References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailPhase field modeling of interfacial crack propagation in quasi-brittle heterogeneous materials
Nguyen, Thanh Tung UL; Yvonnet, Julien; Waldmann, Danièle UL et al

in International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2019)

Detailed reference viewed: 52 (12 UL)
Full Text
Peer Reviewed
See detailComposable, Unconditionally Secure Message Authentication without any Secret Key
Ostrev, Dimiter UL

in 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019 (2019)

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and ... [more ▼]

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and reject a message coming from Eve with high probability. The system does not require any secret key shared between Alice and Bob, provides information theoretic security, and can safely be composed with other protocols in an arbitrary context. [less ▲]

Detailed reference viewed: 67 (8 UL)
Peer Reviewed
See detailFemmes et écrivaines : éternelles mineures ?
Barthelmebs-Raguin, Hélène UL

Scientific Conference (2019)

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailProactive Model for Handling Conflicts in Sensor Data Fusion Applied to Robotic Systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Proceedings of the 14th International Conference on Software Technologies (ICSOFT), 2019 Prague, Czech Republic, 26 - 28 July, 2019 (2019)

Robots have to be able to function in a multitude of different situations and environments. To help them achieve this, they are usually equipped with a large set of sensors whose data will be used in ... [more ▼]

Robots have to be able to function in a multitude of different situations and environments. To help them achieve this, they are usually equipped with a large set of sensors whose data will be used in order to make decisions. However, the sensors can malfunction, be influenced by noise or simply be imprecise. Existing sensor fusion techniques can be used in order to overcome some of these problems, but we believe that data can be improved further by computing context information and using a proactive rule-based system to detect potentially conflicting data coming from different sensors. In this paper we will present the architecture and scenarios for a generic model taking context into account. [less ▲]

Detailed reference viewed: 107 (9 UL)
Full Text
Peer Reviewed
See detailAssessing Transition-based Test Selection Algorithms at Google
Leong, Claire; Abhayendra, Singh; Papadakis, Mike UL et al

in International Conference on Software Engineering (ICSE) (2019)

Detailed reference viewed: 86 (4 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition
Derbez, Patrick UL; Lallemand, Virginie; Udovenko, Aleksei UL

in Patterson, Kenneth G.; Stebila, Douglas (Eds.) Selected Areas in Cryptography -- SAC 2019 (2019)

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous ... [more ▼]

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous editions, the focus was made on practical attacks: contestants were asked to recover a 128-bit secret key from a given set of 2^20 plaintext blocks. The suggested SKINNY instances are 4- to 20-round reduced variants of SKINNY-64-128 and SKINNY-128-128. In this paper, we explain how to solve the challenges for 10-round SKINNY-128-128 and for 12-round SKINNY-64-128 in time equivalent to roughly 2^52 simple operations. Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode. [less ▲]

Detailed reference viewed: 37 (0 UL)
See detail"Georges Perec ou la méthode pratique de la critique"
Raus, Tonia

in Absalyamova, Elina; Van Nuijs, Laurence; Stiénon, Valérie (Eds.) "Figures du critique-écrivain. Formes et pratiques du discours métalittéraire (XIXe-XXIe siècles" (2019)

Detailed reference viewed: 2 (0 UL)
Full Text
See detailBuilding Capacity for Comparative and International Social Sciences: Inter-organizational Collaboration and EU Research Funding & Degree Programs
Powell, Justin J W UL

Scientific Conference (2019)

In this essay, I present global mega-trends in higher education and science (expansion, competition, collaboration), discuss regional shifts in scientific publication globally since 1900 and systematic ... [more ▼]

In this essay, I present global mega-trends in higher education and science (expansion, competition, collaboration), discuss regional shifts in scientific publication globally since 1900 and systematic attempts to build capacity for knowledge production, especially in research universities. Pure exponential growth in the publication of research articles is matched by rising international, interorganizational, and transdisciplinary collaboration. The implications of these patterns, especially for international and comparative social sciences, are then briefly delineated on the basis of the case of EU research funding (Framework Programmes) and joint degree programs (Erasmus Mundus) that promote sustainable collaborations across borders in Europe. [less ▲]

Detailed reference viewed: 364 (5 UL)
Full Text
Peer Reviewed
See detailInterozeptive Genauigkeit: Ein methodischer Vergleich von zwei Heartbeat Tracking Paradigmen
Haciahmet, C.; Opdensteinen, K.; Schaan, L. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert ... [more ▼]

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert nach Melloni et al., 2013) - welche Interozeptive Genauigkeit (IG) anhand des Vergleichs von objektiver und selbst-berichteter Herzrate erfassen (Garfinkel et al., 2015). Die Paradigmen unterscheiden sich hinsichtlich des mentalen Zählens (HTT) und motorischen Tappings (aHTT) von kardiovaskulären Empfindungen. Tapping wird in Biofeedback-Studien zur Verbesserung der IG angewendet (Ring et al., 2015), bislang jedoch kaum mit mentalem Zählen verglichen. 74 gesunde Versuchspersonen (MAlter = 22.66, SDAlter = 2.74, 49 Frauen) bearbeiteten den HTT und den aHTT. Die IGScores des HTT waren im Durchschnitt signifikant höher als im aHTT (t(73) = 2.73, p = .01, d = .28). Bei einem Cut-Off von IG = 0.70 konnten 37 gute Herzschlagwahrnehmer/innen im HTT und 27 gute Herzschlagwahrnehmer/innen im aHTT klassifiziert werden. Auch im Selbstbericht zur eigenen Herzschlagwahrnehmungsfähigkeit, zeigte sich bei den Probanden ein höheres Konfidenzrating im HTT als im aHTT (MHTT = 5.00, SD = 2.04; MaHTT = 3.88, SD = 1.77; Z(74) = -5.24, p < .01, d = .59). Zusammenfassend weisen die Ergebnisse auf eine bessere Herzschlagwahrnehmung im HTT hin, sowohl bezüglich der IG-Scores als auch im Selbstbericht. Eine Erklärung für die niedrigeren Interozeptionswerte im aHTT könnte sein, dass die sensorische und motorische Interferenz der Tapping-Aufgaben mit der Detektion von afferenten Herzsensationen konkurrieren, weshalb der salientere Tapping-Stimulus den Aufmerksamkeitsfokus von internalen Prozessen ablenkt (Pennebaker & Hoover, 1984). Zukünftige Studien sollten prüfen, welche spezifischen Einsatzmöglichkeiten sich für HTT und aHTT anbieten, hinsichtlich einer akkuraten und ökonomischen Erfassung von IG. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailTraining binary classifiers as data structure invariants
Molina, Facundo; Degiovanni, Renzo Gaston UL; Ponzio, Pablo et al

in Proceedings of the 41st International Conference on Software Engineering ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019)

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and ... [more ▼]

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and training it to identify valid and invalid instances of a data structure. The obtained classifier can then be used in place of the data structure’s invariant, in order to attempt to identify (in)correct behaviors in programs manipulating the structure. In order to produce the valid objects to train the network, an assumed-correct set of object building routines is randomly executed. Invalid instances are produced by generating values for object fields that “break” the collected valid values, i.e., that assign values to object fields that have not been observed as feasible in the assumed-correct program executions that led to the collected valid instances. We experimentally assess this approach, over a benchmark of data structures. We show that this learning technique produces classifiers that achieve significantly better accuracy in classifying valid/invalid objects compared to a technique for dynamic invariant detection, and leads to improved bug finding. [less ▲]

Detailed reference viewed: 67 (3 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 52 (23 UL)
Full Text
Peer Reviewed
See detailVideo Indexing Using Face Appearance and Shot Transition Detection
Cazzato, Dario UL; Leo, Marco; Carcagni, Pierluigi et al

in Proceedings of the IEEE International Conference on Computer Vision Workshops (2019)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Extended Abstract)
Steen, Alexander UL; Benzmüller, Christoph UL

in Benzmüller, Christoph; Stuckenschmidt, Heiner (Eds.) {KI} 2019: Advances in Artificial Intelligence - 42nd German Conference on AI, Kassel, Germany, September 23-26, 2019, Proceedings (2019)

Detailed reference viewed: 44 (1 UL)
Full Text
See detailRobotic assistants in factory routines - the ethical implications
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in RACIR 2019 (2019)

This paper is concerned with the problems which arise when humans are working alongside robotic assistants. The main question which appears is how to define the difference between humans and robots in ... [more ▼]

This paper is concerned with the problems which arise when humans are working alongside robotic assistants. The main question which appears is how to define the difference between humans and robots in terms of characteristics, similarities or differences and how to consequently treat humans and robots in the factory routine. Based on a literature analysis, a common ground for the treatment of human and robotic workforce in the manufacturing industry is established. Subsequently, a framework for their cooperation is deduced and an implementation of the solution suggested. [less ▲]

Detailed reference viewed: 28 (4 UL)
Full Text
Peer Reviewed
See detailConversational Interfaces for Explainable AI: A Human-Centered Approach
Jenzsch, Sophie; Höhn, Sviatlana UL; Hochgeschwender, Nico UL

in Proceedings of EXTRAAMAS 2019 (2019)

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an ... [more ▼]

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an intelligent agent. We propose conversational interfaces (CI) to be the perfect setting, since they are intuitive for humans and computationally processible. While there are many approaches addressing technical issues of this human-agent communication problem, the user perspective appears to be widely neglected. With the purpose of better requirement understanding and identification of implicit expectations from a human-centered view, a Wizard of Oz experiment was conducted, where participants tried to elicit basic information from a pretended artificial agent (What are your capabilities?). The hypothesis that users pursue fundamentally different strategies could be verified with the help of Conversation Analysis. Results illustrate the vast variety in human communication and disclose both requirements of users and obstacles in the implementation of protocols for interacting agents. Finally, we infer essential indications for the implementation of such a CI. [less ▲]

Detailed reference viewed: 84 (3 UL)
Full Text
Peer Reviewed
See detailMart: A Mutant Generation Tool for LLVM
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL

in Titcheu Chekam, Thierry; Papadakis, Mike; Le Traon, Yves (Eds.) Mart: A Mutant Generation Tool for LLVM (2019)

Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites ... [more ▼]

Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites. Mutants creation (generation) tools are often characterized by their mutation operators and the way they create and represent the mutants. This paper presents Mart, a mutants generation tool, for LLVM bitcode, that supports the fine-grained definition of mutation operators (as matching rule - replacing pattern pair; uses 816 defined pairs by default) and the restriction of the code parts to mutate. New operators are implemented in Mart by implementing their matching rules and replacing patterns. Mart also implements in-memory Trivial Compiler Equivalence to eliminate equivalent and duplicate mutants during mutants generation. Mart generates mutant code as separated mutant files, meta-mutants file, weak mutation, and mutant coverage instrumented files. The generated LLVM bitcode files can be interpreted using an LLVM interpreter or compiled into native code. Mart is publicly available (https://github.com/thierry-tct/mart) for use by researchers and practitioners. Mart has been applied to generate mutants for several research experiments and generated more than 4,000,000 mutants. [less ▲]

Detailed reference viewed: 185 (16 UL)
See detailÜberlegungen zur Experimentellen Medienarchäologie
Krebs, Stefan UL

Scientific Conference (2019)

Detailed reference viewed: 6 (2 UL)
Full Text
Peer Reviewed
See detailAnalyzing the Context of Bug-Fixing Changes in the OpenStack Cloud Computing Platform
Cotroneo, Domenico; De Simone, Luigi; Iannillo, Antonio Ken UL et al

in 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) (2019)

Detailed reference viewed: 189 (1 UL)
Full Text
Peer Reviewed
See detailLink budget analysis for satellite-based narrowband IoT systems
Kodheli, Oltjon UL; Maturo, Nicola UL; Andrenacci, Stefano et al

Scientific Conference (2019)

Detailed reference viewed: 175 (37 UL)
Full Text
Peer Reviewed
See detailAutomation, Growth, and Factor Shares in the Era of Population Aging
Irmen, Andreas UL

Scientific Conference (2019)

How does population aging affect factor shares and economic growth in times of declining investment good prices and increasingly automated production processes? The present paper addresses this question ... [more ▼]

How does population aging affect factor shares and economic growth in times of declining investment good prices and increasingly automated production processes? The present paper addresses this question in a new model of automation where competitive firms perform tasks to produce output. Tasks require labor and machines as inputs. New machines embody superior technological knowledge and substitute for labor in the performance of tasks. The incentive to automate is stronger when the expected wage is higher or when the price of an automation investment is lower. Automation is shown to i) boost the aggregate demand for labor if the incentives to automate are strong enough and ii) reduce the labor share. These predictions obtain even though automation is labor-augmenting in the economy’s reduced-form production function. In the short run, population aging weakens the incentives to automate and increases the labor share as individuals augment their labor supply. These implications may be neutralized if, at the same time, the price of investment goods declines. In the log-run, population aging and a lower price of investment goods are reinforcing. Both imply more automation, a lower labor share, and faster economic growth. [less ▲]

Detailed reference viewed: 29 (2 UL)
See detailEvaluation of Stratified Condensation Models for a slightly inclined tube unsing ATHELT Code
Zhang, Yu; Moonesi Shabestary, Amir Hossein; Bieberle, Andre et al

in NURETH-18 (2019)

Detailed reference viewed: 35 (7 UL)
Full Text
See detailReductions of elliptic curves
Perucca, Antonella UL

in Proceedings of the Roman Number Theory Association (2019), 4

Detailed reference viewed: 91 (8 UL)
Full Text
Peer Reviewed
See detailTheoretical Analysis and Implementation of Effective Receivers for Telecommand Space Links
Baldi, Marco; Bertinelli, Massimo; Chiaraluce, Franco et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailThe Quality of Work Index Luxembourg (QoWIL): A multidimensional approach and its links to well-being at work.
Sischka, Philipp UL; Fernandez de Henestrosa, Martha UL; Steffgen, Georges UL

Scientific Conference (2019)

Quality of work is a very often used and complex concept. We will present a new conceptualization of quality of work, compare it with the European Working Conditions Survey framework to measure job ... [more ▼]

Quality of work is a very often used and complex concept. We will present a new conceptualization of quality of work, compare it with the European Working Conditions Survey framework to measure job quality (Eurofund, 2017), and structure it with the help of the Job Demands-Resources model (Bakker & Demerouti, 2017). Based on this conceptualization we developed and validated a new measure of quality of work, the Quality of Work Index – Luxembourg (QoWIL) in three different languages (German, French, Luxembourgish). The QoWIL is composed of 43 items, focusing on four areas of work – work intensity, job design, physical conditions, and social conditions (subdivided in eleven components) – which are particularly important for employees’ well-being. Data were collected via computer-assisted telephone interviews in a representative sample of 1,522 employees working in Luxembourg (aged 17–67 years; 57.2% male). Confirmatory factor analysis confirmed the proposed factors structure and scalar measurement invariance for the three different language versions. Internal consistencies were satisfactory for all subscales (Cronbach’s α between .70 and .87). Correlations and hierarchical regression analysis with different psychological health measures (i.e., burnout, general well-being, psychosomatic complaints, work satisfaction, vigor) and subjective work performance confirmed the construct validity of the new questionnaire. We conclude that the QoWIL is globally and on the level of the sub-categories an effective tool to measure work quality, which could be used to compare work quality between organizations and different countries. Furthermore, the current study confirms associations between the different components of quality of work and employees health. Therefore, this new tool allows to monitor and to benchmark quality of work and health outcomes and compare them with each other, across gender, age, nationality and work sector. [less ▲]

Detailed reference viewed: 37 (4 UL)
See detail"Portante postmoderne"
Raus, Tonia UL

in De Toffoli, Ian; Millim, Anne-Marie (Eds.) Modernismes au Luxembourg. Traditions - Variations - Ruptures (2019)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailThe NAI Suite - Drafting and Reasoning over Legal Texts
Libal, Tomer UL; Steen, Alexander UL

in Araszkiewicz, Michal; Rodriguez-Doncel, Victor (Eds.) Legal Knowledge and Information Systems - JURIX2019: The Thirty-second Annual Conference, Madrid, Spain, December 11-13, 2019 (2019)

Detailed reference viewed: 16 (0 UL)
Peer Reviewed
See detailMental health benefits of a robot-mediated emotional ability training for children with autism: An exploratory study.
Pinto Costa, Andreia UL; Kirsten, Lena; Charpiot, Louise UL et al

Scientific Conference (2019)

Background: Children with Autism Spectrum Disorder (ASD) have a high prevalence of mental health problems that are linked to reduced emotional abilities. Therefore, interventions that teach emotional ... [more ▼]

Background: Children with Autism Spectrum Disorder (ASD) have a high prevalence of mental health problems that are linked to reduced emotional abilities. Therefore, interventions that teach emotional abilities are fundamental for their development. However, existing interventions are costly, of difficult access, or inefficient for children with ASD. Furthermore, children with ASD have a preference for sameness and routines that makes technology, and especially robots, an ideal medium to convey interventions that are suitable to their needs. Objectives: The aim of the present exploratory study is to evaluate whether a robot-mediated emotional ability training is effective in enhancing the emotional ability and the mental health of children with ASD. Methods: Using a pre-post training design, 12 children with ASD (all boys) aged between 8 and 14 years (M = 10.93; SD = 2.46) undertook a 7 week long emotional ability training mediated by a robot. Sessions took place weekly and lasted 1h each. Children were compared before (T1) and after (T2) the training on their emotional ability and their mental health. Emotional ability was measured through the parent-report measures Emotion Regulation Checklist (ERC; Shields & Cicchetti, 1997), Emotion Regulation Rating Scale (ERRS; Carlson & Wang, 2007), Self-Control Rating Scale (SCRS; Kendall & Wilcox, 1979), and the Alexithymia Questionnaire for Children (Rieffe et al., 2006); as well through a direct measure of children’s use of emotion regulation strategies using the Reactive and Regulation Situation Tasks (Carthy et al., 2010). Mental health was measured through the parent-report measures Children Behavior Checklist (CBCL; Achenbach & Rescorla, 2001), Strengths and Difficulties Questionnaire (SDQ; Goodman, 1997), and the Social Responsiveness Scale-2 (SRS-2; Constantino, 2002). Results: It was found that regarding emotional ability, children’s use of emotion regulation strategies in the Reactive and Regulation Situation Task, improved significantly after the training (t(10) = 2.81, p < .01) but no significant improvements were found on the parent-reported measures (ERC: t(10) = 0.43, p = .34; SCRS: t(10) = 1.26, p = .12), except for a marginally significant effect on children’s emotional control (ERRS: t(10) = 1.79, p = .05). Regarding mental health, the training significantly reduced internalizing problems (CBCL: t(11) = 1.91, p < .05; SDQ: t(11) = 3.19, p < .01) and autism-related symptomatology (SRS-2: t(11) = 3.24, p < .01), but did not have an effect on externalizing problems (CBCL: t(11) = 0.41, p = 34; SDQ: t(11) = 3.13, p = 07). Discussion: Overall, the results of the present study are to be interpreted cautiously, they provide restricted evidence of positive effects of the robot-mediated emotional ability training in children’s use of adaptive emotional abilities and in mental health issues such as depressive symptomatology and anxiety as well as autism-related social communication difficulties. This exploratory study contributes to the research progress in the domain of robot-mediated interventions for children with ASD. [less ▲]

Detailed reference viewed: 62 (9 UL)
Full Text
Peer Reviewed
See detail¿Hacia una Verdadera Acción Popular para la Protección del Medioambiente? Una Reflexión a la Luz de la Jurisprudencia Española y Europea
Muñoz, Susana UL

in Murillo, F. Javier; Mesa, Manuela (Eds.) Actas del I Congreso Internacional Derechos Humanos, Democracia, Cultura de Paz y No Violencia (2019)

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European ... [more ▼]

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European human rights law provide interpretative keys in favour of a true actio popularis open to citizens in defence of their individual rights and, ultimately, of environmental justice. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailResources and Competences required at the Institutional Level for a Patient – Healthcare Professional Partnership
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has ... [more ▼]

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has given rise to patients who are active players in their care, and participate in decision-making. Central to these changes, are patients and healthcare professionals’, whose backgrounds and experiences reflect both cultural factors that influence health decisions, and a power shift from professional dominance to a more equitable partnership style. Our study aims to determine resources and competences required at the institutional level to implementing a partnership Semi-structured focus groups with 20 chronic disease patients and interviews with 15 healthcare professionals were conducted. Thematic content analysis was performed with NVivo 12 to categorize verbatim. Items were grouped into dimensions, and themes common to both parties were grouped together. Three major areas emerged: 1) Training to develop a partnership culture - Training healthcare professionals in patient psychology, developing therapeutic education programs for patients and enriching available information with patients’ experiential knowledge. 2) Creation of information / support centers for: Interdisciplinary meetings, facilitating the provision of structured, verified and pertinent information and providing administrative aid to patients. 3) Development of e-health solutions to: Provide information 24/7; facilitate collaborative content creation by healthcare professionals, patients and researchers, and for sharing and updating patient files among professionals. Our findings will help design, implement, monitor and evaluate suitable actions, and help promote sustainable forms of expertise – inclusion of experiential knowledge and resource patients within the healthcare team [less ▲]

Detailed reference viewed: 69 (3 UL)
Full Text
Peer Reviewed
See detailA Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate
Schmitt, Xavier; Kubler, Sylvain; Robert, Jérémy UL et al

in International Conference on Social Networks Analysis, Management and Security (2019)

Detailed reference viewed: 67 (2 UL)
Full Text
Peer Reviewed
See detailPortrait of a Miner in a Landscape
Biryukov, Alex UL; Feher, Daniel UL

in IEEE INFOCOM 2019 Workshop Proceedings (2019)

Mining is one of the core elements of the proof-of-work based cryptocurrency economy. In this paper we investigate the generic landscape and hierarchy of miners on the example of Ethereum and Zcash, two ... [more ▼]

Mining is one of the core elements of the proof-of-work based cryptocurrency economy. In this paper we investigate the generic landscape and hierarchy of miners on the example of Ethereum and Zcash, two blockchains that are among the top 5 in terms of USD value of created coins. Both chains used ASIC resistant proofs-of-work which favors GPU mining in order to keep mining decentralized. This however has changed with recent introduction of ASIC miners for these chains. This transition allows us to develop methods that might detect hidden ASIC mining in a chain (if it exists), and to study how the introduction of ASICs effects the decentralization of mining power. Finally, we describe how an attacker might use public blockchain information to invalidate the privacy of miners, deducing the mining hardware of individual miners and their mining rewards. [less ▲]

Detailed reference viewed: 142 (12 UL)
Full Text
Peer Reviewed
See detailEvaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models
Nejati, Shiva UL; gaaloul, Khouloud; Menghi, Claudio UL et al

in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS ... [more ▼]

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness of models against some given formal properties. In this paper, we present an industrial Simulink model benchmark, provide a categorization of different model types in the benchmark, describe the recurring logical patterns in the model requirements, and discuss the results of applying model checking and model testing approaches to identify requirements violations in the benchmarked models. Based on the results, we discuss the strengths and weaknesses of model testing and model checking. Our results further suggest that model checking and model testing are complementary and by combining them, we can significantly enhance the capabilities of each of these approaches individually. We conclude by providing guidelines as to how the two approaches can be best applied together. [less ▲]

Detailed reference viewed: 129 (34 UL)
Full Text
Peer Reviewed
See detailUsing crowd-sourced data to analyse the ongoing merger of [ɕ] and [ʃ] in Luxembourgish
Gilles, Peter UL

in Calhoun, Sasha; Escudero, Paola; Tabain, Marija (Eds.) et al Proceedings of the 19th International Congress of Phonetic Sciences. Melbourne, Australia (2019)

Similar to neighbouring German varieties, the recent language history of Luxembourgish is subject to an ongoing merger of the alveolopalatal fricative [ɕ] (deriving from the palatal fricative [ç]) and the ... [more ▼]

Similar to neighbouring German varieties, the recent language history of Luxembourgish is subject to an ongoing merger of the alveolopalatal fricative [ɕ] (deriving from the palatal fricative [ç]) and the postalveolar fricative [ʃ], leading progressively to the collapse, for example, of the minimal pair frech [fʀæɕ] 'cheeky, impertinent' and Fräsch [fʀæʃ] 'frog'. The present study will draw on a large dataset— which has been recorded using an innovative smartphone application—consisting of fricative realisations of more than 1,300 speakers. In an acoustic analysis, various parameters of the two fricatives will be studied (Centre of Gravity, spectral moments, Euclidian distance, DCT coefficients) and correlated with the speaker’s age. The results show that the merger is acoustically manifest for nearly all age groups. Only the oldest speakers keep the two fricatives distinct. [less ▲]

Detailed reference viewed: 89 (6 UL)
Full Text
Peer Reviewed
See detailAttack-Tree Series: A Case for Dynamic Attack Tree Analysis
Mauw, Sjouke UL; Gadyatskaya, Olga

in Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19) (2019)

Detailed reference viewed: 20 (1 UL)
Peer Reviewed
See detailDLA: Detecting and Localizing Anomalies in Containerized Microservice Architectures Using Markov Models
Samir, Areeg UL; Pahl, Claus

in Samir, Areeg (Ed.) the 7th International Conference on Future Internet of Things and Cloud (2019)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailPower and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019 (2019)

Detailed reference viewed: 122 (24 UL)
Full Text
Peer Reviewed
See detailArbitrary Ranking of Defeasible Subsumption
Casini, Giovanni UL; Harrison, Michael; Meyer, Thomas et al

in Proceedings of the 32nd International Workshop on Description Logics (2019)

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to ... [more ▼]

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to defeasible reasoning, the so-called KLM approach, is based on constructing specific rankings of defeasible information, and using these rankings to determine priorities in case of conflicting information. Here we propose a procedure that allows us to input any possible ranking of the defeasible concept inclusions contained in the knowledge base. We analyse and investigate the forms of defeasible reasoning obtained when conclusions drawn are obtained using these rankings. [less ▲]

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailDeformation quantization and Kähler geometry with moment maps
Futaki, Akito; La Fuente-Gravy, Laurent UL

in ICCM 2018 Proceedings, Taiwan 27-29 December 2018 (2019)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailTaking Stock of the Bologna Process at 20: The Possibilities and Limits of Soft Law Governance
Harmsen, Robert UL; Deca, Ligia

Scientific Conference (2019)

The Bologna Process stands as both an exemplar of regional cooperation in the higher education policy sector and as a comparatively successful instance of the use of so-called ‘soft law governance’ policy ... [more ▼]

The Bologna Process stands as both an exemplar of regional cooperation in the higher education policy sector and as a comparatively successful instance of the use of so-called ‘soft law governance’ policy instruments. Yet, as this pan-European process now marks two decades of existence, questions are increasingly being posed as to its direction and purpose. Against this background, the present paper seeks to take stock of Bologna as it enters adulthood, drawing on both the substantial body of scholarship that has emerged on the process and practitioner insights to examine its past achievements and current challenges. The paper specifically focuses on recent debates surrounding the (non-)implementation of key commitments; on the functioning of the EHEA as a policy forum in relation to both its own membership and the wider international higher education policy landscape; and on the manner in which the EHEA may respond to increasingly serious challenges to the fundamental values that underpin the process. An overall balance sheet is finally drawn, suggesting the likely direction(s) of the process going forward. [less ▲]

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailLegal Design Patterns: Towards A New Language for Legal Information Design
Rossi, Arianna UL; Ducato, Rossana; Haapio, Helena et al

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) 22nd International Legal Infomatics Symposium IRIS 2019 (2019)

Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to ... [more ▼]

Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to users and easier to prepare. In this paper, we take stock of existing legal design patterns and pattern libraries and present the idea of a legal design pattern language intended to lead to documenting and sharing good practices across disciplines and to more actionable pattern libraries. [less ▲]

Detailed reference viewed: 71 (6 UL)
Full Text
Peer Reviewed
See detailAn Efficient Machine Learning Method to Solve Imbalanced Data in Metabolic Disease Prediction
Cecchini, Vania Filipa UL; Nguyen, Thanh-Phuong UL; Pfau, Thomas UL et al

in Cecchini, Vania Filipa (Ed.) An Efficient Machine Learning Method to Solve Imbalanced Data in Metabolic Disease Prediction (2019)

Detailed reference viewed: 77 (14 UL)
Full Text
Peer Reviewed
See detailA Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the 35th Annual Computer Security Applications Conference (2019)

To protect their digital assets from malware attacks, most users and companies rely on anti-virus (AV) software. But AVs' protection is a full-time task and AVs are engaged in a cat-and-mouse game where ... [more ▼]

To protect their digital assets from malware attacks, most users and companies rely on anti-virus (AV) software. But AVs' protection is a full-time task and AVs are engaged in a cat-and-mouse game where malware, e.g., through obfuscation and polymorphism, denial of service attacks and malformed packets and parameters, try to circumvent AV defences or make them crash. On the other hand, AVs react by complementing signature-based with anomaly or behavioral detection, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-act, for instance by using adversarial inputs to avoid detection, et cetera. This paper investigates two novel moves for the malware side. The first one consists in simulating mouse events to control AVs, namely to send them mouse "clicks" to deactivate their protection. We prove that many AVs can be disabled in this way, and we call this class of attacks Ghost Control. The second one consists in controlling high-integrity white-listed applications, such as Notepad, by sending them keyboard events (such as "copy-and-paste") to perform malicious operations on behalf of the malware. We prove that the anti-ransomware protection feature of some AVs can be bypassed if we use Notepad as a "puppet" to rewrite the content of protected files as a ransomware would do. Playing with the words, and recalling the cat-and-mouse game, we call this class of attacks Cut-and-Mouse. [less ▲]

Detailed reference viewed: 36 (6 UL)
Full Text
Peer Reviewed
See detailAutomated Reasoning with Complex Ethical Theories--A Case Study Towards Responsible AI
Fuenmayor, David; Benzmüller, Christoph UL

in 16th International Congress on Logic, Methodology and Philosophy of Science and Technology (CLMPST 2019) --- Bridging across Academic Cultures, Book of Abstracts (2019)

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailA non-invasive tool for attention-deficit disorder analysis based on gaze tracks
Cazzato, Dario UL; Castro, Silvia M.; Agamennoni, Osvaldo et al

in Proceedings of the 2nd International Conference on Applications of Intelligent Systems (2019)

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailControlling large Boolean networks with temporary and permanent perturbations
Su, Cui; Paul, Soumya UL; Pang, Jun UL

in Proceedings of the 23rd International Symposium on Formal Methods (FM'19) (2019)

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailA Query System for Extracting Requirements-related Information from Legal Texts
Sleimi, Amin UL; Ceci, Marcello UL; Sannier, Nicolas UL et al

in Proceedings of the 27th IEEE International Requirements Engineering Conference (RE'19), pp. 319-329 (2019)

Searching legal texts for relevant information is a complex and expensive activity. The search solutions offered by present-day legal portals are targeted primarily at legal professionals. These solutions ... [more ▼]

Searching legal texts for relevant information is a complex and expensive activity. The search solutions offered by present-day legal portals are targeted primarily at legal professionals. These solutions are not adequate for requirements analysts whose objective is to extract domain knowledge including stakeholders, rights and duties, and business processes that are relevant to legal requirements. Semantic Web technologies now enable smart search capabilities and can be exploited to help requirements analysts in elaborating legal requirements. In our previous work, we developed an automated framework for extracting semantic metadata from legal texts. In this paper, we investigate the use of our metadata extraction framework as an enabler for smart legal search with a focus on requirements engineering activities. We report on our industrial experience helping the Government of Luxembourg provide an advanced search facility over Luxembourg’s Income Tax Law. The experience shows that semantic legal metadata can be successfully exploited for answering requirements engineering-related legal queries. Our results also suggest that our conceptualization of semantic legal metadata can be further improved with new information elements and relations. [less ▲]

Detailed reference viewed: 375 (34 UL)
Full Text
Peer Reviewed
See detailOff-line Correlator for Antenna Array Over Long Baselines
Ardito, Alessandro; Abelllo, Ricard; Aroumont, Anbazhagan et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailRobotic trajectory tracking: Bio-inspired position and torque control
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in Procedia CIRP (2019)

As far as complex contact-based manufacturing tasks are concerned, humans outperform machines. Indeed, conventionally controlled robotic manipulators are limited to basic applications in close to ideal ... [more ▼]

As far as complex contact-based manufacturing tasks are concerned, humans outperform machines. Indeed, conventionally controlled robotic manipulators are limited to basic applications in close to ideal circumstances. However, tedious work in hazardous environments, make some tasks unsuitable for humans. Therefore, the interest in expanding the application-areas of robots arose. This paper employs a bottom-up approach to develop robust and adaptive learning algorithms for trajectory tracking: position and torque control in the presence of uncertainties and switching constraints. The robotic manipulators mimicking the human behavior based on bio-inspired algorithms, take advantage of their know-how. Simulations and experiments validate the concept-performance. [less ▲]

Detailed reference viewed: 37 (3 UL)
Full Text
Peer Reviewed
See detailDetecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system
Stojkovski, Borce UL; Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security ... [more ▼]

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security analysis allows for a new class of security properties in terms of misalignments between the system’s technical guarantees and the user’s impressions of them. For instance, a property that we call “false sense of insecurity” identifies a situation in which a secure system injects uncertainty in users, thus improperly transmitting the degree of protection that it actually provides; another, which we call “false sense of security”, captures situations in which a system instills a false sense of security beyond what a technical analysis would justify. Both situations leave room for attacks. In this paper we propose a model to define and reason about such socio-technical misalignments. The model refers to and builds on the concept of security ceremonies, but relies on user experience notions and on security analysis techniques to put together the information needed to verify misalignment properties about user’s impressions and system’s security guarantees. We discuss the innovative insight of this pilot model for a holistic understanding of a system’s security. We also propose a formal model that can be used with existing model checkers for an automatic analysis of misalignments. We exemplify the approach by modelling one specific application for end-to-end email encryption within which we analyze a few instances of misalignment properties. [less ▲]

Detailed reference viewed: 175 (43 UL)
Peer Reviewed
See detailA Radio Drama to Tell the History of 3D Recording Technology
Krebs, Stefan UL

Scientific Conference (2019)

Detailed reference viewed: 11 (0 UL)
Full Text
See detailThe LuNa Open Toolbox for the Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in Perner, Petra (Ed.) Advances in Data Mining, Applications and Theoretical Aspects, Poster Proceedings 2019 (2019)

Despite some recent work, the ongoing research for the processing of Luxembourgish is still largely in its infancy. While a rich variety of linguistic processing tools exist, especially for English, these ... [more ▼]

Despite some recent work, the ongoing research for the processing of Luxembourgish is still largely in its infancy. While a rich variety of linguistic processing tools exist, especially for English, these software tools offer little scope for the Luxembourgish language. LuNa (a Tool for Luxembourgish National Corpus) is an Open Toolbox that allows researchers to annotate a text corpus written in Luxembourgish language and to build/query an annotated corpus. The aim of the paper is to demonstrate the components of the system and its usage for Machine Learning applications like Topic Modelling and Sentiment Detection. Overall, LuNa bases on a XML-database to store the data and to define the XML scheme, it offers a Graphical User Interface (GUI) for a linguistic data preparation such as tokenization, Part-Of-Speech tagging, and morphological analysis -- just to name a few. [less ▲]

Detailed reference viewed: 136 (16 UL)
Full Text
Peer Reviewed
See detailSUBJECTIVE AGING: SOMETHING UNIQUE OR JUST ANOTHER EXPRESSION OF GENERAL SELF-BELIEFS?
Klusmann, Verena; Spuling, Svenja M.; Bowen, Catherine E. et al

in Innovation in Aging (2019), 3(Supplement_1), 786-787

Using data from the German Ageing Survey (adults aged 40‒85), this study tested the convergent and discriminant validity of subjective aging measures by comparing three different measures of subjective ... [more ▼]

Using data from the German Ageing Survey (adults aged 40‒85), this study tested the convergent and discriminant validity of subjective aging measures by comparing three different measures of subjective aging with one another and relating them to established measures of general self-beliefs (optimism, self-efficacy, subjective health) and subjective well-being (depression, affect). Correlations between subjective aging measures ranged from ‒.61 (amongst general self-perceptions of aging measures) to ‒.09, with subjective age being least related to the other measures. The highest overlap was observed between optimism and global self-perceptions of aging (.69) and it was for these global self-perceptions that the highest amount of variance could be explained by correlates in a regression analysis (R-square=.55). In contrast, only 10% of variance could be explained for subjective age. Our results underline the merit of taking the multidimensional nature of subjective aging into account since global measures appear less distinct from general personality traits. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailEffects of acute yohimbine administration on interoception in major depression and childhood adversity
Kuehl, L. K.; Deuter, C. E.; Breden, I.-H. et al

in Psychoneuroendocrinology (2019), 107(Supplement 1), 4

Acute stress, release of stress hormones and chronic stress can affect the processing of visceral-afferent neural signals at different brain levels, which are important for interoception. However, it ... [more ▼]

Acute stress, release of stress hormones and chronic stress can affect the processing of visceral-afferent neural signals at different brain levels, which are important for interoception. However, it remains unclear if these effects are due to activation of the sympatho-adreno-medullary (SAM) axis or hypothalamicpituitary adrenocortical (HPA) axis. With this study, we aimed to investigate the selective effect of SAM axis activation on interoceptive accuracy. Central alpha2-adrenergic receptors represent a negative feedback mechanism of the SAM axis. For major depressive disorder (MDD) and adverse childhood experiences (ACE), alterations in the biological stress systems, including density and sensitivity of central alpha2-adrenergic receptors, have been shown. Healthy individuals without ACE (n = 46), healthy individuals with ACE (n = 23), patients with MDD and without ACE (n = 26) and patients with MDD with ACE (n = 22, all without antidepressant medication) were tested after oral administration of 10mg of yohimbine (alpha2-adrenergic receptors antagonist) and placebo administration in a repeated measures design. Interoceptive accuracy and sensibility were assessed in a heartbeat tracking task. Increases in systolic and diastolic blood pressure after yohimbine administration in all groups confirmed successful activation of the SAM axis. Interoceptive accuracy decreased after yohimbine intake only in the healthy group with ACE, but remained unchanged in all other groups. This ‘group’בdrug’ interaction effect may be due to selective up-regulation of alpha2- adrenergic receptors after experience of childhood trauma, which reduces capacity for attention focus on heartbeats. Suppressed processing of physical sensations in stressful situations may represent an adaptive response in healthy individuals with childhood adversity. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailThe Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Steichen, Mathis UL; State, Radu UL

in USENIX Security Symposium, Santa Clara, 14-16 August 2019 (2019)

Modern blockchains, such as Ethereum, enable the execution of so-called smart contracts - programs that are executed across a decentralised network of nodes. As smart contracts become more popular and ... [more ▼]

Modern blockchains, such as Ethereum, enable the execution of so-called smart contracts - programs that are executed across a decentralised network of nodes. As smart contracts become more popular and carry more value, they become more of an interesting target for attackers. In the past few years, several smart contracts have been exploited by attackers. However, a new trend towards a more proactive approach seems to be on the rise, where attackers do not search for vulnerable contracts anymore. Instead, they try to lure their victims into traps by deploying seemingly vulnerable contracts that contain hidden traps. This new type of contracts is commonly referred to as honeypots. In this paper, we present the first systematic analysis of honeypot smart contracts, by investigating their prevalence, behaviour and impact on the Ethereum blockchain. We develop a taxonomy of honeypot techniques and use this to build HoneyBadger - a tool that employs symbolic execution and well defined heuristics to expose honeypots. We perform a large-scale analysis on more than 2 million smart contracts and show that our tool not only achieves high precision, but is also highly efficient. We identify 690 honeypot smart contracts as well as 240 victims in the wild, with an accumulated profit of more than $90,000 for the honeypot creators. Our manual validation shows that 87% of the reported contracts are indeed honeypots. [less ▲]

Detailed reference viewed: 122 (13 UL)
Peer Reviewed
See detailDas Ende der Reparaturarbeit?
Krebs, Stefan UL

Scientific Conference (2019)

Detailed reference viewed: 54 (7 UL)
Full Text
See detailAutomation, Growth, and Factor Shares in the Era of Population Aging
Irmen, Andreas UL

Scientific Conference (2019)

How does population aging affect factor shares and economic growth in times of declining investment good prices and increasingly automated production processes? The present paper addresses this question ... [more ▼]

How does population aging affect factor shares and economic growth in times of declining investment good prices and increasingly automated production processes? The present paper addresses this question in a new model of automation where competitive firms perform tasks to produce output. Tasks require labor and machines as inputs. New machines embody superior technological knowledge and substitute for labor in the performance of tasks. The incentive to automate is stronger when the expected wage is higher or when the price of an automation investment is lower. Automation is shown to i) boost the aggregate demand for labor if the incentives to automate are strong enough and ii) reduce the labor share. These predictions obtain even though automation is labor-augmenting in the economy’s reduced-form production function. In the short run, population aging weakens the incentives to automate and increases the labor share as individuals augment their labor supply. These implications may be neutralized if, at the same time, the price of investment goods declines. In the log-run, population aging and a lower price of investment goods are reinforcing. Both imply more automation, a lower labor share, and faster economic growth. [less ▲]

Detailed reference viewed: 15 (0 UL)
Peer Reviewed
See detailThe Development of Repair Businesses in Esch-sur-Alzette
Krebs, Stefan UL

Scientific Conference (2019)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailA graph-based approach to explore relationship between hashtags and images
Zhong, Zhiqiang UL; Zhang, Yang; Pang, Jun UL

in Proceedings of the 20th International Conference on Web Information System Engineering (2019)

Detailed reference viewed: 52 (2 UL)
Peer Reviewed
See detailA Containerized Big Data Streaming Architecture for Edge Cloud Computing on Clustered Single-Board Devices
Scolati, Remo; Fronza, Ilenia; Ioini, Nabil El et al

in Samir, Areeg (Ed.) A Containerized Big Data Streaming Architecture for Edge Cloud Computing on Clustered Single-Board Devices (2019)

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Vulnerability Prediction of Open-Source Software Releases
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailA Decade of Featured Transition Systems
Cordy, Maxime UL; Devroey, Xavier; Legay, Axel et al

in From Software Engineering to Formal Methods and Tools, and Back - Essays Dedicated to Stefania Gnesi on the Occasion of Her 65th Birthday (2019)

Detailed reference viewed: 20 (2 UL)
Full Text
Peer Reviewed
See detailÆGIS: Smart Shielding of Smart Contracts
Ferreira Torres, Christof UL; Steichen, Mathis UL; Norvill, Robert UL et al

Poster (2019)

In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were pro ... [more ▼]

In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were pro- posed to detect vulnerable smart contracts, they all fail to protect contracts that have already been deployed on the blockchain. More- over, they focus on vulnerabilities, but do not address scams (e.g., honeypots). In this work, we introduce ÆGIS, a tool that shields smart contracts and users on the blockchain from being exploited. To this end, ÆGIS reverts transactions in real-time based on pat- tern matching. These patterns encode the detection of malicious transactions that trigger exploits or scams. New patterns are voted upon and stored via a smart contract, thus leveraging the benefits of tamper-resistance and transparency provided by blockchain. By allowing its protection to be updated, the smart contract acts as a smart shield. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailCache-Aided Massive MIMO: Linear Precoding Design and Performance Analysis
Wei, Xiao; Xiang, Lin UL; Cottatellucci, Laura et al

in Proc. IEEE ICC 2019 (2019)

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular ... [more ▼]

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular communications. In addition to reaping the conventional advantages of caching and massive MIMO, the proposed scheme also exploits the side information provided by cached files for interference cancellation at the receivers. This interference cancellation increases the degrees of freedom available for precoding design. In addition, the power freed by the cache-enabled offloading can benefit the transmissions to the users requesting non-cached files. The resulting performance gains are not possible if caching and massive MIMO are designed separately. We analyze the performance of cache-aided massive MIMO for cache-dependent maximum-ratio transmission (MRT), zero-forcing (ZF) precoding, and regularized zero-forcing (RZF) precoding. Lower bounds on the ergodic achievable rates are derived in closed form for MRT and ZF precoding. The ergodic achievable rate of RZF precoding is obtained for the case when the numbers of transmit antennas and users are large but their ratio is fixed. Compared to conventional massive MIMO, the proposed cache-aided massive MIMO scheme achieves a significantly higher ergodic rate especially when the number of users approaches the number of transmit antennas. [less ▲]

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailGraph-based malicious login events investigation
Amrouche, Faouzi UL; Lagraa, Sofiane UL; Kaiafas, Georgios UL et al

in Amrouche, Faouzi; Lagraa, Sofiane; Kaiafas, Georgios (Eds.) et al 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 117 (21 UL)
Full Text
Peer Reviewed
See detailAn offline dictionary attack against zkPAKE protocol
Lopez Becerra, José Miguel UL; Ryan, Peter UL; Sala, Petra UL et al

in An offline dictionary attack against zkPAKE protocol (2019)

Password Authenticated Key Exchange (PAKE) allows a user to establish a secure cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security require- ments of ... [more ▼]

Password Authenticated Key Exchange (PAKE) allows a user to establish a secure cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security require- ments of PAKE is to prevent o ine dictionary attacks. In this paper, we revisit zkPAKE, an augmented PAKE that has been recently proposed by Mochetti, Resende, and Aranha (SBSeg 2015). Our work shows that the zkPAKE protocol is prone to o ine password guess- ing attack, even in the presence of an adversary that has only eavesdrop- ping capabilities. Results of performance evaluation show that our attack is practical and e cient.Therefore, zkPAKE is insecure and should not be used as a password-authenticated key exchange mechanism. [less ▲]

Detailed reference viewed: 116 (9 UL)
Full Text
See detailDas Verhältnis zwischen Hochschule und Wissenschaft in Deutschland: Expansion – Produktion – Kooperation
Dusdal, Jennifer UL; Oberg, Achim; Powell, Justin J W UL

in Burzan, Nicole (Ed.) Komplexe Dynamiken globaler und lokaler Entwicklungen: Der Verhandlungsband des 39. Kongresses der Deutschen Gesellschaft für Soziologie vom 24.-28. September 2018 an der Georg-August-Universität Göttingen (2019)

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten ... [more ▼]

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten Produzenten wissenschaftlichen Wissen seit 1900. Folgende Forschungsfragen sollen beantwortet werden: Wie haben institutionalisierte Strukturen, und darin verschiedene Organisationsformen, die langfristige Entwicklung wissenschaftlicher Produktivität beeinflusst und verändert? In welchen organisationalen Netzwerken entwickelt sich aktuell die Wissenschaft weiter? Die Annäherung an den Forschungsgegenstand erfolgt auf der Makroebene anhand von Indikatoren zur Erfassung der globalen Expansion, Kooperation und Produktion der Wissenschaft. Vor dem Hintergrund dieses Untersuchungsrahmens wird dann auf der Mesoebene das Zusammenspiel von Organisationsformen in Deutschland mittels netzwerkanalytischer Verfahren betrachtet. Ziel des Beitrags ist, die Orte und institutionellen Settings wissenschaftlicher Produktion zu identifizieren und anhand ihrer Aufgaben und Ziele voneinander abzugrenzen sowie ihre Beziehungen zueinander herauszuarbeiten. Als theoretische Basis werden neo-institutionalistische Ansätze zur Untersuchung und Erklärung der Expansion des Hochschulwesens und der Wissenschaft und zur Analyse von organisationalen Netzwerken herangezogen. Grundlage der empirischen Analyse bilden Publikationen in peer-reviewed Zeitschriften als Kennzeichen wissenschaftlicher Produktion. [less ▲]

Detailed reference viewed: 116 (23 UL)
See detailMesa Redonda: 2018 - Año de elecciones: Brasil, Colombia y México/ 2018
Harnoncourt, Julia UL; Molden, Berthold; Echivarria, Josefina

Scientific Conference (2019)

Detailed reference viewed: 6 (0 UL)
Full Text
See detailMotivations & barriers of companies for shifting towards circularity
Hild, Paula UL

Poster (2019)

The research follows a qualitative research approach, including 16 exploratory and 50 semi-structured expert interviews with representatives from the building sector and automotive supply firms. The ... [more ▼]

The research follows a qualitative research approach, including 16 exploratory and 50 semi-structured expert interviews with representatives from the building sector and automotive supply firms. The preliminary results put forward the interdependence of the actors’ perception of what would mean a circular economy model for Luxembourg. They also reveal the firm’s specific role in this system. The decision of a business actor to implement a circular economy practice depends primarily on its return on investment, the general regulatory pressure and the maturity of the industry and the company. In general, the hindrance for circularity is not the absence of a technological or technical solution. Besides, the sophistication of the firm given its awareness for concepts like the circular economy, sustainable development, or sustainability shapes its vision for the future in this field actively. As a push for action, interviewees suggested a regulatory framework for circularity. [less ▲]

Detailed reference viewed: 72 (3 UL)
Full Text
Peer Reviewed
See detailTwo-stage RGB-based Action Detection using Augmented 3D Poses
Papadopoulos, Konstantinos UL; Ghorbel, Enjie UL; Baptista, Renato UL et al

in 18th International Conference on Computer Analysis of Images and Patterns SALERNO, 3-5 SEPTEMBER, 2019 (2019)

In this paper, a novel approach for action detection from RGB sequences is proposed. This concept takes advantage of the recent development of CNNs to estimate 3D human poses from a monocular camera. To ... [more ▼]

In this paper, a novel approach for action detection from RGB sequences is proposed. This concept takes advantage of the recent development of CNNs to estimate 3D human poses from a monocular camera. To show the validity of our method, we propose a 3D skeleton-based two-stage action detection approach. For localizing actions in unsegmented sequences, Relative Joint Position (RJP) and Histogram Of Displacements (HOD) are used as inputs to a k-nearest neighbor binary classifier in order to define action segments. Afterwards, to recognize the localized action proposals, a compact Long Short-Term Memory (LSTM) network with a de-noising expansion unit is employed. Compared to previous RGB-based methods, our approach offers robustness to radial motion, view-invariance and low computational complexity. Results on the Online Action Detection dataset show that our method outperforms earlier RGB-based approaches. [less ▲]

Detailed reference viewed: 117 (10 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in Springer Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). (2019)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 665 (48 UL)
Full Text
Peer Reviewed
See detailRigor or rhetoric: Public philosopher and public in dialogue
Burks, Deven UL

in Perspectives: international postgraduate journal of philosophy (2019), 9(1), 1-10

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but ... [more ▼]

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but only sophisticated method, they nevertheless fail to realize that said method does not resonate with the very public whom they purport to help. For, with the second, that method does not engage the emotivist and tribalist cast of contemporary public discourse: emotivist because a person’s moral and political beliefs are a function of emotional attitudes or affective responses for which she adduces reasons post hoc; tribalist because the person tracks not the inferential relation between beliefs but her similarity with interlocutors. In order to understand the full extent of this critique, it is necessary, first, to parse strands of public philosophy, distinct discursive sites, and pictures of philosophical practice and, then, to probe the critique’s empirical groundedness and intended scope. These elements in place, it is then possible to sketch public philosophy reconceived along Leiter’s lines as equal part rigor and rhetoric. That sketch may be somewhat filled out through two tactics employed in Jeffrey Stout’s (2004, 2010) work. These form part of a toolkit for philosophical dialogue whereby philosophers get a discursive grip on non-discursive factors underlying public discourse and push back on Leiter's dilemma. [less ▲]

Detailed reference viewed: 84 (3 UL)
Full Text
Peer Reviewed
See detailOn Domination and Control in Strategic Ability (Extended Abstract)
Kurpiewski, Damian; Knapik, Michal; Jamroga, Wojciech UL

in Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC) (2019)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailFrom Classical to Non-monotonic Deontic Logic Using ASPIC+
Dong, Huimin; Liao, Beishui; Markovich, Réka UL et al

in Logic, Rationality, and Interaction - 7th International Workshop LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings (2019)

In this paper we use formal argumentation to design non-monotonic deontic logics, based on two monotonic deontic logics. In particular, we use the structured argumentation theory ASPIC􀀀 to define non ... [more ▼]

In this paper we use formal argumentation to design non-monotonic deontic logics, based on two monotonic deontic logics. In particular, we use the structured argumentation theory ASPIC􀀀 to define non-monotonic variants of well-understood modal logics. We illustrate the approach using argumentation about free-choice permission. [less ▲]

Detailed reference viewed: 26 (0 UL)
See detailProducing a binaural radio play on the history of 3D sound recording
Krebs, Stefan UL

Scientific Conference (2019)

Detailed reference viewed: 61 (4 UL)
Full Text
Peer Reviewed
See detailSomatoforme Symptome: Zusammenhänge mit Low-Frequency-Herzratenvariabilität und Selbstberichte zu chronischem psychosozialen Stress, aber nicht mit HPA-Achsen-Aktivität
Hansen, G.; Larra, M. F.; Vögele, Claus UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Nach dem Perception-Filter-Modell der somatoformen Störungen (Rief & Barsky, 2005) könnte verstärkte Signalübermittlung von Körperorganen zur Symptomentstehung beitragen. Dabei wurden insbesondere das ... [more ▼]

Nach dem Perception-Filter-Modell der somatoformen Störungen (Rief & Barsky, 2005) könnte verstärkte Signalübermittlung von Körperorganen zur Symptomentstehung beitragen. Dabei wurden insbesondere das sympathische Nervensystem und die HPA-Achse als primäre physiologische Stressachsen diskutiert. Aufgrund hoher Heterogenität somatoformer Störungen ist die Befundlage zu beiden Achsen jedoch gemischt, was dafürspricht, größere Populationen ohne Multi-Komorbidität zu untersuchen. Bei einer studentischen Stichprobe (N=217; 113 w; Alter: 18-33 [M=23.0; SD=2.9] Jahre; BMI=22.2 [SD=2.8]) wurden selbstberichteter chronischer Stress (Trierer Inventar für Chronischen Stress/TICS) und somatoforme Symptome (Screening für Somatoforme Störungen/SOMS-2) erhoben. Alle Probanden lieferten Cortisol- Aufwachreaktionen (Erwachen, +15,+30,+45,+60 Min.) an zwei aufeinanderfolgenden Tagen, sowie ein Cortisol-Tagesprofil. Zusätzlich wurde im Labor in einer 10-minütigen Ruhemessung EKG zur Bestimmung der Ruhe-Herzratenvariabilität (RMSSD, pNN50, SDNN; Low- und High-Frequency) als Indikatoren des zentralen sympathischen und parasympathischen Tonus erfasst. Diejenigen TICS-Skalen, die psychosozialen Stress reflektieren, sowie „Chronische Besorgnis“ waren zwischen r=.16 und .26 mit somatoformen Symptomen korreliert. Die Skala „Chronische Besorgnis“ korrelierte außerdem positiv mit dem Tagescortisolspiegel (r=.19), sowie negativ mit SDNN (r=-.20), RMSSD (r=-.17), pNN50 (r=-.17), LF-Power (r=-.19) und HF-Power (r=-.16; alle ps < .05). Somatoforme Symptome korrelierten hingegen nicht mit Indikatoren der physiologischen Stressachsen. In einem Regressionsmodell mit Somatisierungsindex als Kriterium zeigte sich nur für die TICS-Skalen „Mangel an sozialer Anerkennung“ (b=.19) und „Chronische Besorgnis“ (b=.25), sowie LF-HRV (b=.20) signifikante Vorhersagekraft. Die Annahmen des Perception-Filter-Modells konnten nur hinsichtlich des sympathischen Nervensystems bestätigt werden, was daher als Frühindikator für somatoforme Störungen betrachtet werden könnte. Dennoch sind selbstberichteter chronischer Stress, vor allem „Besorgnis“, bei gesunden Probanden die stärksten Prädiktoren für somatoforme Symptome. [less ▲]

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailTRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL

in Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society (2019)

Detailed reference viewed: 48 (5 UL)
See detailThat Escalated Quickly: The Cyber-ASAT Conundrum
Blount, Percy UL

in Blount, Percy; Masson-Zwaan, Tanja; Moro-Aguilar, Rafael (Eds.) et al 2018 Proceedings of the IISL (2019)

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailBlockchain-based Micropayment Systems: Economic Impact
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in ACM IDEAS '19 Proceedings of the 23rd International Database Engineering & Applications Symposium (2019)

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology ... [more ▼]

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology includes the divisible nature of a cryptocurrency, that can facilitate payments in fractions of a cent, enabling micropayments through the blockchain. Micropayments are a critical tool to enable financial inclusion and to aid in global poverty alleviation. The paper conducts a study on the economic impact of blockchain-based micropayment systems, emphasizing their significance for socioeconomic benefit and financial inclusion. The paper also highlights the contribution of blockchain-based micropayments to the cybercrime economy, indicating the critical need of economic regulations to curtail the growing threat posed by the digital payment mechanism. [less ▲]

Detailed reference viewed: 171 (15 UL)
Full Text
Peer Reviewed
See detailProactive Legal Design: Embedding Values in the Design of Legal Artefacts
Rossi, Arianna UL; Haapio, Helena

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) International Legal Infomatics Symposium IRIS 2019 (2019)

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an ... [more ▼]

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an interdisciplinary and proactive approach to law, covering not only legal information and documents, but also legal services, processes, and systems. This paper introduces Legal Design in the context of forward-looking Legal Tech, especially through the lenses of data protection, and analyses the analogies among Value-Sensitive Design, Proactive Law, and Privacy by Design. [less ▲]

Detailed reference viewed: 53 (3 UL)
Full Text
Peer Reviewed
See detailRisk-Limiting Tallies
Jamroga, Wojciech UL; Roenne, Peter UL; Ryan, Peter UL et al

in Electronic Voting: Proceedings of E-Vote-ID (2019)

Detailed reference viewed: 10 (3 UL)
Full Text
Peer Reviewed
See detailA Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in Emerging Technologies for Authorization and Authentication (2019)

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome ... [more ▼]

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome for the average user. To make more accessible the use of encrypted email, a secure email application named pEp automates the key management operations; pEp still requires the users to carry out the verification, however, the authentication process is simple: users have to compare familiar words instead of strings of random characters, then the application shows the users what level of trust they have achieved via colored visual indicators. Yet, users may not execute the authentication ceremony as intended, pEp's trust rating may be wrongly assigned, or both. To learn whether pEp's trust ratings (and the corresponding visual indicators) are assigned consistently, we present a formal security analysis of pEp's authentication ceremony. From the software implementation in C, we derive the specifications of an abstract protocol for public key distribution, encryption and trust establishment; then, we model the protocol in a variant of the applied pi calculus and later formally verify and validate specific privacy and authentication properties. We also discuss alternative research directions that could enrich the analysis. [less ▲]

Detailed reference viewed: 100 (21 UL)
Full Text
Peer Reviewed
See detailExperimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks
Turcanu, Ion UL; Adamsky, Florian; Engel, Thomas UL

in IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (2019)

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision ... [more ▼]

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision requires the knowledge of the current state of the road traffic, which can be obtained by collecting Floating Car Data (FCD) information using Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p standard. Most of the existing FCD collection protocols have been evaluated via simulations and mathematical models, while the real-world implications have not been thoroughly investigated. This paper presents an open-source implementation of two state-of-the-art FCD collection algorithms, namely BASELINE and DISCOVER. These algorithms are implemented in an open-source vehicular prototyping platform and validated in a real-world experimental setup. [less ▲]

Detailed reference viewed: 132 (31 UL)
Full Text
Peer Reviewed
See detailSome Things are Easier for the Dumb and the Bright Ones (Beware the Average!)
Jamroga, Wojciech UL; Knapik, Michal

in Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (2019)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailNatural Strategic Ability under Imperfect Information
Jamroga, Wojciech UL; Malvone, Vadim; Murano, Aniello

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailPhase field modeling of crack initiation and propagation under complex loading
Nguyen, Thanh Tung UL; Yvonnet, Julien; Waldmann, Danièle UL

in International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2019)

Detailed reference viewed: 63 (17 UL)
Full Text
Peer Reviewed
See detailDéveloppement d'une échelle de mesure de l'engagement scolaire des élèves en classe
Milmeister, Paul UL; Kerger, Sylvie UL; Poncelet, Débora UL et al

in Actes du 31e colloque de l’ADMEE Europe (2019)

Detailed reference viewed: 69 (0 UL)
Full Text
Peer Reviewed
See detailKlostervogtei zwischen monastischem Diskurs und bilateraler Aushandlung am Beispiel des zentralen lotharingischen Raums (10. – Anfang 12. Jahrhundert)
Margue, Michel UL

in Adermann, Kurt; Bünz, Enno (Eds.) Kirchenvogtei und adlige Herrschaftsbildung im europäischen Mittelalter (2019)

Within the Lotharingian space, the role played by advocacy in the shaping of princely territories from the tenth to the eleventh century has been viewed as fundamental by ancient studies sharing a ... [more ▼]

Within the Lotharingian space, the role played by advocacy in the shaping of princely territories from the tenth to the eleventh century has been viewed as fundamental by ancient studies sharing a juridical and institutional perspective. However, a recent reassessment of relationships between nobility and monasteries, makes necessary a re-evaluation of the links between advocates and monasteries. Our rereading is carried out in three steps: a critical view on the historiography of advocacy, a deconstruction of the monastic discourse on advocates and a fresh look at the links between comital advocates and abbey and on advocacy as a space of bilateral negotiation. The dominant discourse on the advocacy’s evolution has led to the development of an image from an institutional perspective, starting with its Carolingian origins and the « advocates-agents » of the central power (« Beamtenvogtei »), then moving to the ducal and comital advocates during the eleventh and twelfth centuries (« Edelvogtei » or « Herrenvogtei »), leading to the progressive abandonment of advocacy in the course of the last three centuries of the Middle Ages. To oversimplify, advocacy is pictured as an institution (« Rechtsinstitut ») with well-defined normative and juridical characteristics. However, its socio-cultural aspects, viewed in the larger context of relationships between nobility and regular clergy, remain neglected. As a result, advocacy is frequently perceived negatively as a source of conflicts with monasteries. It was in the course of the second half of the eleventh century that was born the image of a society polarised between a reformed monastic environment attempting at freeing itself from the laity and « usurping » counts-advocates « oppressors » of monks and rural communities. It then developed before entering modern and contemporary historiography. One needs to relativize and nuance such views, on the one hand by deconstructing the monastic discourse, by disclosing its strategies, and, on the other, by taking a wider look at other socio-cultural links between advocates and monasteries for which they ensure protectio. Indeed, the polarizing discourse carried by monastic sources hide many instances of positive representation of ducal and comital advocates, particularly between the middle of the tenth century and the middle of the twelfth, pertaining to the « high » advocacy exerted by dukes and counts. It is only with the development of the « inferior » advocacy (“Untervogtei”), which occurred in the beginning of the twelfth century, that advocacy started to be portrayed as a plague to be fought. One must therefore view the usage of that negative image of the advocate in terms of a strategy adopted by monasteries, aiming at permanently renegotiate rights between the two parts in the management of monastic patrimony. The analysis of links between the advocates and their monasteries necessitates taking into account elements that are at the same time complex and of various orders: social features such as the seigniorial world’s social and political hierarchy, economical factors such as the evolution of monastic lordship, religious factors such as memoria shared between monks and prominent laypeople. By taking into account other actors such as central power, ministerials and representatives of rural communities, the so-called gradual regulations of the advocates’ rights appear more like parts of exchange processes, of (re)negotiations or strengthening of common interests, shared between the lay and the monastic worlds. [less ▲]

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the Third Central European Cybersecurity Conference (2019)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 109 (33 UL)
Full Text
Peer Reviewed
See detailSatellite Links Integrated in 5G SDN-enabled Backhaul Networks: An Iterative Joint Power and Flow Assignment
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in European Signal Processing Conference (EUSIPCO), A Coruna, Spain, Sept. 2019 (2019)

Detailed reference viewed: 85 (10 UL)
Full Text
Peer Reviewed
See detailAutomated Search for Configurations of Deep Neural Network Architectures
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in Automated Search for Configurations of Convolutional Neural Network Architectures (2019)

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as ... [more ▼]

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the variability of DNN architectures with a Feature Model (FM) that generalizes over existing architectures. Each valid configuration of the FM corresponds to a valid DNN model that can be built and trained. Second, we implement, on top of Tensorflow, an automated procedure to deploy, train and evaluate the performance of a configured model. Third, we propose a method to search for configurations and demonstrate that it leads to good DNN models. We evaluate our method by applying it on image classification tasks (MNIST, CIFAR-10) and show that, with limited amount of computation and training, our method can identify high-performing architectures (with high accuracy). We also demonstrate that we outperform existing state-of-the-art architectures handcrafted by ML researchers. Our FM and framework have been released to support replication and future research. [less ▲]

Detailed reference viewed: 149 (29 UL)
Full Text
Peer Reviewed
See detailDeploying Dynamic On-Board Signal Processing Schemes for Multibeam Satellite Systems
Joroughi, Vahid UL; Kibria, Mirza UL; Lagunas, Eva UL et al

in Deploying Dynamic On-Board Signal Processing Schemes for Multibeam Satellite Systems (2019)

This paper designs dynamic on-board signal processing schemes in a multiple gateway multibeam satellite system where full frequency reuse pattern is considered among the beams and feeds. In particular, we ... [more ▼]

This paper designs dynamic on-board signal processing schemes in a multiple gateway multibeam satellite system where full frequency reuse pattern is considered among the beams and feeds. In particular, we deploy on-board Joint Precoding, Feed selection and Signal switching mechanism (JPFS) so that the following advantages are realized, I) No need of Channel State Information (CSI) exchange among the gateways and satellite, since the performance of precoding is highly sensitive to the quality of CSI, II) In case one gateway fails, rerouting signals through other gateways can be applied without any extra signal processing, III) Properly selecting on-board feed/s to serve each user which generates maximum gain toward corresponding user, IV) Flexibly switching the signals received from the gateways to requested users where each user can dynamically request traffic from any gateway, and V) Multiple user with multiple traffic streams can be dynamically served at each beam. However, deploying such JPFS architecture imposes high complexity to the satellite payload. To tackle this issue, this study aims at deploying JPFS that can provide affordable complexity at the payload. In addition, while increasing the data demand imposes extensive bandwidth resources requirement in the feeder link, the proposed JPFS design works efficiently with available feeder link resources even if the data demand increases. The proposed design is evaluated with a close-to-real beam pattern and the latest broadband communication standard for satellite communications. [less ▲]

Detailed reference viewed: 54 (10 UL)
Full Text
Peer Reviewed
See detailAutonomy and EU Competences in the Context of Free Trade and Investment Agreements
Neframi, Eleftheria UL; Gatti, Mauro UL

in Bosse Platiere, Isabelle; Rapoport, Cecile (Eds.) Negotiation and Conclusion of the New Generation of Free Trade Agreements (2019)

Detailed reference viewed: 157 (3 UL)
Full Text
Peer Reviewed
See detailAn Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles
Kaiafas, Georgios UL; Hammerschmidt, Christian UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Hammerschmidt, Christian; State, Radu (Eds.) 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 58 (12 UL)