References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLes archevêques de Milan face aux premières expériences seigneuriales: stratégies et positionnements (milieu XIIIe-début XIVe s.)
Salemme, Timothy UL

in Barralis, Christine (Ed.) L’évêque face à son métier. Actes du colloque international, Metz. 15-17 novembre 2017 (in press)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailFlipping Geometric Triangulations on Hyperbolic Surfaces
Despré, vincent; Schlenker, Jean-Marc UL; Teillaud, Monique

in symposium on computational geometry (SoCG) (in press)

We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with ... [more ▼]

We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with fixed vertices of a flat torus or a closed hyperbolic surface is connected. We give upper bounds on the number of edge flips that are necessary to transform any geometric triangulation on such a surface into a Delaunay triangulation. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailConservazione e ricezione dei documenti pontifici in Italia settentrionale: il caso del monastero cistercense di Chiaravalle Milanese (secoli XII-XVI)
Salemme, Timothy UL

in Salemme, Timothy; Renault, Jean-Baptiste (Eds.) Conservation et réception des documents pontificaux par les Ordres religieux (XIe-XVe siècles). Actes du colloque international. Nancy, 12-13 décembre 2013 (in press)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailGoal-Directed Decision Procedures for Input/Output Logics
Steen, Alexander UL

in Marra, Alessandra; Liu, Fenrong; Portner, Paul (Eds.) et al Deontic Logic and Normative Systems: 15th International Conference (DEON2020/2021, Munich) (in press)

Input/Output (I/O) logics address the abstract study of conditional norms. Here, norms are represented as pairs of formulas instead of statements that themselves carry truth-values. I/O logics have been ... [more ▼]

Input/Output (I/O) logics address the abstract study of conditional norms. Here, norms are represented as pairs of formulas instead of statements that themselves carry truth-values. I/O logics have been studied thoroughly in the past, including further applications and refinements. In this paper, a class of automated reasoning procedures is presented that, given a set of norms and a concrete situation, decide whether a specific state of affairs is obligatory according to the output operations of I/O logics. The procedures are parametric in the underlying logical formalism and can be instantiated with different classical objects logics, such as propositional logic or first-order logic. The procedures are shown to be correct, and a proof-of-concept implementation for propositional I/O logics is surveyed. [less ▲]

Detailed reference viewed: 68 (4 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 218 (6 UL)
Full Text
Peer Reviewed
See detailProcess analysis in thermal process engineering with high-performance computing using the example of grate firing
Peters, Bernhard UL; Rousset, Alban UL; Besseron, Xavier UL et al

in 12th European Conference on Industrial Furnaces and Boilers (in press)

Biomass as a renewable energy source continues to grow in popularity to reduce fossil fuel consumption for environmental and economic benefits. In the present contribution, the combustion chamber of a 16 ... [more ▼]

Biomass as a renewable energy source continues to grow in popularity to reduce fossil fuel consumption for environmental and economic benefits. In the present contribution, the combustion chamber of a 16 MW geothermal steam super-heater, which is part of the Enel Green Power "Cornia 2" power plant, is being investigated with high-performance computing methods. For this purpose, the extended discrete element method (XDEM) developed at the University of Luxembourg is used in a high-performance computing environment, which includes both the moving wooden bed and the combustion chamber above it. The XDEM simulation platform is based on a hybrid four-way coupling between the Discrete Element Method (DEM) and Computational Fluid Dynamics (CFD). In this approach, particles are treated as discrete elements that are coupled by heat, mass, and momentum transfer to the surrounding gas as a continuous phase. For individual wood particles, besides the equations of motion, the differential conservation equations for mass, heat, and momentum are solved, which describe the thermodynamic state during thermal conversion. The consistency of the numerical results with the actual system performance is discussed in this paper to determine the potentials and limitations of the approach. [less ▲]

Detailed reference viewed: 121 (17 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 165 (7 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 160 (9 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 418 (11 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 79 (1 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 121 (0 UL)
Full Text
Peer Reviewed
See detailDon't Trust Me, Test Me: 100% Code Coverage for a 3rd-party Android App
Pilgun, Aleksandr UL

in Pilgun, Aleksandr (Ed.) Don't Trust Me, Test Me: 100% Code Coverage for a 3rd-party Android App (in press)

The incompleteness of 3rd-party app testing is an accepted fact in Software Engineering. This issue makes it impossible to verify the app functionality and to confirm its safety to the end-user. To solve ... [more ▼]

The incompleteness of 3rd-party app testing is an accepted fact in Software Engineering. This issue makes it impossible to verify the app functionality and to confirm its safety to the end-user. To solve this problem, enterprises developed strict policies. A company, willing to use modern apps, may perform an expensive security analysis, rely on trust or forbid the app. These strategies may lead companies to high direct and indirect spending with no guarantee of safety. In this work, we present a novel approach, called Dynamic Binary Shrinking, that allows a user to review app functionality and leave only tested code. The shrunk app produces 100% instruction coverage on observed behaviors and in this way guarantees the absence of unexplored, and therefore, potentially malicious code. On our running examples, we demonstrate that apps use less than 20% of the codebase. We developed an approach and the ACVCut tool to shrink Android apps towards the executed code. Repository — http://github.com/pilgun/acvcut. [less ▲]

Detailed reference viewed: 77 (3 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 102 (3 UL)
Full Text
Peer Reviewed
See detailBlockchain Governance: An Overview and Prediction of Optimal Strategies Using Nash Equilibrium
Khan, Nida UL; Ahmad, Tabrez; Patel, Anass et al

in 3rd AUE International Research Conference (in press)

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this ... [more ▼]

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this nascent technology. In this paper, the position of blockchain governance within the hierarchy of Institutional governance is discussed. Blockchain governance is analyzed from the perspective of IT governance using Nash equilibrium to predict the outcome of different governance decisions. A payoff matrix for blockchain governance is created and simulation of different strategy profiles is accomplished for computation of all Nash equilibria. We also create payoff matrices for different kinds of blockchain governance, which were used to propose novel mathematical formulae usable to predict the best governance strategy that minimizes the occurrence of a hard fork as well as predicts the behavior of the majority during protocol updates. [less ▲]

Detailed reference viewed: 195 (18 UL)
Full Text
Peer Reviewed
See detailWhich Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography
Rossi, Arianna UL; Lenzini, Gabriele UL

in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (in press)

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this ... [more ▼]

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this paper, we firstly critically review some of those proposals. We then examine the properties that icons and icon sets should arguably fulfill according to Art.12's transparency provisions. Lastly, we discuss metrics and evaluation procedures to measure compliance with the Article. [less ▲]

Detailed reference viewed: 100 (10 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 62 (6 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 102 (11 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Precoding Design for Satellite Systems
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 37th International Communications Satellite Systems Conference (ICSSC'19) (in press)

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then ... [more ▼]

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then considers an efficient implementation of the massive MIMO transmission through the use of hybrid analog/digital precoder. Efficient algorithmic solutions are proposed for the partially connected precoder architecture which enables efficiency in power/ hardware complexity and its performance evaluated. [less ▲]

Detailed reference viewed: 107 (23 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband DSRI-Herbstakademie 2020 (in press)

Im Berichtszeitraum dieses Updates rief die OECD zu einem zweiten Öffentlichkeitsbetei-ligungsverfahren auf und erarbeitete einen präziseren Lösungsansatz zur Besteuerung digitalisierter Geschäftsmodelle ... [more ▼]

Im Berichtszeitraum dieses Updates rief die OECD zu einem zweiten Öffentlichkeitsbetei-ligungsverfahren auf und erarbeitete einen präziseren Lösungsansatz zur Besteuerung digitalisierter Geschäftsmodelle, der in einer Veröffentlichung im Januar 2020 vorgestellt wurde. Auf Ebene der Europäischen Union gab es im Berichtszeitraum keine Weiterent-wicklung der Richtlinienvorschläge zu einer Digitalsteuer und dem Konzept der „signifi-kanten digitalen Präsenz“. Der EuGH urteilte am 3. März 2020 in Hinblick auf die unions-rechtliche Vereinbarkeit zweier ungarischer Umsatzsteuern. Dieses Urteil erlaubt erste Rückschlüsse bezüglich der Europarechtskonformität umsatzbasierter Steuern, wie bspw. auch im Berichtszeitraum eingeführte Digitalsteuern einzelner Mitgliedstaaten. Dieser Beitrag knüpft an die Vorträge von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademien 2018 in Bochum und 2019 in Oldenburg, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 72 (2 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 82 (0 UL)
Full Text
Peer Reviewed
See detailLa Charte dans l'action extérieure de l'Union européenne
Neframi, Eleftheria UL

in Iliopoulou Penot, Anastasia; Xenou, Lamprini (Eds.) La Charte des droits fondamentaux de l'UE (in press)

Detailed reference viewed: 55 (1 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 92 (13 UL)
Full Text
Peer Reviewed
See detailVertex Feature Encoding and Hierarchical Temporal Modeling in a Spatio-Temporal Graph Convolutional Network for Action Recognition
Papadopoulos, Konstantinos UL; Ghorbel, Enjie UL; Aouada, Djamila UL et al

in International Conference on Pattern Recognition, Milan 10-15 January 2021 (2021, January)

Detailed reference viewed: 46 (6 UL)
Full Text
Peer Reviewed
See detailConcise UC Zero-Knowledge Proofs for Oblivious Updatable Databases
Camenisch, Jan; Dubovitskaya, Maria; Rial, Alfredo UL

in 2021 34th IEEE Computer Security Foundations Symposium (2021)

Detailed reference viewed: 159 (14 UL)
Full Text
Peer Reviewed
See detailKant's supposed realism about things-in-themselves
Heidemann, Dietmar UL

in Serck-Hanssen, Camila (Ed.) Proceedings of the 13th International Kant Congress ‘The Court of Reason’ (Oslo, 6-9 August 2019) (2021)

Detailed reference viewed: 94 (0 UL)
Full Text
Peer Reviewed
See detailOut-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications
de La Cadena Ramos, Augusto Wladimir UL; Kaiser, Daniel UL; Panchenko, Andriy UL et al

in 19th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2020) (2020, November 25)

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailTrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
de La Cadena Ramos, Augusto Wladimir UL; Mitseva, Asya; Hiller, Jens et al

in 27th ACM Conference on Computer and Communications Security (CCS '20) (2020, November 13)

Detailed reference viewed: 65 (0 UL)
Full Text
Peer Reviewed
See detailMixed method situational review of primary family violence care in IMOCAFV
Ares Blanco, Sara; Frese, Thomas; Lacatus, Anca et al

in 90th European General Practice Research Network Meeting (2020, November 10)

Background: The ‘IMOCAFV’ project is developing a multi-country vision on how to provide effective primary care for family violence (FV). In phase I, a situational analysis is performed based on mixed ... [more ▼]

Background: The ‘IMOCAFV’ project is developing a multi-country vision on how to provide effective primary care for family violence (FV). In phase I, a situational analysis is performed based on mixed method review of countries’ policies and interventions, key persons inquiries and professional questionnaires. Aim: Provide in a first phase of IMOCAFV a mixed methods analysis of policies and interventions for primary FV care in different health care settings, high, low and middle income countries. Research questions: How to perform a multi-level in depth mixed method analysis of policies, protocols, problems and good practices on primary FV care? Method: National guidance for FV primary care tasks is centralised into a central online database. Documentation is reviewed online nationally answering questions about prevention, detection, assessment and collaborative care for intimate partner violence, child abuse and elder abuse. Semistructured online inquiries are sent to a pragmatic sample of key persons and professionals in each country. Online training provides guidance for standardized mixed method review of materials. A continuous comparative analysis is made at local and international level; it should provide cues for the Delphi study planned in the second phase. Results: The key questionnaire describes policies and interventions defined for primary health care and advocacy support in different health services settings in three continents. The professional questionnaire describes problems encountered and professionals opinion´s. Different online software packages are suitable for international research collaboration with some limitations. Ethical and security requirements may differ, while high security level applications require more budgets. Conclusions: The organisation of a two-level international qualitative analysis is challenging from a methodological and organisational point of view. A qualitative analysis in a multilanguage context requires specific agreements. Challenges will be discussed using first results. Points for discussion: 1.How to facilitate a good qualitative analysis at both national and international level? 2.How to use different software platforms taking into account countries’ different requirements and organisational facilities in different income countries? [less ▲]

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailSeparation of Concerns Within Robotic Systems Through Proactive Computing
Frantz, Alexandre; Zampunieris, Denis UL

in Proceeding of the 4th IEEE International Conference on Robotic Computing (2020, November)

In this short paper, we first introduce a possible new model for designing and implementing software in robotic systems. This model is based on proactive scenarios, coded through dynamic sets of condition ... [more ▼]

In this short paper, we first introduce a possible new model for designing and implementing software in robotic systems. This model is based on proactive scenarios, coded through dynamic sets of condition-action rules. Each scenario embeds the required rules and can be assembled dynamically with others, allowing the proactive system to achieve a unique objective or behavior and instruct the robot accordingly. Furthermore, a scenario is not aware of the existence of the other scenarios. In fact, it only contains information about a predefined central scenario, which oversees global decision making. In addition, each scenario knows where to enter its suggestions, thus allowing for a high degree in terms of separating concerns and modularity of code. Consequently, allowing easier development, testing and optimization of each scenario independently, possible reuse in different robots, and finally, a faster achievement of robust and scalable robotics software. We then show how to apply this programming model and its functionalities during runtime, by a proof of concept consisting of a virtual robot deployed in the Webots™ simulator. This simulator is controlled with four proactive scenarios (plus the central one), in charge of three different objectives. [less ▲]

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailGraph Diffusion Kernel LMS using Random Fourier Features
Gogineni, Vinay; Elias, Vitor R. M.; Alves Martins, Wallace UL et al

in 2020 54th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 1-5 November 2020 (2020, November)

This work introduces kernel adaptive graph filters that operate in the reproducing kernel Hilbert space. We propose a centralized graph kernel least mean squares (GKLMS) approach for identifying the ... [more ▼]

This work introduces kernel adaptive graph filters that operate in the reproducing kernel Hilbert space. We propose a centralized graph kernel least mean squares (GKLMS) approach for identifying the nonlinear graph filters. The principles of coherence-check and random Fourier features (RFF) are used to reduce the dictionary size. Additionally, we leverage on the graph structure to derive the graph diffusion KLMS (GDKLMS). The proposed GDKLMS requires only single-hop communication during successive time instants, making it viable for real-time network-based applications. In the distributed implementation, usage of RFF avoids the requirement of a centralized pretrained dictionary in the case of coherence-check. Finally, the performance of the proposed algorithms is demonstrated in modeling a nonlinear graph filter via numerical examples. The results show that centralized and distributed implementations effectively model the nonlinear graph filters, whereas the random feature-based solutions is shown to outperform coherence-check based solutions. [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailAn SKOS-Based Vocabulary on the Swift Programming Language
Grevisse, Christian UL; Rothkugel, Steffen UL

in The Semantic Web – ISWC 2020 (2020, November)

Domain ontologies about one or several programming languages have been created in various occasions, mostly in the context of Technology Enhanced Learning (TEL). Their benefits range from modeling ... [more ▼]

Domain ontologies about one or several programming languages have been created in various occasions, mostly in the context of Technology Enhanced Learning (TEL). Their benefits range from modeling learning outcomes, over organization and annotation of learning material, to providing scaffolding support in programming labs by integrating relevant learning resources. The Swift programming language, introduced in 2014, is currently gaining momentum in different fields of application. Both its powerful syntax as well as the provided type safety make it a good language for first-year computer science students. However, it has not yet been the subject of a domain ontology. In this paper, we present an SKOS-based vocabulary on the Swift programming language, aiming at enabling the benefits of previous research for this particular language. After reviewing existing ontologies on other programming languages, we present the modeling process of the Swift vocabulary, its integration into the LOD Cloud and list all of its resources available to the research community. Finally, we showcase how it is being used in different TEL tools. [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detailDemountable and reusable construction system for steel-concrete composite structures
Odenbreit, Christoph UL; Kozma, Andras UL

in Odenbreit, Christoph; Kozma, Andras (Eds.) Demountable and reusable construction system for steel-concrete composite structures (2020, October 30)

In the face of climate change and the depletion of finite resources, sustainability is becoming increasingly important recently. This is especially true in the construction industry that is responsible ... [more ▼]

In the face of climate change and the depletion of finite resources, sustainability is becoming increasingly important recently. This is especially true in the construction industry that is responsible for the 11% of global carbon dioxide emissions. Besides the technological improvements, the emissions can be further reduced by the application of the principles of the circular economy. This concept is based on the efficient allocation of resources. Three terms are frequently used when talking about this concept: reduce, reuse and recycle. Reducing is cut-ting back on the amount of waste we produce, reusing is finding a new way to use our products so that they do not be-come waste, and recycling is using the materials of our products to produce new materials. The traditional life-cycle of a building usually follows a linear model from the extraction of the raw materials through material production, component manufacturing, construction and building use, until when finally the building is demolished and most of the materials become debris and go into landfill. This is in direct opposition with the concept of circular economy. With proper considerations at the design stage, it is possible to deconstruct whole buildings and re-erect them elsewhere. In the frame of the RFCS Research Project “REDUCE” of the European Commission, a demountable and reusable construction system for steel-concrete composite structures has been recently developed. The system is based on a modular “kit-of-parts” system that uses prefabricated and standardised elements that are easy to manufacture and to assemble with the help of standardised connections. The elements were designed in a systematic way such that, a wide variety of different configurations are possible. In this system, the geometry of all elements respects the planning grid that is based on a basic module size. The research included the development and structural testing of novel demountable and adjustable structural solutions including beam-to-slab, beam-to-beam and beam-to-column connections. During the development of the structural solutions the following aspects were considered: structural performance, safety, installation and tolerances, demountability, corrosion resistance, aesthetics, economy, adaptability, standardisation and environmental impact. The laboratory testing was supplemented by nonlinear numerical studies using the finite element software ABAQUS. Based on the results and the experiences obtained throughout the research project, a design proposal was prepared. One objective of the project was to find structural solutions that are easily applicable and compatible with the current standard de-sign rules. The proposed beam-to-beam and beam-to-column joint is in the scope of EN1993-1-8. The new shear connections behave differently than the traditionally applied welded studs. The cor-responding standard would not allow the equidistant placement of the connectors nor the application of the partial shear theory. This would make the use of demountable shear connections complicated and uneconomical. In order to overcome this issue, a simple algorithm was developed that transforms the elastic-brittle shear connection behaviour into an equivalent ductile rigid-plastic behaviour so that the Eurocode 4 design rules for the determination of the moment resistance of composite beams with partial shear connection remain applicable. The design proposal also contains recommendations to maximize the reuse potential of the building components. This paper presents a general overview of the developed construction system and the corresponding laboratory tests and numerical studies as well as recommendations for the design and application of de-mountable and reusable composite structures. [less ▲]

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailBuilding up Explainability in Multi-layer Perceptrons for Credit Risk Modeling
Sharma, Rudrani; Schommer, Christoph UL; Vivarelli, Nicolas

in Sharma, Rudrani (Ed.) Building up Explainability in Multi-layer Perceptrons for Credit Risk Modeling (2020, October 09)

Granting loans is one of the major concerns of financial institutions due to the risks of default borrowers. Default prediction by the neural networks is a popular technique for credit risk modeling ... [more ▼]

Granting loans is one of the major concerns of financial institutions due to the risks of default borrowers. Default prediction by the neural networks is a popular technique for credit risk modeling. Neural networks generally offer the accurate predictions that help banks to prevent financial losses and grow their business by approving more creditworthy borrowers. Although neural networks are capable of capturing the complex, non-linear relationships between a large number of features and output, these models act as black boxes. This is a graduation project paper that is focused on loan default risk prediction by multi-layer perceptron neural network and building up explainability to some degree in the trained neural networks through sensitivity analysis. The architecture of a multi-layer perceptron neural network with the best result is used to help the credit-risk manager in explaining why an applicant is a defaulter or non-defaulter. The prediction of a trained multi-layer perceptron neural network is explained by mapping input features and target variables directly using a model-agnostic explanation as well as a modelspecific explanation. Lastly, a comparison is performed between two explanation methods. [less ▲]

Detailed reference viewed: 49 (1 UL)
Full Text
Peer Reviewed
See detail3D SPARSE DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in 27th IEEE International Conference on Image Processing (ICIP 2020), Abu Dhabi 25-28 October 2020 (2020, October)

Detailed reference viewed: 43 (0 UL)
Full Text
See detailWaste Management for Lunar Resources Activities: Towards a Circular Lunar Economy
Salmeri, Antonino UL; Pino, Paolo; Humes, Shayna et al

in Proceedings of the 71st International Astronautical Congress - The Cyberspace Edition (2020, October)

Space resources activities are currently the objective of a thriving, cross-disciplinary, global effort aimed at assessing their role and potential in the future of humankind. New, innovative mission ... [more ▼]

Space resources activities are currently the objective of a thriving, cross-disciplinary, global effort aimed at assessing their role and potential in the future of humankind. New, innovative mission concepts, legal frameworks, and advanced technologies are being actively developed and proposed with the final goal of enabling profitable and efficient space resource utilization. The immediate location for these impacts is the Moon. In sight of this bright cohort of imminent perspectives, it’s imperative for the global community to properly assess the potential effects and consequences of the forthcoming space resources activities, with the goal of including sustainability in the foundations of the ongoing progress and ensuring its enforcement in every future endeavour. Within this context, this paper addresses the topics of Moon mining waste management and a lunar circular economy as key issues in the sustainable utilization of space resources. The most promising technologies are considered for lunar resources extraction and processing - with special focus on water - correlating their waste generation potential to the scale of the efforts implemented and to the projected availability of the resources of interest. Importance is also given to the corollary activities of space mining - such as logistics and transport operations - for their implications in waste management. Protocols and technologies with the lower waste generation potential are identified and further scenarios are elaborated for waste handling, reduction, reuse, and recycle, as well as end-of-life strategies for mining plants. This report’s recommendations are proposed for the development of incremental regulation for waste management, including but not limited to the definition of common areas of non-interest for waste disposal and regulatory obligations for conducting impact assessments before the establishment of mining activities. Please note that the present paper has been developed under the auspices of the Space Generation Advisory Council, as part of the activities of the Space Exploration Project Group. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
See detailDer Wert digitaler Güter - Steuerrechtliche Einordnung
Sinnig, Julia UL

in Gräfe, Hans-Christian; Telemedicus e.V. (Eds.) Tagungsband zur Sommerkonferenz 2019: Über den Tellerrand (2020, October)

Detailed reference viewed: 33 (0 UL)
Full Text
See detailAll for one and one for all: Recommendations for Sustainable International Lunar Base Utilization and Exploration Approaches
Salmeri, Antonino UL; Poliacek, Matej

in Proceedings of the 71st International Astronautical Congress - The Cyberspace Edition (2020, October)

The return to the Moon is widely regarded as the next step of space exploration. Fifty years after the first Apollo mission, a renewed interest is fostering large global efforts in pursuing the scientific ... [more ▼]

The return to the Moon is widely regarded as the next step of space exploration. Fifty years after the first Apollo mission, a renewed interest is fostering large global efforts in pursuing the scientific and economic opportunities offered by cislunar space. The ultimate goal is to establish a sustainable human and robotic presence on the lunar surface as specified in Phase 2 of NASA’s Artemis Program. These perspectives are deeply intertwined with the rapid growth of the private space sector and the arising geopolitical complexities, related to utilisation of outer space among space-faring nations. This study summarises the results and recommendations of the NASA-sponsored Space Exploration Working Group within the Space Generation Congress 2019, organised by the Space Generation Advisory Council in Washington, D.C. The Working Group consisted of 26 delegates from 15 different countries and representatives from NASA Headquarters. The group examined the evolution of lunar exploration in terms of international cooperation, socio-economic and technological challenges, and the inclusion of private industry. This report discusses the political, economic, and technological trade-offs between a multi-agency/multinational monolithic lunar base to multiple lunar bases operated by individual nations. Using the International Space Station as a model for international cooperation, the working group concluded that an initial infrastructure of a single station requiring a collaborative effort between nations and commercial stakeholders is the recommended approach. From this foothold, the presence is expanded to multiple bases with a standardization of planning, building, and operating lunar bases. Strategic recommendations were identified to be addressed to the United Nations and other public/private stakeholders with the vision of a cooperative legal and technical framework as the optimal foundation for a sustainable lunar economy. Recommendations include developing international guidelines for cooperation, establishing international standards for stakeholders, implementing conflict resolution avenues, configuring a single international base, and expanding global partnerships. [less ▲]

Detailed reference viewed: 48 (2 UL)
Full Text
Peer Reviewed
See detailLeveraging Natural-language Requirements for Deriving Better Acceptance Criteria from Models
Veizaga Campero, Alvaro Mario UL; Alferez, Mauricio UL; Torre, Damiano UL et al

in Proceedings of 23rd ACM / IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS) (2020, October)

In many software and systems development projects, analysts specify requirements using a combination of modeling and natural language (NL). In such situations, systematic acceptance testing poses a ... [more ▼]

In many software and systems development projects, analysts specify requirements using a combination of modeling and natural language (NL). In such situations, systematic acceptance testing poses a challenge because defining the acceptance criteria (AC) to be met by the system under test has to account not only for the information in the (requirements) model but also that in the NL requirements. In other words, neither models nor NL requirements per se provide a complete picture of the information content relevant to AC. Our work in this paper is prompted by the observation that a reconciliation of the information content in NL requirements and models is necessary for obtaining precise AC. We perform such reconciliation by devising an approach that automatically extracts AC-related information from NL requirements and helps modelers enrich their model with the extracted information. An existing AC derivation technique is then applied to the model that has now been enriched by the information extracted from NL requirements. Using a real case study from the financial domain, we evaluate the usefulness of the AC-related model enrichments recommended by our approach. Our evaluation results are very promising: Over our case study system, a group of five domain experts found 89% of the recommended enrichments relevant to AC and yet absent from the original model (precision of 89%). Furthermore, the experts could not pinpoint any additional information in the NL requirements which was relevant to AC but which had not already been brought to their attention by our approach (recall of 100%) [less ▲]

Detailed reference viewed: 162 (25 UL)
Full Text
See detailDeveloping and Managing Moon and Mars Settlements in Accordance with International Space Law
Salmeri, Antonino UL

in Proceedings of the 71st International Astronautical Congress 2020 (2020, October)

Despite still being a few decades in the future, the idea of establishing an extra-terrestrial settlement on another celestial body, being it the Moon or Mars, has never been so strong. Moving from the ... [more ▼]

Despite still being a few decades in the future, the idea of establishing an extra-terrestrial settlement on another celestial body, being it the Moon or Mars, has never been so strong. Moving from the premise that future Moon and Mars settlements shall not take place in a lawless space, this paper addresses the question of how to develop and manage them in accordance with international space law. To this end, it conducts a systematic analysis of the Outer Space Treaty (OST), with the goal of assessing the scope of the freedom to use celestial bodies under international space law. Based on this analysis, and building on the successful experience of the International Space Station, the paper proposes the development of open international settlements made of shared modular facilities. In accordance with the principles of adaptive governance and subsidiarity, the paper argues that the regulation of such settlements should be based on a multi-level framework integrating international recommendations and bilateral arrangements. Under the proposed governance scheme, international recommendations should provide a general framework enabling the development of the settlement, while leaving its management to the mutual agreement of the parties. Finally, the paper presents four essential goals to be achieved by the recommendations and ultimately concludes by arguing that while international cooperation in the development and management of extra-terrestrial settlements is not a legal obligation, it may very well be the only political option that we have to preserve the peaceful uses of outer space. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
See detailA Social License to Operate for Lunar Resources Activities: Towards a Fair and Sustainable Era of Space Exploration
Salmeri, Antonino UL; Villegas, Maria Camila

in Proceedings of the 71st International Astronautical Congress - The Cyberspace Edition (2020, October)

Five years ago, soon after his nomination as ESA Director General, Jan Wörner announced the concept of a Moon Village as “an environment where both international cooperation and the commercialization of ... [more ▼]

Five years ago, soon after his nomination as ESA Director General, Jan Wörner announced the concept of a Moon Village as “an environment where both international cooperation and the commercialization of space can thrive”. Today, this concept is more alive than ever and is rapidly moving to its implementation through a series of lunar resources missions planned for as soon as 2021. In line with the spirit of cooperation and sustainability of the Moon Village, this paper addresses how lunar resources activities can become a model for fair and sustainable space exploration through the development of a Social License to Operate (SLO). SLO is defined as the efforts made by a company or entity in order to give back part of the wealth it produces to the community where it operates. On Earth, this is usually done through environmentally friendly practices, information disclosure and a various range of activities aimed at community support such as job creations, educational activities and technology transfer. Mutatis mutandis, current Earth practice on SLO can be implemented in lunar resources activities in order to ensure that they are conducted “for the benefit and interest of all Countries”, as required by Article I OST. Building on the research conducted by the Socio-Economic Panel of The Hague International Space Resources Governance Working Group, this paper explores how the development of a Social License to Operate for Lunar activities can shape a new era of fair and sustainable space exploration. Guided by the principle of adaptive governance, the paper presents the benefits of Lunar SLOs as tailored for the early stages of lunar activities. To this end, Chapter 1 presents the definition of SLO, how it is used on Earth, the experience of some countries, and the way it is granted. Following, Chapter 2 discusses the rationale for implementing SLOs for lunar activities, and how they can contribute to the early development of lunar activities. Based on the above, Chapter 3 discusses three basic features for Lunar SLOs, arguing that they should be multigoverned, multipurposes and multi-incentives. Finally, Section 4 provides a practical example of how a Lunar SLO could be structured in practice, and then the paper draws the final conclusions. Please note that this paper has been developed under the auspices of the Space Generation Advisory Council, as part of the activities of the Space Exploration Project Group [less ▲]

Detailed reference viewed: 28 (0 UL)
See detailComparison of Multidisciplinary Design Optimization Architectures for the design of Distributed Space Systems
Pandi Perumal, Raja UL; Voos, Holger UL; Dalla Vedova, Florio et al

in Pandi Perumal, Raja; Voos, Holger; Dalla Vedova, Florio (Eds.) et al Proceedings of the 71st International Astronautical Congress 2020 (2020, October)

Advancement in satellite technology, and the ability to mass-produce cost-effective small satellites has created a compelling interest in Distributed Space System (DSS), such as Low Earth Orbit (LEO ... [more ▼]

Advancement in satellite technology, and the ability to mass-produce cost-effective small satellites has created a compelling interest in Distributed Space System (DSS), such as Low Earth Orbit (LEO) satellite constellations. Optimization of DSS is a complex Multidisciplinary Design Optimization (MDO) problem involving a large number of variables and coupling relations. This paper focuses on comparing three different MDO architectures for a DSS design problem. Initially, an overview of the constellation model, the subsystems model, and the coupling relationships between the subsystems and the constellation are provided. The modelling of the subsystems and the constellation configuration are carried out in OpenMDAO. Later, three monolithic MDO architectures, namely, Individual Discipline Feasible (IDF), Simultaneous Analysis and Design (SAND) and Multidisciplinary Feasible (MDF) are compared by implementing them to the developed DSS model. The results indicate IDF outperforms the rest of the architectures for the conceptual design of DSS. The optimum objective function obtained by IDF is 1% lower than SAND and 7% lower than MDF. While the functional evaluation required for IDF is 50% lower than SAND and 90% lower than MDF. [less ▲]

Detailed reference viewed: 99 (19 UL)
Full Text
Peer Reviewed
See detailAugmented Reality in Manual Assembly Processes
Kolla, Sri Sudha Vijay Keshav UL; Sanchez, Andre UL; Minoufekr, Meysam UL et al

in Kolla, Sri Sudha Vijay Keshav; Sanchez, Andre; Minoufekr, Meysam (Eds.) et al Augmented Reality in Manual Assembly Processes (2020, September 23)

Augmented Reality (AR) is a novel technology that projects virtual information on the real world environment. With the increased use of Industry 4.0 technologies in manufacturing, AR has gained momentum ... [more ▼]

Augmented Reality (AR) is a novel technology that projects virtual information on the real world environment. With the increased use of Industry 4.0 technologies in manufacturing, AR has gained momentum across various stages of product life cycle. AR can benefit production operators in many manufacturing tasks such as quality inspection, work instructions for manual assembly, maintenance, and in training. This research presents not only a typical architecture of an AR system but also both its software and hardware functions. The architecture is then applied to display virtual assembly instructions in the form of 3D animations on to the real world environment. The chosen assembly task in this research is to assemble a planetary gearbox system. The assembly instructions are displayed on a mobile device targeting a static tracker placed in the assembly environment. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailActive Re-identification Attacks on Periodically Released Dynamic Social Graphs
Chen, Xihui UL; Kepuska, Ema UL; Mauw, Sjouke UL et al

in Chen, Liqun; Li, Ninghui; Liang, Kaitai (Eds.) et al Computer Security - ESORICS 2020 (2020, September 13)

Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to enforce structural patterns that can be used to re-identify ... [more ▼]

Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to enforce structural patterns that can be used to re-identify legitimate users on published anonymised graphs, even without additional background knowledge. So far, this type of attacks has only been studied in the scenario where the inherently dynamic social graph is published once. In this paper, we present the first active re-identification attack in the more realistic scenario where a dynamic social graph is periodically published. Our new attack leverages tempo-structural patterns, created by a dynamic set of sybil nodes, for strengthening the adversary. We evaluate our new attack through a comprehensive set of experiments on real-life and synthetic dynamic social graphs. We show that our new attack substantially outperforms the most effective static active attack in the literature by increasing success probability by at least two times and efficiency by at least 11 times. Moreover, we show that, unlike the static attack, our new attack remains at the same level of efficiency as the publication process advances. Additionally, we conduct a study on the factors that may thwart our new attack, which can help design dynamic graph anonymisation methods displaying a better balance between privacy and utility. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailTowards Privacy Preserving Data Centric Super App
Carvalho Ota, Fernando Kaway UL; Meira, Jorge Augusto UL; Frank, Raphaël UL et al

in Carvalho Ota, Fernando Kaway; Meira, Jorge Augusto; Frank, Raphaël (Eds.) et al 2020 Mediterranean Communication and Computer Networking Conference, Arona 17-19 June 2020 (2020, September 10)

The number of smartphone users recently surpassed the numbers of desktop users on Internet, and opened up countless development challenges and business opportunities. Not only the fact that the majority ... [more ▼]

The number of smartphone users recently surpassed the numbers of desktop users on Internet, and opened up countless development challenges and business opportunities. Not only the fact that the majority of users are connected using their smartphones, but the number of Internet users in general has popularized the massive use of data-driven applications. In this context, the concept of super apps seems to be the next game-changer for the mobile apps industry, and the challenges related to security and privacy are key aspects for keeping user data safe. Thus, by combining different components for provisioning, authentication, membership and others, we propose a novel framework that enables the creation of a super app using privacy by design principles. [less ▲]

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailFostering process skills with the educational technology software MathemaTIC in elementary schools
Haas, Ben; Kreis, Yves UL; Lavicza, Zsolt

in Donevska-Todorova, Ana; Faggiano, Eleonora; Trgalova, Jana (Eds.) et al Proceedings of the 10th ERME TOPIC CONFERENCE (ETC10) on Mathematics Education in the Digital Age (MEDA) (2020, September 07)

This study reports the use of automated tutoring and scaffolding implemented in the module “arithmetic word problem” in the educational technology software MathemaTIC in grade 3 (age 8 to 10). We examined ... [more ▼]

This study reports the use of automated tutoring and scaffolding implemented in the module “arithmetic word problem” in the educational technology software MathemaTIC in grade 3 (age 8 to 10). We examined 246 students with access to MathemaTIC and receiving tutoring and scaffolding through a one-to-one learning setting with this technology. The control group (n=226) had access to the same learning tasks and worked with paper-and-pencil without MathemaTIC but with their teachers. Results showed that the experimental group finished with higher outcome scores than the control group. This paper will outline the study and attempts to explain these results. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailTrace-Checking Signal-based Temporal Properties: A Model-Driven Approach
Boufaied, Chaima UL; Menghi, Claudio UL; Bianculli, Domenico UL et al

in Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE ’20) (2020, September)

Signal-based temporal properties (SBTPs) characterize the behavior of a system when its inputs and outputs are signals over time; they are very common for the requirements specification of cyber-physical ... [more ▼]

Signal-based temporal properties (SBTPs) characterize the behavior of a system when its inputs and outputs are signals over time; they are very common for the requirements specification of cyber-physical systems. Although there exist several specification languages for expressing SBTPs, such languages either do not easily allow the specification of important types of properties (such as spike or oscillatory behaviors), or are not supported by (efficient) trace-checking procedures. In this paper, we propose SB-TemPsy, a novel model-driven trace-checking approach for SBTPs. SB-TemPsy provides (i) SB-TemPsy-DSL, a domain-specific language that allows the specification of SBTPs covering the most frequent requirement types in cyber-physical systems, and (ii) SB-TemPsy-Check, an efficient, model-driven trace-checking procedure. This procedure reduces the problem of checking an SB-TemPsy-DSL property over an execution trace to the problem of evaluating an Object Constraint Language constraint on a model of the execution trace. We evaluated our contributions by assessing the expressiveness of SB-TemPsy-DSL and the applicability of SB-TemPsy-Check using a representative industrial case study in the satellite domain. SB-TemPsy-DSL could express 97% of the requirements of our case study and SB-TemPsy-Check yielded a trace-checking verdict in 87% of the cases, with an average checking time of 48.7 s. From a practical standpoint and compared to state-of-the-art alternatives, our approach strikes a better trade-off between expressiveness and performance as it supports a large set of property types that can be checked, in most cases, within practical time limits. [less ▲]

Detailed reference viewed: 148 (14 UL)
Full Text
Peer Reviewed
See detailForest SaVR – A Virtual-Reality Application to Raise Awareness of Deforestation
Botev, Jean UL; Viegas Milani, Adriano

in Proceedings of the 17th GI VR/AR Workshop (VAR) (2020, September)

Detailed reference viewed: 100 (8 UL)
Full Text
Peer Reviewed
See detailDeepNDN: Opportunistic Data Replication and Caching in Support of Vehicular Named Data
Manzo, Gaetano; Kalogeiton, Eirini; di Maio, Antonio UL et al

in 21st IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2020, September)

Although many target applications in VANETs are information-centric, the performance of Named Data Networking (NDN) in vehicular ad-hoc networks is severely hampered by persistent network partitioning ... [more ▼]

Although many target applications in VANETs are information-centric, the performance of Named Data Networking (NDN) in vehicular ad-hoc networks is severely hampered by persistent network partitioning, typical of many vehicular scenarios. Existing approaches try to address this issue by relying on opportunistic communications. However, they leave open the crucial issue of how to guarantee content persistence and tight QoS levels while optimizing the resource utilization in the vehicular environment. In this work we propose DeepNDN, a communication scheme based on the joint application of NDN and of probabilistic spatial content caching, which enables content retrieval in fragmented and dynamic network topologies with tight delay constraints. We present a data-based approach to DeepNDN management, based on locally modulating content replication and delivery in order to achieve a target hit ratio in a resource-efficient manner. Our management algorithm employs a Convolutional Neural Network (CNN) architecture for effectively capturing the complex relations between spatio-temporal patterns of mobility and content requests and DeepNDN performance. Its numerical assessment in realistic, measurement-based scenarios suggest that our management approach achieves its target set goals while outperforming a set of reference schemes. [less ▲]

Detailed reference viewed: 98 (6 UL)
Full Text
Peer Reviewed
See detailAn AI-assisted Approach for Checking the Completeness of Privacy Policies Against GDPR
Torre, Damiano UL; Abualhaija, Sallam UL; Sabetzadeh, Mehrdad UL et al

in in Proceedings of the 28th IEEE International Requirements Engineering Conference (RE’20) (2020, September)

Detailed reference viewed: 265 (27 UL)
Full Text
Peer Reviewed
See detailSparse Gaussian Process Based On Hat Basis Functions
Fang, W.; Li, H.; Huang, Hui UL et al

in 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) (2020, August 28)

Gaussian process is a popular non-parametric Bayesian methodology for modeling the regression problem, which is completely determined by its mean and covariance function. Nevertheless, this method still ... [more ▼]

Gaussian process is a popular non-parametric Bayesian methodology for modeling the regression problem, which is completely determined by its mean and covariance function. Nevertheless, this method still has two major disadvantages: it is difficult to handle large datasets and may not meet inequality constraints in specific problems. These two issues have been addressed by the so-called sparse Gaussian process and constrained Gaussian process in recent years. In this paper, to reduce the overall computational complexity in the exact Gaussian process, we propose a new sparse Gaussian process method to solve the unconstrained regression problem. The idea is inspired by the constrained Gaussian process method. The critical point of our method is that we introduce the hat basis function, which is mentioned in the constrained Gaussian process, and modify its definition according to the range of training or test data. It turns out that this method belongs to the spectral approximation methods. Similar to the exact Gaussian process and Gaussian process with Fully Independent Training Conditional approximation, our method obtains satisfactory approximate results on analytical functions or open-source datasets. [less ▲]

Detailed reference viewed: 108 (6 UL)
Full Text
Peer Reviewed
See detailA Data Science Approach for Honeypot Detection in Ethereum
Camino, Ramiro Daniel UL; Ferreira Torres, Christof UL; Baden, Mathis UL et al

in 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2020, August 17)

Detailed reference viewed: 50 (3 UL)
Full Text
Peer Reviewed
See detailAn Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Hu, Kai; Sun, Siwei; Wang, Meiqin et al

in 26th Annual International Conference on the Theory and Application of Cryptology and Information Security- ASIACRYPT 2020 (2020, August 16)

Detailed reference viewed: 83 (0 UL)
Full Text
Peer Reviewed
See detailAn Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder, Maria; Grassi, Lorenzo; Lüftenegger, Reinhard et al

in 26th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2020 (2020, August 16)

Detailed reference viewed: 76 (1 UL)
Full Text
Peer Reviewed
See detailSelf-Integration in Mediated-Reality Systems: a Socio-Technical Perspective
Botev, Jean UL

in Proceedings of the 1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS) (2020, August)

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Highlight paper)
Steen, Alexander UL; Benzmüller, Christoph UL

in Proceedings of the 24th European Conference on Artificial Intelligence (2020, August)

Leo-III is an effective automated theorem prover for extensional type theory with Henkin semantics. It is based on an extensional higher-order paramodulation calculus and supports reasoning in monomorphic ... [more ▼]

Leo-III is an effective automated theorem prover for extensional type theory with Henkin semantics. It is based on an extensional higher-order paramodulation calculus and supports reasoning in monomorphic and rank-1 polymorphic first-order and higher-order logics. Leo-III also automates various non-classical logics, including almost every normal higher-order modal logic. [less ▲]

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailOne-Bit Quantized Constructive Interference Based Precoding for Massive Multiuser MIMO Downlink
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Shahbazpanahi, Shahram UL et al

in One-Bit Quantized Constructive Interference Based Precoding for Massive Multiuser MIMO Downlink (2020, July 27)

We propose a one-bit symbol-level precoding method for massive multiuser multiple-input multiple-output (MU-MIMO) downlink systems using the idea of constructive interference (CI). In particular, we adopt ... [more ▼]

We propose a one-bit symbol-level precoding method for massive multiuser multiple-input multiple-output (MU-MIMO) downlink systems using the idea of constructive interference (CI). In particular, we adopt a max-min fair design criterion which aims to maximize the minimum instantaneous received signal-to-noise ratio (SNR) among the user equipments (UEs), while ensuring a CI constraint for each UE and under the restriction that the output of the precoder is a vector of binary elements. This design problem is an NP-hard binary quadratic programming due to the one-bit constraints on the elements of the precoder’s output vector, and hence, is difficult to solve. In this paper, we tackle this difficulty by reformulating the problem, in several steps, into an equivalent continuous-domain biconvex form. Our final biconvex reformulation is obtained via an exact penalty approach and can efficiently be solved using a standard block coordinate ascent algorithm. We show through simulation results that the proposed design outperforms the existing schemes in terms of (uncoded) bit error rate. It is further shown via numerical analysis that our solution algorithm is computationally-efficient as it needs only a few tens of iterations to converge in most practical scenarios. [less ▲]

Detailed reference viewed: 58 (7 UL)
Full Text
Peer Reviewed
See detailJoint User Scheduling, and Precoding for Multicast Spectral Efficiency in Multigroup Multicast Systems
Bandi, Ashok UL; Mysore Rama Rao, Bhavani Shankar UL; Chatzinotas, Symeon UL et al

in International conference on signal processing and communications (SPCOM) (2020, July)

This paper studies the joint design of user scheduling and precoding for the maximization of spectral efficiency (SE) for a multigroup multicast scenario in multiuser MISO downlink channels. Noticing that ... [more ▼]

This paper studies the joint design of user scheduling and precoding for the maximization of spectral efficiency (SE) for a multigroup multicast scenario in multiuser MISO downlink channels. Noticing that the existing definition of SE fails to account for group sizes, a new metric called multicast spectral efficiency (MC-SE) is proposed. In this context, the joint design is considered for the maximization of MC-SE. Firstly, with the help of binary scheduling variables, the joint design problem is formulated as a mixed-integer non-linear programming problem such that it facilitates the joint update of scheduling and precoding variables. Further, useful reformulations are proposed to reveal the hidden difference-of-convex/concave structure of the problem. Thereafter, we propose a convex-concave procedure based iterative algorithm with convergence guarantees to a stationary point. Finally, we compare different aspects namely MC-SE, SE and number of scheduled users through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 53 (3 UL)
Full Text
Peer Reviewed
See detailProceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20)
Veiber, Lisa UL; Allix, Kevin UL; Arslan, Yusuf UL et al

in Veiber, Lisa; Allix, Kevin; Arslan, Yusuf (Eds.) et al Challenges Towards Production-Ready Explainable Machine Learning (2020, July)

Machine Learning (ML) is increasingly prominent in or- ganizations. While those algorithms can provide near perfect accuracy, their decision-making process remains opaque. In a context of accelerating ... [more ▼]

Machine Learning (ML) is increasingly prominent in or- ganizations. While those algorithms can provide near perfect accuracy, their decision-making process remains opaque. In a context of accelerating regulation in Artificial Intelligence (AI) and deepening user awareness, explainability has become a priority notably in critical healthcare and financial environ- ments. The various frameworks developed often overlook their integration into operational applications as discovered with our industrial partner. In this paper, explainability in ML and its relevance to our industrial partner is presented. We then dis- cuss the main challenges to the integration of ex- plainability frameworks in production we have faced. Finally, we provide recommendations given those challenges. [less ▲]

Detailed reference viewed: 55 (9 UL)
Full Text
Peer Reviewed
See detailAutomated Repair of Feature Interaction Failures in Automated Driving Systems
Ben Abdessalem, Raja; Panichella, Annibale; Nejati, Shiva UL et al

in Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020) (2020, July)

In the past years, several automated repair strategies have been proposed to fix bugs in individual software programs without any human intervention. There has been, however, little work on how automated ... [more ▼]

In the past years, several automated repair strategies have been proposed to fix bugs in individual software programs without any human intervention. There has been, however, little work on how automated repair techniques can resolve failures that arise at the system-level and are caused by undesired interactions among different system components or functions. Feature interaction failures are common in complex systems such as autonomous cars that are typically built as a composition of independent features (i.e., units of functionality). In this paper, we propose a repair technique to automatically resolve undesired feature interaction failures in automated driving systems (ADS) that lead to the violation of system safety requirements. Our repair strategy achieves its goal by (1) localizing faults spanning several lines of code, (2) simultaneously resolving multiple interaction failures caused by independent faults, (3) scaling repair strategies from the unit-level to the system-level, and (4) resolving failures based on their order of severity. We have evaluated our approach using two industrial ADS containing four features. Our results show that our repair strategy resolves the undesired interaction failures in these two systems in less than 16h and outperforms existing automated repair techniques. [less ▲]

Detailed reference viewed: 91 (10 UL)
Full Text
Peer Reviewed
See detailDeveloping an Interactive Tabletop Mediated Activity to Induce Collaboration by Implementing Design Considerations Based on Cooperative Learning Principles
Sunnen, Patrick UL; Arend, Béatrice UL; Heuser, Svenja UL et al

in Stephanidis, Constantine; Antona, Margherita (Eds.) HCI International 2020 - Posters (2020, July)

Constructive collaboration can be a difficult matter. For this reason, we are implementing and studying an interactive-tabletop-mediated activity that aims at inducing collaboration among participants ... [more ▼]

Constructive collaboration can be a difficult matter. For this reason, we are implementing and studying an interactive-tabletop-mediated activity that aims at inducing collaboration among participants. The resulting activity ‘Orbitia’ is designed as a serious game. Participants are asked to act as a space- mining crew, which has to collect minerals with a rover and rely on a camera- drone for reconnaissance, while keeping the rover out of harm and managing limited resources. In this paper we provide an account of how we designed Orbitia’s pedagogical structuring by relying on the Johnsons’ cooperative learning approach whose fundamental concept is “positive interdependence”. More particularly, we show how we worked on resource, role and task inter- dependence to design three collaboration-inducing ‘flagship’ devices: the rover- steering-device (RSD), the item-locating-device (ILD) and the responsibility- activating-device (RAD). [less ▲]

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailImmersive Telepresence Framework for Remote Educational Scenarios
Botev, Jean UL; Rodríguez Lera, Francisco J.

in Proceedings of the 22nd International Conference on Human-Computer Interaction (HCI International) (2020, July)

Detailed reference viewed: 69 (10 UL)
Full Text
Peer Reviewed
See detailUML Consistency Rules:a Case Study with Open-Source UML Models
Torre, Damiano UL; Labiche, Yvan; Genero, Marcela et al

in Proceedings of the 8th International Conference on Formal Methods in Software Engineering (2020, July)

UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by ... [more ▼]

UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by software designers. Since the various UML diagram types describe different aspects of a software system, they are not independent but strongly depend on each other, hence they must be consistent. Inconsistencies cause faults in the final software systems. It is, therefore, paramount that they get detected, analyzed, and fixed. Consistency rules are a useful tool proposed in the literature to detect inconsistencies. They categorize constraints that help in identifying inconsistencies when violated. This case study aims at collecting and analyzing UML models with OCL consistency rules proposed in the literature and at promoting the development of a reference benchmark that can be reused by the (FM-)research community. We collected 33 UML consistency rules and 206 different UML diagrams contained in 34 open-source UML models presented in the literature. We propose an FM-based encoding of the consistency rules in OCL. This encoding allows analyzing whether the consistency rules are satisfied or violated within the 34 UML models. To assess the proposed benchmark, we analyzed how the UML models, consistency rules, diagram types contained in the benchmark help in assessing the consistency of UML models, and the consistency of diagrams across the different software development phases. Our results show that the considered UML models and consistency rules allowed identifying 2731 inconsistencies and that those inconsistencies refer to different software development phases. We concluded that the considered UML models and consistency rules could be considered as an initial benchmark that can be further extended by the research community. [less ▲]

Detailed reference viewed: 166 (16 UL)
Full Text
Peer Reviewed
See detailPolitiques de synchronisation dans les systèmes multi-agents distribués parallèles
Rousset, Alban UL; Breugnot, Paul; Herrmann, Bénédicte et al

in Rousset, Alban (Ed.) Politiques de synchronisation dans les systèmes multi-agents distribués parallèles (2020, June 29)

Among simulation or modelisation methods, multi-agent systems are an interesting candidate to simulate complex systems. As the size of the model's increases, the use of parallel multi-agent systems is ... [more ▼]

Among simulation or modelisation methods, multi-agent systems are an interesting candidate to simulate complex systems. As the size of the model's increases, the use of parallel multi-agent systems is mandatory but comes with many issues. In this article, we are interested in the impact of synchronization on models design and on their execution. We highlight synchronization problems through model instances then we experimentally analyze the impact of synchronization on large scale test cases. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailSupporting Citizens’ Political Decision-Making Using Information Visualisation
Graf, Vanessa; Graf-Drasch, Valerie; Tiefenbeck, Verena et al

in Proceedings of the 28th European Conference on Information Systems (ECIS) (2020, June 17)

Individual decision-making is a complex process. If carried out by individual citizens in the context of politically relevant decisions, serious consequences at all levels of a society might occur. That ... [more ▼]

Individual decision-making is a complex process. If carried out by individual citizens in the context of politically relevant decisions, serious consequences at all levels of a society might occur. That is why these decisions need to be made with care and preferably on a broad set of information to reflect citizens’ true preferences. However, due to limited attention, citizens often consider only salient aspects in their decision-making. To mitigate unwanted consequences following therefrom, citizens are in dire need of decision-support. We address this need by developing an Information Systems (IS) tool. Being based on information visualisation, our tool supports citizens by providing instant feedback. To ensure a meaningful engagement, the IS tool is designed according to gamification principles. A first instantiation in the context of renewable energy acceptance in Germany yields three key findings: First, we find indications that young, urban, and environmentally aware citizens are willing to accept a high percentage of renewable wind energy. Second, we find that the tool influences citizens’ decision-making. Third, we find citizens to update, however not completely turn over their preferred level of renewable wind energy after interaction with the tool. This holds true across different cross-sections of the population. [less ▲]

Detailed reference viewed: 69 (0 UL)
Full Text
See detailDiscovering Everyday Mathematical Situations Outside the Classroom with MathCityMap and GeoGebra 3D
Lavicza, Zsolt; Haas, Ben; Kreis, Yves UL

in Ludwig, Matthias; Jablonski, Simone; Caldeira, Amélia (Eds.) et al Research on Outdoor STEM Education in the digiTal Age: Proceedings of the ROSETA Online Conference in June 2020 (2020, June 10)

In elementary school, teaching and learning activities aim to develop, among others, students’ skills to acquire deeper understanding of their living environments. There are numerous opportunities for ... [more ▼]

In elementary school, teaching and learning activities aim to develop, among others, students’ skills to acquire deeper understanding of their living environments. There are numerous opportunities for students to recognize forms, shapes, and mathematical connections in everyday situations. These everyday situations can be simulated in classrooms; however, educational technologies offer new approaches to extend classroom activities, teachers can simulate and design shapes through Augmented Reality and 3D printing within or beyond the classroom. To stimulate students’ everyday mathematical connections utilizing these technologies could assist in developing activities outside the classroom in urban or in natural environments. Through this approach students could utilize or enhance their mathematical and technical skills within their usual living environments. Utilising educational software such as MathCityMap, GeoGebra 3D Calculator, and other 3D modelling software we developed examples of tasks that could offer easy transitions from in- to out-side of classrooms. In this paper, we will describe learning and teaching aims of these tasks and outline further research and development directions to broaden opportunities to develop students’ mathematical, design and modelling skills. [less ▲]

Detailed reference viewed: 106 (7 UL)
Full Text
Peer Reviewed
See detailToward an SDN-based Data Collection Scheme for Vehicular Fog Computing
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in IEEE International Conference on Communications ICC'2020 (2020, June 07)

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during ... [more ▼]

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during journeys. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a fully-programmable, self-configurable, and context-aware data collection scheme for VFC. This scheme leverages a stochastic model to dynamically estimate the number of fog stations to be deployed. Our simulation results demonstrate that our proposed scheme provides lower latency and higher resiliency compared to classical data collection schemes. [less ▲]

Detailed reference viewed: 123 (40 UL)
Full Text
Peer Reviewed
See detailA Novel Heap-based Pilot Assignment for Full Duplex Cell-Free Massive MIMO with Zero-Forcing
Nguyen, Van Hieu; Nguyen, van Dinh UL; Dobre, Octavia A. et al

in IEEE International Conference on Communications (2020, June 07)

This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD ... [more ▼]

This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD capability simultaneously serve numerous uplink and downlink user equipments (UEs) on the same time-frequency resources. To enable the incorporation of FD technology in CF-mMIMO systems, we propose a novel heapbased pilot assignment algorithm, which not only can mitigate the effects of pilot contamination but also reduce the involved computational complexity. Then, we formulate a robust design problem for spectral efficiency (SE) maximization in which the power control and AP-UE association are jointly optimized, resulting in a difficult mixed-integer nonconvex programming. To solve this problem, we derive a more tractable problem before developing a very simple iterative algorithm based on inner approximation method with polynomial computational complexity. Numerical results show that our proposed methods with realistic parameters significantly outperform the existing approaches in terms of the quality of channel estimate and SE. [less ▲]

Detailed reference viewed: 114 (29 UL)
Full Text
Peer Reviewed
See detailEnhancing CoAP Group Communication to Support mMTC Over Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Stemper, André UL et al

in IEEE International Conference on Communications (ICC) (2020, June)

Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served ... [more ▼]

Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served areas, where several services can benefit from the adoption of a group communication model. The IETF has specifically standardized the usage of CoAP group communication. However, CoAP responses are still sent in unicast from each single CoAP server to the CoAP client, which results in a substantial traffic load. Such problem becomes more severe in integrated IoT-Satellite networks given the limited bandwidth of the satellite return channel and the large number of IoT devices in a mMTC scenario. To reduce network traffic overhead in group communication and improve the network responsiveness, this paper proposes an aggregation scheme for the CoAP group communication in combination with Observer pattern and proxying. Results obtained by using the openSAND emulator and CoAPthon library corroborate the merit of our optimization in terms of overhead reduction and delay. [less ▲]

Detailed reference viewed: 129 (6 UL)
Full Text
Peer Reviewed
See detailPredicting near-optimal skin distance in Verlet buffer approach for Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Besseron, Xavier UL; Rousset, Alban UL et al

in 10th IEEE Workshop on Parallel / Distributed Combinatorics and Optimization (2020, June)

The Verlet list method is a well-known bookkeeping technique of the interaction list used both in Molecular Dynamic (MD) and Discrete Element Method (DEM). The Verlet buffer technique is an enhancement of ... [more ▼]

The Verlet list method is a well-known bookkeeping technique of the interaction list used both in Molecular Dynamic (MD) and Discrete Element Method (DEM). The Verlet buffer technique is an enhancement of the Verlet list that consists of extending the interaction radius of each particle by an extra margin to take into account more particles in the interaction list. The extra margin is based on the local flow regime of each particle to account for the different flow regimes that can coexist in the domain. However, the choice of the near-optimal extra margin (which ensures the best performance) for each particle and the related parameters remains unexplored in DEM unlike in MD. In this study, we demonstrate that the near-optimal extra margin can fairly be characterized by four parameters that describe each particle local flow regime: the particle velocity, the ratio of the containing cell size to particle size, the containing cell solid fraction, and the total number of particles in the system. For this purpose, we model the near-optimal extra margin as a function of these parameters using a quadratic polynomial function. We use the DAKOTA SOFTWARE to carry out the Design and Analysis of Computer Experiments (DACE) and the sampling of the parameters for the simulations. For a given instance of the set of parameters, a global optimization method is considered to find the near-optimal extra margin. The latter is required for the construction of the quadratic polynomial model. The numerous simulations generated by the sampling of the parameter were performed on a High-Performance Computing (HPC) environment granting parallel and concurrent executions. This work provides a better understanding of the Verlet buffer method in DEM simulations by analyzing its performances and behavior in various configurations. The near-optimal extra margin can reasonably be predicted by two out of the four chosen parameters using the quadratic polynomial model. This model has been integrated into XDEM in order to automatically choose the extra margin without any input from the user. Evaluations on real industrial-level test cases show up to a 26% reduction of the execution time. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailGOING DEEPER WITH NEURAL NETWORKS WITHOUT SKIP CONNECTIONS
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing (ICIP 2020), Abu Dhabi, UAE, Oct 25–28, 2020 (2020, May 30)

Detailed reference viewed: 88 (5 UL)
Full Text
Peer Reviewed
See detailOn the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs
Liu, Kui UL; Wang, Shangwen; Koyuncu, Anil UL et al

in 42nd ACM/IEEE International Conference on Software Engineering (ICSE) (2020, May)

Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but ... [more ▼]

Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but affordable, approximation to program specifications. Although the literature regularly sets new records on the number of benchmark bugs that can be fixed, several studies increasingly raise concerns about the limitations and biases of state-of-the-art approaches. For example, the correctness of generated patches has been questioned in a number of studies, while other researchers pointed out that evaluation schemes may be misleading with respect to the processing of fault localization results. Nevertheless, there is little work addressing the efficiency of patch generation, with regard to the practicality of program repair. In this paper, we fill this gap in the literature, by providing an extensive review on the efficiency of test suite based program repair. Our objective is to assess the number of generated patch candidates, since this information is correlated to (1) the strategy to traverse the search space efficiently in order to select sensical repair attempts, (2) the strategy to minimize the test effort for identifying a plausible patch, (3) as well as the strategy to prioritize the generation of a correct patch. To that end, we perform a large-scale empirical study on the efficiency, in terms of quantity of generated patch candidates of the 16 open-source repair tools for Java programs. The experiments are carefully conducted under the same fault localization configurations to limit biases. Eventually, among other findings, we note that: (1) many irrelevant patch candidates are generated by changing wrong code locations; (2) however, if the search space is carefully triaged, fault localization noise has little impact on patch generation efficiency; (3) yet, current template-based repair systems, which are known to be most effective in fixing a large number of bugs, are actually least efficient as they tend to generate majoritarily irrelevant patch candidates. [less ▲]

Detailed reference viewed: 139 (7 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis of Distributed and Scalable Deep Learning
Mahon, S.; Varrette, Sébastien UL; Plugaru, Valentin UL et al

in 20th IEEE/ACM Intl. Symp. on Cluster, Cloud and Internet Computing (CCGrid'20) (2020, May)

With renewed global interest for Artificial Intelligence (AI) methods, the past decade has seen a myriad of new programming models and tools that enable better and faster Machine Learning (ML). More ... [more ▼]

With renewed global interest for Artificial Intelligence (AI) methods, the past decade has seen a myriad of new programming models and tools that enable better and faster Machine Learning (ML). More recently, a subset of ML known as Deep Learning (DL) raised an increased interest due to its inherent ability to tackle efficiently novel cognitive computing applications. DL allows computational models that are composed of multiple processing layers to learn in an automated way representations of data with multiple levels of abstraction, and can deliver higher predictive accuracy when trained on larger data sets. Based on Artificial Neural Networks (ANN), DL is now at the core of state of the art voice recognition systems (which enable easy control over e.g. Internet-of- Things (IoT) smart home appliances for instance), self-driving car engine, online recommendation systems. The ecosystem of DL frameworks is fast evolving, as well as the DL architectures that are shown to perform well on specialized tasks and to exploit GPU accelerators. For this reason, the frequent performance evaluation of the DL ecosystem is re- quired, especially since the advent of novel distributed training frameworks such as Horovod allowing for scalable training across multiple computing resources. In this paper, the scalability evaluation of the reference DL frameworks (Tensorflow, Keras, MXNet, and PyTorch) is performed over up-to-date High Performance Comput- ing (HPC) resources to compare the efficiency of differ- ent implementations across several hardware architectures (CPU and GPU). Experimental results demonstrate that the DistributedDataParallel features in the Pytorch library seem to be the most efficient framework for distributing the training process across many devices, allowing to reach a throughput speedup of 10.11 when using 12 NVidia Tesla V100 GPUs when training Resnet44 on the CIFAR10 dataset. [less ▲]

Detailed reference viewed: 107 (7 UL)
Full Text
Peer Reviewed
See detailDeep Learning for Beam Hopping in Multibeam Satellite Systems
Lei, Lei UL; Lagunas, Eva UL; Yuan, Yaxiong UL et al

in IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Detailed reference viewed: 140 (27 UL)
Full Text
Peer Reviewed
See detailTransmit Beamforming Design with Received-Interference Power Constraints: The Zero-Forcing Relaxation
Lagunas, Eva UL; Perez-Neira, Ana; Lagunas, Miguel Angel et al

in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), Barcelona, Spain, May 2020 (2020, May)

Detailed reference viewed: 63 (6 UL)
Full Text
Peer Reviewed
See detailSDN-based Misbehavior Detection System for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing ... [more ▼]

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing misbehavior detection systems are static and do not adapt to the context of vehicles. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a context-aware MDS. Based on the context, our proposed system can tune security parameters to provide accurate detection with low false positives. Our system is Sybil attack-resistant and compliant with vehicular privacy standards. The simulation results show that, under different contexts, our system provides a high detection ratio and low false positives compared to a static MDS. [less ▲]

Detailed reference viewed: 148 (25 UL)
Full Text
Peer Reviewed
See detailBacAnalytics: A Tool to Support Secondary School Examination in France
Roussanaly, Azim; Aleksandrova, Marharyta UL; Boyer, Anne

in 25th International Symposium on Intelligent Systems (ISMIS 2020) (2020, May)

Students who failed the final examination in the secondary school in France (known as baccalauréat or baccalaureate) can improve their scores by passing a remedial test. This test consists of two oral ... [more ▼]

Students who failed the final examination in the secondary school in France (known as baccalauréat or baccalaureate) can improve their scores by passing a remedial test. This test consists of two oral examinations in two subjects of the student's choice. Students announce their choice on the day of the remedial test. Additionally, the secondary education system in France is quite complex. There exist several types of baccalaureate consisting of various streams. Depending upon the stream students belong to, they have different subjects allowed to be taken during the remedial test and different coefficients associated with each of them. In this context, it becomes difficult to estimate the number of professors of each subject required for the examination. Thereby, the general practice of remedial test organization is to mobilize a large number of professors. In this paper, we present BacAnalytics - a tool that was developed to assist the rectorate of secondary schools with the organization of remedial tests for the baccalaureate. Given profiles of students and their choices of subjects for previous years, this tool builds a predictive model and estimates the number of required professors for the current year. In the paper, we present the architecture of the tool, analyze its performance, and describe its usage by the rectorate of the Academy of Nancy-Metz in Grand Est region of France in the years 2018 and 2019. BacAnalytics achieves almost 100% of prediction accuracy with approximately 25% of redundancy and was awarded a French national prize Impulsions 2018. [less ▲]

Detailed reference viewed: 46 (2 UL)
Full Text
Peer Reviewed
See detail'Faster-than-Nyquist Signaling via Spatiotemporal Symbol-Level Precoding for Multi-User MISO Redundant Transmissions
Alves Martins, Wallace UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2020), Barcelona 4-8 May 2020 (2020, May)

This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We ... [more ▼]

This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We propose a framework for redundant block-based symbol-level precoders enabling the trade-off between constructive and destructive multi-user and interblock interference (IBI) effects at the single-antenna user terminals. Redundant elements are added as guard interval to handle IBI destructive effects. It is shown that, within this framework, accelerating the transmissions via FTN signaling improves the error-free spectral efficiency, up to a certain acceleration factor beyond which the transmitted information cannot be perfectly recovered by linear filtering followed by sampling. Simulation results corroborate that the proposed spatiotemporal symbol-level precoding can change the amount of added redundancy from zero (full IBI) to half (IBI-free) the equivalent channel order, so as to achieve a target balance between spectral and energy efficiencies. [less ▲]

Detailed reference viewed: 67 (5 UL)
Full Text
Peer Reviewed
See detailSecurity and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor
Mitseva, Asya UL; Aleksandrova, Marharyta UL; Engel, Thomas UL et al

in Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor (2020, May)

Detailed reference viewed: 82 (6 UL)
Full Text
Peer Reviewed
See detail3D DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020), Barcelona 4-8 May 2020 (2020, May)

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailAn Annotation Framework for Luxembourgish Sentiment Analysis
Sirajzade, Joshgun UL; Gierschek, Daniela UL; Schommer, Christoph UL

in Besacier, Laurent; Sakti, Sakriani; Soria, Claudia (Eds.) et al Proceedings of the LREC 2020 1st Joint SLTU and CCURL Workshop (SLTU-CCURL 2020) (2020, May)

The aim of this paper is to present a framework developed for crowdsourcing sentiment annotation for the low-resource language Luxembourgish. Our tool is easily accessible through a web interface and ... [more ▼]

The aim of this paper is to present a framework developed for crowdsourcing sentiment annotation for the low-resource language Luxembourgish. Our tool is easily accessible through a web interface and facilitates sentence-level annotation of several annotators in parallel. In the heart of our framework is an XML database, which serves as central part linking several components. The corpus in the database consists of news articles and user comments. One of the components is LuNa, a tool for linguistic preprocessing of the data set. It tokenizes the text, splits it into sentences and assigns POS-tags to the tokens. After that, the preprocessed text is stored in XML format into the database. The Sentiment Annotation Tool, which is a browser-based tool, then enables the annotation of split sentences from the database. The Sentiment Engine, a separate module, is trained with this material in order to annotate the whole data set and analyze the sentiment of the comments over time and in relationship to the news articles. The gained knowledge can again be used to improve the sentiment classification on the one hand and on the other hand to understand the sentiment phenomenon from the linguistic point of view. [less ▲]

Detailed reference viewed: 40 (6 UL)
Full Text
Peer Reviewed
See detailDynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'20) (2020, May)

The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a ... [more ▼]

The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situation is unfolding, and therefore rely on configurable software-defined networks (SDN). In this paper, we propose a dynamic adaptive SDN configuration approach for IoT systems. The approach enables resolving congestion in real time while minimizing network utilization, data transmission delays and adaptation costs. Our approach builds on existing work in dynamic adaptive search-based software engineering (SBSE) to reconfigure an SDN while simultaneously ensuring multiple quality of service criteria. We evaluate our approach on an industrial national emergency management system, which is aimed at detecting disasters and emergencies, and facilitating recovery and rescue operations by providing first responders with a reliable communication infrastructure. Our results indicate that (1) our approach is able to efficiently and effectively adapt an SDN to dynamically resolve congestion, and (2) compared to two baseline data forwarding algorithms that are static and non-adaptive, our approach increases data transmission rate by a factor of at least 3 and decreases data loss by at least 70%. [less ▲]

Detailed reference viewed: 258 (33 UL)
Full Text
Peer Reviewed
See detailComponent Analysis of Adjectives in Luxembourgish for Detecting Sentiments
Sirajzade, Joshgun UL; Gierschek, Daniela UL; Schommer, Christoph UL

in Beermann, Dorothee; Besacier, Laurent; Sakti, Sakriani (Eds.) et al Proceedings of the LREC 2020 1st Joint SLTU and CCURL Workshop(SLTU-CCURL 2020) (2020, May)

The aim of this paper is to investigate the role of Luxembourgish adjectives in expressing sentiments in user comments written at the web presence of rtl.lu (RTL is the abbreviation for Radio Television ... [more ▼]

The aim of this paper is to investigate the role of Luxembourgish adjectives in expressing sentiments in user comments written at the web presence of rtl.lu (RTL is the abbreviation for Radio Television Lëtzebuerg). Alongside many textual features or representations, adjectives could be used in order to detect sentiment, even on a sentence or comment level. In fact, they are also by themselves one of the best ways to describe a sentiment, despite the fact that other word classes such as nouns, verbs, adverbs or conjunctions can also be utilized for this purpose. The empirical part of this study focuses on a list of adjectives that were extracted from an annotated corpus. The corpus contains the part of speech tags of individual words and sentiment annotation on the adjective, sentence, and comment level. Suffixes of Luxembourgish adjectives like -esch, -eg, -lech, -al, -el, -iv, -ent, -los, -bar and the prefix on- were explicitly investigated, especially by paying attention to their role in regards to building a model by applying classical machine learning techniques. We also considered the interaction of adjectives with other grammatical means, especially other part of speeches, e.g. negations, which can completely reverse the meaning, thus the sentiment of an utterance. [less ▲]

Detailed reference viewed: 43 (5 UL)
Full Text
Peer Reviewed
See detailProceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020)
Danoy, Grégoire UL; Pang, Jun UL; Sutcliffe

in 6th Global Conference on Artificial Intelligence (2020, May)

Detailed reference viewed: 96 (9 UL)
Full Text
Peer Reviewed
See detailLOVBench: Ontology Ranking Benchmark
Kolbe, Niklas UL; Vandenbussche, Pierre-Yves; Kubler, Sylvain UL et al

in Proceedings of The Web Conference 2020 (WWW '20) (2020, April)

Detailed reference viewed: 42 (9 UL)
Full Text
Peer Reviewed
See detailIntegrating Topological Proofs with Model Checking to Instrument Iterative Design
Menghi, Claudio UL; Rizzi, Alessandro Maria; Bernasconi, Anna

in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 (2020, April)

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous ... [more ▼]

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous verification can be performed after each refinement or revision step. To achieve practical adoption, formal verification must accommodate continuous verification efficiently and effectively. Model checking provides developers with information useful to improve their models only when a property is not satisfied, i.e., when a counterexample is returned. However, it is desirable to have some useful information also when a property is instead satisfied. To address this problem we propose TOrPEDO, an approach that supports verification in two complementary forms: model checking and proofs. While model checking is typically used to pinpoint model behaviors that violate requirements, proofs can instead explain why requirements are satisfied. In our work, we introduce a specific notion of proof, called Topological Proof. A topological proof produces a slice of the original model that justifies the property satisfaction. Because models can be incomplete, TOrPEDO supports reasoning on requirements satisfaction, violation, and possible satisfaction (in the case where satisfaction depends on unknown parts of the model). Evaluation is performed by checking how topological proofs support software development on 12 modeling scenarios and 15 different properties obtained from 3 examples from literature. Results show that: (i) topological proofs are ≈60% smaller than the original models; (ii) after a revision, in ≈78% of cases, the property can be re-verified by relying on a simple syntactic check. [less ▲]

Detailed reference viewed: 132 (16 UL)
Full Text
Peer Reviewed
See detailNeuere Methoden zur Identifikation und Lokalisierung von Schäden an vorgespannten Betonbrücken
Maas, Stefan UL; Nguyen, Viet Ha UL; Kebig, Tanja UL

in Bischoff, Manfred; von Scheven, Malte; Oesterle, Bernd (Eds.) Baustatik-Baupraxis 14 (2020, March 23)

Zuerst wird ein rein statistischer Schadensindikator basierend auf der Hauptkomponentenanalyse vorgestellt. Wichtig sind Referenzmessungen im ungeschädigten Zustand, um Veränderungen zu identifizieren ... [more ▼]

Zuerst wird ein rein statistischer Schadensindikator basierend auf der Hauptkomponentenanalyse vorgestellt. Wichtig sind Referenzmessungen im ungeschädigten Zustand, um Veränderungen zu identifizieren. Bevor die Messdaten mit den Rechenmodellen kombiniert werden, müssen Temperatureffekte kompensiert werden, um dann die Schäden zu erkennen und zu lokalisieren. Ein „Model-Updating“ Prozess eines speziellen Finite-Elemente- Modells passt die Steifigkeitsmatrix an die gemessenen Eigenfrequenzen oder an die progressive Absenkung unter Eigengewicht an. [less ▲]

Detailed reference viewed: 52 (8 UL)
Full Text
Peer Reviewed
See detailAgentenbasierte, hybride Steuerungsarchitektur für cyberphysische Refabrikationssysteme
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Jäkel, Jens; Thiel, Robert (Eds.) Tagungsband AALE 2020 Automatisierung und Mensch-Technik-Interaktion (2020, March 05)

Detailed reference viewed: 70 (2 UL)
Full Text
Peer Reviewed
See detailMensch-Roboter-Kollaboration in der Domäne Refabrikation – State-of-the-Art und Ausblick
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Jäkel, Jens; Thiel, Robert (Eds.) Tagungsband AALE 2020 Automatisierung und Mensch-Technik-Interaktion (2020, March 05)

Detailed reference viewed: 68 (0 UL)
Full Text
Peer Reviewed
See detailStructured Compression of Deep Neural Networks with Debiased Elastic Group LASSO
Oyedotun, Oyebade UL; Aouada, Djamila UL; Ottersten, Björn UL

in IEEE 2020 Winter Conference on Applications of Computer Vision (WACV 20), Aspen, Colorado, US, March 2–5, 2020 (2020, March 01)

Detailed reference viewed: 82 (11 UL)
Full Text
Peer Reviewed
See detailTowards an Executable Methodology for the Formalization of Legal Texts
Libal, Tomer UL; Steen, Alexander UL

in Dastani, Mehdi; Dong, Huimin; van der Torre, Leon (Eds.) Logic and Argumentation. CLAR 2020 (2020, March)

A methodology for the formalization of legal texts is presented. This methodology is based on features of the NAI Suite, a recently developed formalization environment for legal texts. The ability of the ... [more ▼]

A methodology for the formalization of legal texts is presented. This methodology is based on features of the NAI Suite, a recently developed formalization environment for legal texts. The ability of the tool to execute queries is used in order to drive a correct formalization until all queries are validated. The approach is studied on a fragment of the Smoking Prohibition (Children in Motor Vehicles) (Scotland) Act 2016 of the Scottish Parliament. [less ▲]

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailAnalyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments
Mitseva, Asya UL; Engel, Thomas UL; Panchenko, Andriy

in Analyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments (2020, March)

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailMetamorphic Security Testing for Web Systems
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020 (2020, March)

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input ... [more ▼]

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In many situations where potential vulnerabilities are tested, a test oracle may not exist, or it might be impractical due to the many inputs for which specific oracles have to be defined. In this paper, we propose a metamorphic testing approach that alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture security properties of the system. Such MRs are then used to automate testing and detect vulnerabilities. We provide a catalog of 22 system-agnostic MRs to automate security testing in Web systems. Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. It automatically detected 10 out of 12 vulnerabilities affecting two widely used systems, one commercial and the other open source (Jenkins). [less ▲]

Detailed reference viewed: 145 (19 UL)
Full Text
Peer Reviewed
See detailMM-Based Solution for Partially Connected Hybrid Transceivers with Large Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 2019 IEEE Global Communications Conference (GLOBECOM) (2020, February 27)

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost ... [more ▼]

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost. In a hybrid analog-digital (A/D) transceiver, the pre/post-processing operation splits into a lower-dimensional baseband (BB) pre/postcoder, followed by a network of analog phase shifters. Primarily two kinds of hybrid architectures are proposed in the literature to implement hybrid transceivers namely, the fully-connected and the partially-connected. Implementation of fully-connected architecture has higher hardware complexity, cost and power consumption in comparison with partially-connected. In this paper, we focus on partially-connected hybrid architecture and develop a low-complexity algorithm for transceiver design for a single user point-to-point mmWave MIMO system. The proposed algorithm utilizes the variable elimination (projection) and the minorization-maximization (MM) frameworks and has convergence guarantees to a stationary point. Simulation results demonstrate that the proposed algorithm is easily scalable for LSAA systems and achieves significantly improved performance in terms of the spectral efficiency (SE) of the system compared to the state-of-the-art solution. [less ▲]

Detailed reference viewed: 79 (17 UL)
Full Text
Peer Reviewed
See detailNAI: Towards Transparent and Usable Semi-Automated Legal Analysis
Libal, Tomer UL; Steen, Alexander UL

in Schweighöfer, Erich; Hötzendorfer, Walter; Kummer, Franz (Eds.) et al Verantwortungsbewusste Digitalisierung, Tagungsband des 23. Internationalen Rechtsinformatik Symposions IRIS 2020 (2020, February 27)

A prototype for automated reasoning over legal documents, called NAI, is presented. It uses formalized representations of legal documents that are created using a graphical editor that is also provided as ... [more ▼]

A prototype for automated reasoning over legal documents, called NAI, is presented. It uses formalized representations of legal documents that are created using a graphical editor that is also provided as part of NAI. The prototype supports several automated reasoning procedures over the given formalizations, including the execution of user queries. The application of NAI is studied using a fragment of the Scottish Smoking Prohibition (Children in Motor Vehicles) Act 2016. [less ▲]

Detailed reference viewed: 75 (11 UL)
Full Text
Peer Reviewed
See detailPrivacy and Security of Big Data in AI Systems:A Research and Standards Perspective
Esmaeilzadeh Dilmaghani, Saharnaz UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in 2019 IEEE International Conference on Big Data (Big Data), 9-12 December 2019 (2020, February 24)

Detailed reference viewed: 133 (20 UL)