References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailMultiscale fracture: a natural connection between reduced order models and homogenisation
Bordas, Stéphane UL; Beex, Lars UL; Chen, Li UL et al

Scientific Conference (2019, May 13)

Detailed reference viewed: 103 (9 UL)
Full Text
Peer Reviewed
See detailDisplacement based polytopal elements a strain smoothing and scaled boundary approach
Bordas, Stéphane UL; Natarajan, Sundararajan

Scientific Conference (2019, May 03)

Detailed reference viewed: 152 (10 UL)
See detailCanonical quantization for compact quantizable Kaehler manifolds
Schlichenmaier, Martin UL

Scientific Conference (2019, May 02)

Detailed reference viewed: 53 (1 UL)
Peer Reviewed
See detailAre dates processed like words rather than like numbers? A study of transposition priming effects
Lochy, Aliette UL; Golinvaux, Fanny; Schiltz, Christine UL

Poster (2019, May)

Neuropsychological case-studies suggested that dates and encyclopedic numbers may be processed differently than unknown numbers. However, this issue was not yet investigated in reading in healthy ... [more ▼]

Neuropsychological case-studies suggested that dates and encyclopedic numbers may be processed differently than unknown numbers. However, this issue was not yet investigated in reading in healthy participants, so that it is unclear if dates are read like words and processed as lexical items, or like numbers where each position strictly defines the digit value in a base-10 system. Here, we compared processing of known dates to unknown numbers in a group of 26 experts (students and teachers in History). Participants performed an explicit recognition task on dates (e.g., 1789, 1945, …) and on acronyms (e.g., FNRS, HDMI, …), half known and half unknown. They were preceded by an identical prime (e.g., 1945-1945), a transposed-character prime (e.g., 1495-1945) or a substituted-character prime (e.g., 1635-1945). Results show that for dates, there is a significant transposition gain (-57ms), while for unknown numbers as well as for acronyms (known and unknown), the transposed-character prime induced a cost (from +17 to +257ms) rather than a gain. The facilitation due to transposed characters found here on dates is similar to what is observed in studies of lexical decision on words. Therefore, it suggests that dates may be processed with similar types of orthographical mechanisms than words. [less ▲]

Detailed reference viewed: 37 (3 UL)
Full Text
Peer Reviewed
See detailMCP: A Security Testing Tool Driven by Requirements
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in 2019 IEEE/ACM 41st International Conference on Software Engineering (2019, May)

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious ... [more ▼]

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious users). MCP relies on Natural Language Processing (NLP), a restricted form of misuse case specifications, and a test driver API implementing basic utility functions for security testing. NLP is used to identify the activities performed by the malicious user and the control flow of misuse case specifications. MCP matches the malicious user’s activities to the methods of the provided test driver API in order to generate executable security test cases that perform the activities described in the misuse case specifications. MCP has been successfully evaluated on an industrial case study. [less ▲]

Detailed reference viewed: 182 (28 UL)
Full Text
Peer Reviewed
See detailRise of the machines - Moral decisions in Detroit: Become Human
Holl, Elisabeth UL

Scientific Conference (2019, May)

Moral decisions in video games have become increasingly popular. This work in progress project applies established theories on mediated morality (e.g., MIME; Tamborini, 2011) to the cutting-edge video ... [more ▼]

Moral decisions in video games have become increasingly popular. This work in progress project applies established theories on mediated morality (e.g., MIME; Tamborini, 2011) to the cutting-edge video game Detroit: Become Human. The in the game implemented feature of displaying world statistics provides valuable information on how players engage in meaningful moral decision within a virtual world. Statistics will be aggregated and analyzed in relation to the available decision time span, the involved characters and different moral foundations. [less ▲]

Detailed reference viewed: 759 (8 UL)
Full Text
Peer Reviewed
See detailWho’s afraid of Donkey Kong? Testing the Stereotype Threat Effect in Video Gaming
Holl, Elisabeth UL; Wagener, Gary L.; Melzer, André UL

Scientific Conference (2019, May)

In two studies (Study 1: N = 130; Study 2: N = 56) participants played a video game (Bejeweled 3; SkyChasers) and were either confronted with a stereotype threat (ST) or not. ST is defined as the risk of ... [more ▼]

In two studies (Study 1: N = 130; Study 2: N = 56) participants played a video game (Bejeweled 3; SkyChasers) and were either confronted with a stereotype threat (ST) or not. ST is defined as the risk of confirming a negative stereotype about one’s own group and has been investigated in various field, i.a. in gaming. In the first study participants were confronted with the stereotype that women would perform worse in video games than men. In the second study we worked with a reversed stereotype, namely that women would have now outpaced males in some genres of video games. Our results show that performance varies across gender and genre. Although we did not find the hypothesized interaction effect of gender and ST condition in performance, self-reported measures, such as perceived frustration, and moderating variables indicate performance differences both for women and men, but on different psychological dimensions. [less ▲]

Detailed reference viewed: 173 (13 UL)
Full Text
Peer Reviewed
See detailConvex Combination of Constraint Vectors for Set-membership Affine Projection Algorithms
Nagashima Ferreira, Tadeu; Alves Martins, Wallace UL; Lima, Markus et al

in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, May)

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both ... [more ▼]

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both convergence speed and steady-state mean-squared error is the choice of the so-called constraint vector. Optimal constraint vectors were recently proposed relying on convex optimization tools, which might some- times lead to prohibitive computational burden. This paper proposes a convex combination of simpler constraint vectors whose performance approaches the optimal solution closely, utilizing much fewer computations. Some illustrative examples confirm that the sub-optimal solution follows the accomplishments of the optimal one. [less ▲]

Detailed reference viewed: 68 (14 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 219 (27 UL)
Full Text
Peer Reviewed
See detailPredicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment
Charlier, Jérémy Henri J. UL; State, Radu UL; Hilger, Jean UL

in 32nd Canadian Conference on Artificial Intelligence Proceedings (2019, May)

The digital revolution of the banking system with evolving European regulations have pushed the major banking actors to innovate by a newly use of their clients' digital information. Given highly sparse ... [more ▼]

The digital revolution of the banking system with evolving European regulations have pushed the major banking actors to innovate by a newly use of their clients' digital information. Given highly sparse client activities, we propose CPOPT-Net, an algorithm that combines the CP canonical tensor decomposition, a multidimensional matrix decomposition that factorizes a tensor as the sum of rank-one tensors, and neural networks. CPOPT-Net removes efficiently sparse information with a gradient-based resolution while relying on neural networks for time series predictions. Our experiments show that CPOPT-Net is capable to perform accurate predictions of the clients' actions in the context of personalized recommendation. CPOPT-Net is the first algorithm to use non-linear conjugate gradient tensor resolution with neural networks to propose predictions of financial activities on a public data set. [less ▲]

Detailed reference viewed: 75 (0 UL)
Full Text
Peer Reviewed
See detailTowards Systematic Specification of Non-Functional Requirements for Sharing Economy Services
Symeonidis, Iraklis UL; Schroers, Jessica; Mustafa A. Mustafa, Mustafa A. et al

in Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services (2019, May)

Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of ... [more ▼]

Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of Circular Economy. In this paper, we assess existing SE services and identify their challenges in areas that are not technically connected to their core functionality but are essential in creating trust: information security and privacy, personal data protection and fair economic incentives. Existing frameworks for elicitation of non-functional requirements are heterogeneous in their focus and domain specific. Hence, we propose to develop a holistic methodology for non-functional requirements specification for SE systems following a top-down-top approach. A holistic methodology considering non-functional requirements is essential and can assist in the analysis and design of SE systems in a systematic and unified way applied from the early stages of the system development. [less ▲]

Detailed reference viewed: 90 (4 UL)
Full Text
Peer Reviewed
See detailSymposium: Early detection and prevention of cognitive decline and dementia: Findings from major European collaborative and research initiatives
Leist, Anja UL

Scientific Conference (2019, May)

With still no medical cure for dementia available, major research initiatives have been set up to investigate and target the development of dementia at earlier stages. Several ongoing projects focus on ... [more ▼]

With still no medical cure for dementia available, major research initiatives have been set up to investigate and target the development of dementia at earlier stages. Several ongoing projects focus on early detection of dementia with the hope to be able to administer personalized interventions for individuals at high risk. Ongoing clinical trials test different interventions on their potential to prevent or delay the onset of dementia. Complementing those efforts, large and long-spanning observational studies can be used to detect long-term precursors of cognitive aging. Indeed, there is increasing evidence for a large window of opportunity for intervention of several decades that could be used for preventative efforts in dementia. The symposium will bring together major European collaborative and research initiatives in the field of early detection and prevention of dementia. The first part of the symposium will present findings from clinical trials, the second part new findings coming from a range of observational studies. The first paper will report on the design and study cohorts of the European Prevention of Alzheimer’s Dementia Consortium (EPAD) and the TriBEKa project. The second paper will focus on new multifactorial models to quantify prevention potential based on the FINGER trial. The third paper will report an integrated analysis of four longitudinal studies of ageing (OCT0, H70, LASA, and MAP) to evaluate the role of cognitively stimulating activities in the transitions from cognitively normal to slightly impaired, severely impaired, and death with multi-state models. The fourth paper will present the contribution of environmental factors over the life course, in particular air pollution, on cognitive change in the Lothian Birth Cohort of 1936. The last paper makes use of recent developments in approaching causal inference in observational studies and applies these to predict cognitive aging and dementia with data from the Survey of Health, Ageing and Retirement in Europe. [less ▲]

Detailed reference viewed: 38 (4 UL)
Full Text
Peer Reviewed
See detailOutage Performance of Integrated Satellite-Terrestrial Relay Networks with Opportunistic Scheduling
Huang, Qingquan; Zhu, Wei-Ping; Chatzinotas, Symeon UL et al

in ICC 2019 - 2019 IEEE International Conference on Communications (ICC) (2019, May)

In this paper, we investigate the outage performance of a multiuser threshold-based decode-and-forward integrated satellite-terrestrial relay network (ISTRN) with opportunistic user scheduling, where the ... [more ▼]

In this paper, we investigate the outage performance of a multiuser threshold-based decode-and-forward integrated satellite-terrestrial relay network (ISTRN) with opportunistic user scheduling, where the satellite link and terrestrial links undergo Shadowed-Rician (SR) fading and correlated Rayleigh fading, respectively. First, we propose a new probability density function (PDF) to statistically characterize the square sum of independent and identically distributed SR random variables, which is more accurate and concise than existing expressions. Next, based on the new PDF, we derive an analytical expression of outage probability (OP) of the considered network. Furthermore, the asymptotic OP expression is developed at high signal-to-noise ratio to reveal the achievable diversity order of the considered ISTRN. Finally, computer simulation is conducted to validate the analytical results, and show the impact of various parameters on the outage performance. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailLearning to Spot and Refactor Inconsistent Method Names
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations ... [more ▼]

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1-measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild. [less ▲]

Detailed reference viewed: 271 (20 UL)
Peer Reviewed
See detailInnovative work behaviors of entrepreneurs: The role of resilience and satisfaction with life
Palmer, Carolin; Jaouen, Annabelle; Gundolf, Katherine et al

Scientific Conference (2019, May)

We examine the antecedents of entrepreneurs’ innovative work behavior through the prism of two personality variables: resilience and satisfaction with life. Based on a sample of 325 French entrepreneurs ... [more ▼]

We examine the antecedents of entrepreneurs’ innovative work behavior through the prism of two personality variables: resilience and satisfaction with life. Based on a sample of 325 French entrepreneurs, we find a direct effect of both variables. [less ▲]

Detailed reference viewed: 57 (0 UL)
Full Text
Peer Reviewed
See detailTowards sampling and simulation-based analysis of featured weighted automata
Cordy, Maxime UL; Legay, Axel; Lazreg, Sami et al

in Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (2019, May)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailVIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION
Baptista, Renato UL; Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019 (2019, May)

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of ... [more ▼]

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of 3D information in RGB images. Most successful approaches make use of the concept of knowledge transfer by projecting 3D synthetic data to multiple viewpoints. Instead of relying on knowledge transfer, we propose to augment the RGB data by a third dimension by means of 3D skeleton estimation from 2D images using a CNN-based pose estimator. In order to ensure view-invariance, a pre-processing for alignment is applied followed by data expansion as a way for denoising. Finally, a Long-Short Term Memory (LSTM) architecture is used to model the temporal dependency between skeletons. The proposed network is trained to directly recognize actions from aligned 3D skeletons. The experiments performed on the challenging Northwestern-UCLA dataset show the superiority of our approach as compared to state-of-the-art ones. [less ▲]

Detailed reference viewed: 210 (31 UL)
Full Text
Peer Reviewed
See detailMultifaceted automated analyses for variability-intensive embedded systems
Lazreg, Sami; Cordy, Maxime UL; Collet, Philippe et al

in Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019, May)

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailNon-Intrusive Cognitive Measurement for the Amplitude Response of Wideband Transponders
Mazalli, N.; Andrenacci, Stefano UL; Chatzinotas, Symeon UL

in International Conference on Communications (2019, May)

In this paper we propose a new measurement procedure for the amplitude response of a wideband transponder in an in-orbit testing (IOT) context. The proposed procedure resorts to a direct sequence spread ... [more ▼]

In this paper we propose a new measurement procedure for the amplitude response of a wideband transponder in an in-orbit testing (IOT) context. The proposed procedure resorts to a direct sequence spread spectrum (DSSS) technique in order to limit the interference caused by the measurement signals to the traffic. Further, an adaptive approach exploiting the knowledge of the inband traffic power has been introduced. Such knowledge, acquired either a priori or by sensing the channel, allows to easily design measurement signals satisfying multiple performance requirements (i.e., accuracy, resolution, interference, duration, and complexity). The proposed procedure can be used as a design tool to optimize the dimensioning of the IOT system parameters, and to flexibly trade off a performance indicator against another. [less ▲]

Detailed reference viewed: 19 (13 UL)
Full Text
Peer Reviewed
See detailROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL et al

in IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019 (2019, May)

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a ... [more ▼]

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level and network level, with dynamic policy enforcement points using software defined networking (SDN) to provide protection against a large class of attacks. Although SIEMs, IPS, and firewall have been previously used to secure computer networks, ROSDefender is applying them for the specific use case of robotic systems, where security is in many cases an afterthought. [less ▲]

Detailed reference viewed: 79 (6 UL)
Full Text
Peer Reviewed
See detailMulticultural society - multiple ways to negotiate identity
Murdock, Elke UL

Scientific Conference (2019, April 30)

The 21st century has been called the “age of migration” (Castles & Miller, 2009). International migration is a growing phenomenon, both in terms of scope and complexity and affects virtually all countries ... [more ▼]

The 21st century has been called the “age of migration” (Castles & Miller, 2009). International migration is a growing phenomenon, both in terms of scope and complexity and affects virtually all countries in the world (United Nations, 2009). The global migration system has changed over recent decades with regard to origins and destinations for migration. In the 20th century, Europe was a major area for emigration, but has now become a target for immigration, with most European countries, including Iceland, hosting significant minority immigrant populations. In Luxembourg, nearly half of the population is foreign – the foreign population percentage currently stands at 48%. Within this context majority and minority become fluid with the migration process itself being fluid, ranging from daily migration (transnational commuters), to medium-term stays, return visits and permanent immigration including uptake of citizenship. Within such a plurally composed society, culture contact is a permanent feature in daily life. Nationality becomes a salient feature as culture contact tends to prompt reflection, resulting in questioning and (re-)negotiation of national identity. This affects both the native and the diverse immigrant population – with diversity going beyond the level of country of origin as many individuals have very complex biographies. Using multicultural, multilingual Luxembourg as a case study example, I will present examples for the construal process of national identity for different groups, illustrating how (national) identity is negotiated at individual level. As can be expected, the identity construal process becomes more complex within a multicultural context. [less ▲]

Detailed reference viewed: 81 (8 UL)
Full Text
Peer Reviewed
See detailEmotion Regulation Difficulties in Adolescents with ADHD and/or Dyslexia
Battistutta, Layla UL; Steffgen, Georges UL

Poster (2019, April 26)

Objectives: ADHD is commonly associated with emotion regulation (ER) problems. Although around 10-45% of adolescents with ADHD also present with specific learning disorders such as dyslexia, studies on ER ... [more ▼]

Objectives: ADHD is commonly associated with emotion regulation (ER) problems. Although around 10-45% of adolescents with ADHD also present with specific learning disorders such as dyslexia, studies on ER in dyslexia or comorbid cases of ADHD/dyslexia remain limited. The aim was to examine potential differences in ER abilities between 11 to 16-year-old adolescents diagnosed with ADHD, dyslexia as well as comorbid dyslexia/ADHD. Method: Preliminary data from an ongoing research project was analyzed for 3 diagnostic groups (AD(H)D: n=15; dyslexia: n=12; dyslexia/AD(H)D: n=9) paired on age (F<1, n.s.), gender (X2(2)=0.68, p=.71) and IQ (F<1, n.s.). ER was investigated experimentally using a frustration inducing task (Behavioral Indicator of Resiliency to Distress; BIRD; Lejuez et al., 2006) while assessing adolescents’ subjective positive and negative affect before and after the task (PANAS-C; Laurent et al., 1999). Additionally, adolescents completed questionnaires on alexithymia (AQC, Rieffe, Oosterveld & Terwogt, 2006) and difficulties in ER (DERS-SF; Kaufman et al., 2016). Results: Preliminary findings showed a significant effect of time (F(1,33)=6.46, p=.02, n2=.16) with higher negative affect reported after the task and a marginal diagnostic group effect (F(2,33)=3.05, p=.06, n2=.16) showing marginally higher negative affect for the comorbid group compared to the dyslexia group (p=.06). Marginally significant group differences (F(2, 33)=3.21, p=.05, n2=.16) also showed higher alexithymia scores for the comorbid group compared to the dyslexia group (p=.06) but alexithymia and post-task negative affect were not found to be correlated (r=.25, p=.13). No differences in self-reported ER difficulties were found (F(2,33)=2.52, p=.10, n2=.13) between the three diagnostic groups. Conclusion: These preliminary findings indicate that, compared to a single diagnosis of dyslexia, a dyslexia/ADHD comorbidity might potentially entail less developed ER skills. The ongoing data collection (bigger sample, control group) will help to further elucidate these tentative results in the future. [less ▲]

Detailed reference viewed: 103 (3 UL)
Full Text
Peer Reviewed
See detailDeep Reinforcement Learning based Continuous Control for Multicopter Systems
Manukyan, Anush UL; Olivares Mendez, Miguel Angel UL; Geist, Matthieu et al

in International Conference on Control, Decision and Information CoDIT, Paris 23-26 April 2019 (2019, April 26)

In this paper we apply deep reinforcement learning techniques on a multicopter for learning a stable hovering task in a continuous action state environment. We present a framework based on OpenAI GYM ... [more ▼]

In this paper we apply deep reinforcement learning techniques on a multicopter for learning a stable hovering task in a continuous action state environment. We present a framework based on OpenAI GYM, Gazebo and RotorS MAV simulator, utilized for successfully training different agents to perform various tasks. The deep reinforcement learning method used for the training is model-free, on-policy, actor-critic based algorithm called Trust Region Policy Optimization (TRPO). Two neural networks have been used as a nonlinear function approximators. Our experiments showed that such learning approach achieves successful results, and facilitates the process of controller design. [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detailEnseignants non spécialisés et (trans)disciplinarité. L’exemple de l’enseignement musical
Sagrillo, Damien UL

in Karsenti, T.; Goyer, S. (Eds.) Programme du colloque international en éducation et du Somme du numérique en éducation, 25 et 26 avril 2019. Montréal, QC: Centre de recherche interuniversitaire sur la formation et la profession enseignante, Chaire de recherche du Canada sur les technologies de l’information et de la communication (TIC) en éducation. (2019, April 25)

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme ... [more ▼]

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme l’observation à long terme dans des écoles fondamentales à Berlin. H. G. Bastian et son équipe (2002) ont démontré l’effet social bénéfique d’un enseignement musical approfondi. D’autres recherches ont dévoilé un manque de confiance tenace à l’égard de l’enseignement musical chez les étudiants et les enseignants (Holden et Button, 2006). D’autres encore ont analysé les potentialités d’un enseignement musical extrascolaire (Kivi, 2018). L’angoisse des formateurs non spécialisés devant l’éducation musicale se reflète souvent dans les arguments clichés comme : « Je n’ai pas fait du solfège; je ne suis pas musical; je ne peux pas chanter ». Le manque de connaissances déclaratives empêche donc le développement des savoir-faire. Nous présenterons des concepts développés relativement à deux traditions musicales (allemande et française) au Grand-Duché de Luxembourg. Notre objectif est de mettre à la disposition des futurs enseignants un éventail didactique. [less ▲]

Detailed reference viewed: 64 (2 UL)
Peer Reviewed
See detailChair and Commentator: European Union: Immigration and Border Control
Venken, Machteld UL

Scientific Conference (2019, April 25)

Detailed reference viewed: 1 (1 UL)
Peer Reviewed
See detailMixed Integer Linear Programming Model for the Optimal Operation of a Dual Source Heat Pump
Rafii-Tabrizi, Sasan UL; Hadji-Minaglou, Jean-Régis UL; Scholzen, Frank UL

Scientific Conference (2019, April 24)

This paper presents a mixed integer linear programming (MILP) model to optimally operate a dual source heat pump (DSHP). The DSHP draws environmental energy from an underground ice storage tank (IST) or ... [more ▼]

This paper presents a mixed integer linear programming (MILP) model to optimally operate a dual source heat pump (DSHP). The DSHP draws environmental energy from an underground ice storage tank (IST) or wind infrared sensitive collectors (WISC). WISC is further used to regenerate the IST. The thermal output of the DSHP is stored in a thermal energy storage (TES). A single-objective optimization approach is applied to minimize the operational cost of the DSHP over a scheduling horizon of 24h. The developed framework is tested on various days, which are representative for each season of the year. Furthermore, it is investigated how variable electricity price market data influence the dynamic behaviour of the DSHP. [less ▲]

Detailed reference viewed: 21 (3 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 182 (18 UL)
Full Text
Peer Reviewed
See detailClosed Form Discrete Unimodular MIMO Waveform Design Using Block Circulant Decomposition
Hammes, Christian UL; Shankar, Bhavani UL; Ottersten, Björn UL

Poster (2019, April 22)

This paper deals with the waveform design under the constraint of discrete multiphase unimodular sequences. It relies on Block Circulant decomposition of the slow-time transmitted waveform. The presented ... [more ▼]

This paper deals with the waveform design under the constraint of discrete multiphase unimodular sequences. It relies on Block Circulant decomposition of the slow-time transmitted waveform. The presented closed-form solution is capable of designing orthogonal signals, such that the virtual MIMO paradigm is enabled leading to enhanced angular resolution. On the other hand, the proposed method is also capable of approximating any desired radiation pattern within the physical limits of the transmitted array size. Simulation results prove the effectiveness in terms computational complexity, orthogonal signal design and the transmit beam pattern design under constant modulus constraint. [less ▲]

Detailed reference viewed: 32 (2 UL)
Full Text
Peer Reviewed
See detailIoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Engel, Thomas UL

in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19)

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼]

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲]

Detailed reference viewed: 548 (14 UL)
Full Text
Peer Reviewed
See detailThe Importance of Socio-Emotional Skills and Behaviour in Preschool for Later Outcomes
Aleksic, Gabrijela UL; Christine, Merrell; Peter, Tymms

Scientific Conference (2019, April 18)

Background to the Study In order to meet the socio-economic challenges of the 21st century, a blend of cognitive and socio-emotional skills is required (Temple, 2002). Socio-emotional skills are important ... [more ▼]

Background to the Study In order to meet the socio-economic challenges of the 21st century, a blend of cognitive and socio-emotional skills is required (Temple, 2002). Socio-emotional skills are important for personal well-being, life satisfaction, healthy life styles, active citizenship and safer societies (OECD, 2015). No study in Serbia has investigated the development of young children’s socio-emotional skills and behaviour, and the relationship with academic progress in Serbia before and this directly responds to the urgent call for more information concerning the Serbian preschool education (Baucal et al., 2016). The findings are of broader relevance to other countries; as noted in the OECD (2015) report, socio-emotional development continues through late childhood and adolescence which gives a space for intervention programmes that can help reduce social inequalities among children. Theoretical Framework Socio-emotional skills are a range of competences including emotion knowledge, emotional and behavioural regulatory abilities and social skills (Denham, 2006). When children enter school and have positive peer and teacher interactions, they will develop more positive attitudes towards school tasks, engage more into school activities, be more persistent and perform higher (e.g., Arnold et al., 2012; Fantuzzo et al., 2007). Furthermore, studies have shown that children with behavioural difficulties such as inattention, hyperactivity and impulsivity display more delinquent behaviour as adolescents and achieve academically lower than their peers (e.g., Frazier et al., 2007; Merrell et al., 2017). Data In this empirical study we explored the links between socio-emotional skills, behaviour, mathematics and literacy performance of preschool children in Serbia over the course of 14 months. Teachers rated 159 children (51% of girls) aged 5-8 by Personal, social and emotional development scale, and Behaviour rating scale on inattention, hyperactivity and impulsivity. These scales were included in the Performance Indicators in Primary School (PIPS; Tymms, 1999), an adaptive test that measures early literacy and mathematics. Results • At all three times, girls were rated more positively than boys in socio-emotional skills and behaviour, except for adjustment to school setting where there were no differences. • At Time 3, when children entered school, their socio-emotional skills and behaviour were associated with gender, mathematics at Time 1 and their socio-emotional and behaviour ratings at Time 2, controlling for maternal education at Time 1. • Mathematics at Time 3 was not associated with socio-emotional skills nor with specific behaviour. • Literacy at Time 3 was associated with mathematics and social skills at Time 1, and literacy at Time 2, controlling for gender and maternal education. Significance of the Study This study offers the first insight into the links between socio-emotional skills, behaviour and mathematics and literacy performance of preschool children in Serbia which will inform the development and evaluation of interventions. Attrition of the sample limits the findings. [less ▲]

Detailed reference viewed: 129 (2 UL)
Full Text
Peer Reviewed
See detailA Calibrated Learning Approach to Distributed Power Allocation in Small Cell Networks
Zhang, Xinruo; Nakhai; Zheng, Gan UL et al

in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, April 17)

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time ... [more ▼]

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time division multiple access scheme to optimize the transmit power decisions at the small base stations (SBSs) and achieve max-min user fairness in the long run. Provided that the SBSs are autonomous decision makers, the aim of the proposed algorithm is to allow SBSs to gradually improve their forecast of the possible transmit power levels of the other SBSs and react with the best response based on the predicted results at individual time slots. Simulation results validate that in terms of achieving max-min signal-to-interference-plus-noise ratio, the proposed distributed design outperforms two benchmark schemes and achieves a similar performance as compared to the optimal centralized design. [less ▲]

Detailed reference viewed: 27 (0 UL)
Peer Reviewed
See detailHow can we support lecturers in English-medium instruction?
Deroey, Katrien UL

Scientific Conference (2019, April 13)

English-medium instruction (EMI) is a worldwide phenomenon. EMI language and communication issues (e.g. Hu et al., 2014; Murray, 2015; Werther et al., 2014) have led to calls for EAP practitioners to ... [more ▼]

English-medium instruction (EMI) is a worldwide phenomenon. EMI language and communication issues (e.g. Hu et al., 2014; Murray, 2015; Werther et al., 2014) have led to calls for EAP practitioners to collaborate with lecturers and other HE stakeholders to explore ways in which these lecturers can be supported and teaching standards ensured (Coleman, 2006; Doiz et al., 2013; Dubow & Gundermann, 2017). The design and implementation of EMI training and support programmes can be an especially challenging task for EAP practitioners. First, lecturers may not recognize the need for support and may be reluctant to be assessed. Second, we need to factor in practical considerations such as their limited availability and possible reluctance to attend ‘classes’ with colleagues. Third, we have limited resources in terms of specialized standardized tests, training materials and research literature that could inform our 'course' design. Innovative approaches are therefore needed to factor in all these circumstances. This paper has two main parts. First I summarize research on the challenges EMI lecturers face, including the results of a needs analysis among lecturers at the University of Luxembourg and my work on lecture discourse organization (Deroey, 2015). From the relatively few studies that exist, we will see that lecturers tend to believe they have sufficient English language skills and that reduced interactivity is a particularly common issue. Second, I survey different support and training schemes at HE institutions across the world. Here, it will become clear that work on relevant pedagogical skills needs to be included and an apparently ‘remedial’ approach should be avoided if we want to get lecturers on board. [less ▲]

Detailed reference viewed: 84 (0 UL)
Full Text
See detailDigitisation of musicology at the University of Luxembourg
Sagrillo, Damien UL

Scientific Conference (2019, April 13)

One of the aims of the new government of Luxembourg is to enhance digitisation in all dimensions of daily life. Since years already the literature archive runs a dictionary of Luxembourgish authors. I ... [more ▼]

One of the aims of the new government of Luxembourg is to enhance digitisation in all dimensions of daily life. Since years already the literature archive runs a dictionary of Luxembourgish authors. I will present two projects funded by the Ministry of Culture aiming also to promote and to valorise the musical heritage of Luxembourg by compiling an Encyclopedia of Luxembourg Musicians and by editing the music of Luxembourgish composer Laurent Menager. [less ▲]

Detailed reference viewed: 43 (3 UL)
Full Text
Peer Reviewed
See detailWhy do String Players Perform Easier per Memory than Wind Music Players? – Testing Instrumentalist Students’ Attention Levels During Music Reading
Buzás, Zsuzsanna; Sagrillo, Damien UL

in Molnár, Edit Katalin; Dancs, Katinka (Eds.) 17thConference on Educational Assessment (2019, April 13)

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice ... [more ▼]

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice, pianists who play as soloists with an orchestra do notneed written support as opposed to brass instrument soloists. Until now, no research has been conducted to discoverthe reasons why pianists and string players play easier by heart than brass instrument players.Music related activities involve numerous psychological processes, including perception and rapid processing of audio stimuli, attention and auditory, sensory and visual memory activation. Students with working memory impairments have difficulties with concentration as well as with organizing and monitoring the quality of their own work (Alloway et al., 2009).If the attention level is normal or high, the student is in an appropriate state for learning. It has been shown that participants with high working memory capacity perform significantly better on a variety of attention tasks (Fougnie, 2008).Attention supports the development of emerging reading skills by helping students regulate the cognitive demands inherently part of learning (Sáez et al., 2011).Thisstudy aims to test instrumentalist students’ attention and mediation levels during music reading by means of NeuroSky’s MindWave EEG device that translates brainwaves into digital information and beams it wirelessly to acomputer. We investigated 22right-handed wind instrumentalists, 12-14 years of age, and compared them with 21 violin players,matched for age and grade level. Students were asked to play an eight-bar composition bySzilvay. We analyzed attention and mediation levels, as well as alpha, beta and gamma band oscillatory responses to the musical piece during reading. The results of the data analysis were evaluated using e-Sense Metric. According to this metric, attention and meditation data arescaled between 1 and 100. The findings ofthe study revealed that the average attention level of the violin players was slightly highat61.53;while that of the wind players was 39.98, that is,slightly low. A significant difference was found between the averages of attention levelsbetween the string and the wind players (t=2.656, p=.026).With the use of EEG, the appearance of fatiguecan be detectedand the concentration levelscan be differentiatedfor the same exercise for different pupils. The results help us to improve instructionalmethods, and can also help us to reveal the processesof attention and mediation duringthe students’ music reading. Further research can involve the replication of the studywith pianists,comparing them with string players and wind music players. In an even more refined desing, a replication study could be carried out to compare pianists and brass instrument players. These further studies can serve as a basis for developing training programs of music reading comprehension for different instrumentalists. [less ▲]

Detailed reference viewed: 72 (1 UL)
Full Text
Peer Reviewed
See detailMessung von Ambivalenzen: Ambivalenzerfahrungen zwischen jungen Erwachsenen und ihren Eltern
Albert, Isabelle UL

Scientific Conference (2019, April 12)

Die vorliegende Studie beschäftigte sich mit den Ambivalenzerfahrungen junger Erwachsener und der Rolle des Auszugs aus dem Elternhaus. Die Teilnehmer wohnten entweder noch bei den Eltern, waren bereits ... [more ▼]

Die vorliegende Studie beschäftigte sich mit den Ambivalenzerfahrungen junger Erwachsener und der Rolle des Auszugs aus dem Elternhaus. Die Teilnehmer wohnten entweder noch bei den Eltern, waren bereits komplett ausgezogen oder pendelten zwischen dem Wohnort der Eltern und dem Studienort. Ausgangspunkt war die Frage, ob sogenannte „exit options“ die Erfahrung von Ambivalenz verringern können (siehe auch Dykstra & Komter, 2010). Im Folgenden werden anhand dieser Studie verschiedene Möglichkeiten der direkten und indirekten Erfassung von Ambivalenz veranschaulicht sowie inhaltliche Ergebnisse präsentiert. [less ▲]

Detailed reference viewed: 69 (4 UL)
Full Text
See detailADVANCES IN GEOMETRY INDEPENDENT APPROXIMATIONS
Anitescu, Cosmin; Atroshchenko, Elena; Bordas, Stéphane UL et al

Scientific Conference (2019, April 11)

We present recent advances in geometry independent field approximations. The GIFT approach is a generalisation of isogeometric analysis where the approximation used to describe the field variables no ... [more ▼]

We present recent advances in geometry independent field approximations. The GIFT approach is a generalisation of isogeometric analysis where the approximation used to describe the field variables no-longer has to be identical to the approximation used to describe the geometry of the domain. As such, the geometry can be described using usual CAD representations, e.g. NURBS, which are the most common in the CAD area, whilst local refinement and meshes approximations can be used to describe the field variables, enabling local adaptivity. We show in which cases the approach passes the patch test and present applications to various mechanics, fracture and multi-physics problems. [less ▲]

Detailed reference viewed: 279 (20 UL)
See detailLes résistances belge et luxembourgeoise et leurs conceptions européennes
Brüll, Christoph UL

Scientific Conference (2019, April 10)

La deuxième Occupation allemande en un quart de siècle a vu se développer en Belgique et au Luxembourg une série de mouvements de Résistance aux caractéristiques et conceptions politiques très diverses ... [more ▼]

La deuxième Occupation allemande en un quart de siècle a vu se développer en Belgique et au Luxembourg une série de mouvements de Résistance aux caractéristiques et conceptions politiques très diverses. Parmi les Résistants qui s’interrogent sur l’après-guerre, deux tendances lourdes s’affirment : le rétablissement de l’indépendance nationale et la démilitarisation d’une Allemagne vaincue. Il en résulte aussi des plans pour l’Europe qui reposent toutefois rarement sur une approche systématique de la question. Une importance cruciale revient à la question des liens entre mouvements de Résistance et gouvernements en exil. Par ailleurs, il y a des personnalités qui, comme le futur Premier ministre luxembourgeois Pierre Werner, s’engagent aux côtés de la Résistance française et réfléchissent sur l’avenir du continent. La contribution se propose d’établir un inventaire de ces initiatives et d’adopter (là où c’est possible) une perspective comparatiste. Finalement, nous examinerons le rôle des mouvements de Résistance dans la vie politique de l’après-guerre et l’engagement de certains Résistants dans les débuts de l’intégration européenne après 1945. [less ▲]

Detailed reference viewed: 63 (4 UL)
Full Text
Peer Reviewed
See detailAn interface resolved immersed boundary method in XDEM for particulate flow simulations
Wu, Mingqiu UL; Peters, Bernhard UL; Rosemann, Tony et al

in International Congress on Particle Technology (2019, April 09)

immersed boundary method (IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The IBM was first introduced by Peskin to simulate blood flow in a beating heart ... [more ▼]

immersed boundary method (IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The IBM was first introduced by Peskin to simulate blood flow in a beating heart. Later it has been extended for a different range of applications. The advantages of IBM over the body-fitted method is that it substantially simplified grid generation for immersed geometries, and it is easier to handle moving boundary situations. IBM even allows the use of a stationary and non-deformation background mesh, as well as it reduces the cost of computation by avoiding generation of a body-fitted mesh for each time step. However, the IBM approach is not straightforward to implement and it requires special techniques for cut-off boundary cells as well as special techniques for data point interpolations. Generally, the IBM is classified into two approaches based on the methods of imposing the boundary condition in the immersed body. The first approach is called fictitious domain method with continuous forcing scheme which employs a distributed forcing function to impose a rigidity boundary condition in the solid particle domain. The second one is the discrete forcing approach, which enables a sharp interface to represent the immersed surface. The IBM discussed in this work is a combination of these above two approaches: we first employ the continuous forcing scheme to get a first-step approximation of the immersed body, then use an interpolation polynomial to impose a desired accurate physical boundary for each immersed boundary point based on a least square interpolation reconstruction scheme. Particle motions can be calculated and tracked by solving Newton’s equations of motions using the extended discrete element method (XDEM) while the data of fluid flow properties are obtained by solving the Navier-Stokes equations which govern the fluid phase. Combined this leads to the basic concept of DEM-CFD coupling. Therefore, a particle interface resolved simulation solver is developed by coupling the XDEM and IBM approaches together. Consequently, this solver is then used to handle both static and dynamic particle problems as well as particle packed bed simulations. The validation of the solver can be performed by setting one static sphere in a channel and evaluate the drag coefficients and Strouhal number (when shedding occurs) at various Reynolds [less ▲]

Detailed reference viewed: 112 (28 UL)
See detailIntegrated micromechanical model for slope stability analysis
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

Scientific Conference (2019, April 09)

Advances in supercomputing hardware have made it possible to handle highly complex geomechanical analysis with large data. Thus, particle-based methods are gaining an ever-increasing interest with ... [more ▼]

Advances in supercomputing hardware have made it possible to handle highly complex geomechanical analysis with large data. Thus, particle-based methods are gaining an ever-increasing interest with massively parallel programs being developed. These methods have been applied to the analysis of failure mechanisms and scenarios such as mass movement in landslides, avalanches under static, dynamic or seismic loading condition. They provide deep insights into the meso and micro-scale mechanisms leading to macroscopic instabilities. This contribution describes a micromechanical model for stability analysis and simulation in natural or man-made slopes under complex loading and boundary conditions. Based on the micromechanics of loose granular and compacted geomaterial, microstructural change, viscoelastic deformations, fracture, and healing are explicitly integrated into a coupled discrete particle and beam lattice model. Stress-based failure criteria and energy based dissipation and frictional contact are employed. Both gravity increase and strength reduction methods have been employed to evaluate the Factor of Safety (FoS) and potential failure surface and compared. With an emphasis on the impact of the microstructure and its spatial variability on stress-induced microcracks and crack propagation, this study outlines material models and properties relevant to stability analysis. Special focus has been put on layered slopes which present varying shear strength along the depth formed over time according to pressure, temperature, and moisture such as snowpack. This microstructural approach unifies geometrical and material information and allows the structural assembling layers of different strength. [less ▲]

Detailed reference viewed: 86 (17 UL)
Peer Reviewed
See detailThe Influence of Professional Development on Early Years Teachers’ and Educators’ Attitudes and Practices in Luxembourg
Kirsch, Claudine UL

Scientific Conference (2019, April 09)

The present case-study based in multilingual Luxembourg reports on the influence of professional development on two preschool teachers’ attitudes towards multilingual education and their emerging ... [more ▼]

The present case-study based in multilingual Luxembourg reports on the influence of professional development on two preschool teachers’ attitudes towards multilingual education and their emerging multilingual practices. The need for multilingual pedagogies has been recognized and several countries in Europe have implemented multilingual programs in early childhood (García, Lin, & May, 2017; Panagiotopoulou, 2016). Nevertheless, practices often remain monolingual and focus on the development of the majority language (Kratzmann et al., 2017). In Luxembourg, new laws were voted in 2017 that require preschool teachers to develop the three-to-five -year-olds’ skills in Luxembourgish, familiarize them with French, and value home languages. Before 2017, the language policy focused on Luxembourgish. Nevertheless, some teachers had implemented multilingual practices to address the diverse language needs of the children (Kirsch, 2017). In 2015/16, 63,5 % of the four-year-olds did not speak Luxembourgish as a home language (MENJE, 2017). To develop inclusive multilingual practices, researchers at the University of Luxembourg developed a professional development program (thereafter PD) based on the pedagogy of translanguaging (García et al., 2017). The latter is supportive of social justice, places the learners at the centre and gives them some agency over their language use. The 30-hour program was collaborative and inquiry-based and included coaching. The practitioners were invited to implement activities based on books and rhymes in several languages and video-record these activities. The professionals reflected on their practices in the meetings. The research project drew on both qualitative and quantitative research methods. The data collection drew on a questionnaire completed before, during and after the PD; six interviews; six observations of the course and 15 video-recorded classroom activities; four coaching reports and emails after the coaching. The methods of data analysis include paired samples t-test, correlational analysis and content analysis (Braun & Clark, 2006). The findings show a positive effect of PD on the teachers’ knowledge about language learning and their attitudes towards multilingual education. At the beginning of the course, both teachers were influenced by the monolingual language policy in place, parental expectation, and the belief that children learn less Luxembourgish if they encountered other languages. The initial sceptics changed once the teachers began to implement activities in French and home languages, and realized the children’s motivation,engagement and continued progress in Luxembourgish. Both incorporated rituals and regular activities that drew on multiple languages. Both repeatedly acknowledged the impact of the PD, stating that the instruction, the reflection on their activities and the feedback helped them develop different perspectives on their own teaching. The findings of this study confirm that long-term, collaborative and inquiry-based professional development can be transformative (Gaikhorst et al., 2017; Kennedy, 2005; Prenger et al., 2017). They also contribute to the dearth of literature on PD on multilingual education in early years (Egert, 2015). [less ▲]

Detailed reference viewed: 80 (3 UL)
Full Text
See detailImproved Monitoringand Tracking Hurricanes using GPS Atmospheric WaterVapour
Ejigu, Yohannes Getachew; Teferle, Felix Norman UL; klose, Anna et al

Poster (2019, April 09)

Detailed reference viewed: 95 (5 UL)
Full Text
Peer Reviewed
See detailComparison of boundary treatments in thermal Lattice Boltzmann simulations of moving particles in fluids
Rosemann, T; Kravets, B; Kruggel-Emden, H et al

in Particle Technology Series (2019, April 09)

Various numerical schemes have been developed in recent years to simulate particle-laden flows. The Lattice Boltzmann method (LBM) has emerged as an efficient tool for direct numerical simulations in ... [more ▼]

Various numerical schemes have been developed in recent years to simulate particle-laden flows. The Lattice Boltzmann method (LBM) has emerged as an efficient tool for direct numerical simulations in which the flow field around the particles can be fully resolved. In the thermal Lattice Boltzmann method not only the flow field but also the temperature field is calculated by using one distribution function for the fluid density and one for the fluid temperature. The treatment of curved solid-fluid boundaries is crucial for the simulation of particulate flows with this method. While several aspects of moving boundaries have been discussed in previous studies for the non-thermal LBM, it remains unknown to what extend these findings are transferable to the thermal LBM. In this work, we consider a 3D thermal LBM with a multiple-relaxation-time (MRT) collision operator and compare different techniques that can be applied to handle the moving boundary. There are three key aspects in the LBM that need to be considered at the boundary: the momentum exchange method calculating the drag force acting upon particles, the bounce-back scheme determining the bounce-back of density distribution functions at a boundary, and the refilling algorithm assigning a value to the unknown density distribution functions at lattice nodes uncovered by the particle. First, we demonstrate how the choice of the technique to address these problems in the flow field impacts the results for the temperature field in the thermal LBM. In a second step, we focus on the thermal side where similar techniques need to be applied. We compare different refilling strategies and bounce-back schemes for the temperature distribution functions and assess heat transfer calculation methods for the particle surface. The performance of these implementations is evaluated by comparing the simulation results in terms of accuracy and stability for a moving particle in a channel flow with a Galilean invariant reference system in which the particle’s position is fixed. We conduct this analysis for various Reynolds and Prandtl numbers to test the applicability of the individual techniques to varying flow conditions. Moreover, we demonstrate the potential of the implementation found to be superior by considering a more complex flow field in a particle packing. Our findings serve as a guideline for choosing suitable moving boundary treatments in thermal LBM simulations of particle-laden flows. [less ▲]

Detailed reference viewed: 151 (26 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 223 (33 UL)
Full Text
Peer Reviewed
See detailEnergy Systemic Risk
Decet, Romain; Lehnert, Thorsten UL

Scientific Conference (2019, April 06)

Detailed reference viewed: 67 (3 UL)
Full Text
See detailLaser beam joining of copper to aluminum sheet
Mathivanan, Karthik UL; Plapper, Peter UL

Poster (2019, April 04)

Dissimilar metal joining plays a very important role in the battery connections, especially copper and aluminum sheets. The existing literatures for laser research mostly focused on joining from the less ... [more ▼]

Dissimilar metal joining plays a very important role in the battery connections, especially copper and aluminum sheets. The existing literatures for laser research mostly focused on joining from the less reflective aluminum side to bond with copper. In the current research, we explore the joining process from copper side.Finally the optical emission of Cu-Al joint is presented with 394 nm peak as an indication to study the melting of Al. [less ▲]

Detailed reference viewed: 57 (2 UL)
Full Text
Peer Reviewed
See detailConvergence, concurrence, harmonisation – une analyse comparative de la fiscalité Be-Ne-Lux (1945-1992)
Danescu, Elena UL

Scientific Conference (2019, April 04)

The paper aims to investigate the concept, context and socio-economic consequences of fiscal competition and fiscal justice, with a focus on the taxation of Beneux countries. The analysis is carried out ... [more ▼]

The paper aims to investigate the concept, context and socio-economic consequences of fiscal competition and fiscal justice, with a focus on the taxation of Beneux countries. The analysis is carried out at the intersection of several historical fields – national, regional, European and international –, and in a interdisciplinary approach. The research is based on a wide range of primary sources (original archives from Luxembourg, Belgium, the Netherlands, France, Germany and international organisations), by taking into account of a variety of institutions, players and mechanisms, and through the prism of the existing literature in the field. The findings emerged of this analysis may make a valuable addition to this historiography and provide new information, nuances and interpretations in the ongoing debates. [less ▲]

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailSecurity – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security
Distler, Verena UL; Zollinger, Marie-Laure UL; Lallemand, Carine UL et al

in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to ... [more ▼]

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on user experience (UX) in the context of e-voting. Two versions of an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed security mechanisms, while version ND did not reveal any security-related information. We collected data on UX using standardised evaluation scales and semi-structured interviews. Version D performed better overall in terms of UX and need fulfilment. Qualitative analysis of the interviews gives further insights into factors impacting perceived security. Our study adds to existing research suggesting a conceptual shift from usability to UX and discusses implications for designing and evaluating secure systems. [less ▲]

Detailed reference viewed: 407 (52 UL)
Full Text
Peer Reviewed
See detailStability Analysis of Power Networks under Cyber-Physical Attacks: an LPV-Descriptor Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Control, Decision and Information Technologies (2019, April)

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model ... [more ▼]

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model developed in [24], based on the well-known sector non-linearity approach and the convex polytopic transformation, the attacked system (descriptor model) is re-written in a more convenient form (Linear Parameter Varying-LPV) with unmeasurable premise variables. The so-called Lyapunov-based methods are applied in order to study the stability and security problems despite the presence of cyber-attacks. The conditions will be given in terms of Linear- Bilinear Matrix Inequality LMI- BMI constraints. [less ▲]

Detailed reference viewed: 115 (0 UL)
Full Text
Peer Reviewed
See detailTime Series Modeling of Market Price in Real-Time Bidding
Du, Manxing UL; Hammerschmidt, Christian UL; Varisteas, Georgios UL et al

in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2019, April)

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions ... [more ▼]

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions fluctuate heavily within short time spans. State-of-the-art methods neglect the temporal dependencies of bidders’ behaviors. In this paper, the bid requests are aggregated by time and the mean market price per aggregated segment is modeled as a time series. We show that the Long Short Term Memory (LSTM) neural network outperforms the state-of-the-art univariate time series models by capturing the nonlinear temporal dependencies in the market price. We further improve the predicting performance by adding a summary of exogenous features from bid requests. [less ▲]

Detailed reference viewed: 104 (13 UL)
See detailMortgages and Life Time Contracts
Ratti, Luca UL

Scientific Conference (2019, April)

Detailed reference viewed: 78 (4 UL)
See detailComputational Metaphysics: New Insights on Gödel's Ontological Argument and Modal Collapse
Benzmüller, Christoph UL

in Kovac, Srecko; Swietorzecka, Kordula (Eds.) Formal Methods and Science in Philosophy III, Informal Proceedings (2019, April)

Detailed reference viewed: 33 (0 UL)
Peer Reviewed
See detailExploration of Different School Value-Added Models in a Highly Heterogeneous Educational Context
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, April)

Detailed reference viewed: 86 (13 UL)
Full Text
Peer Reviewed
See detailPricing Perspective for SWIPT in OFDM-based Multi-User Wireless Cooperative Systems
Gautam, Sumit UL; Lagunas, Eva UL; Vuppala, Satyanarayana UL et al

Scientific Conference (2019, April)

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from ... [more ▼]

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from a pricing perspective. Specifically, we consider that a transmit source communicates with multiple destinations using Orthogonal Frequency Division Multiplexing (OFDM) system within a dual-hop relay-assisted network, where the destination nodes are capable of jointly decoding information and harvesting energy from the same radio-frequency (RF) signal using either the time-switching (TS) or power-splitting (PS) based SWIPT receiver architectures. Computation of the optimal solution for the aforementioned problem is an extremely challenging task as joint optimization of several network resources introduce intractability at high numeric values of relays, destination nodes and OFDM sub-carriers. Therefore, we present a suitable algorithm with sub-optimal results and good performance to compute the performance of joint data processing and harvesting energy under fixed pricing methods by adjusting the respective weight factors, motivated by practical statistics. Furthermore, by exploiting the binary options of the weights, we show that the proposed formulation can be regulated purely as a sum-spectral efficiency maximization or solely as a sum-harvested energy maximization problem. Numerical results illustrate the benefits of the proposed design under several operating conditions and parameter values. [less ▲]

Detailed reference viewed: 116 (16 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 213 (17 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 164 (49 UL)
See detailResearch visit, Chulalongkorn University, Bangkok, Thailand
Wolff, Christian UL

Scientific Conference (2019, April)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailRobust Precoding Techniques for Multibeam Mobile Satellite Systems
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in 2019 IEEE Wireless Communications and Networking Conference (WCNC) (2019, April)

This paper presents designing precoding technique at the gateway of a multibeam mobile satellite systems, enabling full frequency reuse pattern among the beams. Such a system brings in two critical ... [more ▼]

This paper presents designing precoding technique at the gateway of a multibeam mobile satellite systems, enabling full frequency reuse pattern among the beams. Such a system brings in two critical challenges to overcome. The inter-beam interference makes applying interference mitigation techniques necessary. Further, when the user terminals are mobile the Channel State Information (CSI) becomes time-varying which is another challenge to overcome. Therefore, the gateway has only access to an outdated CSI, which can eventually limit the precoding gains. In this way, employing a proper CSI estimation mechanism at the gateway can improve the performance of the precoding scheme. In this context, the objectives of this paper are two folds. First, we present different CSI feedback mechanisms which aim at preserving a lower CSI variations at the gateway. Then, we develop the corresponding precoding schemes which are adapted with the proposed CSI feedback mechanisms. To keep the complexity of the proposed precoding schemes affordable, we consider a maritime communication scenario so that the signals received by mobile user terminals suffer from a lower pathloss compared to the Land Mobile communication. Finally, we provide several simulations results in order to evaluate the performance of the proposed precoding techniques. [less ▲]

Detailed reference viewed: 20 (2 UL)
Full Text
Peer Reviewed
See detailTopic-based Historical Information Selection for Personalized Sentiment Analysis
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges 24-26 April 2019 (2019, April)

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to ... [more ▼]

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to modeling individuality and understanding the current state of the person. We consider a user's expressions in the past as historical information, and target posts from social platforms for which Twitter texts are chosen as exemplary. While implementing the personalized model PERSEUS, we observed information loss due to the lack of flexibility regarding the design of the input sequence. To compensate this issue, we provide a procedure for information selection based on the similarities in the topics of a user's historical posts. Evaluation is conducted comparing different similarity measures, and improvements are seen with the proposed method. [less ▲]

Detailed reference viewed: 127 (31 UL)
See detailMicrofluidic Wet Spinning of Core-Sheath Elastomer-Liquid Crystal Fibers
Honaker, Lawrence William UL; Vats, Shameek UL; Anyfantakis, Emmanouil UL et al

Scientific Conference (2019, March 29)

Liquid crystals encapsulated in fibers have a wide variety of applications in sensing. In order to produce these, several methods have been explored. Electrospinning is among the better-known techniques ... [more ▼]

Liquid crystals encapsulated in fibers have a wide variety of applications in sensing. In order to produce these, several methods have been explored. Electrospinning is among the better-known techniques with considerable successes. Only a limited range of polymers, though, has been used for electrospinning with liquid crystal cores, and the process of electrospinning has many obstacles to its utility at an industrial scale. On the other hand, wet-spinning techniques are better suited for industrial applications and are widely used in textile manufacturing, but are not commonly used for coaxial fiber production, especially with the large experimental scales that are difficult to replicate in a standard liquid crystal research laboratory. We therefore propose a method for wet-spinning coaxial core-sheath liquid crystal-filled elastomer fibers using a microfluidic set-up. Based on the flow-focusing method used for the production of liquid crystal shells and emulsions, this technique generates coaxial filaments by pumping a core-sheath flow of a liquid crystal surrounded by a rubbery polymer solution into a co-flowing coagulation bath. The coagulation bath is tuned to quickly extract the elastic polymer solution solvent, leaving behind a dry, continuous fiber. We have employed this method to produce fibers of polybutadiene and polyisoprene containing a core of a liquid crystal, such as 4-cyano-4'-pentylbiphenyl (5CB). Investigations into the choice of polymer solution, i.e. both the polymer and solvents used, will be presented in addition to discussion on parameters affecting the contiguity of the core. [less ▲]

Detailed reference viewed: 215 (4 UL)
See detailN point Virasoro algebras are multi-point Krichever Novikov type algebras
Schlichenmaier, Martin UL

Scientific Conference (2019, March 19)

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detailHigher-Order DCA against Standard Side-Channel Countermeasures
Bogdanov, Andrey; Rivain, Matthieu; Philip, S. Vejre et al

in Polian, Ilia; Stöttinger, Marc (Eds.) Constructive Side-Channel Analysis and Secure Design (2019, March 16)

At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack builds on the same principles as DPA in the ... [more ▼]

At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack builds on the same principles as DPA in the classical side-channel context, but uses computational traces consisting of plain values computed by the implementation during execution. It was shown to be able to recover the key of many existing AES white-box implementations. The DCA adversary is passive, and so does not exploit the full power of the white-box setting, implying that many white-box schemes are insecure even in a weaker setting than the one they were designed for. It is therefore important to develop implementations which are resistant to this attack. We investigate the approach of applying standard side-channel countermeasures such as masking and shuffling. Under some necessary conditions on the underlying randomness generation, we show that these countermeasures provide resistance to standard (first-order) DCA. Furthermore, we introduce higher-order DCA, along with an enhanced multivariate version, and analyze the security of the countermeasures against these attacks. We derive analytic expressions for the complexity of the attacks – backed up through extensive attack experiments – enabling a designer to quantify the security level of a masked and shuffled implementation in the (higher-order) DCA setting. [less ▲]

Detailed reference viewed: 27 (3 UL)
Peer Reviewed
See detailModelling how the relative spatial pattern of green within cities impact carbon flows
Boura, Marlène Delphine Fabienne UL

Scientific Conference (2019, March 14)

Cities - particularly the denser ones - are often depicted as sustainable systems that reduce the consumption of land and optimize energy use for buildings and transport. Cities, however - exactly because ... [more ▼]

Cities - particularly the denser ones - are often depicted as sustainable systems that reduce the consumption of land and optimize energy use for buildings and transport. Cities, however - exactly because they concentrate human activities - constitute the main source of CO2 emissions into the atmosphere. Yet it is important to assess to what extent they can cope with their own emissions. We address this issue by examining how the internal spatial organization of cities can impact the flow of anthropogenic CO2 between their major sources - human activities, mainly on built-up lands - ; and their main storage infrastructures, with a focus here on urban green spaces and forests. Is it better to have a dense core with a peripheric green belt? Large green patches within the core centre? Or small and fragmented green spaces? The objective of the present work is to tests whether the internal spatial organization of cities - in terms of green infrastructure characteristics and land use types - matters for evaluating carbon sequestration potentials of cities. Or whether these cities can simply be considered as single objects with a quantity of carbon emissions and a carbon sink capacity derived directly from aggregated land use data. We model urban carbon flows for about 800 Functional Urban Areas (FUAs) of European cities using the Urban Atlas 2012 database. The model intends to characterize the emissions, their diffusion and sequestration within the urban regions as well as their exit from the analysed urban systems. The FUAs are classified along landscape metrics in order to derive a typology of urban forms focusing on the relative position of green and human activities and their characteristics. The analysis then investigates how the type of urban form can affect the level of efficiency of CO2 uptake. The efficiency is defined as the share of local emissions captured within the urban boundaries. The model will be validated using eddy covariance empirical data. [less ▲]

Detailed reference viewed: 21 (3 UL)
Peer Reviewed
See detailMaking an Archive-Based Historical Web Documentary
Santana, Dominique UL

Scientific Conference (2019, March 14)

Detailed reference viewed: 36 (3 UL)
Full Text
Peer Reviewed
See detailUnderstanding Alpha Decay
Penasse, Julien UL

Scientific Conference (2019, March 12)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailCharacterizations and classifications of quasitrivial semigroups
Devillet, Jimmy UL; Marichal, Jean-Luc UL; Teheux, Bruno UL

Scientific Conference (2019, March 03)

Detailed reference viewed: 92 (11 UL)
Full Text
Peer Reviewed
See detailEvaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly
Varisteas, Georgios UL; Frank, Raphaël UL; Sajadi Alamdari, Seyed Amin UL et al

in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)

Detailed reference viewed: 244 (47 UL)
Full Text
Peer Reviewed
See detailRobust Encryption, Extended
Geraud, Remi; Naccache, David; Rosie, Razvan UL

in Matsui, Mitsuru (Ed.) The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings (2019, March 01)

Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key ... [more ▼]

Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key context, it has been further extended to key-encapsulation mechanisms, and more recently to pseudorandom functions, message authentication codes and authenticated encryption. In this work, we motivate the importance of establishing similar guarantees for functional encryption schemes, even under adversarially generated keys. Our main security notion is intended to capture the scenario where a ciphertext obtained under a master key (corresponding to Authority 1) is decrypted by functional keys issued under a different master key (Authority 2). Furthermore, we show there exist simple functional encryption schemes where robustness under adversarial key-generation is not achieved. As a secondary and independent result, we formalize robustness for digital signatures – a signature should not verify under multiple keys – and point out that certain signature schemes are not robust when the keys are adversarially generated. We present simple, generic transforms that turn a scheme into a robust one, while maintaining the original scheme’s security. For the case of public-key functional encryption, we look into ciphertext anonymity and provide a transform achieving it. [less ▲]

Detailed reference viewed: 59 (5 UL)
Peer Reviewed
See detailSocial Rehire Clauses and Transfer of Undertakings
Ratti, Luca UL

Scientific Conference (2019, March)

Detailed reference viewed: 45 (2 UL)
See detailTrue or False Contradictions between Life Time Contracts and Platform Work Contracts?
Ratti, Luca UL

Scientific Conference (2019, March)

Detailed reference viewed: 46 (2 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 128 (17 UL)
See detailThe Pact with the Devil as Model and Crisis of Complicity (Marlowe, Goethe)
Kohns, Oliver UL

Scientific Conference (2019, March)

Detailed reference viewed: 40 (2 UL)
See detailThe role of executive functions in task-related analgesia
Rischer, Katharina Miriam UL; Gigl, Sandra; Dierolf, Angelika UL et al

Poster (2019, March)

Introduction: Recent research suggests that weaker executive functions may be linked to a higher risk of pain chronicity. However, little is known about how executive functions affect the modulation of ... [more ▼]

Introduction: Recent research suggests that weaker executive functions may be linked to a higher risk of pain chronicity. However, little is known about how executive functions affect the modulation of acute pain. The present study aimed to investigate the impact of inhibitory control on the success of cognitive distraction from pain. Methods: Participants completed a battery of cognitive tasks (Go/NoGo, Color Stroop, Eriksen Flanker), assessing their cognitive inhibition and selective attention abilities. Additionally, self-report measures of pain catastrophizing and fear of pain were administered. In a pain distraction paradigm, participants completed either a cognitively demanding working memory task (2-back task) or a visually matched easy control task (target response task) while receiving warm or painful thermal stimuli to their left forearm. Nociceptive stimulus intensity was individually calibrated for each participant. Moreover, to maintain a similar level of task difficulty across participants, task speed was continuously adapted based on the participant's performance in the previous trials. Following each trial, participants rated the perceived intensity and unpleasantness of the thermal stimuli on visual analogue scales. Results: As expected, preliminary results indicate that the 2-back task, but not the target response task, successfully distracted participants from thermal pain, manifesting in significantly lower intensity and unpleasantness ratings. Importantly, the magnitude of the distraction effect was negatively associated with the Flanker effect. Discussion: In line with previous research, engaging in a cognitively demanding task led to significantly lower pain intensity and unpleasantness ratings when compared to an easy control task. Moreover, results indicate that better interference control abilities may predict greater task-related analgesia. Taken together, the results of the present study suggest that it is crucial to assess executive functions to develop a better understanding of the mechanisms behind cognitive distraction from pain. [less ▲]

Detailed reference viewed: 45 (8 UL)
Full Text
Peer Reviewed
See detailTranslingual Discursive Spaces in Language and Arts Lessons
Degano, Sarah UL

in Literacy Information and Computer Education Journal (2019, March), 10(1), 3094-3102

Flexible multilingual pedagogies such as translanguaging pedagogies are promising stepping stones towards a more equitable access to educational resources for students of different backgrounds. Recent ... [more ▼]

Flexible multilingual pedagogies such as translanguaging pedagogies are promising stepping stones towards a more equitable access to educational resources for students of different backgrounds. Recent research in Luxembourgish preschool, Year 1 and Year 2 classes, show that teachers have begun to implement such pedagogies by encouraging the deployment of the students’ full linguistic repertoires, including their home languages. Little attention has however been paid to the later years of primary school where the achievement gap between students with and without a migration background is particularly high. The present qualitative longitudinal study focusses on students in Years 4 and 5 and examines to what extent they deploy their linguistic repertoires in interaction with their peers. Drawing on observations, recordings and interviews, this paper explores the language use of two Portuguese-speaking 4th graders in Language and Arts lessons. Findings show that the students mobilize their linguistic and cultural resources to different extents and, hereby, open or close translingual discursive spaces for further exchange. The findings should contribute to the understanding of multilingual students’ language practices and provide insight into how their linguistic and cultural resources can be capitalized on. [less ▲]

Detailed reference viewed: 83 (7 UL)
Peer Reviewed
See detailOrganiser, European Banking Center (EBC) Network Conference
Wolff, Christian UL

Scientific Conference (2019, March)

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailA Hybrid Machine Learning and Schedulability Method for the Verification of TSN Networks
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 15th IEEE International Workshop on Factory Communication Systems (WFCS2019) (2019, March)

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible ... [more ▼]

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible without executing a conventional schedulability analysis. A disadvantage of ML-based timing verification with respect to schedulability analysis is the possibility of "false positives": configurations deemed feasible while they are not. In this work, in order to minimize the rate of false positives, we propose the use of a measure of the uncertainty of the prediction to drop it when the uncertainty is too high, and rely instead on schedulability analysis. In this hybrid verification strategy, the clear-cut decisions are taken by ML, while the more difficult ones are taken by a conventional schedulability analysis. Importantly, the trade-off achieved between prediction accuracy and computing time can be controlled. We apply this hybrid verification method to Ethernet TSN networks and obtain, for instance in the case of priority scheduling with 8 traffic classes, a 99% prediction accuracy with a speedup factor of 5.7 with respect to conventional schedulability analysis and a reduction of 46% of the false positives compared to ML alone. [less ▲]

Detailed reference viewed: 202 (25 UL)
Peer Reviewed
See detailIntergenerational mobility in Europe: Home ownership as a facet of social reproduction?
Chauvel, Louis UL; Hartung, Anne UL

Scientific Conference (2019, March)

Detailed reference viewed: 122 (4 UL)
Full Text
Peer Reviewed
See detailTransforming Collaboration Data into Network Layers for Enhanced Analytics
Esmaeilzadeh Dilmaghani, Saharnaz UL; Piyatumrong, Apivadee; Bouvry, Pascal UL et al

Scientific Conference (2019, February 25)

We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental ... [more ▼]

We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental patterns and insights of the research collaborations. In this paper, we describe our data-to-networks method, which automatically generates a set of logical network layers from the relational input data using a linkage threshold. We, then, use a series of network metrics to analyze the impact of the linkage threshold on the individual network layers. Moreover, results from the network analysis also provide beneficial information to improve the network visualization. We demonstrate the feasibility and impact of our approach using real-world collaboration data. We discuss how the produced network layers can reveal insights and patterns to direct the data analytics more intelligently. [less ▲]

Detailed reference viewed: 124 (33 UL)
Full Text
Peer Reviewed
See detailShould You Consider Adware as Malware in Your Study?
Gao, Jun UL; Li, Li; Kong, Pingfan UL et al

in 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (2019, February 24)

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports ... [more ▼]

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports which are often provided free through online services such as VirusTotal. Unfortunately, these reports do not offer precise information for appropriately and uniquely assigning classes to samples in app datasets: AV engines indeed do not have a consensus on specifying information in labels. Furthermore, labels often mix information related to families, types, etc. In particular, the notion of “adware” is currently blurry when it comes to maliciousness. There is thus a need to thoroughly investigate cases where adware samples can actually be associated with malware (e.g., because they are tagged as adware but could be considered as malware as well). In this work, we present a large-scale analytical study of Android adware samples to quantify to what extent “adware should be considered as malware”. Our analysis is based on the Androzoo repository of 5 million apps with associated AV labels and leverages a state-of-the-art label harmonization tool to infer the malicious type of apps before confronting it against the ad families that each adware app is associated with. We found that all adware families include samples that are actually known to implement specific malicious behavior types. Up to 50% of samples in an ad family could be flagged as malicious. Overall the study demonstrates that adware is not necessarily benign. [less ▲]

Detailed reference viewed: 163 (16 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 177 (18 UL)
Full Text
Peer Reviewed
See detailRobust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018 (2019, February 21)

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the ... [more ▼]

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the transmitter. In defining the SLP design problem, a general category of constructive interference regions (CIR) called distance preserving CIR (DPCIR) is adopted. In particular, we are interested in a robust SLP design minimizing the total transmit power subject to individual quality-of-service (QoS) requirements. We consider two common models for the channel uncertainty region, namely, spherical (norm-bounded) and stochastic. For the spherical uncertainty model, a worst-case robust precoder is proposed, while for the stochastically known uncertainties, we derive a convex optimization problem with probabilistic constraints. We simulate the performance of the proposed robust approaches, and compare them with the existing methods. Through the simulation results, we also show that there is an essential trade-off between the two robust approaches. [less ▲]

Detailed reference viewed: 141 (22 UL)
See detailThe real problem with Rawlsian reasonableness
Burks, Deven UL

Scientific Conference (2019, February 16)

Rawlsian “reasonableness” has been the object of considerable and varied criticism. Reactions range from its being “loaded” (Stout 2004: 184) or “chimerical” (Young 2005: 308) to “entirely circular” ... [more ▼]

Rawlsian “reasonableness” has been the object of considerable and varied criticism. Reactions range from its being “loaded” (Stout 2004: 184) or “chimerical” (Young 2005: 308) to “entirely circular” (Mulhall and Swift 2003: 483). Yet more critical reactions often employ external standards or equivocal senses of reasonableness to their detriment (Freeman 2004: 2045, 2063-5) or marshal apparently conflicting materials from Rawls’s broader theory (Young 2005, 2006). In this paper, I put forward a narrow, immanent criticism whereon the two basic aspects of reasonableness are shown to be in tension: the “burdens of judgment” may give the person reason to disagree over the need to propose and to abide by a common basis of fair terms of cooperation. My aims in doing so are threefold. First, I try to make sense of and set on firmer ground Stout’s (2004) critique of reasonableness as being epistemologically untenable. My second and third aims stem from the first. The second consists in carving out a middling conceptual space wherein the negation of Rawlsian “reasonableness” is not merely “unreasonable” in the sense of being willing to impose one’s comprehensive doctrine on others as the terms of political justification and coercion (Rawls 1996: 60-1; Freeman 2004: 2049) nor “unreasonable” in the sense of persons’ culpably endorsing a doctrine inconsistent with acceptance of the burdens of judgment (Rawls 2001: 184, 190; Freeman 2004: 2064) but, instead, “reasonably unreasonable” in the sense of the person’s nonculpably or justifiably rejecting the requirement to offer and to abide by fair terms of cooperation in view of the burdens of judgment. Third, I attempt to salvage a minimal core of reasonableness from the two-conjunct Rawlsian reasonableness, a core which contemporary political philosophers are hard-pressed to do without: the second conjunct consisting in the person’s acknowledgement of the burdens of judgment (Rawls 1996: 54-8). To that end, I proceed in two steps. First, I shall recall the two aspects of reasonableness and hold that their conjunction is necessary for a person to qualify as “reasonable”. In particular, this involves showing that a biconditional obtains: a person is reasonable if and only if the two basic aspects of reasonableness obtain, i.e. if and only if she is willing to propose fair terms of cooperation and she is willing to recognize the burdens of judgment. I also briefly define the site wherefrom one checks a person’s reasonableness: the “you and me” standpoint (Rawls 1996: 28). Secondly, I shall examine whether any burden gives reason to doubt the need to propose and to abide by a common basis of fair terms of cooperation. I find that each of the burdens, in its own way, leaves room to doubt whether reasonable persons in a well-ordered society would assent to such a need. For the first burden (complexity of evidence), the evidence backing the requirement of shared terms of cooperation defined ex ante is not obviously less complex than that contained in reasonable comprehensive doctrines. Regarding the second (relative weight of reasons), even supposing agreement on which reasons are relevant to deciding questions of justice, there may be still be disagreement over the relative priority of those reasons in deciding a given question. As to the third (conceptual indeterminacy and hard cases), such concepts as justice and fairness, cooperation and equality are all subject to the difficulties of identifying hard cases and probing a concept’s limits. Of the fourth (divergent total life experience), it is clear that, through her life experience, a person acquires a set of beliefs (political, moral, epistemological, religious, etc.) which could give the person reason to doubt or otherwise reject the first basic aspect of reasonableness, especially given its significant complexity. Finally, for the fifth burden (conflicting distinct normative considerations), persons may disagree over whether the first basic aspect in fact realizes these different considerations, the priority ordering to be fixed for such considerations and whether a common currency might be found so as to make such considerations commensurable, any of which may suffice for persons to be unable to reach agreement on the requirement, not simply on the reasons why it holds, but also on whether it holds at all. In reaching these findings, I parallel Clarke’s (1999: 639-41) claim that the burdens of judgment apply both to contractarianism’s “reasonable rejection procedure” and principles but do so from narrower, immanent grounds rather than the stronger claim that Rawls’s approach must be committed to substantive epistemological positions. This analysis yields two striking conclusions: First, public reason – the demand to present others with reasons which the person could reasonably expect them to accept – becomes looser and shifts to the domain of politics where one sees what public reasons others may in fact accept (Laden 2001). Seen from a different angle, one need not accept the idea that the first basic aspect and, hence, Rawlsian reasonableness are necessary conditions of political justification under conditions of reasonable pluralism (contra Krasnoff 2014: 696-7): rejecting this aspect and reasonableness in no way means that there can be no political justification under conditions of (reasonable) pluralism. Second, when conceiving justification and discourse, Rawls may be committed, despite himself, to accepting “reasonableness pluralism”, i.e. the view that there exist distinct, possibly irreconcilable accounts of reasonableness to which one may appeal when conceiving justification and discourse. Their combination may lead to a public reason liberalism framework which is at once looser and more actionable. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailFunctional Interpretation of Single Amino Acid Substitutions in 1,330 Disease-Associated Genes
Iqbal, Sumaiya; Jespersen, Jakob Berg; Perez-Palma, Eduardo et al

in Biophysical Journal (2019, February 15), 116(3), 420-421

Elucidating molecular consequences of amino-acid-altering missense variants at scale is challenging. In this work, we explored whether features derived from three-dimensional (3D) protein structures can ... [more ▼]

Elucidating molecular consequences of amino-acid-altering missense variants at scale is challenging. In this work, we explored whether features derived from three-dimensional (3D) protein structures can characterize patient missense variants across different protein classes with similar molecular level activities. The identified disease-associated features can advance our understanding of how a single amino acid substitution can lead to the etiology of monogenic disorders. For 1,330 disease-associated genes (>80%, 1,077/1,330 implicated in Mendelian disorders), we collected missense variants from the general population (gnomAD database, N=164,915) and patients (ClinVar and HGMD databases, N=32,923). We in silico mapped the variant positions onto >14k human protein 3D structures. We annotated the protein positions of variants with 40 structural, physiochemical, and functional features. We then grouped the genes into 24 protein classes based on their molecular functions and performed statistical association analyses with the features of population and patient variants. We identified 18 (out of 40) features that are associated with patient variants in general. Specifically, patient variants are less exposed to solvent (p<1.0e-100), enriched on b-sheets (p<2.37e-39), frequently mutate aromatic residues (p<1.0e-100), occur in ligand binding sites (p<1.0e-100) and are spatially close to phosphorylation sites (p<1.0e-100). We also observed differential protein-class-specific features. For three protein classes (signaling molecules, proteases and hydrolases), patient variants significantly perturb the disulfide bonds (p<1.0e-100). Only in immunity proteins, patient variants are enriched in flexible coils (p<1.65e-06). Kinases and cell junction proteins exhibit enrichment of patient variants around SUMOylation (p<1.0e-100) and methylation sites (p<9.29e-11), respectively. In summary, we studied shared and unique features associated with patient variants on protein structure across 24 protein classes, providing novel mechanistic insights. We generated an online resource that contains amino-acid-wise feature annotation-track for 1,330 genes, summarizes the patient-variant-associated features on residue level, and can guide variant interpretation. [less ▲]

Detailed reference viewed: 119 (1 UL)
Full Text
Peer Reviewed
See detailCharacterizations of idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in 38th Linz Seminar on Fuzzy Set Theory (2019, February 05)

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means ... [more ▼]

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means of four conditions only: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. In particular, we show that associativity can be replaced with bisymmetry in this axiomatization. [less ▲]

Detailed reference viewed: 92 (18 UL)
See detailDer "March for Science" – eine Initiative für die Freiheit der Wissenschaft
Baudson, Tanja Gabriele UL

Scientific Conference (2019, February 01)

Der ›March for Science‹ ist eine international angelegte Großdemonstration, die sich für Wissenschaftsfreiheit und gegen ›alternative Fakten‹ ausspricht. Sie findet seit 2017 in mehr als 600 Städten ... [more ▼]

Der ›March for Science‹ ist eine international angelegte Großdemonstration, die sich für Wissenschaftsfreiheit und gegen ›alternative Fakten‹ ausspricht. Sie findet seit 2017 in mehr als 600 Städten weltweit statt. Im Rahmen eines Symposiums soll es um diese Initiative und das Thema ›Wissenschaft im politischen Meinungsstreit‹ gehen. [less ▲]

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailReal-time attack detection on robot cameras: A self-driving car application
Lagraa, Sofiane UL; Cailac, Maxime; Rivera, Sean UL et al

in International Conference on Robotic Computing (2019, February)

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected ... [more ▼]

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially the image flows incoming from camera robots. In this paper, we perform a structured security assessment of robot cameras using ROS. We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras. Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method. We experiment our approach on robot cameras embedded on a self-driving car. [less ▲]

Detailed reference viewed: 170 (15 UL)
Peer Reviewed
See detailTeachers´ Attitudes toward Students with High- and Low-Educated Parents
Pit-Ten Cate, Ineke UL; Glock, Sabine UL

Scientific Conference (2019, February)

Background In several countries, school tracking is used to group students with similar academic potential to optimize instruction. Teachers often have a more or less deciding vote, which school track ... [more ▼]

Background In several countries, school tracking is used to group students with similar academic potential to optimize instruction. Teachers often have a more or less deciding vote, which school track would suit different students based on academic achievement and potential (Ansalone and Biafora, 2004). Given the differential qualifications associated with completion of the different school tracks, teachers’ abilities to correctly assign students to different tracks will not only affect the students´ educational pathways, but also has a long lasting effect on career opportunities and general wellbeing in future adult life. Research shows that tracking recommendations mainly rely on students’ abilities (e.g., Caro, et al., 2009; Klapproth, et al., 2013; Marks, 2006). However, non-academic related student characteristics such as the socioeconomic status (SES) of the parents and —closely related (Reardon, 2011)—the parental educational level also affect teachers´ tracking decisions, either indirectly via grades or directly via the tracking decision itself (Bauer and Riphahn, 2006; Caro et al., 2009; de Boer, et al., 2010; Ditton, Krüsken, and Schauenberg, 2005; Maaz, et al., 2008; Timmermans, et al., 2015; Wagner, et al., 2009). Indeed, research has provided evidence for such stereotype bias in teachers’ judgments, leading to disadvantages for certain social groups (Peterson, et al., 2016; van den Bergh, et al., 2010). Hence, the aim of our study was the investigation of teachers’ attitudes toward students in relation to the educational level of parents. Method The aim of the current study was to investigate teachers´ implicit and explicit attitudes toward students with differentially educated parents. Implicit attitudes were measured using an implicit association task (IAT). The first name of the student was used as a proxy for the educational level of parents (see Onland & Bloothooft, 2008), whereby we created separate versions for boys and girls. Participating teachers (N=70) were randomly divided in two groups whereby the first group completed the IAT-boys version and the other group the IAT-girls version. Explicit attitudes were measured using a questionnaire (adapted from Glock, et al., 2016). Results: Participants indicated positive implicit attitudes toward students with highly educated parents, independent of the gender of the student. More specifically, an independent t test revealed that the mean IAT-D scores for boys and girls did not differ, t(68)=0.47, p=.64, d=0.12. The IAT-D score for the whole sample (M=0.81, SD=0.61) was significantly different from zero, t(69)=11.14, p<.001, d=1.33, reflecting more positive implicit attitudes toward highly educated parents. Teachers did not express differential explicit beliefs regarding the learning and social behaviors of students based on the educational level of the parents (i.e., subscale scores were significantly lower than the mean of the scale, t(65)=4.26, p<.001, d=0.53), whereas their expectations concerning the motivation and ambitions or educational chances of these students were neutral. Although the three subscales within the explicit attitudes measure were substantially associated (correlations ranging from r = .39 to r =.74), no association between explicit and implicit attitudes measures was found (correlations range from r = -.07 to r = .08). Conclusion: Teachers’ attitudes seem to be an important factor, which can guide teachers´ judgments and behaviors, and could partly explain differences in educational equity for students with similar academic profiles, but differentially educated parents. The positive implicit attitudes in favor of students with highly educated parents imply more favorable judgments for and behavior toward these students and deeper work is required to ensure teachers’ fair treatment of all students. The dissociation between implicit and explicit attitudes may be an indication of the social sensitivity of the relationship between students´ social background and educational achievements and opportunities. [less ▲]

Detailed reference viewed: 111 (5 UL)
Full Text
Peer Reviewed
See detailA View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera
Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL; Baptista, Renato UL et al

in 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018 (2019, February)

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it ... [more ▼]

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it possible to extract a 3D skeleton from a single RGB image. Taking advantage of this impressive progress, we propose a simple framework for fast and view-invariant action recognition using a single RGB camera. The proposed pipeline can be seen as the association of two key steps. The first step is the estimation of a 3D skeleton from a single RGB image using a CNN-based pose estimator such as VNect. The second one aims at computing view-invariant skeleton-based features based on the estimated 3D skeletons. Experiments are conducted on two well-known benchmarks, namely, IXMAS and Northwestern-UCLA datasets. The obtained results prove the validity of our concept, which suggests a new way to address the challenge of RGB-based view-invariant action recognition. [less ▲]

Detailed reference viewed: 292 (22 UL)
Full Text
Peer Reviewed
See detailHow to Assess the Usability Metrics of E-Voting Schemes
Marky, Karola; Zollinger, Marie-Laure UL; Funk, Markus et al

in Lecture Notes in Computer Science (2019, February)

Detailed reference viewed: 140 (19 UL)