References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailEffects of Annealing and Light on Co-evaporated Methylammonium Lead Iodide Perovskites using Kelvin Probe Force Microscopy in Ultra-High Vacuum
Gallet, Thibaut UL; Martin Lanzoni, Evandro UL; Redinger, Alex UL

in 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) (2020, February 06)

Careful surface analysis is essential to understand the electronic and ionic behaviors in perovskite absorbers. In this contribution we discuss Kelvin probe force microscopy performed in ultra-high vacuum ... [more ▼]

Careful surface analysis is essential to understand the electronic and ionic behaviors in perovskite absorbers. In this contribution we discuss Kelvin probe force microscopy performed in ultra-high vacuum on as-grown and annealed co-evaporated methylammonium lead iodide perovskite thin films. By comparing the contact potential difference upon annealing and illumination, we find that annealing increases the average workfunction, indicating a change either in doping or in surface composition. Illumination also increases the average workfunction, indicating a p-type absorber, by reducing band bending as the photo-generated carriers screen the surface states. The effect of light shows a two-step process, with a first fast trend, linked to the surface photovoltage and a second slower trend indicating a possible redistribution of mobile charges. [less ▲]

Detailed reference viewed: 31 (4 UL)
See detailLe relations belgo-luxembourgeoises: une mise en perspective historique
Brüll, Christoph UL

Scientific Conference (2020, February 05)

Detailed reference viewed: 27 (0 UL)
Peer Reviewed
See detailN point Virasoro algebras considered as Krichever - Novikov type algebras
Schlichenmaier, Martin UL

Scientific Conference (2020, February 04)

Detailed reference viewed: 60 (0 UL)
Full Text
Peer Reviewed
See detailOpening the black box of the social learning process: The case of community of practices
Boughattas, Yosra; Geraudel, Mickaël UL; Claeye, Frederic

Scientific Conference (2020, February 04)

Detailed reference viewed: 51 (1 UL)
Full Text
Peer Reviewed
See detailIdentifying Unintended Harms of Cybersecurity Measures
Chua, Yi Ting; Parkin, Simon; Edwards, Matthew et al

in Proceedings of ECRIME 2019 (2020, February 01)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailWOW! Sewage is valuable!
Frkova, Zuzana UL; Venditti, Silvia UL; Lacroix, Mark et al

Scientific Conference (2020, February)

There are market opportunities for raw materials from sewage, but for this the sewage treatment plants and the industry need alignment. This calls for a transition: sewage treatment plants need to switch ... [more ▼]

There are market opportunities for raw materials from sewage, but for this the sewage treatment plants and the industry need alignment. This calls for a transition: sewage treatment plants need to switch from treating sewage to producing valuable materials. On the other hand, market parties need to regard sewage as a valuable source instead of ‘dirty unsafe water’. Last but not least, the policies should better fit this new circular practice. To realize these opportunities WOW! aims to develop value chains for three different raw materials from sewage: cellulose, PHA bioplastics and lipids. [less ▲]

Detailed reference viewed: 38 (2 UL)
Full Text
Peer Reviewed
See detailExploring the Monero Peer-to-Peer Network
Cao, Tong UL; Yu, Jiangshan; Decouchant, Jérémie UL et al

in Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie (Eds.) et al Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020 (2020, February)

Detailed reference viewed: 91 (20 UL)
Full Text
Peer Reviewed
See detailShort paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme
Zollinger, Marie-Laure UL; Roenne, Peter UL; Ryan, Peter UL

in International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting (2020, February)

Detailed reference viewed: 65 (5 UL)
See detailLocal Organiser, European Shadow Financial Regulatory Committee Meeting
Wolff, Christian UL

Scientific Conference (2020, February)

Detailed reference viewed: 19 (2 UL)
See detailThe Loneliness of the Vilain : Shakespeare and Schiller
Kohns, Oliver UL

Scientific Conference (2020, February)

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailTowards Automatic CAD Modeling from 3D Scan Sketch based Representation
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2020), GRAPP (2020, February)

Detailed reference viewed: 119 (11 UL)
Full Text
Peer Reviewed
See detailSystematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging
Symeonidis, Iraklis UL; Lenzini, Gabriele UL

in International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020 (2020, February)

Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar ... [more ▼]

Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar threats, and how to comply with comparable system requirements. Assuming a scenario where servers may not be trusted, we review and analyze a list of threats specifically against message delivering, archiving, and contact synchronization. We also describe a list of requirements intended for whom undertakes the task of implementing secure and private messaging. The cryptographic solutions available to mitigate the threats and to comply with the requirements may differ, as the two applications are built on different assumptions and technologies. [less ▲]

Detailed reference viewed: 116 (12 UL)
Full Text
Peer Reviewed
See detailEvolving a Deep Neural Network Training Time Estimator
Pinel, Frédéric UL; Yin, Jian-xiong; Hundt, Christian UL et al

in Communications in Computer and Information Science (2020, February)

We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be ... [more ▼]

We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be embedded in the scheduler of a shared GPU infrastructure, capable of providing estimated training times for a wide range of network architectures, when the user submits a training job. To this end, a very short and simple representation for a given DNN is chosen. In order to compensate for the limited degree of description of the basic network representation, a novel co-evolutionary approach is taken to fit the estimator. The training set for the estimator, i.e. DNNs, is evolved by an evolutionary algorithm that optimizes the accuracy of the estimator. In the process, the genetic algorithm evolves DNNs, generates Python-Keras programs and projects them onto the simple representation. The genetic operators are dynamic, they change with the estimator’s accuracy in order to balance accuracy with generalization. Results show that despite the low degree of information in the representation and the simple initial design for the predictor, co-evolving the training set performs better than near random generated population of DNNs. [less ▲]

Detailed reference viewed: 67 (4 UL)
Full Text
Peer Reviewed
See detailWhen a Master Dies: Speculation and Asset Float”
Penasse, Julien UL; Renneboog,, Luc; Scheinkman, José A.

Scientific Conference (2020, January 30)

Detailed reference viewed: 87 (0 UL)
Full Text
Peer Reviewed
See detailEtudes universitaires sur le Luxembourg: Mots d'accueil
Bisdorff, Raymond UL

Scientific Conference (2020, January 28)

Concise historical review of 20 years of interdisciplinary Luxembourg studies before the foundation of the University of Luxembourg

Detailed reference viewed: 27 (1 UL)
Full Text
See detailLa pluralité des marchés du travail au Luxembourg
Pigeron-Piroth, Isabelle UL

Scientific Conference (2020, January 28)

Detailed reference viewed: 20 (6 UL)
Full Text
Peer Reviewed
See detailWhy is the Market Skewness-Return Relationship Negative?
Lehnert, Thorsten UL

Scientific Conference (2020, January 23)

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we ... [more ▼]

The observed negative relationship between market skewness and excess return or the negative price of market skewness risk in the cross-section of stock returns is somewhat counterintuitive when we consider the usual interpretation of e.g. option-implied skewness as an indicator of jump risk or downside risk. One possible explanation for this inconsistency is that there are factors affecting option-implied market skewness other than jump risk in the stock market. In this paper, I find that price pressure associated with “crowded trades” of mutual funds is an important endogenous factor. Given that retail investors are prone to herding, the directional trading of mutual funds is correlated, and their collective actions can generate short-term price pressure on aggregate stock prices. Short sellers systematically exploit these patterns not only in the equity lending market, but also in the options market. In line with this economic channel, I find that firstly, the significant negative relationship between market skewness and returns becomes insignificant, once I control for price pressure. Secondly, the negative relationship is only present for the “bad” downside component of risk-neutral skewness, associated with out-of-the-money put options. For the “good” upside component of risk-neutral skewness, associated with out-of-the-money call options, the relationship is always positive. Thirdly, price pressure affects the skewness-return relationship, which can be clearly distinguished from the impact of flows on the volatility-return relationship in terms of the leverage effect. [less ▲]

Detailed reference viewed: 41 (5 UL)
Full Text
Peer Reviewed
See detailTeaching DevOps in Academia and Industry: Reflections and Vision
Bobrov, Evgeny; Bucchiarone, Antonio; Capozucca, Alfredo UL et al

in Bruel, Jean-Michel; Mazzara, Manuel; Meyer, Bertrand (Eds.) Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment (2020, January 19)

The new century brought us a kind of renaissance in software development methods. The advent of the Agile manifesto has led to greater appreciation of methodologies aimed at producing valuable software ... [more ▼]

The new century brought us a kind of renaissance in software development methods. The advent of the Agile manifesto has led to greater appreciation of methodologies aimed at producing valuable software through continuous incremental cycles. More recently, a new set of practices enclosed under the term DevOps has appeared to attain manifesto's objectives in more efficient manner. The software development community has already noticed the benefits brought by DevOps. Thus, the necessity of education in the field becomes more and more important, both from the technical and organisational point of view. This paper describes parallel experiences of teaching both undergraduate and graduate students at the university, and junior professional developers in industry, compares the two approaches and sums up the lessons learnt. A vision driven by the DevOps practices aimed at implementing a shift in the Software Engineering Higher Education curricula to takeover its current limitations is also reported at the end of the paper. [less ▲]

Detailed reference viewed: 75 (4 UL)
See detailStudents’ perceptions of instructional quality: Validating 3 dimensions on a lesson-to-lesson basis
Talic, Irma UL; Möller, Jens; Niepel, Christoph UL

Scientific Conference (2020, January 17)

Detailed reference viewed: 17 (1 UL)
Full Text
See detailFostering process related skills in mathematics though educational technology in elementary schools
Haas, Ben; Kreis, Yves UL

Scientific Conference (2020, January 17)

The Teaching in elementary school is mostly based on paper-pencil approaches and does not yet rely primary on educational technologies. But educational technology has found its way into the elementary ... [more ▼]

The Teaching in elementary school is mostly based on paper-pencil approaches and does not yet rely primary on educational technologies. But educational technology has found its way into the elementary schools, this based on various numbers of governmental initiatives launched during the last years in Luxemburg. The aims of these initiatives were to support students in mathematics and foremost render improvements on both skill settings, content and process. However using educational technology in mathematics does not jointly mean teaching and learning process skills. There are many different types of educational technology in mathematics, from tutoring systems to dynamic mathematical software and drill and practice software, only to name those as examples. We want to identify educational technologies and methodologies which are most likely to foster process skills (problem solving, modeling, argumenting, representing and communicating) in mathematics. Therefore we would work on a set of educational technologies offered to the students in elementary school in Luxemburg and evaluate their impacts on the fostering of process skills in mathematics. [less ▲]

Detailed reference viewed: 56 (6 UL)
Full Text
See detail„Entweder man kann’s oder man lässt es bleiben.“ Kritische Gedanken zur Ausbildung von Blasmusikdirigenten
Sagrillo, Damien UL

Scientific Conference (2020, January 17)

Diesen Karl Böhm in den Mund gelegten Satz passt zu seinem Naturell. Sein Sarkasmus und Zynismus waren bekannt. Karl Böhm hat nie ein Dirigierstudium absolviert. Dennoch gehörte er zu den Großen seines ... [more ▼]

Diesen Karl Böhm in den Mund gelegten Satz passt zu seinem Naturell. Sein Sarkasmus und Zynismus waren bekannt. Karl Böhm hat nie ein Dirigierstudium absolviert. Dennoch gehörte er zu den Großen seines Fachs. In der Fachzeitschrift „das Orchester“ ist im Zusammenhang mit dem berufsausbildenden Angebot für Blasorchesterdirigenten folgendes zu lesen: „Marschmusik oder leichtere Muse haben keinen Platz im Curriculum, die Konzentration liegt auf der Literatur für Sinfonisches Blasorchester“ Diese Aussage gehört kritisch hinterfragt. In meinem Vortrag steht infolgedessen zweierlei im Vordergrund. Zum einen: Was ist ein sinfonisches Blasorchester bzw. eine Bläserphilharmonie – wo kommen die Begriffe her, worauf zielen sie ab? Zum anderen: Marchmusik und sog. „leichte Muse“ gehören zum Wesen lokaler Musikvereine. Wieso finden diese als Tradition zu bezeichnenden Genres der Blasmusik in der Ausbildung keinen Platz? In der Zusammenfassung der beiden voraus gestellten Fragen lassen sich Schlussfolgerungen für die Ausbildung von Blasmusikdirigenten ziehen. [less ▲]

Detailed reference viewed: 20 (4 UL)
Full Text
Peer Reviewed
See detailReal Time Holding Control for Multiline Networks
Laskaris, Georgios UL; Cats, Oded; Jenelius, Erik et al

Poster (2020, January 12)

We introduce a rule based multiline holding criterion for regularity in branch and trunk networks accounting for all passenger groups. On the shared transit corridor, we consider synchronization at the ... [more ▼]

We introduce a rule based multiline holding criterion for regularity in branch and trunk networks accounting for all passenger groups. On the shared transit corridor, we consider synchronization at the merging or the diverging stop. The decision between holding for regularity or synchronization is taken by comparing the expected passenger cost of each control action. The proposed criterion is tested through simulation in a synthetic double fork network with different shares of transferring passengers, control schemes for regularity and synchronization. The results show that multiline control outperforms the state of the art schemes at the network level, stemming from benefits occurring at the first part of the route and the shared transit corridor and a 3.5% more stable joint headway compared to the other schemes. Additionally, it is advised to perform the synchronization at the diverging stop, as it proves to result in a more stable transferring time equal to the joint frequency of the corridor while reducing the transfer time variability up to -42.7%. [less ▲]

Detailed reference viewed: 129 (12 UL)
Full Text
Peer Reviewed
See detailComprendre l'état du parlementarisme contemporain en Europe
Poirier, Philippe UL

in Le Parlement depuis 2008 : Renforcement, statu quo ou retour au(x) fondement(s) de la Ve République (2020, January 10)

Cet ouvrage reprend les actes du colloque d'Aix-en-Provence de 2018 consacré au bilan de dix ans de mise en oeuvre de la révision constitutionnelle de 2008 dans son volet parlementaire. Faisant intervenir ... [more ▼]

Cet ouvrage reprend les actes du colloque d'Aix-en-Provence de 2018 consacré au bilan de dix ans de mise en oeuvre de la révision constitutionnelle de 2008 dans son volet parlementaire. Faisant intervenir des acteurs de la révision de 2008, des parlementaires, des membres du Conseil constitutionnel, des hauts fonctionnaires des assemblées et des universitaires, ce colloque a été construit autour des trois fonctions essentielles du Parlement : l'élaboration de la loi, le contrôle de l'exécutif et l'évaluation des politiques publiques afin de répondre à cette question : un changement pour quoi faire ? [less ▲]

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailBenchmarking Synchronous and Asynchronous Stream Processing Systems
Ellampallil Venugopal, Vinu UL; Theobald, Martin UL

in Ellampallil Venugopal, Vinu; Theobald, Martin (Eds.) Benchmarking Synchronous and Asynchronous Stream Processing Systems (2020, January 02)

Processing high-throughput data-streams has become a major challenge in areas such as real-time event monitoring, complex dataflow processing, and big data analytics. While there has been tremendous ... [more ▼]

Processing high-throughput data-streams has become a major challenge in areas such as real-time event monitoring, complex dataflow processing, and big data analytics. While there has been tremendous progress in distributed stream processing systems in the past few years, the high-throughput and low-latency (a.k.a. high sustainable-throughput) requirement of modern applications is pushing the limits of traditional data processing infrastructures. To understand the upper bound of the maximum sustainable throughput that is possible for a given node configuration, we have designed multiple hard-coded multi-threaded processes (called ad-hoc dataflows) in C++ using Message Passing Interface (MPI) and Pthread libraries. Our preliminary results show that our ad-hoc design on average is 5.2 times better than Flink and 9.3 times better than Spark. [less ▲]

Detailed reference viewed: 27 (6 UL)
Full Text
Peer Reviewed
See detailCzechoslovak Jewish emigrants in the clutches of Luxembourg pre-war migration bureaucracy
Bronec, Jakub UL

in Malach Center for Visual History on its 10th Anniversary: Compendium of Papers of the Prague Visual History and Digital Humanities Conference 2020 (2020, January)

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities ... [more ▼]

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities distinguish or give priority to citizens of particular nations? Who was involved in the approval process? Who played the most active role and collected the most controversial information about Jewish immigrants? [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailConditionality in the European Union External Migration Policy – A Critical Appraisal
Silga, Janine UL

Scientific Conference (2020, January)

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailInternal wall insulation with a new aerogel panel: SLENTITE® for energetic retrofit in historic buildings
Günther, Eva; Bichlmair, Stefan; Latz, Sebastian UL et al

in 12th Nordic Symposium on Building Physics (2020, January)

We present two recent test case application examples of a new high-performance insulation panel with product name SLENTITE® used as core element of a rendered internal wall insulation system. The first ... [more ▼]

We present two recent test case application examples of a new high-performance insulation panel with product name SLENTITE® used as core element of a rendered internal wall insulation system. The first case study refers to the 18th-century building Alte Schäfflerei now the Fraunhofer Centre for Conservation and Energy Performance of Historic Buildings, at the monastery Benediktbeuern, southern Germany, where SLENTITE® was applied in 11/2017. The second test case was installed in 04/2019 in a heritage building situated in the historic center of Luxembourg. In Benediktbeuern, a single layer of insulation material was chosen, in Luxembourg we applied two layers of insulation. In both cases, detail work around the windows was a main task and we gained experience on product processing under real conditions. In terms of indoor room usage, the object in Benediktbeuern is used as exhibition hall with rare traffic and well controlled climate, whereas the object in Luxembourg is used as meeting room without climate control. Measured data of 20 months from the object in Benediktbeuern and first impressions of the performance in Luxembourg are discussed. [less ▲]

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailModeling for Three-Subset Division Property without Unknown Subset and Improved Cube Attacks
Hao, Yonglin; Leander, Gregor; Meier, Willi et al

in 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Croatia 10-14 May 2020 (2020, January)

Detailed reference viewed: 42 (2 UL)
See detailAmbitious Amateurs - European Filmclubs in the long 1960s
Wack, Julia UL

Scientific Conference (2020, January)

Ambitious Amateurs aims to investigate the so-called mass taste through the lens of the participatory cultural practice of filming in the long 1960s. The filmmakers were consumers of a medium they were co ... [more ▼]

Ambitious Amateurs aims to investigate the so-called mass taste through the lens of the participatory cultural practice of filming in the long 1960s. The filmmakers were consumers of a medium they were co-creating themselves. They were producing for a circle of peers, respectively to get recognition from professionals. The aesthetic form of these films and genres, the excess of meaning, as well as the moral political ideals represent central axes of the analysis. Additionally, relations between the club members and their activities in national umbrella associations as well as contexts of transnational encounters (i.e. UNICA, founded in 1937) shall be further observed. This will be executed on the examples of selected clubs and locations in Luxembourg, Belgium, France and Germany. Besides archive research and Oral History, the film documents themselves are the core piece of the analysis. The topic is of particular relevance for general Culture and Media History, due to the historical evolution of censorship and auto-censorship tendencies regarding sexual permissiveness, political militancy or religious statements in the long 1960s. These will be connected with the issue of Americanisation, respectively the rejection of the latter within the discourse of European film creators and the topical press. The international comparison will additionally facilitate the display of national specificities and diverse temporalities within (Western)Europe. Simultaneously a possibility to conceive certain potential transnational developments – also beyond the ‘Iron Curtain’ – will be generated. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailMaking Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
Distler, Verena UL; Lallemand, Carine UL; Koenig, Vincent UL

in The 5th European Workshop on Usable Security (EuroUSEC 2020) (2020)

When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and ... [more ▼]

When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and the actual system state can lead to potentially risky behaviors. It is thus crucial to understand how security perceptions are shaped by interface elements such as text-based descriptions of encryption. This article addresses the question of how encryption should be described to non-experts in a way that enhances perceived security. We tested the following within-subject variables in an online experiment (N=309): a) how to best word encryption, b) whether encryption should be described with a focus on the process or outcome, or both c) whether the objective of encryption should be mentioned d) when mentioning the objective of encryption, how to best describe it e) whether a hash should be displayed to the user. We also investigated the role of context (between subjects). The verbs “encrypt” and “secure” performed comparatively well at enhancing perceived security. Overall, participants stated that they felt more secure not knowing about the objective of encryption. When it is necessary to state the objective, positive wording of the objective of encryption worked best. We discuss implications and why using these results to design for perceived lack of security might be of interest as well. This leads us to discuss ethical concerns, and we give guidelines for the design of user interfaces where encryption should be communicated to end users. [less ▲]

Detailed reference viewed: 66 (2 UL)
Full Text
Peer Reviewed
See detailMental health impact of the confinement measures during the COVID-19 pandemic
Pauly, Claire UL; Schroeder, Valerie; Pauly, Laure UL et al

in Innovation in Aging (2020), 4(S1), 952

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailNGAP: a novel hybrid metaheuristic algorithm for round-trip carsharing fleet planning
Changaival, Boonyarit UL; Danoy, Grégoire UL; Kliazovich et al

in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020)

Detailed reference viewed: 32 (4 UL)
Full Text
Peer Reviewed
See detailFlavors of Boolean network reprogramming in the CoLoMoTo notebook environment.
Biane, Célia; Deritei, David; Rozum, Jordan et al

Poster (2020)

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailProcess mining-based approach for investigating malicious login events
Lagraa, Sofiane UL; State, Radu UL

in IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020 (2020)

A large body of research has been accomplished on prevention and detection of malicious events, attacks, threats, or botnets. However, there is a lack of automatic and sophisticated methods for ... [more ▼]

A large body of research has been accomplished on prevention and detection of malicious events, attacks, threats, or botnets. However, there is a lack of automatic and sophisticated methods for investigating malicious events/users, understanding the root cause of attacks, and discovering what is really hap- pening before an attack. In this paper, we propose an attack model discovery approach for investigating and mining malicious authentication events across user accounts. The approach is based on process mining techniques on event logs reaching attacks in order to extract the behavior of malicious users. The evaluation is performed on a publicly large dataset, where we extract models of the behavior of malicious users via authentication events. The results are useful for security experts in order to improve defense tools by making them robust and develop attack simulations. [less ▲]

Detailed reference viewed: 89 (0 UL)
Full Text
Peer Reviewed
See detailAutomatic Testing and Improvement of Machine Translation
Sun, Zeyu; Zhang, Jie; Harman, Mark et al

in International Conference on Software Engineering (ICSE) (2020)

Detailed reference viewed: 49 (8 UL)
Full Text
Peer Reviewed
See detailMind the gap: Robotic Mission Planning Meets Software Engineering
Askarpour, Mehrnoosh; Menghi, Claudio UL; Belli, Gabriele et al

in Proceedings of the 8th International Conference on Formal Methods in Software Engineering (2020)

In the context of robotic software, the selection of an appropriate planner is one of the most crucial software engineering decisions. Robot planners aim at computing plans (i.e., blueprint of actions) to ... [more ▼]

In the context of robotic software, the selection of an appropriate planner is one of the most crucial software engineering decisions. Robot planners aim at computing plans (i.e., blueprint of actions) to accomplish a complex mission. While many planners have been proposed in the robotics literature, they are usually evaluated on showcase examples, making hard to understand whether they can be effectively (re)used for realising complex missions, with heterogeneous robots, and in real-world scenarios. In this paper we propose ENFORCE, a framework which allows wrapping FM-based planners into comprehensive software engineering tools, and considers complex robotic missions. ENFORCE relies on (i) realistic maps (e.g, fire escape maps) that describe the environment in which the robots are deployed; (ii) temporal logic for mission specification; and (iii) Uppaal model checker to compute plans that satisfy mission specifications. We evaluated ENFORCE by analyzing how it supports computing plans in real case scenarios, and by evaluating the generated plans in simulated and real environments. The results show that while ENFORCE is adequate for handling single-robot applications, the state explosion still represents a major barrier for reusing existing planners in multi-robot applications. [less ▲]

Detailed reference viewed: 195 (11 UL)
Full Text
Peer Reviewed
See detailOptimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection
Stolfi Rosso, Daniel UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Optimization and Learning - Third International Conference, OLA 2020, Cádiz, Spain, February 17-19, 2020, Proceedings (2020)

Detailed reference viewed: 65 (6 UL)
Full Text
Peer Reviewed
See detailTowards Extending the Validation Possibilities of ADOxx with Alloy
de Kinderen, Sybren; Ma, Qin UL; Kaczmarek-Heß, Monika

in Lecture Notes in Business Information Processing 400 (2020)

While ADOxx is a popular platform for the creation and use of enterprise modeling languages, it provides only limited support for a well-formedness check of created enterprise models. In this paper, we ... [more ▼]

While ADOxx is a popular platform for the creation and use of enterprise modeling languages, it provides only limited support for a well-formedness check of created enterprise models. In this paper, we propose to complement the meta modeling platform ADOxx with Alloy, which natively provides extensive model checking capabilities, so as to enable a well-formedness check of enterprise models created in ADOxx. Using the e3value modeling language as a point of departure, we particularly provide (a) a partial ADOxx implementation of e3value, (b) a proof-of-concept XML2Alloy parser, which allows for converting e3value models created in ADOxx into Alloy format, so that (c) e3value well-formedness constraints stated in Alloy can be used to check the valid- ity of an e3value model with the Alloy Evaluator. Beyond the specific proof-of-concept, we also discuss further possibilities of using ADOxx in conjunction with Alloy, particularly in checking the soundness of meta models underlying an enterprise modeling language. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailMeeting Designers Where They Are: Using Industry Events as a Research Venue for HCI and Design Methods Development
Lockton, Dan; Lallemand, Carine UL

Scientific Conference (2020)

There is much work in the CHI community about the ‘industry-academia divide’, and how to bridge it. One key crossover between HCI/UX scientists and practitioners is the development and use of tools and ... [more ▼]

There is much work in the CHI community about the ‘industry-academia divide’, and how to bridge it. One key crossover between HCI/UX scientists and practitioners is the development and use of tools and methods—boundary objects between academia and practice. Among other forms of collaboration, there is an underdeveloped opportunity for academics to make use of industry events (conferences, meetups, design jams) as a research venue in the context of tool and method development. This paper describes three cases from work in academia-industry engagement over the last decade, in which workshops or experiments have been run at industry events as a way of trialling and developing tools directly with practitioners. We discuss advantages of this approach and extract key insights and practical implications, highlighting how the CHI community might use this method more widely, gathering relevant research outcomes while contributing to knowledge exchange between academia and practice. [less ▲]

Detailed reference viewed: 99 (0 UL)
Full Text
Peer Reviewed
See detailCommit-Aware Mutation Testing
Ma, Wei UL; Laurent, Thomas; Ojdanić, Miloš UL et al

in IEEE International Conference on Software Maintenance and Evolution (ICSME) (2020)

Detailed reference viewed: 115 (38 UL)
Full Text
Peer Reviewed
See detailA Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV Swarms
Stolfi Rosso, Daniel UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in IEEE 17th Annual Consumer Communications & Networking Conference CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020 (2020)

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailShort Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
Haines, Thomas; Pereira, Olivier; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

Detailed reference viewed: 78 (0 UL)
Full Text
Peer Reviewed
See detailMuteria: An Extensible and Flexible Multi-Criteria Software Testing Framework
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL

in ACM/IEEE International Conference on Automation of Software Test (AST) 2020 (2020)

Program based test adequacy criteria (TAC), such as statement, branch coverage and mutation give objectives for software testing. Many techniques and tools have been developed to improve each phase of the ... [more ▼]

Program based test adequacy criteria (TAC), such as statement, branch coverage and mutation give objectives for software testing. Many techniques and tools have been developed to improve each phase of the TAC-based software testing process. Nonetheless, The engineering effort required to integrate these tools and techniques into the software testing process limits their use and creates an overhead to the users. Especially for system testing with languages like C, where test cases are not always well structured in a framework. In response to these challenges, this paper presents Muteria, a TAC-based software testing framework. Muteria enables the integration of multiple software testing tools. Muteria abstracts each phase of the TAC-based software testing process to provide tool drivers interfaces for the implementation of tool drivers. Tool drivers enable Muteria to call the corresponding tools during the testing process. An initial set of drivers for KLEE, Shadow and SEMu test-generation tools, Gcov, and coverage.py code coverage tools, and Mart mutant generation tool for C and Python programming language were implemented with an average of 345 lines of Python code. Moreover, the user configuration file required to measure code coverage and mutation score on a sample C programs, using the Muteria framework, consists of less than 15 configuration variables. Users of the Muteria framework select, in a configuration file, the tools and TACs to measure. The Muteria framework uses the user configuration to run the testing process and report the outcome. Users interact with Muteria through its Application Programming Interface and Command Line Interface. Muteria can benefit to researchers as a laboratory to execute experiments, and to software practitioners. [less ▲]

Detailed reference viewed: 133 (2 UL)
Peer Reviewed
See detailMeasures of Executive Functions and Mathematical Skills are Distinct Even at a Young Age: A Meta-Analysis with Preschool Children
Emslander, Valentin UL; Scherer, Ronny

Scientific Conference (2020)

Measures of executive functions (inhibition, attention shifting, working memory) are linked to measures of mathematical skills in school students and adults. However, the magnitude of this relation in ... [more ▼]

Measures of executive functions (inhibition, attention shifting, working memory) are linked to measures of mathematical skills in school students and adults. However, the magnitude of this relation in preschool children is unclear. Following the literature on the differentiation of cognitive skills over time, some researchers suggest that tests of executive functions and mathematical skills measure the same underlying construct, while others suggest that they measure correlated but distinct constructs. This dispute does not only tap the question of how the constructs can be understood but also the question of cost and test efficiency (i.e., assessments of single vs. multiple constructs). Clarifying the relation between measures of the two constructs can be especially challenging because preschoolers cannot fill in commonly used questionnaires that require them to read. Thus, researchers have to resort to behavioral, verbal, apparatus-, or computer-based assessments of executive functions. As a result, executive functions may vary in their relation to mathematical skills as a consequence of their measurement. We examined the link between executive functions and early mathematical skills measures, conducting a meta-analysis of 26 studies containing 238 effect sizes for a total sample of 24,256 preschool children. Specifically, we synthesized the corresponding correlations and aimed to clarify which executive function assessments were used for preschool children and how assessment characteristics may moderate the correlation between executive functions and mathematical skills. Three-level random-effects meta-analysis revealed a small to moderate average correlation between executive functions and mathematical skills measures of preschool children, r = 0.35. The type of assessment (behavioral, verbal, apparatus-, or computer-based assessments) did not moderate this relation. Investigating the three executive functions separately, we found average correlations of r = 0.31 between mathematical skills and inhibition, r = 0.38 between mathematical skills and attention shifting, and r = 0.36 between mathematical skills and updating. These analyses will be supplemented by further moderator and sensitivity analyses. These findings emphasize the significant link between executive functions and mathematical skills measures in preschoolers—hereby, supporting that the measures of both constructs are distinct. In addition, under-researched areas around the assessment of executive functions and mathematical abilities will be discussed. [less ▲]

Detailed reference viewed: 56 (5 UL)
Full Text
Peer Reviewed
See detailUsing cohort data to emulate lifestyle interventions: Long-term beneficial effects of initiating physical activity on cognitive decline and dementia
Leist, Anja UL; Muniz-Terrera, Graciela; Solomon, Alina

in Alzheimer's and Dementia: the Journal of the Alzheimer's Association (2020), 16

Background: Intervention studies have shown beneficial short-term effects of physical activity on cognitive decline and reduced risk of dementia. However, randomized controlled trial data of lifestyle ... [more ▼]

Background: Intervention studies have shown beneficial short-term effects of physical activity on cognitive decline and reduced risk of dementia. However, randomized controlled trial data of lifestyle interventions over long time spans are not available due to lack of resources, feasibility or ethical reasons. Drawing from the principles of emulating a ‘target trial’, which apply design principles of randomized trials to the analysis of observational data, cohort data of a large European survey were analyzed to understand the long-term effects of physical activity changes. Method: Biennial assessments of the economic, social, and health situation of respondents aged 50 and older came from the Survey of Health, Ageing and Retirement in Europe (2004-2017). Cognitive functioning (immediate recall, delayed recall, and verbal fluency) and self-reported diagnosis of dementia were assessed at each follow-up. The target trial included sedentary respondents at t1 who, at follow-up (t2), stayed sedentary (“control group”) or newly reported vigorous physical activity more often than once a week (initiators, “treatment group”). Inclusion and exclusion criteria were implemented as close as possible to those of the FINGER trial. Inverse-probability weighting accounted for the probability of initiating physical activity with a large set of predictor variables. Selecting respondents aged 50-85 years old who met the target trial inclusion and exclusion criteria, assessments of cognitive functioning and self-reported diagnosis of dementia were available for 8,781 respondents at t3 (on average 3.02 years later), 3,858 respondents at t4 (5.84 years), and 2,304 respondents at t5 (7.72 years). A total of 304 respondents reported a diagnosis of dementia. Result: Initiators of vigorous physical activity had higher cognitive functioning at two follow-ups compared to non-initiators (t3: “average treatment effect on the treated”, ATET=0.059, CI: 0.028, 0.090), which remained significant after implementing inclusion and exclusion criteria. Initiators had lower risk of dementia compared to non-initiators at all three follow-ups (t3: ATET=-0.009, CI: -0.015, -0.005, relative risk decrease -46.7%), remaining significant after implementing inclusion and exclusion criteria. Conclusion: Emulating a target trial showed long-term benefits of initiating physical activity for cognitive functioning and dementia risk. Multidomain interventions related to nutrition, social, cognitive activities etc. can be similarly emulated. [less ▲]

Detailed reference viewed: 68 (0 UL)
Full Text
Peer Reviewed
See detailA Worst-Case Performance Optimization Based Design Approach to Robust Symbol-Level Precoding for Downlink MU-MIMO
Haqiqatnejad, Alireza UL; Shahbazpanahi, Shahram UL; Ottersten, Björn UL

in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Ottawa 11-14 November 2019 (2020)

This paper addresses the optimization problem of symbol-level precoding (SLP) in the downlink of a multiuser multiple-input multiple-output (MU-MIMO) wireless system while the precoder's output is subject ... [more ▼]

This paper addresses the optimization problem of symbol-level precoding (SLP) in the downlink of a multiuser multiple-input multiple-output (MU-MIMO) wireless system while the precoder's output is subject to partially-known distortions. In particular, we assume a linear distortion model with bounded additive noise. The original signal-to-interference- plus-noise ratio (SINR) -constrained SLP problem minimizing the total transmit power is first reformulated as a penalized unconstrained problem, which is referred to as the relaxed robust formulation. We then adopt a worst-case design approach to protect the users' intended symbols and the targeted constructive interference with a desired level of confidence. Due to the non-convexity of the relaxed robust formulation, we propose an iterative algorithm based on the block coordinate ascent-descent method. We show through simulation results that the proposed robust design is flexible in the sense that the CI constraints can be relaxed so as to keep a desirable balance between achievable rate and power consumption. Remarkably, the new formulation yields more energy-efficient solutions for appropriate choices of the relaxation parameter, compared to the original problem. [less ▲]

Detailed reference viewed: 43 (9 UL)
Full Text
Peer Reviewed
See detailA Report on the VarDial Evaluation Campaign 2020
Găman, Mihaela; Hovy, Dirk; Ionescu, Radu et al

in Zampieri, Marcos; Preslav, Yakov; Ljubešić, Nikola (Eds.) et al Proceedings of the 7th Workshop on NLP for Similar Languages, Varieties and Dialects (2020)

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailAttack-Tree Series: A Case for Dynamic Attack Tree Analysis
Gadyatskaya, Olga UL; Mauw, Sjouke UL

in Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (2020)

Detailed reference viewed: 56 (0 UL)
Full Text
Peer Reviewed
See detailSequential Temporary and Permanent Control of Boolean Networks.
Su, Cui; Pang, Jun UL

in Proceedings of the 18th International Conference on Computational Methods in Systems Biology (CMSB) (2020)

Detailed reference viewed: 74 (0 UL)
Full Text
Peer Reviewed
See detailA Data-Driven Minimal Approach for CAN Bus Reverse Engineering
Buscemi, Alessio UL; Castignani, German; Engel, Thomas UL et al

in 3rd IEEE Connected and Automated Vehicles Symposium, Victoria, Canada, 4-5 October 2020 (2020)

Current in-vehicle communication systems lack security features, such as encryption and secure authentication. The approach most commonly used by car manufacturers is to achieve security through obscurity ... [more ▼]

Current in-vehicle communication systems lack security features, such as encryption and secure authentication. The approach most commonly used by car manufacturers is to achieve security through obscurity – keep the proprietary format used to encode the information secret. However, it is still possible to decode this information via reverse engineering. Existing reverse engineering methods typically require physical access to the vehicle and are time consuming. In this paper, we present a Machine Learning-based method that performs automated Controller Area Network (CAN) bus reverse engineering while requiring minimal time, hardware equipment, and potentially no physical access to the vehicle. Our results demonstrate high accuracy in identifying critical vehicle functions just from analysing raw traces of CAN data. [less ▲]

Detailed reference viewed: 145 (7 UL)
Full Text
Peer Reviewed
See detailTowards Generalization of 3D Human Pose Estimation In The Wild
Baptista, Renato UL; Saint, Alexandre Fabian A UL; Al Ismaeil, Kassem UL et al

in International Conference on Pattern Recognition (ICPR) Workshop on 3D Human Understanding, Milan 10-15 January 2021 (2020)

In this paper, we propose 3DBodyTex.Pose, a dataset that addresses the task of 3D human pose estimation in-the-wild. Generalization to in-the-wild images remains limited due to the lack of adequate ... [more ▼]

In this paper, we propose 3DBodyTex.Pose, a dataset that addresses the task of 3D human pose estimation in-the-wild. Generalization to in-the-wild images remains limited due to the lack of adequate datasets. Existent ones are usually collected in indoor controlled environments where motion capture systems are used to obtain the 3D ground-truth annotations of humans. 3DBodyTex.Pose offers high quality and rich data containing 405 different real subjects in various clothing and poses, and 81k image samples with ground-truth 2D and 3D pose annotations. These images are generated from 200 viewpoints among which 70 challenging extreme viewpoints. This data was created starting from high resolution textured 3D body scans and by incorporating various realistic backgrounds. Retraining a state-of-the-art 3D pose estimation approach using data augmented with 3DBodyTex.Pose showed promising improvement in the overall performance, and a sensible decrease in the per joint position error when testing on challenging viewpoints. The 3DBodyTex.Pose is expected to offer the research community with new possibilities for generalizing 3D pose estimation from monocular in-the-wild images. [less ▲]

Detailed reference viewed: 65 (10 UL)
Full Text
Peer Reviewed
See detailA bimodal simulation of defeasibility in thenormative domain
Libal, Tomer UL; van der Torre, Leon UL; Gabbay, Dov UL et al

in CEUR Workshop Proceedings (2020)

In the present work we illustrate how two sorts of defeasiblereasoning that are fundamental in the normative domain, that is, reasoning about exceptions and reasoning about violations, can be simulated ... [more ▼]

In the present work we illustrate how two sorts of defeasiblereasoning that are fundamental in the normative domain, that is, reasoning about exceptions and reasoning about violations, can be simulated via monotonic propositional theories based on a bimodal language with primitive operators representing knowledge and obligation. The proposed theoretical framework paves the way to using native theorem provers for multimodal logic, such as MleanCoP, in order to automate normative reasoning. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailPrevalence of memory impairment 2000-2015 in Sao Paolo, Brazil
Ribeiro, Fabiana UL; de Oliveira Duarte, Yeda; Santos, Jair Licio Ferreira et al

in Alzheimer's and Dementia: the Journal of the Alzheimer's Association (2020), 16

Background: Decreases in prevalence of memory impairment and dementia over the last two decades have been observed in different countries for cohorts entering older age. We sought to explore the changes ... [more ▼]

Background: Decreases in prevalence of memory impairment and dementia over the last two decades have been observed in different countries for cohorts entering older age. We sought to explore the changes in prevalence of cognitive impairment across four waves of the Health, Welfare and Aging survey (SABE) with data collected in Sao Paolo, Brazil, in 2000, 2006, 2010, and 2015. Method: Mini Mental State Exam (MMSE) scores and covariate values were available for 5,191 respondents (62.4% female) aged 60 to 99 across four waves. Cognitive impairment was defined as having <=12 points on a 19-point abbreviated version of the MMSE. Age group, educational attainment (no formal schooling, primary, secondary, post-secondary), self-reported heart disease, stroke, diabetes, hypertension, and BMI (<18.5, 18.5-24.9, 25-29.9, 30+) were adjusted for. Result: In more recent waves, prevalence of cognitive impairment was higher for respondents aged 60-64 years (9.0% in 2015 vs. 4.6% in 2000), 65-69 years (9.7% in 2015 vs. 5.8% in 2006) and 70-74 years (13.9% in 2015 vs. 5.8% in 2006). Between 2015 and 2000, respondents were increasingly more likely to report some formal education (90.8% vs. 75.3%), secondary (17.6% vs. 7.3%) or postsecondary education (11.4% vs. 4.3%). Respondents were increasingly more likely to report hypertension (66.5% vs. 54.2%), diabetes (28.7% vs. 17.8%), and be overweight/obese (74.1% vs. 58.9%). In age-adjusted logistic regressions, respondents in 2015 were more likely to show cognitive impairment compared to 2000 (OR 1.84, CI 1.20-2.82). Conclusion: SABE respondents showed higher prevalence of cognitive impairment in 2015 compared to respondents of the same age in earlier waves, but differences disappeared after adjusting for chronic disease burden and educational attainment. [less ▲]

Detailed reference viewed: 76 (2 UL)
Full Text
Peer Reviewed
See detailSocial Roles, Subjective Age, and Gender: Exploring the Links in Later Life
Kornadt, Anna Elena UL

in Innovation in Aging (2020), 4(Supplement_1), 556-556

Subjective age (SA) is strongly linked to positive developmental outcomes and successful aging. The social roles people assume are supposed to impact SA, since they incorporate age-graded social ... [more ▼]

Subjective age (SA) is strongly linked to positive developmental outcomes and successful aging. The social roles people assume are supposed to impact SA, since they incorporate age-graded social experiences and age-stereotypic role expectations. Social roles are also strongly gendered, providing the opportunity to understand gender-specific processes of SA. This study investigates a broad range of social roles and their relation to older men and women’s SA in later life. N = 285 participants aged 50 to 86 years (Mage = 65.04, SD = 8.88) reported on 19 social roles and their SA. Higher commitment to social roles of continued development and engagement was related to a younger subjective age, above and beyond sociodemographic variables, physical and mental health, but only for younger men. Commitment to family roles was related to a younger subjective age only for older men. Implications for the gender-specific understanding of antecedents of SA are discussed. [less ▲]

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailHigher-order graph convolutional embedding for temporal networks
Mo, Xian; Pang, Jun UL; Liu, Zhiming

in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailOrdinos: A Verifiable Tally-Hiding E-Voting System
Mueller, Johannes UL

in Küsters, Ralf; Liedtke, Julian; Mueller, Johannes (Eds.) et al IEEE European Symposium on Security and Privacy (2020)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailAutomated design of efficient swarming behaviours: a Q-learning hyper-heuristic approach
Duflo, Gabriel UL; Danoy, Grégoire UL; Talbi, El-Ghazali UL et al

in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020)

Detailed reference viewed: 38 (3 UL)
Full Text
Peer Reviewed
See detailBorder-Making and its Consequences: A Global Overview.
Venken, Machteld UL; Fellner, Astrid; Dorfman, Adriana et al

in Eurasia Border Review (2020), 10(1), 59-69

Detailed reference viewed: 17 (6 UL)
Full Text
Peer Reviewed
See detailCarrier and Power Assignment for Flexible Broadband GEO Satellite Communications System
Abdu, Tedros Salih UL; Lagunas, Eva UL; Kisseleff, Steven et al

in PIMRC 2020 Proceedings (2020)

Current multi-beam GEO satellite systems operate under a limited frequency reuse configuration and considering uniform power assignment across beams. The latter has been shown to be inefficient in ... [more ▼]

Current multi-beam GEO satellite systems operate under a limited frequency reuse configuration and considering uniform power assignment across beams. The latter has been shown to be inefficient in matching the geographic distribution of the traffic demand. In this context, next generation of broadband GEO satellite systems will be equipped with more flexible and reconfigurable payloads, facilitating on-demand resource allocation. In this paper, we consider both carrier and power assignment to match the requested beam demands while minimizing the total transmit power and the total utilized bandwidth. A novel optimization problem is formulated and, given its non-convex structure, we divide the problem into two tractable sub-problems. First, we estimate the number of adjacent frequency carriers required for each beam to satisfy its demand and, subsequently, we optimize the power allocation based on the previously assigned carriers. We validate the proposed method with extensive numerical results, which demonstrate its efficiency with respect to benchmark strategies. [less ▲]

Detailed reference viewed: 250 (68 UL)
Full Text
Peer Reviewed
See detailFeatureNET: Diversity-driven Generation of Deep Learning Models
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in International Conference on Software Engineering (ICSE) (2020)

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailFederated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection
Khramtsova, Ekaterina; Hammerschmidt, Christian; Lagraa, Sofiane UL et al

in IEEE International Conference on Distributed Computing Systems (ICDCS) (2020)

Managed security service providers increasingly rely on machine-learning methods to exceed traditional, signature- based threat detection and classification methods. As machine- learning often improves ... [more ▼]

Managed security service providers increasingly rely on machine-learning methods to exceed traditional, signature- based threat detection and classification methods. As machine- learning often improves with more data available, smaller orga- nizations and clients find themselves at a disadvantage: Without the ability to share their data and others willing to collaborate, their machine-learned threat detection will perform worse than the same model in a larger organization. We show that Feder- ated Learning, i.e. collaborative learning without data sharing, successfully helps to overcome this problem. Our experiments focus on a common task in cyber security, the detection of unwanted URLs in network traffic seen by security-as-a-service providers. Our experiments show that i) Smaller participants benefit from larger participants ii) Participants seeing different types of malicious traffic can generalize better to unseen types of attacks, increasing performance by 8% to 15% on average, and up to 27% in the extreme case. iii) Participating in Federated training never harms the performance of the locally trained model. In our experiment modeling a security-as-a service setting, Federated Learning increased detection up to 30% for some participants in the scheme. This clearly shows that Federated Learning is a viable approach to address issues of data sharing in common cyber security settings. [less ▲]

Detailed reference viewed: 44 (2 UL)
Full Text
Peer Reviewed
See detailAuthentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets
Vazquez Sandoval, Itzel UL; Atashpendar, Arash; Lenzini, Gabriele UL

in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (2020)

We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password ... [more ▼]

We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password-authenticated key exchange (PAKE). This not only allows users to authenticate each other via shared low-entropy secrets, e.g., memorable words, without a public key infrastructure or a trusted third party, but it also paves the way for automation and a series of cryptographic enhancements; improves security by minimizing the impact of human error and potentially improves usability. First, we study a few vulnerabilities in voice-based out-of-band authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. Next, we propose solving the problem of secure equality test using PAKE to achieve entity authentication and to establish a shared high-entropy secret key. Our solution lends itself to offline settings, compatible with the inherently asynchronous nature of email and modern messaging systems. The suggested approach enables enhancements in key management such as automated key renewal and future key pair authentications, multi-device synchronization, secure secret storage and retrieval, and the possibility of post-quantum security as well as facilitating forward secrecy and deniability in a primarily symmetric-key setting. We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols. [less ▲]

Detailed reference viewed: 90 (19 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 327 (79 UL)
Full Text
Peer Reviewed
See detailFlipping Geometric Triangulations on Hyperbolic Surfaces
Despré, vincent; Schlenker, Jean-Marc UL; Teillaud, Monique

in symposium on computational geometry (SoCG) (2020)

We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with ... [more ▼]

We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with fixed vertices of a flat torus or a closed hyperbolic surface is connected. We give upper bounds on the number of edge flips that are necessary to transform any geometric triangulation on such a surface into a Delaunay triangulation. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailLarge Intelligent Surface for Positioning in Millimeter Wave MIMO Systems
He, Jiguang; Wymeersch, Henk; Kong, Long UL et al

in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020)

Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) system for the fifth generation (5G) cellular communications can also enable single-anchor positioning and object tracking due to its large ... [more ▼]

Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) system for the fifth generation (5G) cellular communications can also enable single-anchor positioning and object tracking due to its large bandwidth and inherently high angular resolution. In this paper, we introduce the newly invented concept, large intelligent surface (LIS), to mmWave positioning systems, study the theoretical performance bounds (i.e., Cramér-Rao lower bounds) for positioning, and evaluate the impact of the number of LIS elements and the value of phase shifters on the position estimation accuracy compared to the conventional scheme with one direct link and one non-line-of-sight path. It is verified that better performance can be achieved with a LIS from the theoretical analyses and numerical study. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailMining Assumptions for Software Components using Machine Learning
Gaaloul, Khouloud UL; Menghi, Claudio UL; Nejati, Shiva UL et al

in Proceedings of the The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2020)

Software verification approaches aim to check a software component under analysis for all possible environments. In reality, however, components are expected to operate within a larger system and are ... [more ▼]

Software verification approaches aim to check a software component under analysis for all possible environments. In reality, however, components are expected to operate within a larger system and are required to satisfy their requirements only when their inputs are constrained by environment assumptions. In this paper, we propose EPIcuRus, an approach to automatically synthesize environment assumptions for a component under analysis (i.e., conditions on the component inputs under which the component is guaranteed to satisfy its requirements). EPIcuRus combines search-based testing, machine learning and model checking. The core of EPIcuRus is a decision tree algorithm that infers environment assumptions from a set of test results including test cases and their verdicts. The test cases are generated using search-based testing, and the assumptions inferred by decision trees are validated through model checking. In order to improve the efficiency and effectiveness of the assumption generation process, we propose a novel test case generation technique, namely Important Features Boundary Test (IFBT), that guides the test generation based on the feedback produced by machine learning. We evaluated EPIcuRus by assessing its effectiveness in computing assumptions on a set of study subjects that include 18 requirements of four industrial models. We show that, for each of the 18 requirements, EPIcuRus was able to compute an assumption to ensure the satisfaction of that requirement, and further, ≈78% of these assumptions were computed in one hour. [less ▲]

Detailed reference viewed: 261 (120 UL)
Full Text
Peer Reviewed
See detailA Principle-Based Analysis of Weakly Admissible Semantics
Dauphin, Jérémie UL; Rienstra, Tjitze; van der Torre, Leon UL

in Computational Models of Argument - Proceedings of COMMA 2020, Perugia Italy, September 4-11, 2020 (2020)

Baumann, Brewka and Ulbricht recently introduced weak admissibility as an alternative to Dung’s notion of admissibility, and they use it to define weakly preferred, weakly complete and weakly grounded ... [more ▼]

Baumann, Brewka and Ulbricht recently introduced weak admissibility as an alternative to Dung’s notion of admissibility, and they use it to define weakly preferred, weakly complete and weakly grounded semantics of argumentation frameworks. In this paper we analyze their new semantics with respect to the principles discussed in the literature on abstract argumentation. Moreover, we introduce two variants of their new semantics, which we call qualified and semiqualified semantics, and we check which principles they satisfy as well. Since the existing principles do not distinguish our new semantics from the ones of Baumann et al., we also introduce some new principles to distinguish them. Besides selecting a semantics for an application, or for algorithmic design, our new principle-based analysis can also be used for the further search for weak admissibility semantics. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailReducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition
Thanapol, Panissara UL; Lavangnananda, Kittichai; Bouvry, Pascal UL et al

in 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (2020)

Detailed reference viewed: 41 (0 UL)
Full Text
See detailGesonderte Ruhestätten für besondere Tote: Soldatengräber und Garnisonsfriedhöfe unter besonderer Berücksichtigung der Entwicklung in Luxemburg
Kolnberger, Thomas UL

in Loew, Benedikt; Thewes, Guy; Klauck, Hans Peter (Eds.) Intra muros - Infrastruktur und Lebensalltag in Festungen - Einrichtungen der Fürsorge (2020)

Detailed reference viewed: 136 (3 UL)
Peer Reviewed
See detailSpace-Time Triplet Loss Network for Dynamic 3D Face Verification
Kacem, Anis UL; Ben Abdessalem, Hamza UL; Cherenkova, Kseniya UL et al

Scientific Conference (2020)

In this paper, we propose a new approach for 3D dynamic face verification exploiting 3D facial deformations. First, 3D faces are encoded into low-dimensional representations describing the local ... [more ▼]

In this paper, we propose a new approach for 3D dynamic face verification exploiting 3D facial deformations. First, 3D faces are encoded into low-dimensional representations describing the local deformations of the faces with respect to a mean face. Second, the encoded versions of the 3D faces along a sequence are stacked into 2D arrays for temporal modeling. The resulting 2D arrays are then fed to a triplet loss network for dynamic sequence embedding. Finally, the outputs of the triplet loss network are compared using cosine similarity measure for face verification. By projecting the feature maps of the triplet loss network into attention maps on the 3D face sequences, we are able to detect the space-time patterns that contribute most to the pairwise similarity between differ-ent 3D facial expressions of the same person. The evaluation is conducted on the publicly available BU4D dataset which contains dynamic 3D face sequences. Obtained results are promising with respect to baseline methods. [less ▲]

Detailed reference viewed: 76 (5 UL)
Full Text
Peer Reviewed
See detailCPSDebug: a tool for explanation of failures in cyber-physical systems
Bartocci, Ezio; Manjunath, Niveditha; Mariani, Leonardo et al

in CPSDebug: a tool for explanation of failures in cyber-physical systems (2020)

Debugging Cyber-Physical System models is often challenging, as it requires identifying a potentially long, complex and heterogenous combination of events that resulted in a violation of the expected ... [more ▼]

Debugging Cyber-Physical System models is often challenging, as it requires identifying a potentially long, complex and heterogenous combination of events that resulted in a violation of the expected behavior of the system. In this paper we present CPSDebug, a tool for supporting designers in the debugging of failures in MAT- LAB Simulink/Stateflow models. CPSDebug implements a gray-box approach that combines testing, specification mining, and failure analysis to identify the causes of failures and explain their propagation in time and space. The evaluation of the tool, based on multiple usage scenarios and faults and direct feedback from engineers, shows that CPSDebug can effectively aid engineers during debugging tasks. [less ▲]

Detailed reference viewed: 123 (0 UL)
Full Text
Peer Reviewed
See detailCramer-Rao Bound on DOA Estimation of Finite Bandwidth Signals Using a Moving Sensor
Arora, Aakash UL; Mysore Rama Rao, Bhavani Shankar UL; Ottersten, Björn UL

in Proc. 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2020)

In this paper, we provide a framework for the direction of arrival (DOA) estimation using a single moving sensor and evaluate performance bounds on estimation. We introduce a signal model which captures ... [more ▼]

In this paper, we provide a framework for the direction of arrival (DOA) estimation using a single moving sensor and evaluate performance bounds on estimation. We introduce a signal model which captures spatio-temporal incoherency in the received signal due to sensor motion in space and finite bandwidth of the signal, hitherto not considered. We show that in such a scenario, the source signal covariance matrix becomes a function of the source DOA, which is usually not the case. Due to this unknown dependency, traditional subspace techniques cannot be applied and conditions on source covariance needs to imposed to ensure identifiability. This motivates us to investigate the performance bounds through the Cramer-Rao Lower Bounds (CRLBs) to set benchmark performance for future estimators. This paper exploits the signal model to derive an appropriate CRLB, which is shown to be better than those in relevant literature. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailVerifiable Inner Product Encryption Scheme
Soroush, Najmeh UL; Iovino, Vincenzo; Rial, Alfredo UL et al

in Public-Key Cryptography – PKC 2020 (2020)

Detailed reference viewed: 83 (3 UL)
Full Text
Peer Reviewed
See detailDeepVI: A Novel Framework for Learning Deep View-Invariant Human Action Representations using a Single RGB Camera
Papadopoulos, Konstantinos UL; Ghorbel, Enjie UL; Oyedotun, Oyebade UL et al

in IEEE International Conference on Automatic Face and Gesture Recognition, Buenos Aires 18-22 May 2020 (2020)

Detailed reference viewed: 78 (17 UL)
Full Text
Peer Reviewed
See detailUnderstanding Walking Meetings: Drivers and Barriers
Damen, Ida; Lallemand, Carine UL; Brankaert, Rens et al

Scientific Conference (2020)

There is increased interest in reducing sedentary behavior of office workers to combat the negative health effects of prolonged sitting. Walking meetings offer a promising solution to this problem as they ... [more ▼]

There is increased interest in reducing sedentary behavior of office workers to combat the negative health effects of prolonged sitting. Walking meetings offer a promising solution to this problem as they facilitate a physically active way of working. To inform future development of technologies supporting these type of meetings, in-depth qualitative insights into people’s experiences of walking meetings are needed. We conducted semi-structured walking interviews (N=16) to identify key drivers and barriers for walking meetings in a living lab setting by using the ‘WorkWalk’. The ‘WorkWalk’ is a 1.8 km walking route indicated by a dotted blue line with outdoor meeting points, integrated into the room booking system. Our findings provide insights into how walking meetings are experienced and affect the set-up and social dynamics of meetings. We propose design recommendations for the development of future technologies and service design elements to support walking meetings and active ways of working. [less ▲]

Detailed reference viewed: 163 (0 UL)
Full Text
Peer Reviewed
See detail(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
Iovino, Vincenzo; Rial, Alfredo UL; Roenne, Peter UL et al

in 2020 IEEE 33rd Computer Security Foundations Symposium (2020)

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailCompetitive Evolution of a UAV Swarm for Improving Intruder Detection Rates
Stolfi Rosso, Daniel UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPSW 2020, New Orleans, LA, USA, May 18-22, 2020 (2020)

Detailed reference viewed: 95 (4 UL)
Full Text
Peer Reviewed
See detailSession Subtyping and Multiparty Compatibility Using Circular Sequents
Horne, Ross James UL

in In 31st International Conference on Concurrency Theory (CONCUR 2020). (2020)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailVote Selling Resistant Voting
Boyd, Colin; Haines, Thomas; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailA Dynamics-based Approach for the Target Control of Boolean Networks
Su, Cui; Pang, Jun UL

in Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (2020)

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailA Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Boyen, Xavier; Haines, Thomas; Mueller, Johannes UL

in Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (2020)

Detailed reference viewed: 12 (0 UL)
See detailMale knjizevnosti: pregled pojmov
Glesener, Jeanne UL

in Koron, Alenka; Leben, Andrej (Eds.) Literarna vecjezicnost v slovenskem in avstrijskem konteksti (2020)

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailDesigning different features of an interactive tabletop application to support collaborative problem-solving
Afkari, Hoorieh; Maquil, Valérie; Arend, Béatrice UL et al

Poster (2020)

The design space of tangible and multi-touch tabletop interfaces is complex, and little is known about how the different characteristics of tangible and multi-touch interactive features affect collabora ... [more ▼]

The design space of tangible and multi-touch tabletop interfaces is complex, and little is known about how the different characteristics of tangible and multi-touch interactive features affect collabora- tion strategies. With this work, we report on five different features designed for an interactive tabletop application to support collabo- rative problem-solving. We present the design details and describe preliminary results obtained from a user study with 15 participants. [less ▲]

Detailed reference viewed: 23 (3 UL)
Full Text
Peer Reviewed
See detailCharacterising probabilistic alternating simulation for concurrent games
Zhang, Chenyi; Pang, Jun UL

in Proceedings of the 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE) (2020)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailPost-Quantum Anonymous Veto Networks
Ding, Jintai; Emery, Doug; Mueller, Johannes UL et al

in E-Vote-ID 2020 (2020)

Detailed reference viewed: 17 (0 UL)
Full Text
See detailL’édition de chartes à Luxembourg: de l’érudition aux nouvelles technologies (et vice-versa?)
Salemme, Timothy UL

in Bendheim, Amelie (Ed.) Tagungsband Mittelalter zwischen Faszination und Fortschritt (2020)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailIntrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application
Amrouche, Faouzi UL; Lagraa, Sofiane UL; Frank, Raphaël UL et al

in 91st IEEE Vehicular Technology Conference, VTC Spring 2020, Antwerp, Belgium, May 25-28, 2020 (2020)

Robot Operating System (ROS) is becoming more and more important and is used widely by developers and researchers in various domains. One of the most important fields where it is being used is the self ... [more ▼]

Robot Operating System (ROS) is becoming more and more important and is used widely by developers and researchers in various domains. One of the most important fields where it is being used is the self-driving cars industry. However, this framework is far from being totally secure, and the existing security breaches do not have robust solutions. In this paper we focus on the camera vulnerabilities, as it is often the most important source for the environment discovery and the decision-making process. We propose an unsupervised anomaly detection tool for detecting suspicious frames incoming from camera flows. Our solution is based on spatio-temporal autoencoders used to truthfully reconstruct the camera frames and detect abnormal ones by measuring the difference with the input. We test our approach on a real-word dataset, i.e. flows coming from embedded cameras of self-driving cars. Our solution outperforms the existing works on different scenarios. [less ▲]

Detailed reference viewed: 111 (7 UL)
Full Text
Peer Reviewed
See detailProxSGD: Training Structured Neural Networks under Regularization and Constraints
Yang, Yang; Yuan, Yaxiong UL; Chatzimichailidis, Avraam et al

in International Conference on Learning Representations (ICLR) 2020 (2020)

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailAlzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)
Beierle, Christof; Biryukov, Alex UL; Cardoso Dos Santos, Luan UL et al

in Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (2020)

Detailed reference viewed: 111 (9 UL)
Full Text
Peer Reviewed
See detailTowards Automating Inconsistency Checking of Legal Texts
Libal, Tomer UL; Tereza,

in Towards Automating Inconsistency Checking of Legal Texts (2020)

Inconsistencies in legal texts are sometimes hard to find and correct. In this paper a novel machine executable methodology is described, which can facilitate this process. We demonstrate the methodology ... [more ▼]

Inconsistencies in legal texts are sometimes hard to find and correct. In this paper a novel machine executable methodology is described, which can facilitate this process. We demonstrate the methodology on the American University of Paris Library Circulation Policy No. AA036EN. [less ▲]

Detailed reference viewed: 10 (0 UL)