners’ requirements) and ‘controlling agency’ (e.g. influencing or changing peers’ or practitioners’ language use). The findings should deepen our understanding of the interplay between agency and translanguaging. García, O., & Kleifgen, J. (2010). Educating Emergent Bilinguals. Policies, Programs and Practices for English Language Learners. New York: Teachers College Press. Schwartz, M. (2018). Preschool Bilingual Education: Agency in Interactions between Children, Teachers, and Parents. Dordrecht: Springer. Schwartz, M., Kirsch, C., & Mortini, S. (forthcoming). Young children’s language-based agency in multilingual contexts in Luxembourg and Israel. (Applied Linguistic Review). Manuscript accepted for publication. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailLocalization Performance of 1-Bit Passive Radars in NB-IoT Applications
Sedighi, Saeid UL; Mishra, Kumar Vijay; Shankar, Bhavani UL et al

in Sedighi, Saeid; Mishra, Kumar Vijay; Shankar, Bhavani (Eds.) et al Localization Performance of 1-Bit Passive Radars in NB-IoT Applications (2019, December 14)

Location-based services form an important use-case in emerging narrowband Internet-of-Things (NB-IoT) networks. Critical to this offering is an accurate estimation of the location without overlaying the ... [more ▼]

Location-based services form an important use-case in emerging narrowband Internet-of-Things (NB-IoT) networks. Critical to this offering is an accurate estimation of the location without overlaying the network with additional active sensors. The massive number of devices, low power requirement, and low bandwidths restrict the sampling rates of NB-IoT receivers. In this paper, we propose a novel low-complexity approach for NB-IoT target delay estimation in cases where one-bit analog-to-digital-converters (ADCs) are employed to sample the received radar signal instead of high-resolution ADCs. This problem has potential applications in the design of inexpensive NB-IoT radar and sensing devices. We formulate the target estimation as a multivariate fractional optimization problem and solve it via Lasserre's semi-definite program relaxation. Numerical experiments suggest feasibility of the proposed approach yielding high localization accuracy with a very low number of 1-bit samples. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailWhy is the Market Skewness-Return Relationship Negative?
Lehnert, Thorsten UL

Scientific Conference (2019, December 13)

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we ... [more ▼]

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we consider the usual interpretation of e.g. option-implied skewness as an indicator of jump risk or downside risk. One possible explanation for this inconsistency is that there are factors affecting option-implied market skewness other than jump risk in the stock market. In this paper, I find that price pressure associated with “crowded trades” of mutual funds is an important endogenous factor. Given that retail investors are prone to herding, the directional trading of mutual funds is correlated, and their collective actions can generate short-term price pressure on aggregate stock prices. Short sellers systematically exploit these patterns not only in the equity lending market, but also in the options market. In line with this economic channel, I find that firstly, the significant negative relationship between market skewness and returns becomes insignificant, once I control for price pressure. Secondly, the negative relationship is only present for the “bad” downside component of risk-neutral skewness, associated with out-of-the-money put options. For the “good” upside component of risk-neutral skewness, associated with out-of-the-money call options, the relationship is always positive. Thirdly, price pressure affects the skewness-return relationship, which can be clearly distinguished from the impact of flows on the volatility-return relationship in terms of the leverage effect. [less ▲]

Detailed reference viewed: 21 (3 UL)
Full Text
See detailConsolidating Observation of Land and Sea Level Changes around South Georgia Island
Teferle, Felix Norman UL; Hunegnaw, Addisu UL; Hibbert, Angela et al

Poster (2019, December 13)

With its mid-ocean location in the Southern Atlantic Ocean South Georgia Island is in a key position for the oceanic and geodetic global monitoring networks. Since 2013 the tide gauge at King Edward Point ... [more ▼]

With its mid-ocean location in the Southern Atlantic Ocean South Georgia Island is in a key position for the oceanic and geodetic global monitoring networks. Since 2013 the tide gauge at King Edward Point (KEP) with GLOSS ID 187 has been monitored using a GNSS station nearby on Brown Mountain. By accurately geo-referencing the tide gauge and monitoring any vertical land movements, a continuous record of its datum within the Permanent Service for Mean Sea Level (PSMSL) can be established, which in turn makes the recorded and averaged sea levels useful for long-term studies and satellite altimetry calibrations. In 2014 another GNSS station was installed at KEP after local subsidence was sus-pected and later on three additional GNSS stations came to service at the periphery of the main island, making it possible to monitor uplift/subsidence wider afield. Further-more, together with four precise levelling campaigns of the KEP benchmark network in 2013, 2014 and two in 2017, it has also been possible to investigate the very local character of the vertical motions near KEP, i.e. the stability of the jetty upon which the tide gauge is mounted. In this study, we will present the results from the GNSS and precise levelling meas-urements, and will discuss their impact on the sea level record from the KEP tide gauge and nearby satellite altimetry sea surface heights. This study comes at a timely manner as during the Austral Summer 2019/2020 the jetty will be stabilized and en-larged, and consequently the current tide gauge will be replaced by a new one. Our measurements show that uplift is observed all over South Georgia Island while the ar-ea at KEP and particularly the jetty with tide gauge are subsiding relative to the rest of the island. In contrast, results for the tide gauge record show a lower magnitude of ob-served sea level rise than expected from nearby satellite altimetry. We will revisit all geodetic and oceanic observations in an attempt to improve the agreement between these measurements to summarize the status before the work at the jetty begins. [less ▲]

Detailed reference viewed: 72 (6 UL)
Full Text
See detailUsing the Vertical Land Movement estimates from the IGS TIGA combined solution to derive Global Mean Sea Level changes
Bogusz, Janusz; Hunegnaw, Addisu UL; Teferle, Felix Norman UL et al

Scientific Conference (2019, December 13)

Global mean sea level (GMSL) is now widely recognized to have risen between 1 to 2 mm/yr depending on location since the 20th century. Prior to the satellite altimetry era, GMSL was primarily estimated ... [more ▼]

Global mean sea level (GMSL) is now widely recognized to have risen between 1 to 2 mm/yr depending on location since the 20th century. Prior to the satellite altimetry era, GMSL was primarily estimated from a set of secular tide gauge records relative to coastal benchmarks. Recent measurements of GPS (Global Positioning System) have been demonstrated as a useful tool of a direct estimate of Vertical Land Motion (VLM) induced by both long and short-term geophysical and human-induced processes in a geocentric reference frame. This presentation will provide the results of a combination performed using the CATREF software of three independent GPS daily solutions provided by British Isles continuous GNSS Facility – University of Luxembourg consortium (BLT), German Research Centre for Geosciences (GFZ) and University of La Rochelle (ULR) under the auspices of the Tide Gauge Benchmark Monitoring (TIGA) Working Group (WG), that results in a spatially comprehensive map of VLM near or close to tide gauge benchmarks. The combination was performed in accordance with the second re-processing campaign (repro2) of the IGS (International GNSS Service). Long coastal tide gauge records from the archives maintained at the Permanent Service for Mean Sea Level (PSMSL) were extracted for relative sea level estimates. To cross-compare the sea level rates over the years, we employed observations between 1900-2016. Then, the time series were cut and analyzed separately, ceteris paribus, for the period 1960-2016. This analysis was aimed at a cross-comparison of relative sea level trends and their changes over the years. The stochastic part of the tide gauge records was analyzed with Maximum Likelihood Estimation (MLE) and assumed several different combinations of noise models with the Bayesian Information Criterion (BIC) providing a means to identify the preferred one. The relative sea level estimates were corrected by the inverted barometric effect to the tide-gauge records using data from the 20th century Reanalysis project version V2C, the effect of wind stress on the surface of the ocean in both, zonal and meridional components, as well as Pacific Decadal Oscillation (PDO) and the North Pacific Gyre Oscillation (NPGO) influencing Pacific tide gauge records. The GPS-based velocities were corrected by Glacial Isostatic Adjustment (GIA) effect using ICE-6G(VM5a) model with associated geoid rate and post seismic decays using ITRF2014 estimates. Also, environmental loading models were employed to account for present-day elastic loading in VLM. The Mean Sea Level (MSL) trends from tide gauges and VLM-corrected MSL trends using GIA model (TG+GIA) and the TIGA combination (TG+TIGA) were determined. Our final reconstruction of GMSL based on the MSL records from 1900 to 2016 where the VLM uncertainty is smaller than 0.7 mm/yr indicate a long-term trend of 1.75 +/- 0.2 mm/yr and is in good agreement with several similar determinations. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
See detailConventional EO Satellites vs. CubeSats; FDL - AI flood detection onboard a Nano Satellite
Backes, Dietmar UL; Schumann, Guy; Teferle, Felix Norman UL

Scientific Conference (2019, December 11)

Detailed reference viewed: 15 (0 UL)
Full Text
See detailTracking hurricanes Harvey and Irma using GPS tropospheric products
Ejigu, Yohannes Getachew; Teferle, Felix Norman UL; Hunegnaw, Addisu UL et al

Poster (2019, December 10)

The 2017 Hurricanes season was one of the most powerful severe weather events producing catastrophic socio-economic and environmental effects on the east coast of the United States. Therefore, tracking ... [more ▼]

The 2017 Hurricanes season was one of the most powerful severe weather events producing catastrophic socio-economic and environmental effects on the east coast of the United States. Therefore, tracking their path accurately is extremely useful. Today Global Navigation Satellite Systems (GNSS) tropospheric products, such as Zenith Wet Delays (ZWD), and Integrated Water Vapor (IWV) are used as complementary data sets in Numerical Weather Prediction (NWP) models. In this study, we employed GPS-derived IWV and horizontal tropospheric gradient information to monitor and investigate the complicated characteristics of hurricane events in their spatial and temporal distribution using a dense ground network of GPS stations. Our results show that a surge in GPS-derived IWV occurred several hours prior to the manifestation of the major hurricanes Harvey and Irma. We used the derived GPS-derived IWV information as input to spaghetti lines weather models, allowing us to predict the paths of Harvey and Irma hurricanes. As such, a parameter directly estimated from GPS can provide an additional resource for improving the monitoring of hurricane paths [less ▲]

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailCarrier Aggregation in Multi-Beam High Throughput Satellite Systems
Kibria, Mirza UL; Lagunas, Eva UL; Maturo, Nicola UL et al

in Carrier Aggregation in Multi-Beam High Throughput Satellite Systems (2019, December 10)

Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the ... [more ▼]

Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the demand for data-hungry applications has drawn large attention from different wireless network communities. Given the benefits of CA in the terrestrial wireless environment, it is of great interest to analyze and evaluate the potential impact of CA in the satellite domain. In this paper, we study CA in multi-beam high throughput satellite systems. We consider both inter-transponder and intra-transponder CA at the satellite payload level of the communication stack, and we address the problem of carrier-user assignment assuming that multiple users can be multiplexed in each carrier. The transmission parameters of different carriers are generated considering the transmission characteristics of carriers in different transponders. In particular, we propose a flexible carrier allocation approach for a CA enabled multi-beam satellite system targeting a proportionally fair user demand satisfaction. Simulation results and analysis shed some light on this rather unexplored scenario and demonstrate the feasibility of the CA in satellite communication systems. [less ▲]

Detailed reference viewed: 8 (2 UL)
Full Text
See detailParameter identification problem in bimaterial human skin and sensitivity analysis : Uncertainties in biomechanics of skin
Sutula, Danas; Elouneg, Aflah; Sensale, Marco UL et al

Scientific Conference (2019, December 09)

The proposed paper concerns the prediction of the numerical response of a biomechanical structure submitted to an unknown external loading state. The methodology is based on homogeneous and then ... [more ▼]

The proposed paper concerns the prediction of the numerical response of a biomechanical structure submitted to an unknown external loading state. The methodology is based on homogeneous and then heterogeneous structures such as healthy or pathological cutaneous tissues that can be mechanically tested in vivo under a patchy knowledge of boundary conditions. Experimental data corresponding to the extension of a piece of skin located between two pads with displacement enslavement, represent input data to the numerical model. Data are reaction force on one pad and displacement field between the two pads and all around. The numerical model consists of a representation of the bi-material domain geometry with neo-hookean behaviors. The boundary conditions and loadings of the experimental extension test are imposed. The materials parameters have been identified by inverse method starting from a constrained cost function minimizing the difference between the calculated displacements field and experimental displacements field obtained by digital image correlation and taking into account the reaction force as a constraint. An analysis of the model sensitivity to material parameters is presented. [less ▲]

Detailed reference viewed: 3 (0 UL)
Full Text
Peer Reviewed
See detailJoint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

in Bandi, Ashok; Shankar, Bhavani; Chatzinotas, Symeon (Eds.) et al Joint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications (2019, December 09)

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam ... [more ▼]

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam coverage with a large number of users and limited frame length lead to the scheduling of only a few users. Moreover, in emerging aggressive frequency reuse systems, scheduling is coupled with precoding. This is addressed in this work, through the joint design of scheduling and precoding for frame-based MGMC satellite systems. This aim is formulated as the maximization of the sum-rate under per beam power constraint and minimum SINR requirement of scheduled users. Further, a framework is proposed to transform the non-smooth SR objective with integer scheduling and nonconvex SINR constraints as a difference-of-convex problem that facilitates the joint update of scheduling and precoding. Therein, an efficient convex-concave procedure based algorithm is proposed. Finally, the gains (up to 50%) obtained by the jointed design over state-of-the-art methods is shown through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 106 (30 UL)
Full Text
See detailMechanical parameters identification of keloid and surrounding healthy skin using Digital Image Correlation measurements in vivo
Elouneg, Aflah; Sutula, Danas; Sensale, Marco UL et al

Scientific Conference (2019, December 09)

The human skin behaves as an elastic membrane initially prestressed but not uniformly. The presence of anatomical sites favorable to the appearance of some tumors, a keloid in our case, while other sites ... [more ▼]

The human skin behaves as an elastic membrane initially prestressed but not uniformly. The presence of anatomical sites favorable to the appearance of some tumors, a keloid in our case, while other sites never develop them attests to the importance of the mechanical environment of the tissue. Thus, a mechanical characterization of the tumored skin is necessary to understand the keloid expansion from a mechanical point of view. Our case study consists in modeling a bi-material structure composed of a keloid skin surrounded by healthy skin located on upper left arm of a young female. From the experimental measurements in vivo, by combining force sensor, displacement sensor and Digital Image Correlation techniques, we perform a mechanical analysis to characterize the mechanical stress fields over the entire area and on the interface ‘healthy skin/keloid skin’. Since the mechanical behavior of the tumorous skin is unknown, many physical models can be implemented and assessed very easily inside the specific digital software to fit with the real data. Once a set of mechanical parameters for both the healthy skin and the keloid skin are identified, the stress fields around the keloid are calculated. Next steps consist in determining matching preferential directions in order to define as precisely as possible the specifications of a device for preventing the growth of keloids. [less ▲]

Detailed reference viewed: 9 (1 UL)
See detailPsychiatric knowledge dissimination at international conferences (1860-1914): 'those who have the interest of science at heart, don't distinguish between nationalities'
Andersen, Eva UL

Scientific Conference (2019, December 06)

The amount of international conferences that were organised over the nineteenth century increased rapidly, and formed an ideal environment for discussions amongst peers and establishing knowledge ... [more ▼]

The amount of international conferences that were organised over the nineteenth century increased rapidly, and formed an ideal environment for discussions amongst peers and establishing knowledge transfers. Medical and psychiatric conferences were no exception. However, a study into psychiatric conferences on a larger scale has not yet been conducted. Adopting a transnational perspective is essential, and while this approach is gaining more attention from historians more generally, it is only slowly reaching the history of psychiatry. To gain insights into the (inter)national knowledge dissemination that happened within psychiatry, we will examine different organisational aspects such as the locations where conferences were held, its organisation and the subjects and questions that were included in the conference program, as well as studying the mutual connections between congresses and the connections between the participants. This will help to discover the key players and whether it was well-known psychiatrists that were most involved in these international conferences. These interwoven sub-questions will help to establish in how far an international community existed within psychiatry and thus if such international congresses were an epicentre of transnational knowledge dissemination or if they were rather a manifestation of national encounters. This research is based on the minutes and membership lists found within conference proceedings of the “Congrès internationale médecine mentale”, “Congrès international de neurologie, psychiatrie et de physiologie”, “Congrès international de l’assistance aux aliéné” and the “Congrès international de médecine” that also often included a section dedicated to psychiatry. These all took place between the 1860’s and the first decade of the twentieth century. [less ▲]

Detailed reference viewed: 5 (1 UL)
Peer Reviewed
See detailAccommodation of non-nationals in Luxembourg
Wronska, Iwona; Murdock, Elke UL

Scientific Conference (2019, December 05)

The Grand Duchy of Luxembourg within its current borders was established in the end of 19th century. In the space of less than 150 years the population of this state more than doubled - largely ... [more ▼]

The Grand Duchy of Luxembourg within its current borders was established in the end of 19th century. In the space of less than 150 years the population of this state more than doubled - largely attributable to immigration. Today, 48% of the population are foreigners. We would like to argue that the current immigration policy of Luxembourg is based on the strategy of accommodation. We can identify three major pillars of this strategy. The first pillar creates welcome conditions to adaptation within the host society. The second pillar brings liberal provisions for naturalization and the third pillar offers open and generous admission of refugees. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailThe Impact of Human Mobility on Edge Data Center Deployment in Urban Environments
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]

Detailed reference viewed: 87 (11 UL)
Full Text
Peer Reviewed
See detailAutomatic Software Tuning of Parallel Programs for Energy-Aware Executions
Varrette, Sébastien UL; Pinel, Frédéric UL; Kieffer, Emmanuel UL et al

in Proc. of 13th Intl. Conf. on Parallel Processing and Applied Mathematics (PPAM 2019) (2019, December)

For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to ... [more ▼]

For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to the type and characteristics of workload that the device is running. For this reason, this paper presents an automatic software tuning method for parallel program generation able to adapt and exploit the hardware features available on a target computing system such as an HPC facility or a cloud system in a better way than traditional compiler infrastructures. We propose a search based approach combining both exact methods and approximated heuristics evolving programs in order to find optimized configurations relying on an ever-increasing number of tunable knobs i.e., code transformation and execution options (such as the num- ber of OpenMP threads and/or the CPU frequency settings). The main objective is to outperform the configurations generated by traditional compiling infrastructures for selected KPIs i.e., performance, energy and power usage (for both for the CPU and DRAM), as well as the runtime. First experimental results tied to the local optimization phase of the proposed framework are encouraging, demonstrating between 8% and 41% improvement for all considered metrics on a reference benchmark- ing application (i.e., Linpack). This brings novel perspectives for the global optimization step currently under investigation within the presented framework, with the ambition to pave the way toward automatic tuning of energy-aware applications beyond the performance of the current state-of-the-art compiler infrastructures. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailLinear system identification from ensemble snapshot observations
Aalto, Atte UL; Goncalves, Jorge UL

in Proceedings of the IEEE Conference on Decision and Control (2019, December)

Developments in transcriptomics techniques have caused a large demand in tailored computational methods for modelling gene expression dynamics from experimental data. Recently, so-called single-cell ... [more ▼]

Developments in transcriptomics techniques have caused a large demand in tailored computational methods for modelling gene expression dynamics from experimental data. Recently, so-called single-cell experiments have revolutionised genetic studies. These experiments yield gene expression data in single cell resolution for a large number of cells at a time. However, the cells are destroyed in the measurement process, and so the data consist of snapshots of an ensemble evolving over time, instead of time series. The problem studied in this article is how such data can be used in modelling gene regulatory dynamics. Two different paradigms are studied for linear system identification. The first is based on tracking the evolution of the distribution of cells over time. The second is based on the so-called pseudotime concept, identifying a common trajectory through the state space, along which cells propagate with different rates. Therefore, at any given time, the population contains cells in different stages of the trajectory. Resulting methods are compared in numerical experiments. [less ▲]

Detailed reference viewed: 96 (11 UL)
Full Text
Peer Reviewed
See detailOn the Formal Structure of Rules in Conflict of Laws
Markovich, Réka UL

in Legal Knowledge and Information Systems 2019 (proceedings) (2019, December)

Law has different methods and principles to resolve conflicts between norms, most of these come from Roman Law, they are well-known and much discussed. There is a whole branch of law, though, which is ... [more ▼]

Law has different methods and principles to resolve conflicts between norms, most of these come from Roman Law, they are well-known and much discussed. There is a whole branch of law, though, which is much less discussed while having been created exactly in order to resolve special conflicts: conflict of laws. This system within Private International Law is dedicated to providing metarules in legal situations where more than one national legal systems’ rules could be applied: CoL rules indirectly settle the situation by declaring which one’s should. The formal representation of how these rules work contributes not only to the modelling of this branch of law but also provides methodologies for concerns arising from other conflicting normative systems, such as ethically sensitive situations where there are multiple stakeholders with different moral backgrounds. [less ▲]

Detailed reference viewed: 35 (6 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of CLT13 Multilinear Maps with Independent Slots
Coron, Jean-Sébastien UL; Notarnicola, Luca UL

in Advances in Cryptology – ASIACRYPT 2019, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II (2019, December)

Detailed reference viewed: 124 (0 UL)
Full Text
Peer Reviewed
See detailTemporal 3D Human Pose Estimation for Action Recognition from Arbitrary Viewpoints
Adel Musallam, Mohamed; Baptista, Renato UL; Al Ismaeil, Kassem UL et al

in 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas 5-7 December 2019 (2019, December)

This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from ... [more ▼]

This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from different viewpoints remains an extremely challenging problem, due to depth ambiguities, occlusion, and a large variety of appearances and scenes. Moreover, using only the information from the 2D perspective gives different interpretations for the same action seen from different viewpoints. Our system operates in two subsequent stages. The first stage estimates the 2D human pose using a convolution neural network. In the next stage, the 2D human poses are lifted to 3D human poses, using a temporal convolution neural network that enforces the temporal coherence over the estimated 3D poses. The estimated 3D poses from different viewpoints are then aligned to the same camera reference frame. Finally, we propose to use a temporal convolution network-based classifier for cross-view action recognition. Our results show that we can achieve state of art view-invariant action recognition accuracy even for the challenging viewpoints by only using RGB videos, without pre-training on synthetic or motion capture data. [less ▲]

Detailed reference viewed: 161 (1 UL)
Full Text
Peer Reviewed
See detailUC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing
Damodaran, Aditya Shyam Shankar UL; Dubovitskaya, Maria; Rial Duran, Alfredo UL

in Progress in Cryptology – INDOCRYPT 2019 (2019, December)

Priced oblivious transfer (POT) is a cryptographic protocol that can be used to protect customer privacy in e-commerce applications. Namely, it allows a buyer to purchase an item from a seller without ... [more ▼]

Priced oblivious transfer (POT) is a cryptographic protocol that can be used to protect customer privacy in e-commerce applications. Namely, it allows a buyer to purchase an item from a seller without disclosing to the latter which item was purchased and at which price. Unfortunately, existing POT schemes have some drawbacks in terms of design and functionality. First, the design of existing POT schemes is not modular. Typically, a POT scheme extends a k-out-of-N oblivious transfer (OT) scheme by adding prices to the items. However, all POT schemes do not use OT as a black-box building block with certain security guarantees. Consequently, security of the OT scheme needs to be reanalyzed while proving security of the POT scheme, and it is not possible to swap the underlying OT scheme with any other OT scheme. Second, existing POT schemes do not allow the seller to obtain any kind of statistics about the buyer's purchases, which hinders customer and sales management. Moreover, the seller is not able to change the prices of items without restarting the protocol from scratch. We propose a POT scheme that addresses the aforementioned drawbacks. We prove the security of our POT in the UC framework. We modify a standard POT functionality to allow the seller to receive aggregate statistics about the buyer's purchases and to change prices dynamically. We present a modular construction for POT that realizes our functionality in the hybrid model. One of the building blocks is an ideal functionality for OT. Therefore, our protocol separates the tasks carried out by the underlying OT scheme from the additional tasks needed by a POT scheme. Thanks to that, our protocol is a good example of modular design and can be instantiated with any secure OT scheme as well as other building blocks without reanalyzing security from scratch. [less ▲]

Detailed reference viewed: 79 (20 UL)
Full Text
Peer Reviewed
See detailSafer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments
Wang, Min UL; Voos, Holger UL

in Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments (2019, December)

Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ... [more ▼]

Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ensure safety of the UAV as well as its surroundings, it is necessary for the UAV to boast the capability of detecting emergency situation and acting on its own when facing imminent threat. However, the majority of UAVs currently available in the market are not equipped with such capability. To fill in the gap, in this paper we present a complete sense-and-avoid solution for assisting unskilled pilots in ensuring a safe flight. Particularly, we propose a novel nonlinear vehicle control system which takes into account of sensor characteristics, an emergency evaluation policy and a novel optimization-based avoidance control strategy. The effectiveness of the proposed approach is demonstrated and validated in simulation with multiple moving objects. [less ▲]

Detailed reference viewed: 17 (4 UL)
Full Text
Peer Reviewed
See detailFrom tech to bench: Deep Learning pipeline for image segmentation of high-throughput high-content microscopy data
Garcia Santa Cruz, Beatriz UL; Jarazo, Javier UL; Saraiva, Claudia UL et al

Poster (2019, November 29)

Automation of biological image analysis is essential to boost biomedical research. The study of complex diseases such as neurodegenerative diseases calls for big amounts of data to build models towards ... [more ▼]

Automation of biological image analysis is essential to boost biomedical research. The study of complex diseases such as neurodegenerative diseases calls for big amounts of data to build models towards precision medicine. Such data acquisition is feasible in the context of high-throughput screening in which the quality of the results relays on the accuracy of image analysis. Although the state-of-the-art solutions for image segmentation employ deep learning approaches, the high cost of manual data curation is hampering the real use in current biomedical research laboratories. Here, we propose a pipeline that employs deep learning not only to conduct accurate segmentation but also to assist with the creation of high-quality datasets in a less time-consuming solution for the experts. Weakly-labelled datasets are becoming a common alternative as a starting point to develop real-world solutions. Traditional approaches based on classical multimedia signal processing were employed to generate a pipeline specifically optimized for the high-throughput screening images of iPSC fused with rosella biosensor. Such pipeline produced good segmentation results but with several inaccuracies. We employed the weakly-labelled masks produced in this pipeline to train a multiclass semantic segmentation CNN solution based on U-net architecture. Since a strong class imbalance was detected between the classes, we employed a class sensitive cost function: Dice coe!cient. Next, we evaluated the accuracy between the weakly-labelled data and the trained network segmentation using double-blind tests conducted by experts in cell biology with experience in this type of images; as well as traditional metrics to evaluate the quality of the segmentation using manually curated segmentations by cell biology experts. In all the evaluations the prediction of the neural network overcomes the weakly-labelled data quality segmentation. Another big handicap that complicates the use of deep learning solutions in wet lab environments is the lack of user-friendly tools for non-computational experts such as biologists. To complete our solution, we integrated the trained network on a GUI built on MATLAB environment with non-programming requirements for the user. This integration allows conducting semantic segmentation of microscopy images in a few seconds. In addition, thanks to the patch-based approach it can be employed in images with different sizes. Finally, the human-experts can correct the potential inaccuracies of the prediction in a simple interactive way which can be easily stored and employed to re-train the network to improve its accuracy. In conclusion, our solution focuses on two important bottlenecks to translate leading-edge technologies in computer vision to biomedical research: On one hand, the effortless obtention of high-quality datasets with expertise supervision taking advantage of the proven ability of our CNN solution to generalize from weakly-labelled inaccuracies. On the other hand, the ease of use provided by the GUI integration of our solution to both segment images and interact with the predicted output. Overall this approach looks promising for fast adaptability to new scenarios. [less ▲]

Detailed reference viewed: 94 (15 UL)
Full Text
See detailDeveloping Multilingual Pedagogies in Early Childhood: a review of the project MuLiPEC
Aleksic, Claudine UL; Aleksic, Gabrijela UL; Mortini, Simone UL et al

Scientific Conference (2019, November 27)

Developing Multilingual Pedagogies in Early Childhood: a review of the project The project MuLiPEC (2016-2019) addresses the need for multilingual pedagogies in early childhood education in Luxembourg. It ... [more ▼]

Developing Multilingual Pedagogies in Early Childhood: a review of the project The project MuLiPEC (2016-2019) addresses the need for multilingual pedagogies in early childhood education in Luxembourg. It offered a professional development (PD) course to develop the practitioners’ knowledge and skills in relation to multilingualism and effective pedagogies as well as their practices, and analysed the effects of the PD on the practitioners and the children’s languaging. We offered a first 15-hour course to 46 practitioners from formal and non-formal education settings. Of these, seven continued during one academic year. They were coached and took part in six network meetings where we discussed their practices. To analyse the results, we drew on observations of the PD and in the research settings, video-recorded activities, and interviews. The results show that all 46 participants opened up to multilingual education and deepened their understanding of multilingualism, language development and multilingual pedagogies. Furthermore, the seven focus practitioners implemented activities in multiple languages and deployed effective language supportive strategies. Five of them developed holistic and child-centred multilingual pedagogies. This paper presents these positive findings and raises questions related to the sustainability of PD course and the need to continue the implementation of these effective pedagogies. [less ▲]

Detailed reference viewed: 15 (3 UL)
Full Text
See detailA professional development course in translanguaging: Challenges and opportunities
Aleksic, Gabrijela UL; Dzoen, Bebic-Crestany

Scientific Conference (2019, November 27)

In Luxembourg, the new law in 2017 has declared multilingual early education mandatory. Not only that teachers need to help children develop their Luxembourgish, but also they need to familiarize them ... [more ▼]

In Luxembourg, the new law in 2017 has declared multilingual early education mandatory. Not only that teachers need to help children develop their Luxembourgish, but also they need to familiarize them with French and value their home languages. In order to support preschool teachers in this endeavour, our project aims to: (1) offer a professional development (PD) course in translanguaging, (2) involve children’s families to reinforce home-school collaboration, and (3) foster children’s cognitive, linguistic, and socio-emotional engagement in the classroom. We use a panoply of measures to reach our aims: focus groups and teacher questionnaires (aim 1), parent questionnaires and interviews (aim 2), a test in early literacy and numeracy in school and home languages, teacher assessment of children’s socio-emotional development and video observations with children (aim 3). Translanguaging, the main topic of our 22 hour PD course (June – December 2019), is the use of a full linguistic repertoire to make meaning (Otheguy, García, & Reid, 2015). In eight sessions, we explore multilingual ecology, parental involvement, and oracy and early literacy. We will present preliminary findings of the focus groups with teachers and tests in early literacy and numeracy in children’s home and school languages. Challenges and opportunities that emerged during the course will be explored as well. [less ▲]

Detailed reference viewed: 65 (2 UL)
Full Text
Peer Reviewed
See detailDreaming of Constructivist Technology Integration Strategies in Future Teacher Students
Reuter, Robert UL; Busana, Gilbert UL

Scientific Conference (2019, November 27)

Based on previous experiences in preparing future teachers for technology integration (Reuter & Busana, 2017), and based on the recommendations from Kolb’s (2017) Triple E framework about effective uses ... [more ▼]

Based on previous experiences in preparing future teachers for technology integration (Reuter & Busana, 2017), and based on the recommendations from Kolb’s (2017) Triple E framework about effective uses of ICT in education, we have adapted the Educational Technology course in our Initial Teacher Training. Over the years, we have indeed observed that, when given the choice of the type of technology integration strategies, many students designed ICT-based learning and teaching scenarios that implemented a rather teacher-centred teaching model (Roblyer & Doering, 2013). These scenarios were often far from innovative nor did they implement the disruptive potential of ICT in education (Christensen, Horn & Johnson, 2008). In the winter semester 2018-2019 we thus decided to ask our students to design and develop constructivist technology integration scenarios. We assessed the success of this adaptation with the help of our own observations, the semester reports produced by our students and their answers to an end-of-semester course evaluation. In general, we saw that students were able to design rather attractive constructivist learning activities. We also observed that our students were quite surprised that such activities do not require complicated and expensive tools, but that they can be implemented with standard productivity tools. [less ▲]

Detailed reference viewed: 37 (7 UL)
Full Text
Peer Reviewed
See detailA case study on the impact of masking moving objects on the camera pose regression with CNNs
Cimarelli, Claudio UL; Cazzato, Dario UL; Olivares Mendez, Miguel Angel UL et al

in 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (2019, November 25)

Robot self-localization is essential for operating autonomously in open environments. When cameras are the main source of information for retrieving the pose, numerous challenges are posed by the presence ... [more ▼]

Robot self-localization is essential for operating autonomously in open environments. When cameras are the main source of information for retrieving the pose, numerous challenges are posed by the presence of dynamic objects, due to occlusion and continuous changes in the appearance. Recent research on global localization methods focused on using a single (or multiple) Convolutional Neural Network (CNN) to estimate the 6 Degrees of Freedom (6-DoF) pose directly from a monocular camera image. In contrast with the classical approaches using engineered feature detector, CNNs are usually more robust to environmental changes in light and to occlusions in outdoor scenarios. This paper contains an attempt to empirically demonstrate the ability of CNNs to ignore dynamic elements, such as pedestrians or cars, through learning. For this purpose, we pre-process a dataset for pose localization with an object segmentation network, masking potentially moving objects. Hence, we compare the pose regression CNN trained and/or tested on the set of masked images and the original one. Experimental results show that the performances of the two training approaches are similar, with a slight reduction of the error when hiding occluding objects from the views. [less ▲]

Detailed reference viewed: 11 (4 UL)
Full Text
Peer Reviewed
See detailAu-delà du cours magistral: Vers des apprentissages autonomes et collaboratifs basés sur de « grandes questions »
Busana, Gilbert UL; Reuter, Robert UL

Scientific Conference (2019, November 22)

Nous enseignions depuis quelques années un cours de première année sur "l'éducation à l'ère numérique", dans la formation initiale des futur-e-s enseignant-e-s du fondamental, sous forme d’un cours ... [more ▼]

Nous enseignions depuis quelques années un cours de première année sur "l'éducation à l'ère numérique", dans la formation initiale des futur-e-s enseignant-e-s du fondamental, sous forme d’un cours magistral afin de véhiculer certaines connaissances théoriques et pratiques dans ce domaine. Cependant, nous avons observé au cours des dernières années que (1) de nombreux étudiants échouaient à l'examen et que (2) beaucoup d'entre eux, lorsqu'ils étaient en 4e année, avaient oublié la plupart des fondements. Ces considérations nous ont amenés à repenser et à remanier nos méthodes d'enseignement et notre façon d'évaluer les résultats d'apprentissage des étudiant-e-s. Après une première implémentation de notre nouvelle approche pédagogique combinant diverses méthodes actives d'apprentissage au semestre d’hiver 2018 (décrite et réfléchie dans Reuter & Busana, 2018), nous avons effectué quelques modifications basées (a) sur nos propres observations et réflexions ainsi que (b) sur les commentaires des étudiant-e-s tirées de l’évaluation du cours (organisée par notre université). Dès à présent, plutôt que de les faire travailler sur de « grandes questions » (c.-à-d. des questions pour lesquelles il n'y a pas de réponses simples et faciles à consulter) au cours des séances en présentiel, nous demandons maintenant à nos étudiant-e-s (1) de construire individuellement des connaissances en amont du séminaire sur base de ressources fournies ou tirés de recherches bibliographiques autonomes ; (2) de les présenter, discuter et développer de manière collaborative en petits groupes pendant les séminaires ; puis (3) de les partager et discuter avec nous et leurs pairs et finalement (4) de les conserver dans un portfolio numérique personnel. L’évaluation des apprentissages des étudiant-e-s est effectuée à l’aide de ce portfolio numérique en fin de semestre. [less ▲]

Detailed reference viewed: 85 (7 UL)
Peer Reviewed
See detailDie Entstehung einer Hauptstadtregion als deutsch-belgische Beziehungsgeschichte
Brüll, Christoph UL

Scientific Conference (2019, November 22)

Vom 14. Mai - 23. Juli und vom 19. September - 31.Oktober 1972 fand zunächst im Kölner Museum Schnütgen und dann in den Brüsseler Musées Royaux d’Art et d’Histoire die bis heute größte Schau rheinisch ... [more ▼]

Vom 14. Mai - 23. Juli und vom 19. September - 31.Oktober 1972 fand zunächst im Kölner Museum Schnütgen und dann in den Brüsseler Musées Royaux d’Art et d’Histoire die bis heute größte Schau rheinisch-maasländischer Kunst statt. Unter dem Titel „Rhein und Maas. Kunst und Kultur 800-1400“ wurde sie zu einem großen Publikumserfolg, der auch in der Scientific Community der Kunsthistoriker einige Aufmerksamkeit erregte. Die Entstehung der Ausstellung sagt einiges über die Geschichte der Wissenschaftsbeziehungen zwischen Deutschland und Belgien seit 1945 aus, aber auch, so die Ausgangshypothese meines Beitrags, über die Veränderungen der in Belgien vorherrschenden Mental Maps von Deutschland seit der Verlagerung des politischen Schwerpunktes an den Rhein mit der Gründung der Bundesrepublik. Der belgische Deutschlanddiskurs knüpfte dabei durchaus an bereits bestehende Deutschlandbilder an, die gerade das Maasland als Zwischenraum inszenierten , doch kam durch das Zusammenrücken der westeuropäischen Länder im Zuge von Kaltem Krieg und beginnender europäischer Integration, gerade auch unter dem Signum des Abendlandes, eine neue Dimension ins Spiel. Mentalitätsgeschichtlich hob die rheinische Bonner Republik die durch den Ersten Weltkrieg hervorgerufene Distanz zwischen dem belgischen Staat und (West-)Deutschland auf, politikgeschichtlich fanden deutsche und belgische „Suche nach Sicherheit“ (E. Conze) ein enges Kooperationsfeld. Zum Zentrum der belgischen Aktivität im Rheinland wurde Köln, das nach dem durch die Wahl als Regierungssitz notwendig gewordenen Verlassen Bonns durch die belgischen Truppen in Deutschland 1950 zu deren neuem Hauptquartier wurde. Dort etablierte sich zudem rasch das Belgische Haus als Drehscheibe für politischen, konsularischen, aber auch kulturellen Austausch. Die Ausstellung „Rhein und Maas“ dient als Aufhänger für den Beitrag, der sowohl das Ende einer langen Nachkriegszeit als auch das Ankommen Belgiens in der Bonner Republik herausstellen kann. Auch die Anfang der 1970er Jahre erfolgten ersten gegenseitigen Staatsbesuche geben Aufschluss über Inszenierung und Wahrnehmung der Hauptstadtregion. Der Beitrag wirft somit eine beziehungsgeschichtliche Perspektive auf Bonn-Köln-Düsseldorf zwischen 1949 und den 1970er Jahren und fragt mit Bezug auf die Hauptstadtregion auf die belgische(n) Wahrnehmung(en) des Rheinischen, aber auch nach Rückwirkungen auf Brüssel als belgischer und europäischer Hauptstadt. [less ▲]

Detailed reference viewed: 73 (0 UL)
Full Text
See detailToward fluid-structure-piezoelectric simulations applied to flow-induced energy harvesters
Hoareau, Christophe UL; Shang, Lan UL; Zilian, Andreas UL

Poster (2019, November 15)

The subject deals with the simulation of flow-induced energy harvesters. We focus in particular on the modelling of autonomous piezo-ceramic power generators to convert ambient fluid-flow energy into ... [more ▼]

The subject deals with the simulation of flow-induced energy harvesters. We focus in particular on the modelling of autonomous piezo-ceramic power generators to convert ambient fluid-flow energy into electrical energy. The vibrations of an immersed electromechanical structure with large amplitude have to be taken into account in that case. One challenge consists in modelling and predicting the nonlinear coupled dynamic behaviour for the improved design of such devices. The set of governing equations is expressed in integral form, using the method of weighted residuals, and discretized with finite elements using the open source package FEniCS. Preliminary results of separated problems using FEniCS will be detailed and discussed (e.g. Navier-Stokes with or without moving meshes, nonlinear elasticity, aeroelasticity and electromechanical coupling). The objective is to validate each problem independently before coupling all the phenomena in a monolithic framework. Those simulations involve nonlinearities at many levels of modeling. The perspective of using reduced order models to limit the computational cost (in time and memory) will be discussed in an outlook to this work. [less ▲]

Detailed reference viewed: 9 (3 UL)
Full Text
Peer Reviewed
See detailA professional development course in translanguaging: Teachers’ stance, design, and shifts
Aleksic, Gabrijela UL

Scientific Conference (2019, November 14)

The school population in Luxembourg is highly socially, culturally, and linguistically diverse. The new law in 2017 has declared multilingual early education mandatory, with the focus not only on the ... [more ▼]

The school population in Luxembourg is highly socially, culturally, and linguistically diverse. The new law in 2017 has declared multilingual early education mandatory, with the focus not only on the development of Luxemburgish, but also familiarizing children with French and valuing their home languages. Thus, our project aims to: (1) offer a professional development (PD) course in translanguaging to preschool teachers, (2) involve children’s families to reinforce home-school collaboration, and (3) foster children’s cognitive, linguistic, and socio-emotional engagement in the classroom. With teachers, we use focus groups, questionnaires, and language portraits, with parents, we employ questionnaires and interviews, and with children, a test in early literacy and numeracy in school and home language and video observations. Translanguaging is the use of a full linguistic repertoire to make meaning (Otheguy, García, & Reid, 2015). Translanguaging pedagogy is the main topic of our 22 hour PD course (June – December 2019) for 40 teachers. In the focus groups, the teachers shared their negative translanguaging stance towards the use of children’s home languages in the classroom, convinced that it hindered the development of Luxembourgish. Teachers, however, in some instances incorporated a translanguaging design (e.g. multilingual stories, morning greetings) and translanguaging shift (e.g. translations by older children). The project addresses these negative translanguaging stances through practical activities and a close collaboration with parents, children and organisational stakeholders. The preliminary results from parent questionnaires and tests with children will provide a bigger picture of the effect of translanguaging pedagogy from our PD course on all the actors involved. References Otheguy, R., García, O., & Reid, W. (2015). Clarifying translanguaging and deconstructing named languages: A perspective from linguistics. Applied Linguistic Review, 6(3), 281–307. [less ▲]

Detailed reference viewed: 70 (2 UL)
Full Text
Peer Reviewed
See detailPost-collusion security and distance bounding
Mauw, Sjouke UL; Smith, Zachary Daniel UL; Trujillo Rasua, Rolando UL et al

in Post-collusion security and distance bounding (2019, November 11)

Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat ... [more ▼]

Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat some security goals, without revealing their long-term secrets. We develop a model based on multiset rewriting to reason about collusion in security protocols. We introduce the notion of postcollusion security, which verifies security properties claimed in sessions initiated after collusion occurred. We use post-collusion security to analyse terrorist fraud on protocols for securing physical proximity, known as distance-bounding protocols. In a terrorist fraud attack, agents collude to falsely prove proximity, whilst no further false proximity proof can be issued without further collusion. Our definitions and the Tamarin prover are used to develop a modular framework for verification of distance-bounding protocols that accounts for all types of attack from literature. We perform a survey of over 25 protocols, which include industrial protocols such as Mastercard’s contactless payment PayPass and NXP’s MIFARE Plus with proximity check. For the industrial protocols we confirm attacks, propose fixes, and deliver computer-verifiable security proofs of the repaired versions [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailPOSTER: Traffic Splitting to Counter Website Fingerprinting
de La Cadena Ramos, Augusto Wladimir UL; Mitseva, Asya UL; Pennekamp, Jan et al

Poster (2019, November 11)

Detailed reference viewed: 43 (4 UL)
Peer Reviewed
See detailThe 2004 Afghan Constitution and Islam Merits and Challenges
Al Hajjaji, Shams Al Din UL

Scientific Conference (2019, November 11)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailWorkplace bullying exposure and subjective well-being – The mediating role of the frustration of the need for relatedness. A longitudinal six-wave study
Sischka, Philipp UL; Steffgen, Georges UL

Scientific Conference (2019, November 08)

Workplace bullying is a serious phenomenon that has serious detrimental effects on victim’s health, attitudes, and work-related behavior. Drawing on self-determination theory, we propose that bullying ... [more ▼]

Workplace bullying is a serious phenomenon that has serious detrimental effects on victim’s health, attitudes, and work-related behavior. Drawing on self-determination theory, we propose that bullying exposure thwarts employee’s need for relatedness with the result of decreased well-being. Studies examining these mechanisms used either a cross-sectional design (Trépanier et al., 2013) or a longitudinal design with (not theoretically justified) long time intervals (i.e., 12-month time lag; Trépanier et al., 2015). Therefore, the aim of our study was to test this mediation in a longitudinal design with much shorter time intervals (i.e. monthly), whether to see if the bullying exposure also shows short-term effects on well-being. A six-wave online survey design with monthly time lag was employed and data were collected among U.S. employees. The sample consists of 1,595 respondents (55.8% females, n=890, ageM = 36.9, ageSD =10.3). Workplace bullying exposure was assessed with the S-NAQ (Notelaers et al., 2018), frustration of the need for relatedness with the Psychological Needs Thwarting Scale (Bartholomew et al., 2011) and well-being with the WHO-5 well-being-index (Topp et al., 2015). Cross-lagged mediation analysis within a structural equation modeling framework confirmed the mediation model: Bullying exposure was significantly related to a change in frustration of relatedness and frustration of relatedness was significantly related to a change in well-being across all waves. The study findings advance the field through showing that bullying exposure has not only a long-term effect on well-being but also a short one, and that this effect is mediated through the frustration of relatedness. [less ▲]

Detailed reference viewed: 9 (2 UL)
Peer Reviewed
See detailSimilarities and differences of value-added scores from models with different covariates: A cluster analysis
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 51 (4 UL)
See detailDimensional and Social Comparison Effects on Domain-Specific Academic Self-Concepts and Interests with First- and Third-Grade Students
van der Westhuizen, Lindie UL; Arens, Katrin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Academic self-concepts (ASCs) are self-perceptions of one’s own academic abilities. The internal/external frame of reference (I/E) model (Marsh, 1986) explains the formation of domain-specific ASCs ... [more ▼]

Academic self-concepts (ASCs) are self-perceptions of one’s own academic abilities. The internal/external frame of reference (I/E) model (Marsh, 1986) explains the formation of domain-specific ASCs through a combination of social (i.e. comparing one’s achievement in one domain with the achievement of others in the same domain) and dimensional (i.e. comparing one’s achievement in one domain with one’s achievement in another domain) comparisons. This results into positive achievement-self-concept relations within the math and verbal domains, but into negative achievement-self-concept relations across these domains. The generalized internal/external frame of reference (GI/E) model (Möller, Müller-Kalthoff, Helm, Nagy, & Marsh, 2015) extends the I/E model to the formation of other domain-specific academic self-beliefs such as interest. Research on the validity of the (G)I/E model for elementary school children is limited, especially for first-graders. This study examined the associations between verbal and math achievement and corresponding domain-specific self-concepts and interests for first-graders and third-graders. Two fully representative Luxembourgish first-grader cohorts and two fully representative third-graders cohorts (N=21,192) were used. The analyses were based on structural equation modeling. The findings fully supported the (G)I/E model for third-graders: Achievement was positively related to self-concept and interest within matching domains. Negative relations were found between achievement and self-concept and between achievement and interest across domains. For first-graders, achievement was positively related to self-concept and interest within matching domains. However, the majority of cross-domain relations were non-significant, except for the negative path between math achievement and verbal interest. Hence, while the formation of domain-specific ASCs and interests seem to rely on social and dimensional comparisons for third-graders, only social comparisons seem to be in operation for first-graders. Gender and cohort invariance was established for both grade levels. The findings are discussed within the framework of ASC differentiation and dimensional comparison theory applied to elementary school students. [less ▲]

Detailed reference viewed: 52 (1 UL)