References of "Paper published in a book"
     in
Bookmark and Share    
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 95 (11 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 375 (7 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 103 (0 UL)
Full Text
Peer Reviewed
See detailLes archevêques de Milan face aux premières expériences seigneuriales: stratégies et positionnements (milieu XIIIe-début XIVe s.)
Salemme, Timothy UL

in Barralis, Christine (Ed.) L’évêque face à son métier. Actes du colloque international, Metz. 15-17 novembre 2017 (in press)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailWhich Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography
Rossi, Arianna UL; Lenzini, Gabriele UL

in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (in press)

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this ... [more ▼]

Following GDPR's Article12.7's proposal to use standardized icons to inform data subject in "an easily visible, intelligible and clearly legible manner," several icon sets have been developed. In this paper, we firstly critically review some of those proposals. We then examine the properties that icons and icon sets should arguably fulfill according to Art.12's transparency provisions. Lastly, we discuss metrics and evaluation procedures to measure compliance with the Article. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 263 (25 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 197 (6 UL)
Full Text
Peer Reviewed
See detailMM-Based Solution for Partially Connected Hybrid Transceivers with Large Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 2019 IEEE Global Communications Conference (GLOBECOM) (in press)

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost ... [more ▼]

In a mmWave multiple-input multiple-output (MIMO) communication system employing a large-scale antenna array (LSAA), the hybrid transceivers are used to reduce the power consumption and the hardware cost. In a hybrid analog-digital (A/D) transceiver, the pre/post-processing operation splits into a lower-dimensional baseband (BB) pre/postcoder, followed by a network of analog phase shifters. Primarily two kinds of hybrid architectures are proposed in the literature to implement hybrid transceivers namely, the fully-connected and the partially-connected. Implementation of fully-connected architecture has higher hardware complexity, cost and power consumption in comparison with partially-connected. In this paper, we focus on partially-connected hybrid architecture and develop a low-complexity algorithm for transceiver design for a single user point-to-point mmWave MIMO system. The proposed algorithm utilizes the variable elimination (projection) and the minorization-maximization (MM) frameworks and has convergence guarantees to a stationary point. Simulation results demonstrate that the proposed algorithm is easily scalable for LSAA systems and achieves significantly improved performance in terms of the spectral efficiency (SE) of the system compared to the state-of-the-art solution. [less ▲]

Detailed reference viewed: 39 (11 UL)
Full Text
Peer Reviewed
See detailDual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the 6th International Conference on Information Systems Security and Privacy (in press)

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware ... [more ▼]

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code. By methodically reverse-engineering 128 malware executables, we have found that, out of 21 ransomware samples, 9 contain copy-paste code from public resources. Thanks to this finding, we managed to retrieve the decryption keys with which to nullify the ransomware attacks. From this fact, we recall critical cases of code disclosure in the recent history of ransomware and, arguing that ransomware are components in cyber-weapons, reflect on the dual-use nature of this research. We further discuss benefits and limits of using cyber-intelligence and counter-intelligence strategies that could be used against this threat. [less ▲]

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailImmersive Telepresence Framework for Remote Educational Scenarios
Botev, Jean UL; Rodríguez Lera, Francisco J.

in Proceedings of the 22nd International Conference on Human-Computer Interaction (HCI International) (in press)

Detailed reference viewed: 5 (1 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 81 (12 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 107 (5 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 44 (4 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Precoding Design for Satellite Systems
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 37th International Communications Satellite Systems Conference (ICSSC'19) (in press)

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then ... [more ▼]

The work investigates the feasibility of massive MIMO in SatCom. Towards this, the necessary channel models, system parameters and scenarios are identified and a basic simulator developed. The work then considers an efficient implementation of the massive MIMO transmission through the use of hybrid analog/digital precoder. Efficient algorithmic solutions are proposed for the partially connected precoder architecture which enables efficiency in power/ hardware complexity and its performance evaluated. [less ▲]

Detailed reference viewed: 22 (10 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 148 (6 UL)
Full Text
Peer Reviewed
See detailConservazione e ricezione dei documenti pontifici in Italia settentrionale: il caso del monastero cistercense di Chiaravalle Milanese (secoli XII-XVI)
Salemme, Timothy UL

in Salemme, Timothy; Renault, Jean-Baptiste (Eds.) Conservation et réception des documents pontificaux par les Ordres religieux (XIe-XVe siècles). Actes du colloque international. Nancy, 12-13 décembre 2013 (in press)

Detailed reference viewed: 32 (0 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 64 (0 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 58 (1 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 81 (1 UL)
Full Text
Peer Reviewed
See detailMajorization-Minimization Algorithms for Analog Beamforming with Large-Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 7th IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2019 (in press)

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly ... [more ▼]

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly increases the number of required radio-frequency (RF) chains, which may be prohibitive. Thus, analog beamforming based on a phase-shifting network driven by a variable gain amplifier (VGA) is a potential alternative technology. In this paper, we cast the beamforming vector design problem as a beampattern matching problem, with an unknown power gain. This is formulated as a unit-modulus least-squares (ULS) problem where the optimal gain of the VGA is also designed in addition to the beamforming vector. We also consider a scenario where the receivers have the additional processing capability to adjust the phases of the incoming signals to mitigate specular multipath components. We propose efficient majorization-minimization (MM) based algorithms with convergence guarantees to a stationary point for solving both variants of the proposed ULS problem. Numerical results verify the effectiveness of the proposed solution in comparison with the existing state-of-the-art techniques. [less ▲]

Detailed reference viewed: 19 (9 UL)
Full Text
Peer Reviewed
See detailMetamorphic Security Testing for Web Systems
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020 (2020, March)

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input ... [more ▼]

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In many situations where potential vulnerabilities are tested, a test oracle may not exist, or it might be impractical due to the many inputs for which specific oracles have to be defined. In this paper, we propose a metamorphic testing approach that alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture security properties of the system. Such MRs are then used to automate testing and detect vulnerabilities. We provide a catalog of 22 system-agnostic MRs to automate security testing in Web systems. Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. It automatically detected 10 out of 12 vulnerabilities affecting two widely used systems, one commercial and the other open source (Jenkins). [less ▲]

Detailed reference viewed: 66 (7 UL)
Full Text
Peer Reviewed
See detailIdentifying Unintended Harms of Cybersecurity Measures
Chua, Yi Ting; Parkin, Simon; Edwards, Matthew et al

in Proceedings of ECRIME 2019 (2020, February 01)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailApproximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification
Menghi, Claudio UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 42st International Conference on Software Engineering (2020)

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing ... [more ▼]

Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute-intensive CPS (CI-CPS) models, where a single simulation may take hours to complete. We propose a novel approach, namely ARIsTEO, to enable effective and efficient testing of CI-CPS models. Our approach embeds black-box testing into an iterative approximation-refinement loop. At the start, some sampled inputs and outputs of the CI-CPS model under test are used to generate a surrogate model that is faster to execute and can be subjected to black-box testing. Any failure-revealing test identified for the surrogate model is checked on the original model. If spurious, the test results are used to refine the surrogate model to be tested again. Otherwise, the test reveals a valid failure. We evaluated ARIsTEO by comparing it with S-Taliro, an open-source and industry-strength tool for testing CPS models. Our results, obtained based on five publicly-available CPS models, show that, on average, ARIsTEO is able to find 24% more requirements violations than S-Taliro and is 31% faster than S-Taliro in finding those violations. We further assessed the effectiveness and efficiency of ARIsTEO on a large industrial case study from the satellite domain. In contrast to S-Taliro, ARIsTEO successfully tested two different versions of this model and could identify three requirements violations, requiring four hours, on average, for each violation. [less ▲]

Detailed reference viewed: 13 (11 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 263 (72 UL)
Full Text
See detailVisualisierungen des Induktionsprinzips
Perucca, Antonella UL; Todorovic, Milko

in Beiträge zum Mathematikunterricht 2020 (2020)

Detailed reference viewed: 26 (5 UL)
Full Text
Peer Reviewed
See detailAutomatic Testing and Improvement of Machine Translation
Sun, Zeyu; Zhang, Jie; Harman, Mark et al

in International Conference on Software Engineering (ICSE) (2020)

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailIntegrating Topological Proofs with Model Checking to Instrument Iterative Design
Menghi, Claudio UL; Rizzi, Alessandro Maria; Bernasconi, Anna

in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 (2020)

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous ... [more ▼]

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous verification can be performed after each refinement or revision step. To achieve practical adoption, formal verification must accommodate continuous verification efficiently and effectively. Model checking provides developers with information useful to improve their models only when a property is not satisfied, i.e., when a counterexample is returned. However, it is desirable to have some useful information also when a property is instead satisfied. To address this problem we propose TOrPEDO, an approach that supports verification in two complementary forms: model checking and proofs. While model checking is typically used to pinpoint model behaviors that violate requirements, proofs can instead explain why requirements are satisfied. In our work, we introduce a specific notion of proof, called Topological Proof. A topological proof produces a slice of the original model that justifies the property satisfaction. Because models can be incomplete, TOrPEDO supports reasoning on requirements satisfaction, violation, and possible satisfaction (in the case where satisfaction depends on unknown parts of the model). Evaluation is performed by checking how topological proofs support software development on 12 modeling scenarios and 15 different properties obtained from 3 examples from literature. Results show that: (i) topological proofs are ≈60% smaller than the original models; (ii) after a revision, in ≈78% of cases, the property can be re-verified by relying on a simple syntactic check. [less ▲]

Detailed reference viewed: 60 (1 UL)
Full Text
See detailL’édition de chartes à Luxembourg: de l’érudition aux nouvelles technologies (et vice-versa?)
Salemme, Timothy UL

in Bendheim, Amelie (Ed.) Tagungsband Mittelalter zwischen Faszination und Fortschritt (2020)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailLocalization Performance of 1-Bit Passive Radars in NB-IoT Applications
Sedighi, Saeid UL; Mishra, Kumar Vijay; Shankar, Bhavani UL et al

in Sedighi, Saeid; Mishra, Kumar Vijay; Shankar, Bhavani (Eds.) et al Localization Performance of 1-Bit Passive Radars in NB-IoT Applications (2019, December 14)

Location-based services form an important use-case in emerging narrowband Internet-of-Things (NB-IoT) networks. Critical to this offering is an accurate estimation of the location without overlaying the ... [more ▼]

Location-based services form an important use-case in emerging narrowband Internet-of-Things (NB-IoT) networks. Critical to this offering is an accurate estimation of the location without overlaying the network with additional active sensors. The massive number of devices, low power requirement, and low bandwidths restrict the sampling rates of NB-IoT receivers. In this paper, we propose a novel low-complexity approach for NB-IoT target delay estimation in cases where one-bit analog-to-digital-converters (ADCs) are employed to sample the received radar signal instead of high-resolution ADCs. This problem has potential applications in the design of inexpensive NB-IoT radar and sensing devices. We formulate the target estimation as a multivariate fractional optimization problem and solve it via Lasserre's semi-definite program relaxation. Numerical experiments suggest feasibility of the proposed approach yielding high localization accuracy with a very low number of 1-bit samples. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailCarrier Aggregation in Multi-Beam High Throughput Satellite Systems
Kibria, Mirza UL; Lagunas, Eva UL; Maturo, Nicola UL et al

in Carrier Aggregation in Multi-Beam High Throughput Satellite Systems (2019, December 10)

Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the ... [more ▼]

Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the demand for data-hungry applications has drawn large attention from different wireless network communities. Given the benefits of CA in the terrestrial wireless environment, it is of great interest to analyze and evaluate the potential impact of CA in the satellite domain. In this paper, we study CA in multi-beam high throughput satellite systems. We consider both inter-transponder and intra-transponder CA at the satellite payload level of the communication stack, and we address the problem of carrier-user assignment assuming that multiple users can be multiplexed in each carrier. The transmission parameters of different carriers are generated considering the transmission characteristics of carriers in different transponders. In particular, we propose a flexible carrier allocation approach for a CA enabled multi-beam satellite system targeting a proportionally fair user demand satisfaction. Simulation results and analysis shed some light on this rather unexplored scenario and demonstrate the feasibility of the CA in satellite communication systems. [less ▲]

Detailed reference viewed: 8 (2 UL)
Full Text
Peer Reviewed
See detailJoint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

in Bandi, Ashok; Shankar, Bhavani; Chatzinotas, Symeon (Eds.) et al Joint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications (2019, December 09)

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam ... [more ▼]

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam coverage with a large number of users and limited frame length lead to the scheduling of only a few users. Moreover, in emerging aggressive frequency reuse systems, scheduling is coupled with precoding. This is addressed in this work, through the joint design of scheduling and precoding for frame-based MGMC satellite systems. This aim is formulated as the maximization of the sum-rate under per beam power constraint and minimum SINR requirement of scheduled users. Further, a framework is proposed to transform the non-smooth SR objective with integer scheduling and nonconvex SINR constraints as a difference-of-convex problem that facilitates the joint update of scheduling and precoding. Therein, an efficient convex-concave procedure based algorithm is proposed. Finally, the gains (up to 50%) obtained by the jointed design over state-of-the-art methods is shown through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 106 (30 UL)
Full Text
Peer Reviewed
See detailAutomatic Software Tuning of Parallel Programs for Energy-Aware Executions
Varrette, Sébastien UL; Pinel, Frédéric UL; Kieffer, Emmanuel UL et al

in Proc. of 13th Intl. Conf. on Parallel Processing and Applied Mathematics (PPAM 2019) (2019, December)

For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to ... [more ▼]

For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to the type and characteristics of workload that the device is running. For this reason, this paper presents an automatic software tuning method for parallel program generation able to adapt and exploit the hardware features available on a target computing system such as an HPC facility or a cloud system in a better way than traditional compiler infrastructures. We propose a search based approach combining both exact methods and approximated heuristics evolving programs in order to find optimized configurations relying on an ever-increasing number of tunable knobs i.e., code transformation and execution options (such as the num- ber of OpenMP threads and/or the CPU frequency settings). The main objective is to outperform the configurations generated by traditional compiling infrastructures for selected KPIs i.e., performance, energy and power usage (for both for the CPU and DRAM), as well as the runtime. First experimental results tied to the local optimization phase of the proposed framework are encouraging, demonstrating between 8% and 41% improvement for all considered metrics on a reference benchmark- ing application (i.e., Linpack). This brings novel perspectives for the global optimization step currently under investigation within the presented framework, with the ambition to pave the way toward automatic tuning of energy-aware applications beyond the performance of the current state-of-the-art compiler infrastructures. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of CLT13 Multilinear Maps with Independent Slots
Coron, Jean-Sébastien UL; Notarnicola, Luca UL

in Advances in Cryptology – ASIACRYPT 2019, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II (2019, December)

Detailed reference viewed: 124 (0 UL)
Full Text
Peer Reviewed
See detailSafer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments
Wang, Min UL; Voos, Holger UL

in Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments (2019, December)

Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ... [more ▼]

Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ensure safety of the UAV as well as its surroundings, it is necessary for the UAV to boast the capability of detecting emergency situation and acting on its own when facing imminent threat. However, the majority of UAVs currently available in the market are not equipped with such capability. To fill in the gap, in this paper we present a complete sense-and-avoid solution for assisting unskilled pilots in ensuring a safe flight. Particularly, we propose a novel nonlinear vehicle control system which takes into account of sensor characteristics, an emergency evaluation policy and a novel optimization-based avoidance control strategy. The effectiveness of the proposed approach is demonstrated and validated in simulation with multiple moving objects. [less ▲]

Detailed reference viewed: 17 (4 UL)
Full Text
Peer Reviewed
See detailTemporal 3D Human Pose Estimation for Action Recognition from Arbitrary Viewpoints
Adel Musallam, Mohamed; Baptista, Renato UL; Al Ismaeil, Kassem UL et al

in 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas 5-7 December 2019 (2019, December)

This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from ... [more ▼]

This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from different viewpoints remains an extremely challenging problem, due to depth ambiguities, occlusion, and a large variety of appearances and scenes. Moreover, using only the information from the 2D perspective gives different interpretations for the same action seen from different viewpoints. Our system operates in two subsequent stages. The first stage estimates the 2D human pose using a convolution neural network. In the next stage, the 2D human poses are lifted to 3D human poses, using a temporal convolution neural network that enforces the temporal coherence over the estimated 3D poses. The estimated 3D poses from different viewpoints are then aligned to the same camera reference frame. Finally, we propose to use a temporal convolution network-based classifier for cross-view action recognition. Our results show that we can achieve state of art view-invariant action recognition accuracy even for the challenging viewpoints by only using RGB videos, without pre-training on synthetic or motion capture data. [less ▲]

Detailed reference viewed: 161 (1 UL)
Full Text
Peer Reviewed
See detailOn the Formal Structure of Rules in Conflict of Laws
Markovich, Réka UL

in Legal Knowledge and Information Systems 2019 (proceedings) (2019, December)

Law has different methods and principles to resolve conflicts between norms, most of these come from Roman Law, they are well-known and much discussed. There is a whole branch of law, though, which is ... [more ▼]

Law has different methods and principles to resolve conflicts between norms, most of these come from Roman Law, they are well-known and much discussed. There is a whole branch of law, though, which is much less discussed while having been created exactly in order to resolve special conflicts: conflict of laws. This system within Private International Law is dedicated to providing metarules in legal situations where more than one national legal systems’ rules could be applied: CoL rules indirectly settle the situation by declaring which one’s should. The formal representation of how these rules work contributes not only to the modelling of this branch of law but also provides methodologies for concerns arising from other conflicting normative systems, such as ethically sensitive situations where there are multiple stakeholders with different moral backgrounds. [less ▲]

Detailed reference viewed: 35 (6 UL)
Full Text
Peer Reviewed
See detailThe Impact of Human Mobility on Edge Data Center Deployment in Urban Environments
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]

Detailed reference viewed: 87 (11 UL)
Full Text
Peer Reviewed
See detailUC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing
Damodaran, Aditya Shyam Shankar UL; Dubovitskaya, Maria; Rial Duran, Alfredo UL

in Progress in Cryptology – INDOCRYPT 2019 (2019, December)

Priced oblivious transfer (POT) is a cryptographic protocol that can be used to protect customer privacy in e-commerce applications. Namely, it allows a buyer to purchase an item from a seller without ... [more ▼]

Priced oblivious transfer (POT) is a cryptographic protocol that can be used to protect customer privacy in e-commerce applications. Namely, it allows a buyer to purchase an item from a seller without disclosing to the latter which item was purchased and at which price. Unfortunately, existing POT schemes have some drawbacks in terms of design and functionality. First, the design of existing POT schemes is not modular. Typically, a POT scheme extends a k-out-of-N oblivious transfer (OT) scheme by adding prices to the items. However, all POT schemes do not use OT as a black-box building block with certain security guarantees. Consequently, security of the OT scheme needs to be reanalyzed while proving security of the POT scheme, and it is not possible to swap the underlying OT scheme with any other OT scheme. Second, existing POT schemes do not allow the seller to obtain any kind of statistics about the buyer's purchases, which hinders customer and sales management. Moreover, the seller is not able to change the prices of items without restarting the protocol from scratch. We propose a POT scheme that addresses the aforementioned drawbacks. We prove the security of our POT in the UC framework. We modify a standard POT functionality to allow the seller to receive aggregate statistics about the buyer's purchases and to change prices dynamically. We present a modular construction for POT that realizes our functionality in the hybrid model. One of the building blocks is an ideal functionality for OT. Therefore, our protocol separates the tasks carried out by the underlying OT scheme from the additional tasks needed by a POT scheme. Thanks to that, our protocol is a good example of modular design and can be instantiated with any secure OT scheme as well as other building blocks without reanalyzing security from scratch. [less ▲]

Detailed reference viewed: 79 (20 UL)
Full Text
Peer Reviewed
See detailA case study on the impact of masking moving objects on the camera pose regression with CNNs
Cimarelli, Claudio UL; Cazzato, Dario UL; Olivares Mendez, Miguel Angel UL et al

in 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (2019, November 25)

Robot self-localization is essential for operating autonomously in open environments. When cameras are the main source of information for retrieving the pose, numerous challenges are posed by the presence ... [more ▼]

Robot self-localization is essential for operating autonomously in open environments. When cameras are the main source of information for retrieving the pose, numerous challenges are posed by the presence of dynamic objects, due to occlusion and continuous changes in the appearance. Recent research on global localization methods focused on using a single (or multiple) Convolutional Neural Network (CNN) to estimate the 6 Degrees of Freedom (6-DoF) pose directly from a monocular camera image. In contrast with the classical approaches using engineered feature detector, CNNs are usually more robust to environmental changes in light and to occlusions in outdoor scenarios. This paper contains an attempt to empirically demonstrate the ability of CNNs to ignore dynamic elements, such as pedestrians or cars, through learning. For this purpose, we pre-process a dataset for pose localization with an object segmentation network, masking potentially moving objects. Hence, we compare the pose regression CNN trained and/or tested on the set of masked images and the original one. Experimental results show that the performances of the two training approaches are similar, with a slight reduction of the error when hiding occluding objects from the views. [less ▲]

Detailed reference viewed: 11 (4 UL)
Full Text
Peer Reviewed
See detailPost-collusion security and distance bounding
Mauw, Sjouke UL; Smith, Zachary Daniel UL; Trujillo Rasua, Rolando UL et al

in Post-collusion security and distance bounding (2019, November 11)

Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat ... [more ▼]

Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat some security goals, without revealing their long-term secrets. We develop a model based on multiset rewriting to reason about collusion in security protocols. We introduce the notion of postcollusion security, which verifies security properties claimed in sessions initiated after collusion occurred. We use post-collusion security to analyse terrorist fraud on protocols for securing physical proximity, known as distance-bounding protocols. In a terrorist fraud attack, agents collude to falsely prove proximity, whilst no further false proximity proof can be issued without further collusion. Our definitions and the Tamarin prover are used to develop a modular framework for verification of distance-bounding protocols that accounts for all types of attack from literature. We perform a survey of over 25 protocols, which include industrial protocols such as Mastercard’s contactless payment PayPass and NXP’s MIFARE Plus with proximity check. For the industrial protocols we confirm attacks, propose fixes, and deliver computer-verifiable security proofs of the repaired versions [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailOptimum Design for Sparse FDA-MIMO Automotive Radar
Sedighi, Saeid UL; Shankar, Bhavani UL; Mishra, Kumar Vijay et al

in Sedighi, Saeid; Shankar, Bhavani; Mishra, Kumar Vijay (Eds.) et al Optimum Design for Sparse FDA-MIMO Automotive Radar (2019, November 03)

Automotive radars usually employ multiple-input multiple-output (MIMO) antenna arrays to achieve high azimuthal resolution with fewer elements than a phased array. Despite this advantage, hardware costs ... [more ▼]

Automotive radars usually employ multiple-input multiple-output (MIMO) antenna arrays to achieve high azimuthal resolution with fewer elements than a phased array. Despite this advantage, hardware costs and desired radar size limits the usage of more antennas in the array. Similar trade-off is encountered while attempting to achieve high range resolution which is limited by the signal bandwidth. However, nowadays given the demand for spectrum from communications services, wide bandwidth is not readily available. To address these issues, we propose a sparse variant of Frequency Diverse Array MIMO (FDA-MIMO) radar which enjoys the benefits of both FDA and MIMO techniques, including fewer elements, decoupling, and efficient joint estimation of target parameters. We then employ the Cram\'{e}r-Rao bound for angle and range estimation as a performance metric to design the optimal antenna placement and carrier frequency offsets for the transmit waveforms. Numerical experiments suggest that the performance of sparse FDA-MIMO radar is very close to the conventional FDA-MIMO despite 50\% reduction in the bandwidth and antenna elements. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailCharacterization of the MSE Region under a Total Power Budget for Asynchronous Two-Way Relay Networks
Rahimi, Razgar; Shahbazpanahi, Shahram UL; Ottersten, Björn UL

in The Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, 3-6 November 2019 (2019, November)

Detailed reference viewed: 92 (0 UL)
Full Text
Peer Reviewed
See detailCrowdSenSim 2.0: a Stateful Simulation Platform for Mobile Crowdsensing in Smart Cities
Montori, Federico; Cortesi, Emanuele; Bedogni, Luca et al

in MSWIM '19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami Beach, FL, USA, 2019. (2019, November)

Mobile crowdsensing (MCS) has become a popular paradigm for data collection in urban environments. In MCS systems, a crowd supplies sensing information for monitoring phenomena through mobile devices ... [more ▼]

Mobile crowdsensing (MCS) has become a popular paradigm for data collection in urban environments. In MCS systems, a crowd supplies sensing information for monitoring phenomena through mobile devices. Typically, a large number of participants is required to make a sensing campaign successful. For such a reason, it is often not practical for researchers to build and deploy large testbeds to assess the performance of frameworks and algorithms for data collection, user recruitment, and evaluating the quality of information. Simulations offer a valid alternative. In this paper, we present CrowdSenSim 2.0, a significant extension of the popular CrowdSenSim simulation platform. CrowdSenSim 2.0 features a stateful approach to support algorithms where the chronological order of events matters, extensions of the architectural modules, including an additional system to model urban environments, code refactoring, and parallel execution of algorithms. All these improvements boost the performances of the simulator and make the runtime execution and memory utilization significantly lower, also enabling the support for larger simulation scenarios. We demonstrate retro-compatibility with the older platform and evaluate as a case study a stateful data collection algorithm. [less ▲]

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailFeasibility of Stellar as a Blockchain-based Micropayment System
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain (2019, November)

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time ... [more ▼]

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time. The divisibility of a blockchain cryptocurrency to even fractions of a cent, caused microtransactions to become feasible to formerly non-existent denominations. These microtransactions have spurred the development of novel ways of monetizing online resources and hold the potential to aid in alleviation of poverty. The paper conducts a feasibility study on Stellar as a blockchain-based micropayment system. It highlights the computational and other issues that impedes its progress and utilizes a characterization model for micropayment systems to evaluate the efficacy of the Stellar platform. The paper conducts a comparison with the micropayment solutions from Bitcoin, Ethereum and PayPal. The paper analyzes a subset of transactions from the Stellar blockchain to aid in drawing a conclusion on the undertaken study and elaborates on the mitigation tools to enable fraud prevention in online monetary transactions. [less ▲]

Detailed reference viewed: 122 (20 UL)
Full Text
See detailA New Optimization Tool for Mega-Constellation Design and its Application to Trunking Systems
Kisseleff, Steven UL; Shankar, Bhavani UL; Spano, Danilo UL et al

in 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019 (2019, November)

Detailed reference viewed: 40 (3 UL)
Full Text
See detailUser Terminal Wideband Modem for Very High Throughput Satellites
Kisseleff, Steven UL; Maturo, Nicola UL; Chatzinotas, Symeon UL et al

in 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019 (2019, November)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailEnhanced Sketchnoting through Semantic Integration of Learning Material
Atashpendar, Aryobarzan UL; Grevisse, Christian UL; Rothkugel, Steffen UL

in Applied Informatics (2019, November)

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in ... [more ▼]

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in popularity, especially in teaching and learning. While current solutions already reduce the burden of organizing and searching through stacks of paper, they provide little support in finding additional information related to the notes, and search capabilities are mostly limited to textual queries and content. In this paper, we present a novel solution for digital sketchnoting aimed at enhancing the learning experience of students. In addition to common capabilities such as handwriting recognition, our note-taking app integrates semantic annotation and drawing recognition. Handwritten notes are recognized and passed through concept recognition and entity linking tools to enable a knowledge graph-based integration of contextually relevant learning resources. We extend traditional search capabilities by including the semantic metadata from the related material as well as enabling visual queries to find recognized sketches. Finally, resembling the exchange of paper notes among students, our app allows to share the semantically enhanced notes with other devices. [less ▲]

Detailed reference viewed: 105 (26 UL)
Full Text
Peer Reviewed
See detailPrivacy Aspects and Subliminal Channels in Zcash
Biryukov, Alex UL; Feher, Daniel UL; Vitto, Giuseppe UL

in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit (2019, November)

In this paper we analyze two privacy and security issues for the privacy-oriented cryptocurrency Zcash. First we study shielded transactions and show ways to fingerprint user transactions, including ... [more ▼]

In this paper we analyze two privacy and security issues for the privacy-oriented cryptocurrency Zcash. First we study shielded transactions and show ways to fingerprint user transactions, including active attacks.We introduce two new attacks which we call Danaan-gift attack and Dust attack. Following the recent Sapling update of Zcash protocol we study the interaction between the new and the old zk-SNARK protocols and the effects of their interaction on transaction privacy. In the second part of the paper we check for the presence of subliminal channels in the zk-SNARK protocol and in Pedersen Commitments. We show presence of efficient 70-bit channels which could be used for tagging of shielded transactions which would allow the attacker (malicious transaction verifier) to link transactions issued by a maliciously modified zk-SNARK prover, while would be indistinguishable from regular transactions for the honest verifier/user. We discuss countermeasures against both of these privacy issues. [less ▲]

Detailed reference viewed: 136 (13 UL)
Full Text
Peer Reviewed
See detailAssessing the Generalizability of code2vec Token Embeddings
Kang, Hong Jin; Bissyande, Tegawendé François D Assise UL; David, Lo

in Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (2019, November)

Many Natural Language Processing (NLP) tasks, such as sentiment analysis or syntactic parsing, have benefited from the development of word embedding models. In particular, regardless of the training ... [more ▼]

Many Natural Language Processing (NLP) tasks, such as sentiment analysis or syntactic parsing, have benefited from the development of word embedding models. In particular, regardless of the training algorithms, the learned embeddings have often been shown to be generalizable to different NLP tasks. In contrast, despite recent momentum on word embeddings for source code, the literature lacks evidence of their generalizability beyond the example task they have been trained for. In this experience paper, we identify 3 potential downstream tasks, namely code comments generation, code authorship identification, and code clones detection, that source code token embedding models can be applied to. We empirically assess a recently proposed code token embedding model, namely code2vec’s token embeddings. Code2vec was trained on the task of predicting method names, and while there is potential for using the vectors it learns on other tasks, it has not been explored in literature. Therefore, we fill this gap by focusing on its generalizability for the tasks we have identified. Eventually, we show that source code token embeddings cannot be readily leveraged for the downstream tasks. Our experiments even show that our attempts to use them do not result in any improvements over less sophisticated methods. We call for more research into effective and general use of code embeddings. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailA Multilayer Low-Altitude Airspace Model for UAV Traffic Management
Samir Labib, Nader UL; Danoy, Grégoire UL; Musial, Jedrzej et al

in Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (2019, November)

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼]

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲]

Detailed reference viewed: 98 (21 UL)
Full Text
Peer Reviewed
See detailA Personalized Sentiment Model with Textual and Contextual Information
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in The SIGNLL Conference on Computational Natural Language Learning, Hong Kong 3-4 November 2019 (2019, November)

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In ... [more ▼]

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In particular, we construct a hierarchical neural network that leverages valuable information from a person's past expressions, and offer a better understanding of the sentiment from the expresser's perspective. Additionally, we investigate how a person's sentiment changes over time so that recent incidents or opinions may have more effect on the person's current sentiment than the old ones. Psychological studies have also shown that individual variation exists in how easily people change their sentiments. In order to model such traits, we develop a modified attention mechanism with Hawkes process applied on top of a recurrent network for a user-specific design. Implemented with automatically labeled Twitter data, the proposed model has shown positive results employing different input formulations for representing the concerned information. [less ▲]

Detailed reference viewed: 216 (8 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 114 (19 UL)
Full Text
Peer Reviewed
See detailOuter and Anti Joins in Temporal-Probabilistic Databases
Papaioannou, Katerina; Theobald, Martin UL; Böhlen, Michael H.

in 35th IEEE International Conference on Data Engineering, ICDE 2019, Macao, China, April 8-11, 2019 (2019, October 16)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailSoftwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection
Rinaldi, Giulia UL; Adamsky, Florian UL; Soua, Ridha UL et al

in 10th International Conference on Networks of the Future (NoF) (2019, October 04)

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼]

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲]

Detailed reference viewed: 103 (13 UL)
Full Text
Peer Reviewed
See detailOptimized and flexible scheduling of AGVs and process machines in Re- manufacturing 4 .0 Systems using multi-agent technology and simultaneous scheduling
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Ramírez Fernández, Francisco Javier; Honrubia Escribano, Andrés (Eds.) Abstracts III International Workshop on Autonomous Remanufacturing 2019 (2019, October 02)

In remanufacturing processes the condition of the used products is unknown. This leads to many challenges which are special to the domain of remanufacturing and not known from manufacturing. One of these ... [more ▼]

In remanufacturing processes the condition of the used products is unknown. This leads to many challenges which are special to the domain of remanufacturing and not known from manufacturing. One of these challenges is the stochastic routing of products based on the unknown product conditions. This problem in particular requires a flexible scheduling and control system for the remanufacturing system as well as the intralogistics. The aim of this research is to optimize the scheduling and control of remanufacturing systems considering the flexible material transport by AGVs. Therefore the networking of all resources is organized as an embedded system treating the remanufacturing system as a cyber-physical system in the context of industry 4.0. The scheduling and control of the remanufacturing system will be achieved by a combination of multi-agent technology to deal with unexpected events and the optimization of the schedule by simultaneous scheduling of machines and AGVs. Machine scheduling and transport scheduling have been vastly studied by many researchers, but most of the works address both problems separately. However, these two problems are closely linked and influence each other. By looking at them together, it is possible to achieve an improvement in the overall schedule. In the first step of the research work, the simultaneous scheduling of machines and AGVs has been compared with the currently used sequential scheduling within a simulation study. For this purpose, benchmark instances known in the literature were used. The simulation results show the superiority of the simultaneous scheduling of machines and AGVs. [less ▲]

Detailed reference viewed: 111 (0 UL)
Full Text
Peer Reviewed
See detailTrustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy
Samir Labib, Nader UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Samir Labib, Nader; Brust, Matthias R.; Danoy, Grégoire (Eds.) et al Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy (2019, October)

With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised ... [more ▼]

With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised management, improved energy efficiency and a better quality living through a wide array of value-added services. However, as sensing, actuation, communication and control become increasingly more sophisticated, such promising data-driven systems generate, process, and exchange larger amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. In turn this affirms the importance of trustworthiness in IoT and emphasises the need of a solid technical and regulatory foundation. The goal of this paper is to first introduce the concept of trustworthiness in IoT, its main pillars namely, security, privacy and data protection, and then analyse the state-of-the-art in research and standardisation for each of these subareas. Throughout the paper, we develop and refer to Unmanned Aerial Vehicles (UAVs) as a promising value-added service example of mobile IoT devices. The paper then presents a thorough gap analysis and concludes with recommendations for future work. [less ▲]

Detailed reference viewed: 75 (11 UL)
Full Text
Peer Reviewed
See detailUser Experience Design for E-Voting: How mental models align with security mechanisms
Zollinger, Marie-Laure UL; Distler, Verena UL; Roenne, Peter UL et al

in Electronic Voting (2019, October)

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]

Detailed reference viewed: 92 (6 UL)
Full Text
Peer Reviewed
See detailHandling duplicates in Dockerfiles families: Learning from experts
Oumaziz, Mohamed; Falleri, Jean-Rémy; Blanc, Xavier et al

in 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (2019, October)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailOn the Event-based Attack-tolerant Control: A Polytopic Representation
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant ... [more ▼]

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant control, and scheduling co-design strategy are proposed. From the event triggering definition (sample-and-hold strategy), polytopic writing of the event-triggered feedback control is first presented and then incorporated into the system dynamics for analysis. Our goal is to present a unique model that is able to deal with the co-design problem simultaneously and that can be handled by classical control synthesis tools. The novel representation, including data deception and attack tolerant control is formulated as a BMI optimization problem ensuring both stability and some level performance requirements (L2 attenuation of the cyber-attack). [less ▲]

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailHouston We Have a Law. A Model for National Regulation of Space Resources Activities.
Salmeri, Antonino UL

in Proceedings of the 70th International Astronautical Congress 2018 (2019, October)

The field of space resources activities is rapidly maturing, but we still do not have a legal regime able to cope with such development. The United Nations Committee on the Peaceful Uses of Outer Space ... [more ▼]

The field of space resources activities is rapidly maturing, but we still do not have a legal regime able to cope with such development. The United Nations Committee on the Peaceful Uses of Outer Space finally started to debate whether commercialization of space resources is permitted under current international space law only in 2018, and yet declaring that space resources activities are lawful is barely the start. In fact, the real challenge is how to regulate them in light of the obligations set forth in international space law, without jeopardizing their economic convenience. The present paper addresses precisely this question by presenting a draft law redacted in articles, coupled with a comprehensive explanatory note. Inter alia, the paper introduces a new “space resources activities” license and proposes a detailed authorization regime based on the grant of priority rights limited in size, number and time extension. Based on the above, the paper concludes praising the importance of domestic regulation of space resources activities, when based on the same language and spirit of the OST and coordinated through mutual recognition. [less ▲]

Detailed reference viewed: 99 (0 UL)
Full Text
Peer Reviewed
See detailSDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October)

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼]

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲]

Detailed reference viewed: 114 (15 UL)
Full Text
Peer Reviewed
See detailSimultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time ... [more ▼]

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time-varying parameters with a multiplicative effect on the actuator input signal and the sensor output signal, respectively. Based on the sector non-linearity approach and the convex polytopic transformation, the nonlinear model is written in a Linear Parameter-Varying (LPV) form, then an observer allowing both state and attack reconstruction is designed by solving an LMI optimization problem. [less ▲]

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailAn industrial study on the differences between pre-release and post-release bugs
Rwemalika, Renaud UL; Kintis, Marinos; Papadakis, Mike UL et al

in Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (2019, September 30)

Software bugs constitute a frequent and common issue of software development. To deal with this problem, modern software development methodologies introduce dedicated quality assurance procedures. At the ... [more ▼]

Software bugs constitute a frequent and common issue of software development. To deal with this problem, modern software development methodologies introduce dedicated quality assurance procedures. At the same time researchers aim at developing techniques capable of supporting the early discovery and fix of bugs. One important factor that guides such research attempts is the characteristics of software bugs and bug fixes. In this paper, we present an industrial study on the characteristics and differences between pre-release bugs, i.e. bugs detected during software development, and post-release bugs, i.e. bugs that escaped to production. Understanding such differences is of paramount importance as it will improve our understanding on the testing and debugging support that practitioners require from the research community, on the validity of the assumptions of several research techniques, and, most importantly, on the reasons why bugs escape to production. To this end, we analyze 37 industrial projects from our industrial partner and document the differences between pre-release bugs and post-release bugs. Our findings suggest that post-release bugs are more complex to fix, requiring developers to modify several source code files, written in different programming languages, and configuration files, as well. We also find that approximately 82% of the post-release bugs involve code additions and can be characterized as "omission" bugs. Finally, we conclude the paper with a discussion on the implications of our study and provide guidance to future research directions. [less ▲]

Detailed reference viewed: 57 (0 UL)
Full Text
Peer Reviewed
See detailNoCry: No More Secure Encryption Keys for Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in 2nd International Workshop on Emerging Technologies for Authorization and Authentication (2019, September 27)

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific ... [more ▼]

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific strategy they implement, and all have pros and cons. However, three requirements concern them all: their implementation must be secure, be effective, and be efficient. Recently, Genç et al. proposed to stop a specific class of ransomware, the cryptographically strong one, by blocking unauthorized calls to cryptographically secure pseudo-random number generators, which are required to build strong encryption keys. Here, in adherence to the requirements, we discuss an implementation of that solution that is more secure (with components that are not vulnerable to known attacks), more effective (with less false negatives in the class of ransomware addressed) and more efficient (with minimal false positive rate and negligible overhead) than the original, bringing its security and technological readiness to a higher level. [less ▲]

Detailed reference viewed: 78 (4 UL)
See detailInbetriebnahme und Monitoring einer Feldtestfläche zur außenliegenden Lufttemperierung
Schmidt, Christoph Wilhelm UL; Altgeld, Horst; Groß, Bodo et al

in Völker, Conrad; Kornadt, Oliver; Jentsch, Mark (Eds.) et al Schriftenreihe der Professur Bauphysik, Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)

Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II ... [more ▼]

Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II, Förderkennzeichen 0327370Y) zugeordnet. Im Rahmen des Pro-jektes wurde ein Großdemonstrator mit außenliegender Wand- und Lufttemperierung (kurz aWT & aLT) zusammen mit einem niederexergetischen Versorgungssystem, bestehend aus Eisspeicher, Wärmepumpe und PVT-Hybridkollektoren realisiert. Zur Heizperiode 2018/19 wurde die „Feldtestanlage“ in Betrieb genommen, sodass derzeit Messdaten generiert wer-den. In dem Forschungsprojekt wird der Demonstrator über eine Heizperiode und eine Kühl-periode messtechnisch begleitet und ausgewertet. Dabei wird der Großdemonstrator und alle Komponenten umfassend messtechnisch ausgewertet (~300 Messwerte). Ziel des Beitrags ist eine Darstellung der Grundlagen der außenliegenden Lufttemperierung, als niederexergetische und schnell regelbare Ergänzung zur außenliegenden Wandtemperie-rung. Bei der außenliegenden Lufttemperierung wird zwischen thermisch aktivierter Be-standswand und neuem Wärmedämm-Verbundsystem ein Luftspalt geschaffen, durch den Außenluft geführt und temperiert werden kann. Diese temperierte Außenluft wird dem dahin-terliegenden Raum (im Feldtest ein Büroraum mit rund 20 m² Grundfläche und zwei Arbeits-plätzen) als Frischluft zur Verfügung gestellt. Aufbauend auf den Grundlagen wird die Inbe-triebnahme der bereits umgesetzten Feldtestfläche mit möglichen Regelstrategien geschildert. Abschließend sollen erste Messergebnisse der Feldtestfläche dargestellt und diskutiert wer-den. Interessant sind hier vor allem (im Vergleich zur außenliegenden Wandtemperierung) die möglichen Zeitkonstanten und die erreichbaren Wärmeströme nach Innen (z.B. mögliche Wärmeübertragung als Kombination aus Konvektion im Luftspalt und Wärmeleitung durch die Bestandswand). Themengebiet: Energieeffiziente Gebäude & Bauphysik und Sanierung & Behaglichkeit und Raumklima [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis of MANET Routing Protocols in Urban VANETs
Di Maio, Antonio UL; Palattella, Maria Rita UL; Engel, Thomas UL

in Lecture Notes in Computer Science (volume 11803) (2019, September 25)

Infrastructure-less communications between moving vehicles present emblematic challenges because of high node mobility and link volatility, which may harm the performances of different categories of ... [more ▼]

Infrastructure-less communications between moving vehicles present emblematic challenges because of high node mobility and link volatility, which may harm the performances of different categories of emerging vehicular applications. In order to move data between vehicles that are not in direct communication range, several distributed routing protocols have been proposed and tested in vehicular networks, highlighting their strengths and weaknesses. Some previous works report disagreeing claims about routing protocol performances in similar vehicular scenarios. Therefore, in this work, we evaluate the performances in terms of Packet Delivery Ratio (PDR), packet delay, frame collision rate, and signaling rate of three well-known routing protocols (AODV, DSDV, and GPSR), simulating them in a realistic Manhattan scenario. Furthermore, we evaluate the impact of typical urban obstacles (e.g. buildings) on the considered performance metrics. We observed that, in the proposed urban scenario, AODV provided the best PDR, GPSR the best packet delay, and DSDV failed to provide satisfactory performances due to signaling-induced congestion. Simulations showed that considering the shadowing effects induced by the buildings in an urban scenario drastically changes the observed performances, i.e. reduces the frame collisions, decreases the PDR, and increases the packet delay. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
See detailEvaluation von bauphysikalischen Vormessungen im Rahmen von komplexen Innendämmprojekten
Latz, Sebastian Joachim UL; Thewes, Andreas; Scholzen, Frank UL et al

in Vogel, Albert (Ed.) Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer ... [more ▼]

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer reduces the temperature of the masonry during the heating period and considerably reduces the drying potential. If the moisture content is too high due to the absorption of driving rain from the outside and moisture from the interior climate, the masonry may be permanently damaged and mould may form. The proof of function can be achieved by hygrothermal simulations. These simulations require the input of sensitive boundary conditions and different material parameters. In order to obtain precise simulation results, these input values should be validated by building physics measurements. In order to be able to better assess the simulation parameters, various physical measurements for the preparation of a field test for interior insulation systems in a conference room were carried out on behalf of the administration of the bâtiments publics at the University of Luxembourg as part of the research project "Possibilities and limitations of interior insulation in the renovation of public buildings in Luxembourg". [less ▲]

Detailed reference viewed: 98 (14 UL)
See detailAuswertung eines Großdemonstrators mit außenliegender Wandtemperierung, Wärmepumpe, Eisspeicher und PTV-Hybridkollektoren
Schmidt, Christoph Wilhelm UL; Altgeld, Horst; Groß, Bodo et al

in Völker, Conrad; Kornadt, Oliver; Jentsch, Mark (Eds.) et al Schriftenreihe der Professur Bauphysik, Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)

Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II ... [more ▼]

Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II, Förderkennzeichen 0327370Y) zugeordnet. Im Rahmen des Pro-jektes wurde ein Großdemonstrator mit außenliegender Wand- und Lufttemperierung (kurz aWT & aLT) zusammen mit einem niederexergetischen Versorgungssystem, bestehend aus Eisspeicher, Wärmepumpe und PVT-Hybridkollektoren realisiert. Zur Heizperiode 2018/19 wurde die „Feldtestanlage“ in Betrieb genommen, sodass derzeit Messdaten generiert wer-den. In dem Forschungsprojekt wird der Demonstrator über eine Heizperiode und eine Kühl-periode messtechnisch begleitet und ausgewertet. Dabei wird der Großdemonstrator und alle Komponenten umfassend messtechnisch ausgewertet (~300 Messwerte). Ziel des Beitrags ist eine Darstellung der messtechnischen Auswertung des Großdemonstra-tors über die aktuelle Heizperiode (2018/19) und die anstehende Kühlperiode (2019). Der Fo-kus der Auswertung liegt auf der Feldtestfassade der außenliegenden Wandtemperierung und adressiert die folgenden Fragestellungen: - Konnten die theoretischen Ergebnisse aus Berechnung und Simulation reproduziert werden? - Welche Heizleistungen sind über die außenliegende Wandtemperierung übertragbar? - Welches Fazit kann nach dem Betrieb der Anlage/Feldtestfläche über ca. ein Jahr ge-zogen werden? Je nach aktuellem Stand der begleitenden Simulations- und Potentialstudien können auch hier erste Ergebnisse präsentiert werden. Inhaltlich baut der Beitrag auf dem Beitrag „Außen-liegende Wand- und Lufttemperierung: Umsetzung eines Großdemonstrators“ von den Bau-physiktagen 2017 in Kaiserslautern auf. Im Anschluss an die dort beschriebene Umsetzung soll nun ein Fazit bzgl. Umsetzung, Monitoring und Simulation gezogen werden. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailBreaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity
Horne, Ross James UL; Mauw, Sjouke UL; Smith, Zachary Daniel UL et al

in Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (2019, September 23)

We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that should protect the user from being ... [more ▼]

We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that should protect the user from being traced from one session to another. While it is well known that there are attacks on BAC, allowing an attacker to link multiple uses of the same passport, due to differences in implementation; there still remains confusion about whether there is an attack on unlinkability directly on the BAC protocol as specified in the ICAO 9303 standard. This paper clarifies the nature of the debate, and sources of potential confusion. We demonstrate that the original privacy claims made are flawed, by uncovering attacks on a strong formulation of unlinkability. We explain why the use of the bisimilarity equivalence technique is essential for uncovering our attacks. We also clarify what assumptions lead to proofs of formulations of unlinkability using weaker notions of equivalence. Furthermore, we propose a fix for BAC within the scope of the standard, and prove that it is correct, again using a state-of-the-art approach to bisimilarity. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailMulti-flow congestion-aware routing in software-defined vehicular networks
Di Maio, Antonio UL; Palattella, Maria Rita UL; Engel, Thomas UL

in 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) Proceedings (2019, September 22)

5G-enabled vehicular networks will soon allow their users to exchange safety and non-safety related information over heterogeneous communication interfaces. Routing vehicular data flows over multi-hop ... [more ▼]

5G-enabled vehicular networks will soon allow their users to exchange safety and non-safety related information over heterogeneous communication interfaces. Routing vehicular data flows over multi-hop Vehicle-to-Vehicle (V2V) communications is one of the hardest challenges in vehicular networking, and it has been tackled in literature by using distributed algorithms. The distributed approach has shown significant inefficiencies in such dynamic vehicular scenarios, mainly due to poor network congestion control. To overcome the complexity of the envisioned architecture, and the inefficiency of distributed routing algorithms, we hereby propose to leverage the coordination capabilities of Software-Defined Networking (SDN) to determine optimal V2V multi-hop paths and to offload traffic from the Vehicle-to-Infrastructure-to-Vehicle (V2I2V) to the V2V communications, using both cellular and Wi-Fi technologies. In order to achieve this goal, we propose Multi-Flow Congestion-Aware Routing (MFCAR), a centralized routing algorithm that relies on graph theory to choose short and uncongested V2V paths. Realistic simulations prove that MFCAR outperforms well- established centralized routing algorithms (e.g. Dijkstra's) in terms of Packet Delivery Ratio (PDR), goodput and average packet delay, up to a five-fold performance gain. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailBODYFITR: Robust Automatic 3D Human Body Fitting
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Cherenkova, Kseniya UL et al

in Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP) (2019, September 22)

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications ... [more ▼]

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications related to healthcare, digital ergonomics, avatar creation and security, especially in industrial contexts for large-scale product design. Existing works either make prior assumptions on the pose, require manual annotation of the data or have difficulty handling complex poses. This work addresses these limitations by providing a novel automatic fitting pipeline with carefully integrated building blocks designed for a systematic and robust approach. It is validated on the 3DBodyTex dataset, with hundreds of high-quality 3D body scans, and shown to outperform prior works in static body pose and shape estimation, qualitatively and quantitatively. The method is also applied to the creation of realistic 3D avatars from the high-quality texture scans of 3DBodyTex, further demonstrating its capabilities. [less ▲]

Detailed reference viewed: 87 (15 UL)
Full Text
Peer Reviewed
See detailInvestigation of the moment redistribution for steel concrete continuous beams
Yolacan, Taygun Firat UL; Schäfer, Markus UL

in The 14th Nordic Steel Construction Conference (2019, September 18)

This study investigates moment redistribution phenomenon for pin ended double-span steel-concrete continuous composite beams and arise a question about moment redistribution for the continuous beams ... [more ▼]

This study investigates moment redistribution phenomenon for pin ended double-span steel-concrete continuous composite beams and arise a question about moment redistribution for the continuous beams subjected to partially distributed or concentrated loading conditions. The overall objective of the study is to propose a methodology to fulfil the technical gaps adopted by Eurocode-4, which considers the redistribution for only uniformly load condition. A robust iterative algorithm is developed to obtain moment-curvature relations of the standard composite cross-sections. Flexural stiffness-curvature relations of the cross-sections are predicted through the moment-curvature relations. Flexural stiffness distribution along the composite beams is determined with curvature compatibility. Fourth order differential load-deflection equation is evaluated with finite difference solution scheme for continuous beam conditions and variable flexural stiffness along the beam length. A non-iterative incremental load-deflection algorithm is developed to calculate moment distribution in continuous beams with variable flexural stiffness. A benchmark example is solved with Eurocode- 4 provisions to validate the developed algorithms. Moment redistribution from hogging (negative) zone to sagging (positive) zone of uniformly loaded double-span continuous composite beam is illustrated considering the degree of flexural stiffness degradation in the composite medium. A question is arisen for moment redistribution in the continuous beams subjected to partially distributed or concentrated loading conditions. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailImpact of reinforcement to moment resistance of composite slabs
Zhang, Qingjie UL; Schäfer, Markus UL; Kurz, Wolfgang

in The 2019 World Congress on Advances in Structural Engineering and Mechanics (ASEM19) (2019, September 17)

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based ... [more ▼]

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based on plastic design methods. The current version of Eurocode 4 does not consider explicitly additional reinforcement in the ribs for sagging moment resistance. However, the construction industry requires this possibility in order to provide economical and flexible design. Regarding this situation, further investigations are necessary to prove the applicability of plastic design methods. In the case of high bottom reinforcement ratio, a deep position of the plastic neutral axis occurs, and concrete compression failure may happen before most parts of the profiled steel sheeting and reinforcement yield. This leads to an overestimation of the bending resistance according to the plastic design method. A parametric study, based on approximately 290.000 different combinations of various cross-section geometries and materials, is provided to compare the plastic moment resistance with the resistance determined by strain-limited design. The results show that limitations are necessary to be enabled for the general application of plastic design methods. [less ▲]

Detailed reference viewed: 36 (2 UL)
Full Text
Peer Reviewed
See detailUnravelling the border-facade of France : a multi-level modelling of cross-border commuting
Pigeron-Piroth, Isabelle UL; Caruso, Geoffrey UL; Le Texier, Marion

in Caruso, Geoffrey; Gerber, Philippe; Jones, Catherine (Eds.) et al 21st European Colloquium on Theoretical and Quantitative Geography (ECTQG), Book of Abstracts, Mondorf-las-Bains, 5-9 septembre 2019 (2019, September 09)

Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross ... [more ▼]

Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross-border commuting raises a lot of concerns for planners on both side of each border, especially for provisioning transport infrastructure and local public services but also because it impacts land and housing markets, especially when salary differentials are high. While there is a lot of research about the daily functioning of specific borders (e.g. France-Switzerland or France-Luxembourg), generalization is lacking and spatial heterogeneities impede our understanding of the very determinants of cross-border commuting, such as the role of benefits differentials, transport costs and distance, or the relative availability of jobs at residential places and across the border. Further, these effects are most likely mediated differently by the socio-demographic characteristics of workers, their employment sector, and the quality of their residential environment at large. This suggests that an individual approach and a spatially detailed approach is needed, which contrasts sharply with the fact that most European-wide studies of cross-border commuting are conducted at very aggregated spatial scales (NUTS 2 or 3). [less ▲]

Detailed reference viewed: 50 (4 UL)
Full Text
Peer Reviewed
See detail“It felt wrong to me to play that way” Understanding moral decision-making in video games through focus group discussions
Holl, Elisabeth UL; Bernard, Steve; Melzer, André UL

in Nebel, Steve; Pietschmann, Daniel; Schneider, Sascha (Eds.) et al Proceedings of the Media Psychology Division (2019, September 05)

Detailed reference viewed: 42 (6 UL)
Full Text
Peer Reviewed
See detailTime-Deconvolutive CNMF for Multichannel Blind Source Separation
Dias, Thadeu; Biscainho, Luiz Wagner; Alves Martins, Wallace UL

in Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (2019, September)

Detailed reference viewed: 41 (4 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2019: Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI (2019, September)

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die ... [more ▼]

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die neue wirtschaftliche Realität der digitalisierten Welt vor. Auf Ebene der Europäischen Union (EU) gilt die Verabschiedung der im März 2018 von der Europäischen Kommission vorgestellten Richtlinien-Vorschläge (RL-Vorschläge) zu einer Digitalsteuer und einer sog. signifikanten digitalen Präsenz, nach intensiver Diskussion im Rat, als unwahrscheinlich. Der Gerichtshof der Europäischen Union beschäftigt sich derzeit mit der unionsrechtlichen Vereinbarkeit nationaler Sonderabgaben, die umsatzbasiert erhoben werden. Dieser Beitrag bietet einen Überblick über wesentliche Entwicklungen im internationalen und europäischen Steuerrecht bzgl. der Besteuerung digitalisierter Unternehmen. Der Beitrag knüpft an den Vortrag von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademie 2018 in Bochum, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 78 (3 UL)
Full Text
Peer Reviewed
See detailOn the Use of Vertex-Frequency Analysis for Anomaly Detection in Graph Signals
Lewenfus, Gabriela; Alves Martins, Wallace UL; Chatzinotas, Symeon UL et al

in Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (2019, September)

Detailed reference viewed: 64 (9 UL)
Full Text
Peer Reviewed
See detailIntersymbol and Intercarrier Interference in OFDM Transmissions Through Highly Dispersive Channels
Alves Martins, Wallace UL; Cruz-Roldán, Fernando; Moonen, Marc et al

in Proc. of the 27th European Signal Processing Conference (EUSIPCO-2019) (2019, September)

Detailed reference viewed: 49 (5 UL)
Full Text
Peer Reviewed
See detailOptimal Resource Allocation for NOMA-Enabled Cache Replacement and Content Delivery
Lei, Lei UL; Vu, Thang Xuan UL; Xiang, Lin UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2019) (2019, September)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailA Way Forward. Regulating New Space Activities Through Multi-Stakeholder Adaptive Governance
Salmeri, Antonino UL

in Proceedings of the XXV International Congress of the Italian Association of Aeronautics and Astronautics (2019, September)

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailCryptocurrencies and Blockchain Technology
Biryukov, Alex UL; García-Alfaro

in Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops (2019, September)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailUsing Models to Enable Compliance Checking against the GDPR: An Experience Report
Torre, Damiano UL; Soltana, Ghanem UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the IEEE / ACM 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS 19) (2019, September)

The General Data Protection Regulation (GDPR) harmonizes data privacy laws and regulations across Europe. Through the GDPR, individuals are able to better control their personal data in the face of new ... [more ▼]

The General Data Protection Regulation (GDPR) harmonizes data privacy laws and regulations across Europe. Through the GDPR, individuals are able to better control their personal data in the face of new technological developments. While the GDPR is highly advantageous to citizens, complying with it poses major challenges for organizations that control or process personal data. Since no automated solution with broad industrial applicability currently exists for GDPR compliance checking, organizations have no choice but to perform costly manual audits to ensure compliance. In this paper, we share our experience building a UML representation of the GDPR as a first step towards the development of future automated methods for assessing compliance with the GDPR. Given that a concrete implementation of the GDPR is affected by the national laws of the EU member states, GDPR’s expanding body of case laws and other contextual information, we propose a two-tiered representation of the GDPR: a generic tier and a specialized tier. The generic tier captures the concepts and principles of the GDPR that apply to all contexts, whereas the specialized tier describes a specific tailoring of the generic tier to a given context, including the contextual variations that may impact the interpretation and application of the GDPR. We further present the challenges we faced in our modeling endeavor, the lessons we learned from it, and future directions for research. [less ▲]

Detailed reference viewed: 336 (39 UL)
Full Text
Peer Reviewed
See detailOn Fairness Optimization for NOMA-Enabled Multi-Beam Satellite Systems
Wang, Anyue UL; Lei, Lei UL; Lagunas, Eva UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 2019 (2019, September)

Detailed reference viewed: 57 (8 UL)
Full Text
Peer Reviewed
See detailJoint User Grouping and Power Allocation for MISO Systems: Learning to Schedule
Yuan, Yaxiong; Vu, Thang Xuan UL; Lei, Lei UL et al

in IEEE European Signal Processing Conference 2019 (2019, September)

Detailed reference viewed: 22 (4 UL)
Full Text
Peer Reviewed
See detailContingent Payments on a Public Ledger: Models and Reductions for Automated Verification.
Bursuc, Sergiu UL; Kremer, Steve

in Bursuc, Sergiu; Kremer, Steve (Eds.) Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification. (2019, September)

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailAutomated evaluation of embedded-system design alternatives
Cordy, Maxime UL; Lazreg, Sami

in Proceedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, Volume A, Paris, France, September 9-13, 2019 (2019, September)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailAn Approximate Solution for Symbol-Level Multiuser Precoding Using Support Recovery
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes 2-5 July 2019 (2019, August 29)

In this paper, we propose a low-complexity method to approximately solve the SINR-constrained optimization problem of symbol-level precoding (SLP). First, assuming a generic modulation scheme, the ... [more ▼]

In this paper, we propose a low-complexity method to approximately solve the SINR-constrained optimization problem of symbol-level precoding (SLP). First, assuming a generic modulation scheme, the precoding optimization problem is recast as a standard non-negative least squares (NNLS). Then, we improve an existing closed-form SLP (CF-SLP) scheme using the conditions for nearly perfect recovery of the optimal solution support, followed by solving a reduced system of linear equations. We show through simulation results that in comparison with the CF-SLP method, the improved approximate solution of this paper, referred to as ICF-SLP, significantly enhances the performance with a negligible increase in complexity. We also provide comparisons with a fast-converging iterative NNLS algorithm, where it is shown that the ICF-SLP method is comparable in performance to the iterative algorithm with a limited maximum number of iterations. Analytic discussions on the complexities of different methods are provided, verifying the computational efficiency of the proposed method. Our results further indicate that the ICF-SLP scheme performs quite close to the optimal SLP, particularly in the large system regime. [less ▲]

Detailed reference viewed: 57 (9 UL)
Full Text
Peer Reviewed
See detailModelling of interfacial crack propagation in strongly heterogeneous materials by using phase field method
Nguyen, Thanh-Tung; Yvonnet, Julien; Waldmann, Danièle UL et al

in Proceedings of the 8th GACM Colloquium on Computational Mechanics for Young Scientists from Academia and Industry (2019, August 28)

Phase field model has been proved to be a useful tool to study the fracture behaviors in heterogeneous materials. This method is able to model complex, multiple crack fronts, and branching in both 2D/3D ... [more ▼]

Phase field model has been proved to be a useful tool to study the fracture behaviors in heterogeneous materials. This method is able to model complex, multiple crack fronts, and branching in both 2D/3D without ad-hoc numerical treatments. In this study, a new interfacial cracking model in the phase field framework is proposed. The effects of both stiff and soft interphases on the fracture response of composite materials are considered. A dimensional-reduced model based on a rigorous asymptotic analysis is adapted to derive the null thickness imperfect interface models from an original configuration containing thin interphase. The idea of mixing the bulk and interfacial energy within the phase field framework is then used to describe the material degradation both on the interface and in bulk. Moreover, in order to ensure the physical crack propagation patterns, a unilateral contact condition is also proposed for the case of spring imperfect interface. The complex cracking phenomena on interfaces such as initiation, delamination, coalescence, deflection, as well as the competition between the interface and bulk cracking are successfully predicted by the present method. Concerning the numerical aspect, the one-pass staggered algorithm is adapted, providing an extremely robust approach to study interfacial cracking phenomena in a broad class of heterogeneous materials. [less ▲]

Detailed reference viewed: 29 (3 UL)
Full Text
Peer Reviewed
See detailTowards context-aware automated writing evaluation systems
Patout, Pierre-André; Cordy, Maxime UL

in Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (2019, August 26)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailHarnessing Higher-Order (Meta-)Logic to Represent and Reason with Complex Ethical Theories
Fuenmayor, David; Benzmüller, Christoph UL

in Nayak, A.; Sharma, A. (Eds.) PRICAI 2019: Trends in Artificial Intelligence (2019, August 23)

Detailed reference viewed: 80 (0 UL)
Full Text
Peer Reviewed
See detailFaster Visual-Based Localization with Mobile-PoseNet
Cimarelli, Claudio UL; Cazzato, Dario UL; Olivares Mendez, Miguel Angel UL et al

in International Conference on Computer Analysis of Images and Patterns (2019, August 22)

Precise and robust localization is of fundamental importance for robots required to carry out autonomous tasks. Above all, in the case of Unmanned Aerial Vehicles (UAVs), efficiency and reliability are ... [more ▼]

Precise and robust localization is of fundamental importance for robots required to carry out autonomous tasks. Above all, in the case of Unmanned Aerial Vehicles (UAVs), efficiency and reliability are critical aspects in developing solutions for localization due to the limited computational capabilities, payload and power constraints. In this work, we leverage novel research in efficient deep neural architectures for the problem of 6 Degrees of Freedom (6-DoF) pose estimation from single RGB camera images. In particular, we introduce an efficient neural network to jointly regress the position and orientation of the camera with respect to the navigation environment. Experimental results show that the proposed network is capable of retaining similar results with respect to the most popular state of the art methods while being smaller and with lower latency, which are fundamental aspects for real-time robotics applications. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailA new model selection criterion for finite mixture models
Schiltz, Jang UL

in Proceedings of the 62nd ISI World Statistics Congress (2019, August 20)

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailDatabase Processing-in-Memory: A Vision
Kepe, Tiago rodrigo; Almeida, Eduardo Cunha; Alves, Marcos A.Z. et al

in Database Processing-in-Memory: A Vision (2019, August 03)

Detailed reference viewed: 61 (2 UL)
Full Text
Peer Reviewed
See detailiFixR: bug report driven program repair
Koyuncu, Anil UL; Liu, Kui UL; Bissyande, Tegawendé François D Assise UL et al

in ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019, August)

Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization ... [more ▼]

Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization of patch generation for user-reported bugs. Although this ambition is aligned with the momentum of automated program repair, the literature has, so far, mostly focused on generate-and- validate setups where fault localization and patch generation are driven by a well-defined test suite. On the one hand, however, the common (yet strong) assumption on the existence of relevant test cases does not hold in practice for most development settings: many bugs are reported without the available test suite being able to reveal them. On the other hand, for many projects, the number of bug reports generally outstrips the resources available to triage them. Towards increasing the adoption of patch generation tools by practitioners, we investigate a new repair pipeline, iFixR, driven by bug reports: (1) bug reports are fed to an IR-based fault localizer; (2) patches are generated from fix patterns and validated via regression testing; (3) a prioritized list of generated patches is proposed to developers. We evaluate iFixR on the Defects4J dataset, which we enriched (i.e., faults are linked to bug reports) and carefully-reorganized (i.e., the timeline of test-cases is naturally split). iFixR generates genuine/plausible patches for 21/44 Defects4J faults with its IR-based fault localizer. iFixR accurately places a genuine/plausible patch among its top-5 recommendation for 8/13 of these faults (without using future test cases in generation-and-validation). [less ▲]

Detailed reference viewed: 63 (8 UL)
Full Text
Peer Reviewed
See detailKeynote lecture: Potential of the Deformation Area Difference (DAD)-Method for Condition Assessment of Bridge Structures
Waldmann, Danièle UL; Erdenebat, Dolgion

in Proceedings of SMAR 2019 - Fifth Conference on Smart Monitoring, Assessment and Rehabilitation of Civil Structures (2019, August)

Detailed reference viewed: 19 (2 UL)