References of "Paper published in a book"
     in
Bookmark and Share    
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 99 (11 UL)
Full Text
Peer Reviewed
See detailMind the gap: Robotic Mission Planning Meets Software Engineering
Askarpour, Mehrnoosh; Menghi, Claudio UL; Belli, Gabriele et al

in Proceedings of the 8th International Conference on Formal Methods in Software Engineering (in press)

In the context of robotic software, the selection of an appropriate planner is one of the most crucial software engineering decisions. Robot planners aim at computing plans (i.e., blueprint of actions) to ... [more ▼]

In the context of robotic software, the selection of an appropriate planner is one of the most crucial software engineering decisions. Robot planners aim at computing plans (i.e., blueprint of actions) to accomplish a complex mission. While many planners have been proposed in the robotics literature, they are usually evaluated on showcase examples, making hard to understand whether they can be effectively (re)used for realising complex missions, with heterogeneous robots, and in real-world scenarios. In this paper we propose ENFORCE, a framework which allows wrapping FM-based planners into comprehensive software engineering tools, and considers complex robotic missions. ENFORCE relies on (i) realistic maps (e.g, fire escape maps) that describe the environment in which the robots are deployed; (ii) temporal logic for mission specification; and (iii) Uppaal model checker to compute plans that satisfy mission specifications. We evaluated ENFORCE by analyzing how it supports computing plans in real case scenarios, and by evaluating the generated plans in simulated and real environments. The results show that while ENFORCE is adequate for handling single-robot applications, the state explosion still represents a major barrier for reusing existing planners in multi-robot applications. [less ▲]

Detailed reference viewed: 175 (10 UL)
Full Text
Peer Reviewed
See detailMajorization-Minimization Algorithms for Analog Beamforming with Large-Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 7th IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2019 (in press)

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly ... [more ▼]

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly increases the number of required radio-frequency (RF) chains, which may be prohibitive. Thus, analog beamforming based on a phase-shifting network driven by a variable gain amplifier (VGA) is a potential alternative technology. In this paper, we cast the beamforming vector design problem as a beampattern matching problem, with an unknown power gain. This is formulated as a unit-modulus least-squares (ULS) problem where the optimal gain of the VGA is also designed in addition to the beamforming vector. We also consider a scenario where the receivers have the additional processing capability to adjust the phases of the incoming signals to mitigate specular multipath components. We propose efficient majorization-minimization (MM) based algorithms with convergence guarantees to a stationary point for solving both variants of the proposed ULS problem. Numerical results verify the effectiveness of the proposed solution in comparison with the existing state-of-the-art techniques. [less ▲]

Detailed reference viewed: 200 (40 UL)
Full Text
Peer Reviewed
See detailWhich Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography
Rossi, Arianna UL; Lenzini, Gabriele UL

in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (in press)

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this ... [more ▼]

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this paper, we firstly critically review some of those proposals. We then examine the properties that icons and icon sets should arguably fulfill according to Art.12's transparency provisions. Lastly, we discuss metrics and evaluation procedures to measure compliance with the Article. [less ▲]

Detailed reference viewed: 90 (9 UL)
Full Text
Peer Reviewed
See detailGoal-Directed Decision Procedures for Input/Output Logics
Steen, Alexander UL

in Marra, Alessandra; Liu, Fenrong; Portner, Paul (Eds.) et al Deontic Logic and Normative Systems: 15th International Conference (DEON2020/2021, Munich) (in press)

Input/Output (I/O) logics address the abstract study of conditional norms. Here, norms are represented as pairs of formulas instead of statements that themselves carry truth-values. I/O logics have been ... [more ▼]

Input/Output (I/O) logics address the abstract study of conditional norms. Here, norms are represented as pairs of formulas instead of statements that themselves carry truth-values. I/O logics have been studied thoroughly in the past, including further applications and refinements. In this paper, a class of automated reasoning procedures is presented that, given a set of norms and a concrete situation, decide whether a specific state of affairs is obligatory according to the output operations of I/O logics. The procedures are parametric in the underlying logical formalism and can be instantiated with different classical objects logics, such as propositional logic or first-order logic. The procedures are shown to be correct, and a proof-of-concept implementation for propositional I/O logics is surveyed. [less ▲]

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 161 (7 UL)
Full Text
Peer Reviewed
See detailFlipping Geometric Triangulations on Hyperbolic Surfaces
Despré, vincent; Schlenker, Jean-Marc UL; Teillaud, Monique

in symposium on computational geometry (SoCG) (in press)

We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with ... [more ▼]

We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with fixed vertices of a flat torus or a closed hyperbolic surface is connected. We give upper bounds on the number of edge flips that are necessary to transform any geometric triangulation on such a surface into a Delaunay triangulation. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailMM-Based Solution for Partially Connected Hybrid Transceivers with Large Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 2019 IEEE Global Communications Conference (GLOBECOM) (in press)

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost ... [more ▼]

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost. In a hybrid analog-digital (A/D) transceiver, the pre/post-processing operation splits into a lower-dimensional baseband (BB) pre/postcoder, followed by a network of analog phase shifters. Primarily two kinds of hybrid architectures are proposed in the literature to implement hybrid transceivers namely, the fully-connected and the partially-connected. Implementation of fully-connected architecture has higher hardware complexity, cost and power consumption in comparison with partially-connected. In this paper, we focus on partially-connected hybrid architecture and develop a low-complexity algorithm for transceiver design for a single user point-to-point mmWave MIMO system. The proposed algorithm utilizes the variable elimination (projection) and the minorization-maximization (MM) frameworks and has convergence guarantees to a stationary point. Simulation results demonstrate that the proposed algorithm is easily scalable for LSAA systems and achieves significantly improved performance in terms of the spectral efficiency (SE) of the system compared to the state-of-the-art solution. [less ▲]

Detailed reference viewed: 70 (16 UL)
Full Text
Peer Reviewed
See detailConservazione e ricezione dei documenti pontifici in Italia settentrionale: il caso del monastero cistercense di Chiaravalle Milanese (secoli XII-XVI)
Salemme, Timothy UL

in Salemme, Timothy; Renault, Jean-Baptiste (Eds.) Conservation et réception des documents pontificaux par les Ordres religieux (XIe-XVe siècles). Actes du colloque international. Nancy, 12-13 décembre 2013 (in press)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 144 (5 UL)
Full Text
Peer Reviewed
See detailBlockchain Governance: An Overview and Prediction of Optimal Strategies Using Nash Equilibrium
Khan, Nida UL; Ahmad, Tabrez; Patel, Anass et al

in 3rd AUE International Research Conference (in press)

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this ... [more ▼]

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this nascent technology. In this paper, the position of blockchain governance within the hierarchy of Institutional governance is discussed. Blockchain governance is analyzed from the perspective of IT governance using Nash equilibrium to predict the outcome of different governance decisions. A payoff matrix for blockchain governance is created and simulation of different strategy profiles is accomplished for computation of all Nash equilibria. We also create payoff matrices for different kinds of blockchain governance, which were used to propose novel mathematical formulae usable to predict the best governance strategy that minimizes the occurrence of a hard fork as well as predicts the behavior of the majority during protocol updates. [less ▲]

Detailed reference viewed: 175 (13 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 119 (0 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 410 (10 UL)
Full Text
Peer Reviewed
See detailLes archevêques de Milan face aux premières expériences seigneuriales: stratégies et positionnements (milieu XIIIe-début XIVe s.)
Salemme, Timothy UL

in Barralis, Christine (Ed.) L’évêque face à son métier. Actes du colloque international, Metz. 15-17 novembre 2017 (in press)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 57 (6 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband DSRI-Herbstakademie 2020 (in press)

Im Berichtszeitraum dieses Updates rief die OECD zu einem zweiten Öffentlichkeitsbetei-ligungsverfahren auf und erarbeitete einen präziseren Lösungsansatz zur Besteuerung digitalisierter Geschäftsmodelle ... [more ▼]

Im Berichtszeitraum dieses Updates rief die OECD zu einem zweiten Öffentlichkeitsbetei-ligungsverfahren auf und erarbeitete einen präziseren Lösungsansatz zur Besteuerung digitalisierter Geschäftsmodelle, der in einer Veröffentlichung im Januar 2020 vorgestellt wurde. Auf Ebene der Europäischen Union gab es im Berichtszeitraum keine Weiterent-wicklung der Richtlinienvorschläge zu einer Digitalsteuer und dem Konzept der „signifi-kanten digitalen Präsenz“. Der EuGH urteilte am 3. März 2020 in Hinblick auf die unions-rechtliche Vereinbarkeit zweier ungarischer Umsatzsteuern. Dieses Urteil erlaubt erste Rückschlüsse bezüglich der Europarechtskonformität umsatzbasierter Steuern, wie bspw. auch im Berichtszeitraum eingeführte Digitalsteuern einzelner Mitgliedstaaten. Dieser Beitrag knüpft an die Vorträge von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademien 2018 in Bochum und 2019 in Oldenburg, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailLeveraging Natural-language Requirements for Deriving Better Acceptance Criteria from Models
Veizaga Campero, Alvaro Mario UL; Alferez, Mauricio UL; Torre, Damiano UL et al

in Proceedings of 23rd ACM / IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS) (in press)

In many software and systems development projects, analysts specify requirements using a combination of modeling and natural language (NL). In such situations, systematic acceptance testing poses a ... [more ▼]

In many software and systems development projects, analysts specify requirements using a combination of modeling and natural language (NL). In such situations, systematic acceptance testing poses a challenge because defining the acceptance criteria (AC) to be met by the system under test has to account not only for the information in the (requirements) model but also that in the NL requirements. In other words, neither models nor NL requirements per se provide a complete picture of the information content relevant to AC. Our work in this paper is prompted by the observation that a reconciliation of the information content in NL requirements and models is necessary for obtaining precise AC. We perform such reconciliation by devising an approach that automatically extracts AC-related information from NL requirements and helps modelers enrich their model with the extracted information. An existing AC derivation technique is then applied to the model that has now been enriched by the information extracted from NL requirements. Using a real case study from the financial domain, we evaluate the usefulness of the AC-related model enrichments recommended by our approach. Our evaluation results are very promising: Over our case study system, a group of five domain experts found 89% of the recommended enrichments relevant to AC and yet absent from the original model (precision of 89%). Furthermore, the experts could not pinpoint any additional information in the NL requirements which was relevant to AC but which had not already been brought to their attention by our approach (recall of 100%) [less ▲]

Detailed reference viewed: 128 (11 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 80 (0 UL)
Full Text
Peer Reviewed
See detailUML Consistency Rules:a Case Study with Open-Source UML Models
Torre, Damiano UL; Labiche, Yvan; Genero, Marcela et al

in Proceedings of the 8th International Conference on Formal Methods in Software Engineering (in press)

UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by ... [more ▼]

UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by software designers. Since the various UML diagram types describe different aspects of a software system, they are not independent but strongly depend on each other, hence they must be consistent. Inconsistencies cause faults in the final software systems. It is, therefore, paramount that they get detected, analyzed, and fixed. Consistency rules are a useful tool proposed in the literature to detect inconsistencies. They categorize constraints that help in identifying inconsistencies when violated. This case study aims at collecting and analyzing UML models with OCL consistency rules proposed in the literature and at promoting the development of a reference benchmark that can be reused by the (FM-)research community. We collected 33 UML consistency rules and 206 different UML diagrams contained in 34 open-source UML models presented in the literature. We propose an FM-based encoding of the consistency rules in OCL. This encoding allows analyzing whether the consistency rules are satisfied or violated within the 34 UML models. To assess the proposed benchmark, we analyzed how the UML models, consistency rules, diagram types contained in the benchmark help in assessing the consistency of UML models, and the consistency of diagrams across the different software development phases. Our results show that the considered UML models and consistency rules allowed identifying 2731 inconsistencies and that those inconsistencies refer to different software development phases. We concluded that the considered UML models and consistency rules could be considered as an initial benchmark that can be further extended by the research community. [less ▲]

Detailed reference viewed: 158 (16 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 88 (12 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Precoding Design for Satellite Systems
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 37th International Communications Satellite Systems Conference (ICSSC'19) (in press)

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then ... [more ▼]

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then considers an efficient implementation of the massive MIMO transmission through the use of hybrid analog/digital precoder. Efficient algorithmic solutions are proposed for the partially connected precoder architecture which enables efficiency in power/ hardware complexity and its performance evaluated. [less ▲]

Detailed reference viewed: 88 (22 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 97 (3 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 214 (6 UL)
Full Text
Peer Reviewed
See detailProcess analysis in thermal process engineering with high-performance computing using the example of grate firing
Peters, Bernhard UL; Rousset, Alban UL; Besseron, Xavier UL et al

in Process analysis in thermal process engineering with high- performance computing using the example of grate firing (in press)

Biomass as a renewable energy source continues to grow in popularity to reduce fossil fuel consumption for environmental and economic benefits. In the present contribution, the combustion chamber of a 16 ... [more ▼]

Biomass as a renewable energy source continues to grow in popularity to reduce fossil fuel consumption for environmental and economic benefits. In the present contribution, the combustion chamber of a 16 MW geothermal steam super-heater, which is part of the Enel Green Power "Cornia 2" power plant, is being investigated with high-performance computing methods. For this purpose, the extended discrete element method (XDEM) developed at the University of Luxembourg is used in a high-performance computing environment, which includes both the moving wooden bed and the combustion chamber above it. The XDEM simulation platform is based on a hybrid four-way coupling between the Discrete Element Method (DEM) and Computational Fluid Dynamics (CFD). In this approach, particles are treated as discrete elements that are coupled by heat, mass, and momentum transfer to the surrounding gas as a continuous phase. For individual wood particles, besides the equations of motion, the differential conservation equations for mass, heat, and momentum are solved, which describe the thermodynamic state during thermal conversion. The consistency of the numerical results with the actual system performance is discussed in this paper to determine the potentials and limitations of the approach. [less ▲]

Detailed reference viewed: 70 (6 UL)
Full Text
Peer Reviewed
See detailAn AI-assisted Approach for Checking the Completeness of Privacy Policies Against GDPR
Torre, Damiano UL; Abualhaija, Sallam UL; Sabetzadeh, Mehrdad UL et al

in in Proceedings of the 28th IEEE International Requirements Engineering Conference (RE’20) (in press)

Detailed reference viewed: 215 (24 UL)
Full Text
Peer Reviewed
See detailKant's supposed realism about things-in-themselves
Heidemann, Dietmar UL

in Serck-Hanssen, Camila (Ed.) Proceedings of the 13th International Kant Congress ‘The Court of Reason’ (Oslo, 6-9 August 2019) (2021)

Detailed reference viewed: 84 (0 UL)
Full Text
Peer Reviewed
See detailBuilding up Explainability in Multi-layer Perceptrons for Credit Risk Modeling
Sharma, Rudrani; Schommer, Christoph UL; Vivarelli, Nicolas

in Sharma, Rudrani (Ed.) Building up Explainability in Multi-layer Perceptrons for Credit Risk Modeling (2020, October 09)

Granting loans is one of the major concerns of financial institutions due to the risks of default borrowers. Default prediction by the neural networks is a popular technique for credit risk modeling ... [more ▼]

Granting loans is one of the major concerns of financial institutions due to the risks of default borrowers. Default prediction by the neural networks is a popular technique for credit risk modeling. Neural networks generally offer the accurate predictions that help banks to prevent financial losses and grow their business by approving more creditworthy borrowers. Although neural networks are capable of capturing the complex, non-linear relationships between a large number of features and output, these models act as black boxes. This is a graduation project paper that is focused on loan default risk prediction by multi-layer perceptron neural network and building up explainability to some degree in the trained neural networks through sensitivity analysis. The architecture of a multi-layer perceptron neural network with the best result is used to help the credit-risk manager in explaining why an applicant is a defaulter or non-defaulter. The prediction of a trained multi-layer perceptron neural network is explained by mapping input features and target variables directly using a model-agnostic explanation as well as a modelspecific explanation. Lastly, a comparison is performed between two explanation methods. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detail3D SPARSE DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in 27th IEEE International Conference on Image Processing (ICIP 2020), Abu Dhabi 25-28 October 2020 (2020, October)

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailActive Re-identification Attacks on Periodically Released Dynamic Social Graphs
Chen, Xihui UL; Kepuska, Ema UL; Mauw, Sjouke UL et al

in Chen, Liqun; Li, Ninghui; Liang, Kaitai (Eds.) et al Computer Security - ESORICS 2020 (2020, September 13)

Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to enforce structural patterns that can be used to re-identify ... [more ▼]

Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to enforce structural patterns that can be used to re-identify legitimate users on published anonymised graphs, even without additional background knowledge. So far, this type of attacks has only been studied in the scenario where the inherently dynamic social graph is published once. In this paper, we present the first active re-identification attack in the more realistic scenario where a dynamic social graph is periodically published. Our new attack leverages tempo-structural patterns, created by a dynamic set of sybil nodes, for strengthening the adversary. We evaluate our new attack through a comprehensive set of experiments on real-life and synthetic dynamic social graphs. We show that our new attack substantially outperforms the most effective static active attack in the literature by increasing success probability by at least two times and efficiency by at least 11 times. Moreover, we show that, unlike the static attack, our new attack remains at the same level of efficiency as the publication process advances. Additionally, we conduct a study on the factors that may thwart our new attack, which can help design dynamic graph anonymisation methods displaying a better balance between privacy and utility. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailTrace-Checking Signal-based Temporal Properties: A Model-Driven Approach
Boufaied, Chaima UL; Menghi, Claudio UL; Bianculli, Domenico UL et al

in Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE ’20) (2020, September)

Signal-based temporal properties (SBTPs) characterize the behavior of a system when its inputs and outputs are signals over time; they are very common for the requirements specification of cyber-physical ... [more ▼]

Signal-based temporal properties (SBTPs) characterize the behavior of a system when its inputs and outputs are signals over time; they are very common for the requirements specification of cyber-physical systems. Although there exist several specification languages for expressing SBTPs, such languages either do not easily allow the specification of important types of properties (such as spike or oscillatory behaviors), or are not supported by (efficient) trace-checking procedures. In this paper, we propose SB-TemPsy, a novel model-driven trace-checking approach for SBTPs. SB-TemPsy provides (i) SB-TemPsy-DSL, a domain-specific language that allows the specification of SBTPs covering the most frequent requirement types in cyber-physical systems, and (ii) SB-TemPsy-Check, an efficient, model-driven trace-checking procedure. This procedure reduces the problem of checking an SB-TemPsy-DSL property over an execution trace to the problem of evaluating an Object Constraint Language constraint on a model of the execution trace. We evaluated our contributions by assessing the expressiveness of SB-TemPsy-DSL and the applicability of SB-TemPsy-Check using a representative industrial case study in the satellite domain. SB-TemPsy-DSL could express 97% of the requirements of our case study and SB-TemPsy-Check yielded a trace-checking verdict in 87% of the cases, with an average checking time of 48.7 s. From a practical standpoint and compared to state-of-the-art alternatives, our approach strikes a better trade-off between expressiveness and performance as it supports a large set of property types that can be checked, in most cases, within practical time limits. [less ▲]

Detailed reference viewed: 92 (7 UL)
Full Text
Peer Reviewed
See detailForest SaVR – A Virtual-Reality Application to Raise Awareness of Deforestation
Botev, Jean UL; Viegas Milani, Adriano

in Proceedings of the 17th GI VR/AR Workshop (VAR) (2020, September)

Detailed reference viewed: 90 (2 UL)
Full Text
Peer Reviewed
See detailDeepNDN: Opportunistic Data Replication and Caching in Support of Vehicular Named Data
Manzo, Gaetano; Kalogeiton, Eirini; di Maio, Antonio UL et al

in 21st IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2020, September)

Although many target applications in VANETs are information-centric, the performance of Named Data Networking (NDN) in vehicular ad-hoc networks is severely hampered by persistent network partitioning ... [more ▼]

Although many target applications in VANETs are information-centric, the performance of Named Data Networking (NDN) in vehicular ad-hoc networks is severely hampered by persistent network partitioning, typical of many vehicular scenarios. Existing approaches try to address this issue by relying on opportunistic communications. However, they leave open the crucial issue of how to guarantee content persistence and tight QoS levels while optimizing the resource utilization in the vehicular environment. In this work we propose DeepNDN, a communication scheme based on the joint application of NDN and of probabilistic spatial content caching, which enables content retrieval in fragmented and dynamic network topologies with tight delay constraints. We present a data-based approach to DeepNDN management, based on locally modulating content replication and delivery in order to achieve a target hit ratio in a resource-efficient manner. Our management algorithm employs a Convolutional Neural Network (CNN) architecture for effectively capturing the complex relations between spatio-temporal patterns of mobility and content requests and DeepNDN performance. Its numerical assessment in realistic, measurement-based scenarios suggest that our management approach achieves its target set goals while outperforming a set of reference schemes. [less ▲]

Detailed reference viewed: 94 (6 UL)
Full Text
Peer Reviewed
See detailAn Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder, Maria; Grassi, Lorenzo; Lüftenegger, Reinhard et al

in 26th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2020 (2020, August 16)

Detailed reference viewed: 71 (1 UL)
Full Text
Peer Reviewed
See detailAn Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Hu, Kai; Sun, Siwei; Wang, Meiqin et al

in 26th Annual International Conference on the Theory and Application of Cryptology and Information Security- ASIACRYPT 2020 (2020, August 16)

Detailed reference viewed: 78 (0 UL)
Full Text
Peer Reviewed
See detailSelf-Integration in Mediated-Reality Systems: a Socio-Technical Perspective
Botev, Jean UL

in Proceedings of the 1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS) (2020, August)

Detailed reference viewed: 73 (1 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Highlight paper)
Steen, Alexander UL; Benzmüller, Christoph UL

in Proceedings of the 24th European Conference on Artificial Intelligence (2020, August)

Leo-III is an effective automated theorem prover for extensional type theory with Henkin semantics. It is based on an extensional higher-order paramodulation calculus and supports reasoning in monomorphic ... [more ▼]

Leo-III is an effective automated theorem prover for extensional type theory with Henkin semantics. It is based on an extensional higher-order paramodulation calculus and supports reasoning in monomorphic and rank-1 polymorphic first-order and higher-order logics. Leo-III also automates various non-classical logics, including almost every normal higher-order modal logic. [less ▲]

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailOne-Bit Quantized Constructive Interference Based Precoding for Massive Multiuser MIMO Downlink
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Shahbazpanahi, Shahram UL et al

in One-Bit Quantized Constructive Interference Based Precoding for Massive Multiuser MIMO Downlink (2020, July 27)

We propose a one-bit symbol-level precoding method for massive multiuser multiple-input multiple-output (MU-MIMO) downlink systems using the idea of constructive interference (CI). In particular, we adopt ... [more ▼]

We propose a one-bit symbol-level precoding method for massive multiuser multiple-input multiple-output (MU-MIMO) downlink systems using the idea of constructive interference (CI). In particular, we adopt a max-min fair design criterion which aims to maximize the minimum instantaneous received signal-to-noise ratio (SNR) among the user equipments (UEs), while ensuring a CI constraint for each UE and under the restriction that the output of the precoder is a vector of binary elements. This design problem is an NP-hard binary quadratic programming due to the one-bit constraints on the elements of the precoder’s output vector, and hence, is difficult to solve. In this paper, we tackle this difficulty by reformulating the problem, in several steps, into an equivalent continuous-domain biconvex form. Our final biconvex reformulation is obtained via an exact penalty approach and can efficiently be solved using a standard block coordinate ascent algorithm. We show through simulation results that the proposed design outperforms the existing schemes in terms of (uncoded) bit error rate. It is further shown via numerical analysis that our solution algorithm is computationally-efficient as it needs only a few tens of iterations to converge in most practical scenarios. [less ▲]

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailAutomated Repair of Feature Interaction Failures in Automated Driving Systems
Ben Abdessalem, Raja; Panichella, Annibale; Nejati, Shiva UL et al

in Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020) (2020, July)

In the past years, several automated repair strategies have been proposed to fix bugs in individual software programs without any human intervention. There has been, however, little work on how automated ... [more ▼]

In the past years, several automated repair strategies have been proposed to fix bugs in individual software programs without any human intervention. There has been, however, little work on how automated repair techniques can resolve failures that arise at the system-level and are caused by undesired interactions among different system components or functions. Feature interaction failures are common in complex systems such as autonomous cars that are typically built as a composition of independent features (i.e., units of functionality). In this paper, we propose a repair technique to automatically resolve undesired feature interaction failures in automated driving systems (ADS) that lead to the violation of system safety requirements. Our repair strategy achieves its goal by (1) localizing faults spanning several lines of code, (2) simultaneously resolving multiple interaction failures caused by independent faults, (3) scaling repair strategies from the unit-level to the system-level, and (4) resolving failures based on their order of severity. We have evaluated our approach using two industrial ADS containing four features. Our results show that our repair strategy resolves the undesired interaction failures in these two systems in less than 16h and outperforms existing automated repair techniques. [less ▲]

Detailed reference viewed: 78 (10 UL)
Full Text
Peer Reviewed
See detailJoint User Scheduling, and Precoding for Multicast Spectral Efficiency in Multigroup Multicast Systems
Bandi, Ashok UL; Mysore Rama Rao, Bhavani Shankar UL; Chatzinotas, Symeon UL et al

in International conference on signal processing and communications (SPCOM) (2020, July)

This paper studies the joint design of user scheduling and precoding for the maximization of spectral efficiency (SE) for a multigroup multicast scenario in multiuser MISO downlink channels. Noticing that ... [more ▼]

This paper studies the joint design of user scheduling and precoding for the maximization of spectral efficiency (SE) for a multigroup multicast scenario in multiuser MISO downlink channels. Noticing that the existing definition of SE fails to account for group sizes, a new metric called multicast spectral efficiency (MC-SE) is proposed. In this context, the joint design is considered for the maximization of MC-SE. Firstly, with the help of binary scheduling variables, the joint design problem is formulated as a mixed-integer non-linear programming problem such that it facilitates the joint update of scheduling and precoding variables. Further, useful reformulations are proposed to reveal the hidden difference-of-convex/concave structure of the problem. Thereafter, we propose a convex-concave procedure based iterative algorithm with convergence guarantees to a stationary point. Finally, we compare different aspects namely MC-SE, SE and number of scheduled users through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 46 (1 UL)
Full Text
Peer Reviewed
See detailImmersive Telepresence Framework for Remote Educational Scenarios
Botev, Jean UL; Rodríguez Lera, Francisco J.

in Proceedings of the 22nd International Conference on Human-Computer Interaction (HCI International) (2020, July)

Detailed reference viewed: 27 (8 UL)
Full Text
Peer Reviewed
See detailDeveloping an Interactive Tabletop Mediated Activity to Induce Collaboration by Implementing Design Considerations Based on Cooperative Learning Principles
Sunnen, Patrick UL; Arend, Béatrice UL; Heuser, Svenja UL et al

in Stephanidis, Constantine; Antona, Margherita (Eds.) HCI International 2020 - Posters (2020, July)

Constructive collaboration can be a difficult matter. For this reason, we are implementing and studying an interactive-tabletop-mediated activity that aims at inducing collaboration among participants ... [more ▼]

Constructive collaboration can be a difficult matter. For this reason, we are implementing and studying an interactive-tabletop-mediated activity that aims at inducing collaboration among participants. The resulting activity ‘Orbitia’ is designed as a serious game. Participants are asked to act as a space- mining crew, which has to collect minerals with a rover and rely on a camera- drone for reconnaissance, while keeping the rover out of harm and managing limited resources. In this paper we provide an account of how we designed Orbitia’s pedagogical structuring by relying on the Johnsons’ cooperative learning approach whose fundamental concept is “positive interdependence”. More particularly, we show how we worked on resource, role and task inter- dependence to design three collaboration-inducing ‘flagship’ devices: the rover- steering-device (RSD), the item-locating-device (ILD) and the responsibility- activating-device (RAD). [less ▲]

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailPolitiques de synchronisation dans les systèmes multi-agents distribués parallèles
Rousset, Alban UL; Breugnot, Paul; Herrmann, Bénédicte et al

in Rousset, Alban (Ed.) Politiques de synchronisation dans les systèmes multi-agents distribués parallèles (2020, June 29)

Among simulation or modelisation methods, multi-agent systems are an interesting candidate to simulate complex systems. As the size of the model's increases, the use of parallel multi-agent systems is ... [more ▼]

Among simulation or modelisation methods, multi-agent systems are an interesting candidate to simulate complex systems. As the size of the model's increases, the use of parallel multi-agent systems is mandatory but comes with many issues. In this article, we are interested in the impact of synchronization on models design and on their execution. We highlight synchronization problems through model instances then we experimentally analyze the impact of synchronization on large scale test cases. [less ▲]

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailSupporting Citizens’ Political Decision-Making Using Information Visualisation
Graf, Vanessa; Graf-Drasch, Valerie; Tiefenbeck, Verena et al

in Proceedings of the 28th European Conference on Information Systems (ECIS) (2020, June 17)

Individual decision-making is a complex process. If carried out by individual citizens in the context of politically relevant decisions, serious consequences at all levels of a society might occur. That ... [more ▼]

Individual decision-making is a complex process. If carried out by individual citizens in the context of politically relevant decisions, serious consequences at all levels of a society might occur. That is why these decisions need to be made with care and preferably on a broad set of information to reflect citizens’ true preferences. However, due to limited attention, citizens often consider only salient aspects in their decision-making. To mitigate unwanted consequences following therefrom, citizens are in dire need of decision-support. We address this need by developing an Information Systems (IS) tool. Being based on information visualisation, our tool supports citizens by providing instant feedback. To ensure a meaningful engagement, the IS tool is designed according to gamification principles. A first instantiation in the context of renewable energy acceptance in Germany yields three key findings: First, we find indications that young, urban, and environmentally aware citizens are willing to accept a high percentage of renewable wind energy. Second, we find that the tool influences citizens’ decision-making. Third, we find citizens to update, however not completely turn over their preferred level of renewable wind energy after interaction with the tool. This holds true across different cross-sections of the population. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
See detailDiscovering Everyday Mathematical Situations Outside the Classroom with MathCityMap and GeoGebra 3D
Lavicza, Zsolt; Haas, Ben; Kreis, Yves UL

in Ludwig, Matthias; Jablonski, Simone; Caldeira, Amélia (Eds.) et al Research on Outdoor STEM Education in the digiTal Age: Proceedings of the ROSETA Online Conference in June 2020 (2020, June 10)

In elementary school, teaching and learning activities aim to develop, among others, students’ skills to acquire deeper understanding of their living environments. There are numerous opportunities for ... [more ▼]

In elementary school, teaching and learning activities aim to develop, among others, students’ skills to acquire deeper understanding of their living environments. There are numerous opportunities for students to recognize forms, shapes, and mathematical connections in everyday situations. These everyday situations can be simulated in classrooms; however, educational technologies offer new approaches to extend classroom activities, teachers can simulate and design shapes through Augmented Reality and 3D printing within or beyond the classroom. To stimulate students’ everyday mathematical connections utilizing these technologies could assist in developing activities outside the classroom in urban or in natural environments. Through this approach students could utilize or enhance their mathematical and technical skills within their usual living environments. Utilising educational software such as MathCityMap, GeoGebra 3D Calculator, and other 3D modelling software we developed examples of tasks that could offer easy transitions from in- to out-side of classrooms. In this paper, we will describe learning and teaching aims of these tasks and outline further research and development directions to broaden opportunities to develop students’ mathematical, design and modelling skills. [less ▲]

Detailed reference viewed: 95 (7 UL)
Full Text
Peer Reviewed
See detailToward an SDN-based Data Collection Scheme for Vehicular Fog Computing
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in IEEE International Conference on Communications ICC'2020 (2020, June 07)

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during ... [more ▼]

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during journeys. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a fully-programmable, self-configurable, and context-aware data collection scheme for VFC. This scheme leverages a stochastic model to dynamically estimate the number of fog stations to be deployed. Our simulation results demonstrate that our proposed scheme provides lower latency and higher resiliency compared to classical data collection schemes. [less ▲]

Detailed reference viewed: 113 (37 UL)
Full Text
Peer Reviewed
See detailA Novel Heap-based Pilot Assignment for Full Duplex Cell-Free Massive MIMO with Zero-Forcing
Nguyen, Van Hieu; Nguyen, van Dinh UL; Dobre, Octavia A. et al

in IEEE International Conference on Communications (2020, June 07)

This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD ... [more ▼]

This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD capability simultaneously serve numerous uplink and downlink user equipments (UEs) on the same time-frequency resources. To enable the incorporation of FD technology in CF-mMIMO systems, we propose a novel heapbased pilot assignment algorithm, which not only can mitigate the effects of pilot contamination but also reduce the involved computational complexity. Then, we formulate a robust design problem for spectral efficiency (SE) maximization in which the power control and AP-UE association are jointly optimized, resulting in a difficult mixed-integer nonconvex programming. To solve this problem, we derive a more tractable problem before developing a very simple iterative algorithm based on inner approximation method with polynomial computational complexity. Numerical results show that our proposed methods with realistic parameters significantly outperform the existing approaches in terms of the quality of channel estimate and SE. [less ▲]

Detailed reference viewed: 109 (29 UL)
Full Text
Peer Reviewed
See detailEnhancing CoAP Group Communication to Support mMTC Over Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Stemper, André UL et al

in IEEE International Conference on Communications (ICC) (2020, June)

Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served ... [more ▼]

Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served areas, where several services can benefit from the adoption of a group communication model. The IETF has specifically standardized the usage of CoAP group communication. However, CoAP responses are still sent in unicast from each single CoAP server to the CoAP client, which results in a substantial traffic load. Such problem becomes more severe in integrated IoT-Satellite networks given the limited bandwidth of the satellite return channel and the large number of IoT devices in a mMTC scenario. To reduce network traffic overhead in group communication and improve the network responsiveness, this paper proposes an aggregation scheme for the CoAP group communication in combination with Observer pattern and proxying. Results obtained by using the openSAND emulator and CoAPthon library corroborate the merit of our optimization in terms of overhead reduction and delay. [less ▲]

Detailed reference viewed: 120 (6 UL)
Full Text
Peer Reviewed
See detailGOING DEEPER WITH NEURAL NETWORKS WITHOUT SKIP CONNECTIONS
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing (ICIP 2020), Abu Dhabi, UAE, Oct 25–28, 2020 (2020, May 30)

Detailed reference viewed: 69 (4 UL)
Full Text
Peer Reviewed
See detailSecurity and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor
Mitseva, Asya UL; Aleksandrova, Marharyta UL; Engel, Thomas UL et al

in Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor (2020, May)

Detailed reference viewed: 58 (6 UL)
Full Text
Peer Reviewed
See detailProceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020)
Danoy, Grégoire UL; Pang, Jun UL; Sutcliffe

in 6th Global Conference on Artificial Intelligence (2020, May)

Detailed reference viewed: 93 (8 UL)
Full Text
Peer Reviewed
See detailDeep Learning for Beam Hopping in Multibeam Satellite Systems
Lei, Lei UL; Lagunas, Eva UL; Yuan, Yaxiong UL et al

in IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Detailed reference viewed: 132 (27 UL)
Full Text
Peer Reviewed
See detailSDN-based Misbehavior Detection System for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing ... [more ▼]

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing misbehavior detection systems are static and do not adapt to the context of vehicles. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a context-aware MDS. Based on the context, our proposed system can tune security parameters to provide accurate detection with low false positives. Our system is Sybil attack-resistant and compliant with vehicular privacy standards. The simulation results show that, under different contexts, our system provides a high detection ratio and low false positives compared to a static MDS. [less ▲]

Detailed reference viewed: 142 (24 UL)
Full Text
Peer Reviewed
See detailOn the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs
Liu, Kui UL; Wang, Shangwen; Koyuncu, Anil UL et al

in 42nd ACM/IEEE International Conference on Software Engineering (ICSE) (2020, May)

Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but ... [more ▼]

Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but affordable, approximation to program specifications. Although the literature regularly sets new records on the number of benchmark bugs that can be fixed, several studies increasingly raise concerns about the limitations and biases of state-of-the-art approaches. For example, the correctness of generated patches has been questioned in a number of studies, while other researchers pointed out that evaluation schemes may be misleading with respect to the processing of fault localization results. Nevertheless, there is little work addressing the efficiency of patch generation, with regard to the practicality of program repair. In this paper, we fill this gap in the literature, by providing an extensive review on the efficiency of test suite based program repair. Our objective is to assess the number of generated patch candidates, since this information is correlated to (1) the strategy to traverse the search space efficiently in order to select sensical repair attempts, (2) the strategy to minimize the test effort for identifying a plausible patch, (3) as well as the strategy to prioritize the generation of a correct patch. To that end, we perform a large-scale empirical study on the efficiency, in terms of quantity of generated patch candidates of the 16 open-source repair tools for Java programs. The experiments are carefully conducted under the same fault localization configurations to limit biases. Eventually, among other findings, we note that: (1) many irrelevant patch candidates are generated by changing wrong code locations; (2) however, if the search space is carefully triaged, fault localization noise has little impact on patch generation efficiency; (3) yet, current template-based repair systems, which are known to be most effective in fixing a large number of bugs, are actually least efficient as they tend to generate majoritarily irrelevant patch candidates. [less ▲]

Detailed reference viewed: 106 (5 UL)
Full Text
Peer Reviewed
See detailDynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'20) (2020, May)

The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a ... [more ▼]

The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situation is unfolding, and therefore rely on configurable software-defined networks (SDN). In this paper, we propose a dynamic adaptive SDN configuration approach for IoT systems. The approach enables resolving congestion in real time while minimizing network utilization, data transmission delays and adaptation costs. Our approach builds on existing work in dynamic adaptive search-based software engineering (SBSE) to reconfigure an SDN while simultaneously ensuring multiple quality of service criteria. We evaluate our approach on an industrial national emergency management system, which is aimed at detecting disasters and emergencies, and facilitating recovery and rescue operations by providing first responders with a reliable communication infrastructure. Our results indicate that (1) our approach is able to efficiently and effectively adapt an SDN to dynamically resolve congestion, and (2) compared to two baseline data forwarding algorithms that are static and non-adaptive, our approach increases data transmission rate by a factor of at least 3 and decreases data loss by at least 70%. [less ▲]

Detailed reference viewed: 227 (31 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis of Distributed and Scalable Deep Learning
Mahon, S.; Varrette, Sébastien UL; Plugaru, Valentin UL et al

in 20th IEEE/ACM Intl. Symp. on Cluster, Cloud and Internet Computing (CCGrid'20) (2020, May)

With renewed global interest for Artificial Intelligence (AI) methods, the past decade has seen a myriad of new programming models and tools that enable better and faster Machine Learning (ML). More ... [more ▼]

With renewed global interest for Artificial Intelligence (AI) methods, the past decade has seen a myriad of new programming models and tools that enable better and faster Machine Learning (ML). More recently, a subset of ML known as Deep Learning (DL) raised an increased interest due to its inherent ability to tackle efficiently novel cognitive computing applications. DL allows computational models that are composed of multiple processing layers to learn in an automated way representations of data with multiple levels of abstraction, and can deliver higher predictive accuracy when trained on larger data sets. Based on Artificial Neural Networks (ANN), DL is now at the core of state of the art voice recognition systems (which enable easy control over e.g. Internet-of- Things (IoT) smart home appliances for instance), self-driving car engine, online recommendation systems. The ecosystem of DL frameworks is fast evolving, as well as the DL architectures that are shown to perform well on specialized tasks and to exploit GPU accelerators. For this reason, the frequent performance evaluation of the DL ecosystem is re- quired, especially since the advent of novel distributed training frameworks such as Horovod allowing for scalable training across multiple computing resources. In this paper, the scalability evaluation of the reference DL frameworks (Tensorflow, Keras, MXNet, and PyTorch) is performed over up-to-date High Performance Comput- ing (HPC) resources to compare the efficiency of differ- ent implementations across several hardware architectures (CPU and GPU). Experimental results demonstrate that the DistributedDataParallel features in the Pytorch library seem to be the most efficient framework for distributing the training process across many devices, allowing to reach a throughput speedup of 10.11 when using 12 NVidia Tesla V100 GPUs when training Resnet44 on the CIFAR10 dataset. [less ▲]

Detailed reference viewed: 97 (4 UL)
Full Text
Peer Reviewed
See detail3D DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020), Barcelona 4-8 May 2020 (2020, May)

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailAn Annotation Framework for Luxembourgish Sentiment Analysis
Sirajzade, Joshgun UL; Gierschek, Daniela UL; Schommer, Christoph UL

in Besacier, Laurent; Sakti, Sakriani; Soria, Claudia (Eds.) et al Proceedings of the LREC 2020 1st Joint SLTU and CCURL Workshop (SLTU-CCURL 2020) (2020, May)

The aim of this paper is to present a framework developed for crowdsourcing sentiment annotation for the low-resource language Luxembourgish. Our tool is easily accessible through a web interface and ... [more ▼]

The aim of this paper is to present a framework developed for crowdsourcing sentiment annotation for the low-resource language Luxembourgish. Our tool is easily accessible through a web interface and facilitates sentence-level annotation of several annotators in parallel. In the heart of our framework is an XML database, which serves as central part linking several components. The corpus in the database consists of news articles and user comments. One of the components is LuNa, a tool for linguistic preprocessing of the data set. It tokenizes the text, splits it into sentences and assigns POS-tags to the tokens. After that, the preprocessed text is stored in XML format into the database. The Sentiment Annotation Tool, which is a browser-based tool, then enables the annotation of split sentences from the database. The Sentiment Engine, a separate module, is trained with this material in order to annotate the whole data set and analyze the sentiment of the comments over time and in relationship to the news articles. The gained knowledge can again be used to improve the sentiment classification on the one hand and on the other hand to understand the sentiment phenomenon from the linguistic point of view. [less ▲]

Detailed reference viewed: 29 (4 UL)
Full Text
Peer Reviewed
See detailComponent Analysis of Adjectives in Luxembourgish for Detecting Sentiments
Sirajzade, Joshgun UL; Gierschek, Daniela UL; Schommer, Christoph UL

in Beermann, Dorothee; Besacier, Laurent; Sakti, Sakriani (Eds.) et al Proceedings of the LREC 2020 1st Joint SLTU and CCURL Workshop(SLTU-CCURL 2020) (2020, May)

The aim of this paper is to investigate the role of Luxembourgish adjectives in expressing sentiments in user comments written at the web presence of rtl.lu (RTL is the abbreviation for Radio Television ... [more ▼]

The aim of this paper is to investigate the role of Luxembourgish adjectives in expressing sentiments in user comments written at the web presence of rtl.lu (RTL is the abbreviation for Radio Television Lëtzebuerg). Alongside many textual features or representations, adjectives could be used in order to detect sentiment, even on a sentence or comment level. In fact, they are also by themselves one of the best ways to describe a sentiment, despite the fact that other word classes such as nouns, verbs, adverbs or conjunctions can also be utilized for this purpose. The empirical part of this study focuses on a list of adjectives that were extracted from an annotated corpus. The corpus contains the part of speech tags of individual words and sentiment annotation on the adjective, sentence, and comment level. Suffixes of Luxembourgish adjectives like -esch, -eg, -lech, -al, -el, -iv, -ent, -los, -bar and the prefix on- were explicitly investigated, especially by paying attention to their role in regards to building a model by applying classical machine learning techniques. We also considered the interaction of adjectives with other grammatical means, especially other part of speeches, e.g. negations, which can completely reverse the meaning, thus the sentiment of an utterance. [less ▲]

Detailed reference viewed: 31 (4 UL)
Full Text
Peer Reviewed
See detail'Faster-than-Nyquist Signaling via Spatiotemporal Symbol-Level Precoding for Multi-User MISO Redundant Transmissions
Alves Martins, Wallace UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2020), Barcelona 4-8 May 2020 (2020, May)

This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We ... [more ▼]

This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We propose a framework for redundant block-based symbol-level precoders enabling the trade-off between constructive and destructive multi-user and interblock interference (IBI) effects at the single-antenna user terminals. Redundant elements are added as guard interval to handle IBI destructive effects. It is shown that, within this framework, accelerating the transmissions via FTN signaling improves the error-free spectral efficiency, up to a certain acceleration factor beyond which the transmitted information cannot be perfectly recovered by linear filtering followed by sampling. Simulation results corroborate that the proposed spatiotemporal symbol-level precoding can change the amount of added redundancy from zero (full IBI) to half (IBI-free) the equivalent channel order, so as to achieve a target balance between spectral and energy efficiencies. [less ▲]

Detailed reference viewed: 59 (4 UL)
Full Text
Peer Reviewed
See detailTransmit Beamforming Design with Received-Interference Power Constraints: The Zero-Forcing Relaxation
Lagunas, Eva UL; Perez-Neira, Ana; Lagunas, Miguel Angel et al

in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), Barcelona, Spain, May 2020 (2020, May)

Detailed reference viewed: 59 (6 UL)
Full Text
Peer Reviewed
See detailBacAnalytics: A Tool to Support Secondary School Examination in France
Roussanaly, Azim; Aleksandrova, Marharyta UL; Boyer, Anne

in 25th International Symposium on Intelligent Systems (ISMIS 2020) (2020, May)

Students who failed the final examination in the secondary school in France (known as baccalauréat or baccalaureate) can improve their scores by passing a remedial test. This test consists of two oral ... [more ▼]

Students who failed the final examination in the secondary school in France (known as baccalauréat or baccalaureate) can improve their scores by passing a remedial test. This test consists of two oral examinations in two subjects of the student's choice. Students announce their choice on the day of the remedial test. Additionally, the secondary education system in France is quite complex. There exist several types of baccalaureate consisting of various streams. Depending upon the stream students belong to, they have different subjects allowed to be taken during the remedial test and different coefficients associated with each of them. In this context, it becomes difficult to estimate the number of professors of each subject required for the examination. Thereby, the general practice of remedial test organization is to mobilize a large number of professors. In this paper, we present BacAnalytics - a tool that was developed to assist the rectorate of secondary schools with the organization of remedial tests for the baccalaureate. Given profiles of students and their choices of subjects for previous years, this tool builds a predictive model and estimates the number of required professors for the current year. In the paper, we present the architecture of the tool, analyze its performance, and describe its usage by the rectorate of the Academy of Nancy-Metz in Grand Est region of France in the years 2018 and 2019. BacAnalytics achieves almost 100% of prediction accuracy with approximately 25% of redundancy and was awarded a French national prize Impulsions 2018. [less ▲]

Detailed reference viewed: 38 (2 UL)
Full Text
Peer Reviewed
See detailIntegrating Topological Proofs with Model Checking to Instrument Iterative Design
Menghi, Claudio UL; Rizzi, Alessandro Maria; Bernasconi, Anna

in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 (2020, April)

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous ... [more ▼]

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous verification can be performed after each refinement or revision step. To achieve practical adoption, formal verification must accommodate continuous verification efficiently and effectively. Model checking provides developers with information useful to improve their models only when a property is not satisfied, i.e., when a counterexample is returned. However, it is desirable to have some useful information also when a property is instead satisfied. To address this problem we propose TOrPEDO, an approach that supports verification in two complementary forms: model checking and proofs. While model checking is typically used to pinpoint model behaviors that violate requirements, proofs can instead explain why requirements are satisfied. In our work, we introduce a specific notion of proof, called Topological Proof. A topological proof produces a slice of the original model that justifies the property satisfaction. Because models can be incomplete, TOrPEDO supports reasoning on requirements satisfaction, violation, and possible satisfaction (in the case where satisfaction depends on unknown parts of the model). Evaluation is performed by checking how topological proofs support software development on 12 modeling scenarios and 15 different properties obtained from 3 examples from literature. Results show that: (i) topological proofs are ≈60% smaller than the original models; (ii) after a revision, in ≈78% of cases, the property can be re-verified by relying on a simple syntactic check. [less ▲]

Detailed reference viewed: 128 (15 UL)
Full Text
Peer Reviewed
See detailLOVBench: Ontology Ranking Benchmark
Kolbe, Niklas UL; Vandenbussche, Pierre-Yves; Kubler, Sylvain UL et al

in Proceedings of The Web Conference 2020 (WWW '20) (2020, April)

Detailed reference viewed: 39 (9 UL)
Full Text
Peer Reviewed
See detailNeuere Methoden zur Identifikation und Lokalisierung von Schäden an vorgespannten Betonbrücken
Maas, Stefan UL; Nguyen, Viet Ha UL; Kebig, Tanja UL

in Bischoff, Manfred; von Scheven, Malte; Oesterle, Bernd (Eds.) Baustatik-Baupraxis 14 (2020, March 23)

Zuerst wird ein rein statistischer Schadensindikator basierend auf der Hauptkomponentenanalyse vorgestellt. Wichtig sind Referenzmessungen im ungeschädigten Zustand, um Veränderungen zu identifizieren ... [more ▼]

Zuerst wird ein rein statistischer Schadensindikator basierend auf der Hauptkomponentenanalyse vorgestellt. Wichtig sind Referenzmessungen im ungeschädigten Zustand, um Veränderungen zu identifizieren. Bevor die Messdaten mit den Rechenmodellen kombiniert werden, müssen Temperatureffekte kompensiert werden, um dann die Schäden zu erkennen und zu lokalisieren. Ein „Model-Updating“ Prozess eines speziellen Finite-Elemente- Modells passt die Steifigkeitsmatrix an die gemessenen Eigenfrequenzen oder an die progressive Absenkung unter Eigengewicht an. [less ▲]

Detailed reference viewed: 47 (8 UL)
Full Text
Peer Reviewed
See detailMensch-Roboter-Kollaboration in der Domäne Refabrikation – State-of-the-Art und Ausblick
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Jäkel, Jens; Thiel, Robert (Eds.) Tagungsband AALE 2020 Automatisierung und Mensch-Technik-Interaktion (2020, March 05)

Detailed reference viewed: 63 (0 UL)
Full Text
Peer Reviewed
See detailAgentenbasierte, hybride Steuerungsarchitektur für cyberphysische Refabrikationssysteme
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Jäkel, Jens; Thiel, Robert (Eds.) Tagungsband AALE 2020 Automatisierung und Mensch-Technik-Interaktion (2020, March 05)

Detailed reference viewed: 66 (1 UL)
Full Text
Peer Reviewed
See detailStructured Compression of Deep Neural Networks with Debiased Elastic Group LASSO
Oyedotun, Oyebade UL; Aouada, Djamila UL; Ottersten, Björn UL

in IEEE 2020 Winter Conference on Applications of Computer Vision (WACV 20), Aspen, Colorado, US, March 2–5, 2020 (2020, March 01)

Detailed reference viewed: 74 (7 UL)
Full Text
Peer Reviewed
See detailAnalyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments
Mitseva, Asya UL; Engel, Thomas UL; Panchenko, Andriy

in Analyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments (2020, March)

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailTowards an Executable Methodology for the Formalization of Legal Texts
Libal, Tomer UL; Steen, Alexander UL

in Dastani, Mehdi; Dong, Huimin; van der Torre, Leon (Eds.) Logic and Argumentation. CLAR 2020 (2020, March)

A methodology for the formalization of legal texts is presented. This methodology is based on features of the NAI Suite, a recently developed formalization environment for legal texts. The ability of the ... [more ▼]

A methodology for the formalization of legal texts is presented. This methodology is based on features of the NAI Suite, a recently developed formalization environment for legal texts. The ability of the tool to execute queries is used in order to drive a correct formalization until all queries are validated. The approach is studied on a fragment of the Smoking Prohibition (Children in Motor Vehicles) (Scotland) Act 2016 of the Scottish Parliament. [less ▲]

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailMetamorphic Security Testing for Web Systems
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020 (2020, March)

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input ... [more ▼]

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In many situations where potential vulnerabilities are tested, a test oracle may not exist, or it might be impractical due to the many inputs for which specific oracles have to be defined. In this paper, we propose a metamorphic testing approach that alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture security properties of the system. Such MRs are then used to automate testing and detect vulnerabilities. We provide a catalog of 22 system-agnostic MRs to automate security testing in Web systems. Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. It automatically detected 10 out of 12 vulnerabilities affecting two widely used systems, one commercial and the other open source (Jenkins). [less ▲]

Detailed reference viewed: 134 (19 UL)
Full Text
Peer Reviewed
See detailNAI: Towards Transparent and Usable Semi-Automated Legal Analysis
Libal, Tomer UL; Steen, Alexander UL

in Schweighöfer, Erich; Hötzendorfer, Walter; Kummer, Franz (Eds.) et al Verantwortungsbewusste Digitalisierung, Tagungsband des 23. Internationalen Rechtsinformatik Symposions IRIS 2020 (2020, February 27)

A prototype for automated reasoning over legal documents, called NAI, is presented. It uses formalized representations of legal documents that are created using a graphical editor that is also provided as ... [more ▼]

A prototype for automated reasoning over legal documents, called NAI, is presented. It uses formalized representations of legal documents that are created using a graphical editor that is also provided as part of NAI. The prototype supports several automated reasoning procedures over the given formalizations, including the execution of user queries. The application of NAI is studied using a fragment of the Scottish Smoking Prohibition (Children in Motor Vehicles) Act 2016. [less ▲]

Detailed reference viewed: 64 (6 UL)
Full Text
Peer Reviewed
See detailPrivacy and Security of Big Data in AI Systems:A Research and Standards Perspective
Esmaeilzadeh Dilmaghani, Saharnaz UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in 2019 IEEE International Conference on Big Data (Big Data), 9-12 December 2019 (2020, February 24)

Detailed reference viewed: 117 (19 UL)
Full Text
Peer Reviewed
See detailPreventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach
Antoniadis, Nikolaos UL; Cordy, Maxime UL; Sifaleras, Angelo et al

in Communications in Computer and Information Science (2020, February 15)

Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that ... [more ▼]

Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that, the overload could trip the fuse, opening the circuit, and stopping the flow and heating. However, sustained overloads, even if they are below the safety limits, could also damage the wires. To prevent overload, smart grid operators can switch the fuses on or off to protect the circuits, or remotely curtail the over-producing/over-consuming users. Nevertheless, making the most appropriate decision is a daunting decision-making task, notably due to contractual and technical obligations. In this paper, we define and formulate the overloading prevention problem as a Multiobjective Mixed Integer Quadratically Constrained Program. We also suggest a solution method using a combinatorial optimization approach with a state-of-the-art exact solver. We evaluate this approach for this real-world problem together with Creos Luxembourg S.A., the leading grid operator in Luxembourg, and show that our method can suggest optimal countermeasures to operators facing potential overloading incidents. [less ▲]

Detailed reference viewed: 229 (26 UL)
Full Text
Peer Reviewed
See detailIdentifying Unintended Harms of Cybersecurity Measures
Chua, Yi Ting; Parkin, Simon; Edwards, Matthew et al

in Proceedings of ECRIME 2019 (2020, February 01)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailExploring the Monero Peer-to-Peer Network
Cao, Tong UL; Yu, Jiangshan; Decouchant, Jérémie UL et al

in Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie (Eds.) et al Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020 (2020, February)

Detailed reference viewed: 72 (7 UL)
Full Text
Peer Reviewed
See detailTowards Automatic CAD Modeling from 3D Scan Sketch based Representation
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2020), GRAPP (2020, February)

Detailed reference viewed: 110 (9 UL)
Full Text
Peer Reviewed
See detailShort paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme
Zollinger, Marie-Laure UL; Roenne, Peter UL; Ryan, Peter UL

in International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting (2020, February)

Detailed reference viewed: 54 (1 UL)
Full Text
Peer Reviewed
See detailSystematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging
Symeonidis, Iraklis UL; Lenzini, Gabriele UL

in International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020 (2020, February)

Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar ... [more ▼]

Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar threats, and how to comply with comparable system requirements. Assuming a scenario where servers may not be trusted, we review and analyze a list of threats specifically against message delivering, archiving, and contact synchronization. We also describe a list of requirements intended for whom undertakes the task of implementing secure and private messaging. The cryptographic solutions available to mitigate the threats and to comply with the requirements may differ, as the two applications are built on different assumptions and technologies. [less ▲]

Detailed reference viewed: 92 (12 UL)
Full Text
Peer Reviewed
See detailTeaching DevOps in Academia and Industry: Reflections and Vision
Bobrov, Evgeny; Bucchiarone, Antonio; Capozucca, Alfredo UL et al

in Bruel, Jean-Michel; Mazzara, Manuel; Meyer, Bertrand (Eds.) Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment (2020, January 19)

The new century brought us a kind of renaissance in software development methods. The advent of the Agile manifesto has led to greater appreciation of methodologies aimed at producing valuable software ... [more ▼]

The new century brought us a kind of renaissance in software development methods. The advent of the Agile manifesto has led to greater appreciation of methodologies aimed at producing valuable software through continuous incremental cycles. More recently, a new set of practices enclosed under the term DevOps has appeared to attain manifesto's objectives in more efficient manner. The software development community has already noticed the benefits brought by DevOps. Thus, the necessity of education in the field becomes more and more important, both from the technical and organisational point of view. This paper describes parallel experiences of teaching both undergraduate and graduate students at the university, and junior professional developers in industry, compares the two approaches and sums up the lessons learnt. A vision driven by the DevOps practices aimed at implementing a shift in the Software Engineering Higher Education curricula to takeover its current limitations is also reported at the end of the paper. [less ▲]

Detailed reference viewed: 59 (3 UL)
Full Text
Peer Reviewed
See detailComprendre l'état du parlementarisme contemporain en Europe
Poirier, Philippe UL

in Le Parlement depuis 2008 : Renforcement, statu quo ou retour au(x) fondement(s) de la Ve République (2020, January 10)

Cet ouvrage reprend les actes du colloque d'Aix-en-Provence de 2018 consacré au bilan de dix ans de mise en oeuvre de la révision constitutionnelle de 2008 dans son volet parlementaire. Faisant intervenir ... [more ▼]

Cet ouvrage reprend les actes du colloque d'Aix-en-Provence de 2018 consacré au bilan de dix ans de mise en oeuvre de la révision constitutionnelle de 2008 dans son volet parlementaire. Faisant intervenir des acteurs de la révision de 2008, des parlementaires, des membres du Conseil constitutionnel, des hauts fonctionnaires des assemblées et des universitaires, ce colloque a été construit autour des trois fonctions essentielles du Parlement : l'élaboration de la loi, le contrôle de l'exécutif et l'évaluation des politiques publiques afin de répondre à cette question : un changement pour quoi faire ? [less ▲]

Detailed reference viewed: 46 (1 UL)
Full Text
Peer Reviewed
See detailInternal wall insulation with a new aerogel panel: SLENTITE® for energetic retrofit in historic buildings
Günther, Eva; Bichlmair, Stefan; Latz, Sebastian UL et al

in 12th Nordic Symposium on Building Physics (2020, January)

We present two recent test case application examples of a new high-performance insulation panel with product name SLENTITE® used as core element of a rendered internal wall insulation system. The first ... [more ▼]

We present two recent test case application examples of a new high-performance insulation panel with product name SLENTITE® used as core element of a rendered internal wall insulation system. The first case study refers to the 18th-century building Alte Schäfflerei now the Fraunhofer Centre for Conservation and Energy Performance of Historic Buildings, at the monastery Benediktbeuern, southern Germany, where SLENTITE® was applied in 11/2017. The second test case was installed in 04/2019 in a heritage building situated in the historic center of Luxembourg. In Benediktbeuern, a single layer of insulation material was chosen, in Luxembourg we applied two layers of insulation. In both cases, detail work around the windows was a main task and we gained experience on product processing under real conditions. In terms of indoor room usage, the object in Benediktbeuern is used as exhibition hall with rare traffic and well controlled climate, whereas the object in Luxembourg is used as meeting room without climate control. Measured data of 20 months from the object in Benediktbeuern and first impressions of the performance in Luxembourg are discussed. [less ▲]

Detailed reference viewed: 57 (0 UL)
Full Text
Peer Reviewed
See detailCzechoslovak Jewish emigrants in the clutches of Luxembourg pre-war migration bureaucracy
Bronec, Jakub UL

in Malach Center for Visual History on its 10th Anniversary: Compendium of Papers of the Prague Visual History and Digital Humanities Conference 2020 (2020, January)

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities ... [more ▼]

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities distinguish or give priority to citizens of particular nations? Who was involved in the approval process? Who played the most active role and collected the most controversial information about Jewish immigrants? [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailModeling for Three-Subset Division Property without Unknown Subset and Improved Cube Attacks
Hao, Yonglin; Leander, Gregor; Meier, Willi et al

in 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Croatia 10-14 May 2020 (2020, January)

Detailed reference viewed: 42 (2 UL)
Full Text
Peer Reviewed
See detailAutomatic Testing and Improvement of Machine Translation
Sun, Zeyu; Zhang, Jie; Harman, Mark et al

in International Conference on Software Engineering (ICSE) (2020)

Detailed reference viewed: 36 (4 UL)
Full Text
Peer Reviewed
See detailApproximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification
Menghi, Claudio UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 42nd International Conference on Software Engineering (2020)

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing ... [more ▼]

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute-intensive CPS (CI-CPS) models, where a single simulation may take hours to complete. We propose a novel approach, namely ARIsTEO, to enable effective and efficient testing of CI-CPS models. Our approach embeds black-box testing into an iterative approximation-refinement loop. At the start, some sampled inputs and outputs of the CI-CPS model under test are used to generate a surrogate model that is faster to execute and can be subjected to black-box testing. Any failure-revealing test identified for the surrogate model is checked on the original model. If spurious, the test results are used to refine the surrogate model to be tested again. Otherwise, the test reveals a valid failure. We evaluated ARIsTEO by comparing it with S-Taliro, an open-source and industry-strength tool for testing CPS models. Our results, obtained based on five publicly-available CPS models, show that, on average, ARIsTEO is able to find 24% more requirements violations than S-Taliro and is 31% faster than S-Taliro in finding those violations. We further assessed the effectiveness and efficiency of ARIsTEO on a large industrial case study from the satellite domain. In contrast to S-Taliro, ARIsTEO successfully tested two different versions of this model and could identify three requirements violations, requiring four hours, on average, for each violation. [less ▲]

Detailed reference viewed: 79 (30 UL)
Full Text
See detailComputational Metabolomics: From Cheminformatics to Machine Learning (Dagstuhl Seminar 20051)
Böcker, Sebastian; Broeckling, Corey; Schymanski, Emma UL et al

in Dagstuhl Reports (2020)

Dagstuhl Seminar 20051 on Computational Metabolomics is the third edition of seminars onthis topic and focused on Cheminformatics and Machine Learning. With the advent of higherprecision instrumentation ... [more ▼]

Dagstuhl Seminar 20051 on Computational Metabolomics is the third edition of seminars onthis topic and focused on Cheminformatics and Machine Learning. With the advent of higherprecision instrumentation, application of metabolomics to a wider variety of small molecules, andever increasing amounts of raw and processed data available, developments in cheminformaticsand machine learning are sorely needed to facilitate interoperability and leverage further insightsfrom these data. Following on from Seminars 17491 and 15492, this edition convened bothexperimental and computational experts, many of whom had attended the previous sessions andbrought much-valued perspective to the week’s proceedings and discussions. Throughout theweek, participants first debated on what topics to discuss in detail, before dispersing into smaller,focused working groups for more in-depth discussions. This dynamic format was found to bemost productive and ensured active engagement amongst the participants. The abstracts inthis report reflect these working group discussions, in addition to summarising several informalevening sessions. Action points to follow-up on after the seminar were also discussed, includingfuture workshops and possibly another Dagstuhl seminar in late 2021 or 2022. [less ▲]

Detailed reference viewed: 39 (1 UL)
See detailMale knjizevnosti: pregled pojmov
Glesener, Jeanne E UL

in Koron, Alenka; Leben, Andrej (Eds.) Literarna vecjezicnost v slovenskem in avstrijskem konteksti (2020)

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailMuteria: An Extensible and Flexible Multi-Criteria Software Testing Framework
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL

in ACM/IEEE International Conference on Automation of Software Test (AST) 2020 (2020)

Program based test adequacy criteria (TAC), such as statement, branch coverage and mutation give objectives for software testing. Many techniques and tools have been developed to improve each phase of the ... [more ▼]

Program based test adequacy criteria (TAC), such as statement, branch coverage and mutation give objectives for software testing. Many techniques and tools have been developed to improve each phase of the TAC-based software testing process. Nonetheless, The engineering effort required to integrate these tools and techniques into the software testing process limits their use and creates an overhead to the users. Especially for system testing with languages like C, where test cases are not always well structured in a framework. In response to these challenges, this paper presents Muteria, a TAC-based software testing framework. Muteria enables the integration of multiple software testing tools. Muteria abstracts each phase of the TAC-based software testing process to provide tool drivers interfaces for the implementation of tool drivers. Tool drivers enable Muteria to call the corresponding tools during the testing process. An initial set of drivers for KLEE, Shadow and SEMu test-generation tools, Gcov, and coverage.py code coverage tools, and Mart mutant generation tool for C and Python programming language were implemented with an average of 345 lines of Python code. Moreover, the user configuration file required to measure code coverage and mutation score on a sample C programs, using the Muteria framework, consists of less than 15 configuration variables. Users of the Muteria framework select, in a configuration file, the tools and TACs to measure. The Muteria framework uses the user configuration to run the testing process and report the outcome. Users interact with Muteria through its Application Programming Interface and Command Line Interface. Muteria can benefit to researchers as a laboratory to execute experiments, and to software practitioners. [less ▲]

Detailed reference viewed: 121 (1 UL)
Full Text
Peer Reviewed
See detailAlzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)
Beierle, Christof; Biryukov, Alexei UL; Cardoso Dos Santos, Luan UL et al

in Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (2020)

Detailed reference viewed: 71 (6 UL)
Full Text
Peer Reviewed
See detailTracking Hurricanes using GPS atmospheric precipitable water vapor field
Ejigu, Yohannes Getachew; Teferle, Felix Norman UL; klos, Anna et al

in Beyond 100: The Next Century in Geodesy (2020)

Tropical cyclones are one of the most powerful severe weather events that produce devastating socioeconomic and environmental impacts in the areas they strike. Therefore, monitoring and tracking of the ... [more ▼]

Tropical cyclones are one of the most powerful severe weather events that produce devastating socioeconomic and environmental impacts in the areas they strike. Therefore, monitoring and tracking of the arrival times and path of the tropical cyclones are extremely valuable in providing early warning to the public and governments. Hurricane Florence struck the East cost of USA in 2018 and offers an outstanding case study. We employed Global Positioning System (GPS) derived precipitable water vapor (PWV) data to track and investigate the characteristics of storm occurrences in their spatial and temporal distribution using a dense ground network of permanent GPS stations. Our findings indicate that a rise in GPS-derived PWV occurred several hours before Florence’s manifestation. Also, we compared the temporal distribution of the GPS-derived PWV content with the precipitation value for days when the storm appeared in the area under influence. The study will contribute to quantitative assessment of the complementary GPS tropospheric products in hurricane monitoring and tracking using GPS-derived water vapor evolution from a dense network of permanent GPS stations [less ▲]

Detailed reference viewed: 54 (4 UL)
Full Text
Peer Reviewed
See detailNGAP: a novel hybrid metaheuristic algorithm for round-trip carsharing fleet planning
Changaival, Boonyarit UL; Danoy, Grégoire UL; Kliazovich et al

in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020)

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailA Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV Swarms
Stolfi Rosso, Daniel UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in IEEE 17th Annual Consumer Communications & Networking Conference CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020 (2020)

Detailed reference viewed: 21 (3 UL)
Full Text
Peer Reviewed
See detailOptimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection
Stolfi Rosso, Daniel UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Optimization and Learning - Third International Conference, OLA 2020, Cádiz, Spain, February 17-19, 2020, Proceedings (2020)

Detailed reference viewed: 58 (5 UL)
Full Text
Peer Reviewed
See detailDesign Challenges of Trustworthy Artificial Intelligence Learning Systems
Brust, Matthias R. UL; Bouvry, Pascal UL; Danoy, Grégoire UL et al

in Intelligent Information and Database Systems - 12th Asian Conference ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Companion Proceedings (2020)

Detailed reference viewed: 20 (3 UL)
Full Text
Peer Reviewed
See detailAutomated design of efficient swarming behaviours: a Q-learning hyper-heuristic approach
Duflo, Gabriel UL; Danoy, Grégoire UL; Talbi, El-Ghazali UL et al

in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020)

Detailed reference viewed: 20 (2 UL)