References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailToward an SDN-based Data Collection Scheme for Vehicular Fog Computing
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in IEEE International Conference on Communications ICC'2020 (2020, June 07)

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during ... [more ▼]

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during journeys. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a fully-programmable, self-configurable, and context-aware data collection scheme for VFC. This scheme leverages a stochastic model to dynamically estimate the number of fog stations to be deployed. Our simulation results demonstrate that our proposed scheme provides lower latency and higher resiliency compared to classical data collection schemes. [less ▲]

Detailed reference viewed: 133 (41 UL)
Full Text
Peer Reviewed
See detailA Novel Heap-based Pilot Assignment for Full Duplex Cell-Free Massive MIMO with Zero-Forcing
Nguyen, Van Hieu; Nguyen, van Dinh UL; Dobre, Octavia A. et al

in IEEE International Conference on Communications (2020, June 07)

This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD ... [more ▼]

This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD capability simultaneously serve numerous uplink and downlink user equipments (UEs) on the same time-frequency resources. To enable the incorporation of FD technology in CF-mMIMO systems, we propose a novel heapbased pilot assignment algorithm, which not only can mitigate the effects of pilot contamination but also reduce the involved computational complexity. Then, we formulate a robust design problem for spectral efficiency (SE) maximization in which the power control and AP-UE association are jointly optimized, resulting in a difficult mixed-integer nonconvex programming. To solve this problem, we derive a more tractable problem before developing a very simple iterative algorithm based on inner approximation method with polynomial computational complexity. Numerical results show that our proposed methods with realistic parameters significantly outperform the existing approaches in terms of the quality of channel estimate and SE. [less ▲]

Detailed reference viewed: 119 (29 UL)
Full Text
Peer Reviewed
See detailPredicting near-optimal skin distance in Verlet buffer approach for Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Besseron, Xavier UL; Rousset, Alban UL et al

in 10th IEEE Workshop on Parallel / Distributed Combinatorics and Optimization (2020, June)

The Verlet list method is a well-known bookkeeping technique of the interaction list used both in Molecular Dynamic (MD) and Discrete Element Method (DEM). The Verlet buffer technique is an enhancement of ... [more ▼]

The Verlet list method is a well-known bookkeeping technique of the interaction list used both in Molecular Dynamic (MD) and Discrete Element Method (DEM). The Verlet buffer technique is an enhancement of the Verlet list that consists of extending the interaction radius of each particle by an extra margin to take into account more particles in the interaction list. The extra margin is based on the local flow regime of each particle to account for the different flow regimes that can coexist in the domain. However, the choice of the near-optimal extra margin (which ensures the best performance) for each particle and the related parameters remains unexplored in DEM unlike in MD. In this study, we demonstrate that the near-optimal extra margin can fairly be characterized by four parameters that describe each particle local flow regime: the particle velocity, the ratio of the containing cell size to particle size, the containing cell solid fraction, and the total number of particles in the system. For this purpose, we model the near-optimal extra margin as a function of these parameters using a quadratic polynomial function. We use the DAKOTA SOFTWARE to carry out the Design and Analysis of Computer Experiments (DACE) and the sampling of the parameters for the simulations. For a given instance of the set of parameters, a global optimization method is considered to find the near-optimal extra margin. The latter is required for the construction of the quadratic polynomial model. The numerous simulations generated by the sampling of the parameter were performed on a High-Performance Computing (HPC) environment granting parallel and concurrent executions. This work provides a better understanding of the Verlet buffer method in DEM simulations by analyzing its performances and behavior in various configurations. The near-optimal extra margin can reasonably be predicted by two out of the four chosen parameters using the quadratic polynomial model. This model has been integrated into XDEM in order to automatically choose the extra margin without any input from the user. Evaluations on real industrial-level test cases show up to a 26% reduction of the execution time. [less ▲]

Detailed reference viewed: 42 (2 UL)
Full Text
Peer Reviewed
See detailDebugging Inputs
Kirschner, Lukas; Soremekun, Ezekiel UL; Zeller, Andreas

in Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering (2020, June)

When a program fails to process an input, it need not be the program code that is at fault. It can also be that the input data is faulty, for instance as result of data corruption. To get the data ... [more ▼]

When a program fails to process an input, it need not be the program code that is at fault. It can also be that the input data is faulty, for instance as result of data corruption. To get the data processed, one then has to debug the input data—that is, (1) identify which parts of the input data prevent processing, and (2) recover as much of the (valuable) input data as possible. In this paper, we present a general-purpose algorithm called ddmax that addresses these problems automatically. Through experiments, ddmax maximizes the subset of the input that can still be processed by the program, thus recovering and repairing as much data as possible; the difference between the original failing input and the “maximized” passing input includes all input fragments that could not be processed. To the best of our knowledge, ddmax is the first approach that fixes faults in the input data without requiring program analysis. In our evaluation, ddmax repaired about 69% of input files and recovered about 78% of data within one minute per input. [less ▲]

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailPerceptive Packet Scheduling for Carrier Aggregation in Satellite Communication Systems
Al-Hraishawi, Hayder UL; Maturo, Nicola UL; Lagunas, Eva UL et al

in IEEE International Conference on Communications, June 2020. (2020, June)

Detailed reference viewed: 144 (1 UL)
Full Text
Peer Reviewed
See detailEnhancing CoAP Group Communication to Support mMTC Over Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Stemper, André UL et al

in IEEE International Conference on Communications (ICC) (2020, June)

Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served ... [more ▼]

Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served areas, where several services can benefit from the adoption of a group communication model. The IETF has specifically standardized the usage of CoAP group communication. However, CoAP responses are still sent in unicast from each single CoAP server to the CoAP client, which results in a substantial traffic load. Such problem becomes more severe in integrated IoT-Satellite networks given the limited bandwidth of the satellite return channel and the large number of IoT devices in a mMTC scenario. To reduce network traffic overhead in group communication and improve the network responsiveness, this paper proposes an aggregation scheme for the CoAP group communication in combination with Observer pattern and proxying. Results obtained by using the openSAND emulator and CoAPthon library corroborate the merit of our optimization in terms of overhead reduction and delay. [less ▲]

Detailed reference viewed: 138 (7 UL)
Full Text
Peer Reviewed
See detailAn Integrated Teleoperation Assistance System for Collision Avoidance of High-speed UAVs in Complex Environments
Wang, Min UL; Voos, Holger UL

in 17th International Conference on Ubiquitous Robots (UR), Kyoto 22-26 June 2020 (2020, June)

UAV teleoperation is a demanding task, especially for amateur operators who wish to successfully accomplish their mission without collision. In this work we present an integrated 2D LIDAR based Sense-and ... [more ▼]

UAV teleoperation is a demanding task, especially for amateur operators who wish to successfully accomplish their mission without collision. In this work we present an integrated 2D LIDAR based Sense-and-Avoid system which actively assists unskilled human operator in obstacle avoidance, so that the operator can focus on higher-level decisions and global objectives in UAV applications such as search and rescue, farming etc. Specifically, with our perception-assistive vehicle control design, novel adaptive virtual cushion force field (AVCFF) based avoidance strategy, and integrated sensing solution, the proposed UAV teleoperation assistance system is capable of obstacle detection and tracking, as well as automatic avoidance in complex environment where both static and dynamic objects are present. The proposed system is constructed on the basis of Hector Quadrotor open source framework [1], and its effectiveness is demonstrated and validated on a realistic simulated UAV platform in Gazebo simulations where the UAV is operated at a high speed. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailGOING DEEPER WITH NEURAL NETWORKS WITHOUT SKIP CONNECTIONS
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing (ICIP 2020), Abu Dhabi, UAE, Oct 25–28, 2020 (2020, May 30)

Detailed reference viewed: 96 (5 UL)
Full Text
Peer Reviewed
See detailInformation Theoretic Approach for Waveform Design in Coexisting MIMO Radar and MIMO Communications
Alaeekerahroodi, Mohammad UL; Mysore Rama Rao, Bhavani Shankar UL; Mishra, Kumar Vijay et al

in Information Theoretic Approach for Waveform Design in Coexisting MIMO Radar and MIMO Communications (2020, May 14)

We investigate waveform design for coexistence between a multipleinput multiple-output (MIMO) radar and MIMO communications (MRMC), with a radar-centric criterion that leads to a minimal interference in ... [more ▼]

We investigate waveform design for coexistence between a multipleinput multiple-output (MIMO) radar and MIMO communications (MRMC), with a radar-centric criterion that leads to a minimal interference in the communications system. The communications use the traditional mode of operation in Long Term Evolution (LTE)/Advanced (FDD), where we formulate the design problem based on information-theoretic criterion with the discrete phase constraint at the design stage. The optimization problem, is nonconvex, multi-objective and multi-variable, where we propose an efficient algorithm based on the coordinate descent (CD) framework to simultaneously improve radar target detection performance and the communications rate. The numerical results indicate the effectiveness of the proposed algorithm in designing discrete phase set of sequences, potentially binary. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailDeep Rainrate Estimation from Highly Attenuated Downlink Signals of Ground-Based Communications Satellite Terminals
Mishra, K. V.; R., B. S. M.; Ottersten, Björn UL

in ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Deep Rainrate Estimation from Highly Attenuated Downlink Signals of Ground-Based Communications Satellite Terminals (2020, May 14)

While the use of weather radars to continuously monitor the spatiotemporal dynamics of precipitation has grown in recent years, these systems are expensive and sparsely deployed across the world. In this ... [more ▼]

While the use of weather radars to continuously monitor the spatiotemporal dynamics of precipitation has grown in recent years, these systems are expensive and sparsely deployed across the world. In this context, densely located ground-based terminals for interactive satellite services have the potential for dual-use as weather sensors because they measure rain-attenuated power of the downlink signal. Although in the millimeter-wave regime, the rain rate has almost a linear relationship with specific attenuation, lack of other weather radar observables at satellite terminals imposes a daunting task of extracting rainfall rate from these highly attenuated signals. We address this problem by designing a deep convolutional neural network (CNN) that learns the relationship between the signal attenuation and rainfall rate observed by weather radars and rain gauges at a given location. During the prediction stage, the CNN accepts downlink attenuation as input and classifies the rain intensity which is then used to apply an appropriate rainfall estimator. Our experiments with real data show that, despite severe attenuation, CNN-based downlink rainfall accumulations closely follow the nearest C-band German weather service Deutscher Wetterdienst (DWD) radar. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailDynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'20) (2020, May)

The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a ... [more ▼]

The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situation is unfolding, and therefore rely on configurable software-defined networks (SDN). In this paper, we propose a dynamic adaptive SDN configuration approach for IoT systems. The approach enables resolving congestion in real time while minimizing network utilization, data transmission delays and adaptation costs. Our approach builds on existing work in dynamic adaptive search-based software engineering (SBSE) to reconfigure an SDN while simultaneously ensuring multiple quality of service criteria. We evaluate our approach on an industrial national emergency management system, which is aimed at detecting disasters and emergencies, and facilitating recovery and rescue operations by providing first responders with a reliable communication infrastructure. Our results indicate that (1) our approach is able to efficiently and effectively adapt an SDN to dynamically resolve congestion, and (2) compared to two baseline data forwarding algorithms that are static and non-adaptive, our approach increases data transmission rate by a factor of at least 3 and decreases data loss by at least 70%. [less ▲]

Detailed reference viewed: 284 (38 UL)
Full Text
Peer Reviewed
See detailSDN-based Misbehavior Detection System for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing ... [more ▼]

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing misbehavior detection systems are static and do not adapt to the context of vehicles. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a context-aware MDS. Based on the context, our proposed system can tune security parameters to provide accurate detection with low false positives. Our system is Sybil attack-resistant and compliant with vehicular privacy standards. The simulation results show that, under different contexts, our system provides a high detection ratio and low false positives compared to a static MDS. [less ▲]

Detailed reference viewed: 159 (25 UL)
Full Text
Peer Reviewed
See detailSecurity and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor
Mitseva, Asya UL; Aleksandrova, Marharyta UL; Engel, Thomas UL et al

in Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor (2020, May)

Detailed reference viewed: 87 (6 UL)
Full Text
Peer Reviewed
See detailBacAnalytics: A Tool to Support Secondary School Examination in France
Roussanaly, Azim; Aleksandrova, Marharyta UL; Boyer, Anne

in 25th International Symposium on Intelligent Systems (ISMIS 2020) (2020, May)

Students who failed the final examination in the secondary school in France (known as baccalauréat or baccalaureate) can improve their scores by passing a remedial test. This test consists of two oral ... [more ▼]

Students who failed the final examination in the secondary school in France (known as baccalauréat or baccalaureate) can improve their scores by passing a remedial test. This test consists of two oral examinations in two subjects of the student's choice. Students announce their choice on the day of the remedial test. Additionally, the secondary education system in France is quite complex. There exist several types of baccalaureate consisting of various streams. Depending upon the stream students belong to, they have different subjects allowed to be taken during the remedial test and different coefficients associated with each of them. In this context, it becomes difficult to estimate the number of professors of each subject required for the examination. Thereby, the general practice of remedial test organization is to mobilize a large number of professors. In this paper, we present BacAnalytics - a tool that was developed to assist the rectorate of secondary schools with the organization of remedial tests for the baccalaureate. Given profiles of students and their choices of subjects for previous years, this tool builds a predictive model and estimates the number of required professors for the current year. In the paper, we present the architecture of the tool, analyze its performance, and describe its usage by the rectorate of the Academy of Nancy-Metz in Grand Est region of France in the years 2018 and 2019. BacAnalytics achieves almost 100% of prediction accuracy with approximately 25% of redundancy and was awarded a French national prize Impulsions 2018. [less ▲]

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailProceedings of the 6th Global Conference on Artificial Intelligence (GCAI 2020)
Danoy, Grégoire UL; Pang, Jun UL; Sutcliffe

in 6th Global Conference on Artificial Intelligence (2020, May)

Detailed reference viewed: 97 (9 UL)
Full Text
Peer Reviewed
See detailDeep Learning for Beam Hopping in Multibeam Satellite Systems
Lei, Lei UL; Lagunas, Eva UL; Yuan, Yaxiong UL et al

in IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Detailed reference viewed: 149 (30 UL)
Full Text
Peer Reviewed
See detailTowards Power-Efficient Aerial Communicationsvia Dynamic Multi-UAV Cooperation
Xiang, Lin; Lei, Lei UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference (WCNC) 2020 (2020, May)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detail3D DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020), Barcelona 4-8 May 2020 (2020, May)

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailAn Annotation Framework for Luxembourgish Sentiment Analysis
Sirajzade, Joshgun UL; Gierschek, Daniela UL; Schommer, Christoph UL

in Besacier, Laurent; Sakti, Sakriani; Soria, Claudia (Eds.) et al Proceedings of the LREC 2020 1st Joint SLTU and CCURL Workshop (SLTU-CCURL 2020) (2020, May)

The aim of this paper is to present a framework developed for crowdsourcing sentiment annotation for the low-resource language Luxembourgish. Our tool is easily accessible through a web interface and ... [more ▼]

The aim of this paper is to present a framework developed for crowdsourcing sentiment annotation for the low-resource language Luxembourgish. Our tool is easily accessible through a web interface and facilitates sentence-level annotation of several annotators in parallel. In the heart of our framework is an XML database, which serves as central part linking several components. The corpus in the database consists of news articles and user comments. One of the components is LuNa, a tool for linguistic preprocessing of the data set. It tokenizes the text, splits it into sentences and assigns POS-tags to the tokens. After that, the preprocessed text is stored in XML format into the database. The Sentiment Annotation Tool, which is a browser-based tool, then enables the annotation of split sentences from the database. The Sentiment Engine, a separate module, is trained with this material in order to annotate the whole data set and analyze the sentiment of the comments over time and in relationship to the news articles. The gained knowledge can again be used to improve the sentiment classification on the one hand and on the other hand to understand the sentiment phenomenon from the linguistic point of view. [less ▲]

Detailed reference viewed: 44 (9 UL)
Full Text
Peer Reviewed
See detailComponent Analysis of Adjectives in Luxembourgish for Detecting Sentiments
Sirajzade, Joshgun UL; Gierschek, Daniela UL; Schommer, Christoph UL

in Beermann, Dorothee; Besacier, Laurent; Sakti, Sakriani (Eds.) et al Proceedings of the LREC 2020 1st Joint SLTU and CCURL Workshop(SLTU-CCURL 2020) (2020, May)

The aim of this paper is to investigate the role of Luxembourgish adjectives in expressing sentiments in user comments written at the web presence of rtl.lu (RTL is the abbreviation for Radio Television ... [more ▼]

The aim of this paper is to investigate the role of Luxembourgish adjectives in expressing sentiments in user comments written at the web presence of rtl.lu (RTL is the abbreviation for Radio Television Lëtzebuerg). Alongside many textual features or representations, adjectives could be used in order to detect sentiment, even on a sentence or comment level. In fact, they are also by themselves one of the best ways to describe a sentiment, despite the fact that other word classes such as nouns, verbs, adverbs or conjunctions can also be utilized for this purpose. The empirical part of this study focuses on a list of adjectives that were extracted from an annotated corpus. The corpus contains the part of speech tags of individual words and sentiment annotation on the adjective, sentence, and comment level. Suffixes of Luxembourgish adjectives like -esch, -eg, -lech, -al, -el, -iv, -ent, -los, -bar and the prefix on- were explicitly investigated, especially by paying attention to their role in regards to building a model by applying classical machine learning techniques. We also considered the interaction of adjectives with other grammatical means, especially other part of speeches, e.g. negations, which can completely reverse the meaning, thus the sentiment of an utterance. [less ▲]

Detailed reference viewed: 49 (7 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis of Distributed and Scalable Deep Learning
Mahon, S.; Varrette, Sébastien UL; Plugaru, Valentin UL et al

in 20th IEEE/ACM Intl. Symp. on Cluster, Cloud and Internet Computing (CCGrid'20) (2020, May)

With renewed global interest for Artificial Intelligence (AI) methods, the past decade has seen a myriad of new programming models and tools that enable better and faster Machine Learning (ML). More ... [more ▼]

With renewed global interest for Artificial Intelligence (AI) methods, the past decade has seen a myriad of new programming models and tools that enable better and faster Machine Learning (ML). More recently, a subset of ML known as Deep Learning (DL) raised an increased interest due to its inherent ability to tackle efficiently novel cognitive computing applications. DL allows computational models that are composed of multiple processing layers to learn in an automated way representations of data with multiple levels of abstraction, and can deliver higher predictive accuracy when trained on larger data sets. Based on Artificial Neural Networks (ANN), DL is now at the core of state of the art voice recognition systems (which enable easy control over e.g. Internet-of- Things (IoT) smart home appliances for instance), self-driving car engine, online recommendation systems. The ecosystem of DL frameworks is fast evolving, as well as the DL architectures that are shown to perform well on specialized tasks and to exploit GPU accelerators. For this reason, the frequent performance evaluation of the DL ecosystem is re- quired, especially since the advent of novel distributed training frameworks such as Horovod allowing for scalable training across multiple computing resources. In this paper, the scalability evaluation of the reference DL frameworks (Tensorflow, Keras, MXNet, and PyTorch) is performed over up-to-date High Performance Comput- ing (HPC) resources to compare the efficiency of differ- ent implementations across several hardware architectures (CPU and GPU). Experimental results demonstrate that the DistributedDataParallel features in the Pytorch library seem to be the most efficient framework for distributing the training process across many devices, allowing to reach a throughput speedup of 10.11 when using 12 NVidia Tesla V100 GPUs when training Resnet44 on the CIFAR10 dataset. [less ▲]

Detailed reference viewed: 113 (8 UL)
Full Text
Peer Reviewed
See detailOn the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs
Liu, Kui UL; Wang, Shangwen; Koyuncu, Anil UL et al

in 42nd ACM/IEEE International Conference on Software Engineering (ICSE) (2020, May)

Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but ... [more ▼]

Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but affordable, approximation to program specifications. Although the literature regularly sets new records on the number of benchmark bugs that can be fixed, several studies increasingly raise concerns about the limitations and biases of state-of-the-art approaches. For example, the correctness of generated patches has been questioned in a number of studies, while other researchers pointed out that evaluation schemes may be misleading with respect to the processing of fault localization results. Nevertheless, there is little work addressing the efficiency of patch generation, with regard to the practicality of program repair. In this paper, we fill this gap in the literature, by providing an extensive review on the efficiency of test suite based program repair. Our objective is to assess the number of generated patch candidates, since this information is correlated to (1) the strategy to traverse the search space efficiently in order to select sensical repair attempts, (2) the strategy to minimize the test effort for identifying a plausible patch, (3) as well as the strategy to prioritize the generation of a correct patch. To that end, we perform a large-scale empirical study on the efficiency, in terms of quantity of generated patch candidates of the 16 open-source repair tools for Java programs. The experiments are carefully conducted under the same fault localization configurations to limit biases. Eventually, among other findings, we note that: (1) many irrelevant patch candidates are generated by changing wrong code locations; (2) however, if the search space is carefully triaged, fault localization noise has little impact on patch generation efficiency; (3) yet, current template-based repair systems, which are known to be most effective in fixing a large number of bugs, are actually least efficient as they tend to generate majoritarily irrelevant patch candidates. [less ▲]

Detailed reference viewed: 163 (8 UL)
Full Text
Peer Reviewed
See detailJoint Optimization for PS-based SWIPT Multiuser Systems with Non-linear Energy Harvesting
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Gautam, Sumit UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), Seoul, 25-38 May 2020 (2020, May)

In this paper, we investigate the performance of simultaneous wireless information and power transfer (SWIPT) multiuser systems, in which a base station serves a set of users with both information and ... [more ▼]

In this paper, we investigate the performance of simultaneous wireless information and power transfer (SWIPT) multiuser systems, in which a base station serves a set of users with both information and energy simultaneously via a power splitting (PS) mechanism. To capture realistic scenarios, a nonlinear energy harvesting (EH) model is considered. In particular, we jointly design the PS factors and the beamforming vectors in order to maximize the total harvested energy, subjected to rate requirements and a total transmit power budget. To deal with the inherent non-convexity of the formulated problem, an iterative optimization algorithm is proposed based on the inner approximation method and semidefinite relaxation (SDR), whose convergence is theoretically guaranteed. Numerical results show that the proposed scheme significantly outperforms the baseline max-min based SWIPT multicast and fixed-power PS designs. [less ▲]

Detailed reference viewed: 135 (0 UL)
Full Text
Peer Reviewed
See detail'Faster-than-Nyquist Signaling via Spatiotemporal Symbol-Level Precoding for Multi-User MISO Redundant Transmissions
Alves Martins, Wallace UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2020), Barcelona 4-8 May 2020 (2020, May)

This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We ... [more ▼]

This paper tackles the problem of both multi-user and intersymbol interference stemming from co-channel users transmitting at a faster-than-Nyquist (FTN) rate in multi-antenna downlink transmissions. We propose a framework for redundant block-based symbol-level precoders enabling the trade-off between constructive and destructive multi-user and interblock interference (IBI) effects at the single-antenna user terminals. Redundant elements are added as guard interval to handle IBI destructive effects. It is shown that, within this framework, accelerating the transmissions via FTN signaling improves the error-free spectral efficiency, up to a certain acceleration factor beyond which the transmitted information cannot be perfectly recovered by linear filtering followed by sampling. Simulation results corroborate that the proposed spatiotemporal symbol-level precoding can change the amount of added redundancy from zero (full IBI) to half (IBI-free) the equivalent channel order, so as to achieve a target balance between spectral and energy efficiencies. [less ▲]

Detailed reference viewed: 74 (5 UL)
Full Text
Peer Reviewed
See detailTransmit Beamforming Design with Received-Interference Power Constraints: The Zero-Forcing Relaxation
Lagunas, Eva UL; Perez-Neira, Ana; Lagunas, Miguel Angel et al

in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), Barcelona, Spain, May 2020 (2020, May)

Detailed reference viewed: 67 (8 UL)
Full Text
Peer Reviewed
See detailIntegrating Topological Proofs with Model Checking to Instrument Iterative Design
Menghi, Claudio UL; Rizzi, Alessandro Maria; Bernasconi, Anna

in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 (2020, April)

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous ... [more ▼]

System development is not a linear, one-shot process. It proceeds through refinements and revisions. To support assurance that the system satisfies its requirements, it is desirable that continuous verification can be performed after each refinement or revision step. To achieve practical adoption, formal verification must accommodate continuous verification efficiently and effectively. Model checking provides developers with information useful to improve their models only when a property is not satisfied, i.e., when a counterexample is returned. However, it is desirable to have some useful information also when a property is instead satisfied. To address this problem we propose TOrPEDO, an approach that supports verification in two complementary forms: model checking and proofs. While model checking is typically used to pinpoint model behaviors that violate requirements, proofs can instead explain why requirements are satisfied. In our work, we introduce a specific notion of proof, called Topological Proof. A topological proof produces a slice of the original model that justifies the property satisfaction. Because models can be incomplete, TOrPEDO supports reasoning on requirements satisfaction, violation, and possible satisfaction (in the case where satisfaction depends on unknown parts of the model). Evaluation is performed by checking how topological proofs support software development on 12 modeling scenarios and 15 different properties obtained from 3 examples from literature. Results show that: (i) topological proofs are ≈60% smaller than the original models; (ii) after a revision, in ≈78% of cases, the property can be re-verified by relying on a simple syntactic check. [less ▲]

Detailed reference viewed: 135 (17 UL)
Full Text
Peer Reviewed
See detailMadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps
Liu, Tianming; Wang, Haoyu; Li, Li et al

in Proceedings of The Web Conference 2020 (2020, April)

Advertisement drives the economy of the mobile app ecosystem. As a key component in the mobile ad business model, mobile ad content has been overlooked by the research community, which poses a number of ... [more ▼]

Advertisement drives the economy of the mobile app ecosystem. As a key component in the mobile ad business model, mobile ad content has been overlooked by the research community, which poses a number of threats, e.g., propagating malware and undesirable contents. To understand the practice of these devious ad behaviors, we perform a large-scale study on the app contents harvested through automated app testing. In this work, we first provide a comprehensive categorization of devious ad contents, including five kinds of behaviors belonging to two categories: ad loading content and ad clicking content. Then, we propose MadDroid, a framework for automated detection of devious ad contents. MadDroid leverages an automated app testing framework with a sophisticated ad view exploration strategy for effectively collecting ad-related network traffic and subsequently extracting ad contents. We then integrate dedicated approaches into the framework to identify devious ad contents. We have applied MadDroid to 40,000 Android apps and found that roughly 6% of apps deliver devious ad contents, e.g., distributing malicious apps that cannot be downloaded via traditional app markets. Experiment results indicate that devious ad contents are prevalent, suggesting that our community should invest more effort into the detection and mitigation of devious ads towards building a trustworthy mobile advertising ecosystem. [less ▲]

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailLOVBench: Ontology Ranking Benchmark
Kolbe, Niklas UL; Vandenbussche, Pierre-Yves; Kubler, Sylvain UL et al

in Proceedings of The Web Conference 2020 (WWW '20) (2020, April)

Detailed reference viewed: 49 (9 UL)
Full Text
Peer Reviewed
See detailNeuere Methoden zur Identifikation und Lokalisierung von Schäden an vorgespannten Betonbrücken
Maas, Stefan UL; Nguyen, Viet Ha UL; Kebig, Tanja UL

in Bischoff, Manfred; von Scheven, Malte; Oesterle, Bernd (Eds.) Baustatik-Baupraxis 14 (2020, March 23)

Zuerst wird ein rein statistischer Schadensindikator basierend auf der Hauptkomponentenanalyse vorgestellt. Wichtig sind Referenzmessungen im ungeschädigten Zustand, um Veränderungen zu identifizieren ... [more ▼]

Zuerst wird ein rein statistischer Schadensindikator basierend auf der Hauptkomponentenanalyse vorgestellt. Wichtig sind Referenzmessungen im ungeschädigten Zustand, um Veränderungen zu identifizieren. Bevor die Messdaten mit den Rechenmodellen kombiniert werden, müssen Temperatureffekte kompensiert werden, um dann die Schäden zu erkennen und zu lokalisieren. Ein „Model-Updating“ Prozess eines speziellen Finite-Elemente- Modells passt die Steifigkeitsmatrix an die gemessenen Eigenfrequenzen oder an die progressive Absenkung unter Eigengewicht an. [less ▲]

Detailed reference viewed: 60 (11 UL)
Full Text
Peer Reviewed
See detailGuided Inductive Logic Programming: Cleaning Knowledge Bases with Iterative User Feedback
Wu, Yan; Chen, Jinchuan; Haxhidauti, Plarent et al

in Guided Inductive Logic Programming: Cleaning Knowledge Bases with Iterative User Feedback (2020, March 12)

Domain-oriented knowledge bases (KBs) such as DBpedia and YAGO are largely constructed by applying a set of predefined extraction rules to the semi-structured contents of Wikipedia articles. Although both ... [more ▼]

Domain-oriented knowledge bases (KBs) such as DBpedia and YAGO are largely constructed by applying a set of predefined extraction rules to the semi-structured contents of Wikipedia articles. Although both of these large-scale KBs achieve very high average precision values (above 95% for YAGO3), subtle mistakes in a few of the underlying extraction rules may still impose a substantial amount of systematic extraction mistakes for specific relations. For example, by applying the same regular expressions to extract person names of both Asian and Western nationality, YAGO erroneously swaps most of the family and given names of Asian person entities. For traditional rule-learning approaches based on Inductive Logic Programming (ILP), it is very difficult to detect these systematic extraction mistakes, since they usually occur only in a relatively small subdomain of the relations’ arguments. In this paper, we thus propose a guided form of ILP, coined “GILP”, that iteratively asks for small amounts of user feedback over a given KB to learn a set of data-cleaning rules that (1) best match the feedback and (2) also generalize to a larger portion of facts in the KB. We propose both algorithms and respective metrics to automatically assess the quality of the learned rules with respect to the user feedback. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailAgentenbasierte, hybride Steuerungsarchitektur für cyberphysische Refabrikationssysteme
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Jäkel, Jens; Thiel, Robert (Eds.) Tagungsband AALE 2020 Automatisierung und Mensch-Technik-Interaktion (2020, March 05)

Detailed reference viewed: 72 (3 UL)
Full Text
Peer Reviewed
See detailMensch-Roboter-Kollaboration in der Domäne Refabrikation – State-of-the-Art und Ausblick
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Jäkel, Jens; Thiel, Robert (Eds.) Tagungsband AALE 2020 Automatisierung und Mensch-Technik-Interaktion (2020, March 05)

Detailed reference viewed: 76 (0 UL)
Full Text
Peer Reviewed
See detailStructured Compression of Deep Neural Networks with Debiased Elastic Group LASSO
Oyedotun, Oyebade UL; Aouada, Djamila UL; Ottersten, Björn UL

in IEEE 2020 Winter Conference on Applications of Computer Vision (WACV 20), Aspen, Colorado, US, March 2–5, 2020 (2020, March 01)

Detailed reference viewed: 82 (11 UL)
Full Text
Peer Reviewed
See detailMetamorphic Security Testing for Web Systems
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020 (2020, March)

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input ... [more ▼]

Security testing verifies that the data and the resources of software systems are protected from attackers. Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior. In many situations where potential vulnerabilities are tested, a test oracle may not exist, or it might be impractical due to the many inputs for which specific oracles have to be defined. In this paper, we propose a metamorphic testing approach that alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture security properties of the system. Such MRs are then used to automate testing and detect vulnerabilities. We provide a catalog of 22 system-agnostic MRs to automate security testing in Web systems. Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques. It automatically detected 10 out of 12 vulnerabilities affecting two widely used systems, one commercial and the other open source (Jenkins). [less ▲]

Detailed reference viewed: 157 (22 UL)
Full Text
Peer Reviewed
See detailAnalyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments
Mitseva, Asya UL; Engel, Thomas UL; Panchenko, Andriy

in Analyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments (2020, March)

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailDissecting Android Cryptocurrency Miners
Dashevskyi, Stanislav UL; Zhauniarovich, Yury; Gadyatskaya, Olga UL et al

in CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans LA USA, March 2020 (2020, March)

Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even damage the device. In this work we make a step towards ... [more ▼]

Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even damage the device. In this work we make a step towards combating this threat. We collected and manually verified a large dataset of Android mining apps. In this paper, we analyze the gathered miners and identify how they work, what are the most popular libraries and APIs used to facilitate their development, and what static features are typical for this class of applications. Further, we analyzed our dataset using VirusTotal. The majority of our samples is considered malicious by at least one VirusTotal scanner, but 16 apps are not detected by any engine; and at least 5 apks were not seen previously by the service. Mining code could be obfuscated or fetched at runtime, and there are many confusing miner-related apps that actually do not mine. Thus, static features alone are not sufficient for miner detection.We have collected a feature set of dynamic metrics both for miners and unrelated benign apps, and built a machine learning-based tool for dynamic detection. Our BrenntDroid tool is able to detect miners with 95% of accuracy on our dataset. [less ▲]

Detailed reference viewed: 53 (1 UL)
Full Text
Peer Reviewed
See detailTowards an Executable Methodology for the Formalization of Legal Texts
Libal, Tomer UL; Steen, Alexander UL

in Dastani, Mehdi; Dong, Huimin; van der Torre, Leon (Eds.) Logic and Argumentation. CLAR 2020 (2020, March)

A methodology for the formalization of legal texts is presented. This methodology is based on features of the NAI Suite, a recently developed formalization environment for legal texts. The ability of the ... [more ▼]

A methodology for the formalization of legal texts is presented. This methodology is based on features of the NAI Suite, a recently developed formalization environment for legal texts. The ability of the tool to execute queries is used in order to drive a correct formalization until all queries are validated. The approach is studied on a fragment of the Smoking Prohibition (Children in Motor Vehicles) (Scotland) Act 2016 of the Scottish Parliament. [less ▲]

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailA Preliminary Study on the Automatic Visual based Identification of UAV Pilots from Counter UAVs
Cazzato, Dario; Cimarelli, Claudio UL; Voos, Holger UL

in 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 5: VISAPP, Valletta 27-29 February 2020 (2020, February 27)

Two typical Unmanned Aerial Vehicles (UAV) countermeasures involve the detection and tracking of the UAV position, as well as of the human pilot; they are of critical importance before taking any ... [more ▼]

Two typical Unmanned Aerial Vehicles (UAV) countermeasures involve the detection and tracking of the UAV position, as well as of the human pilot; they are of critical importance before taking any countermeasure, and they already obtained strong attention from national security agencies in different countries. Recent advances in computer vision and artificial intelligence are already proposing many visual detection systems from an operating UAV, but they do not focus on the problem of the detection of the pilot of another approaching unauthorized UAV. In this work, a first attempt of proposing a full autonomous pipeline to process images from a flying UAV to detect the pilot of an unauthorized UAV entering a no-fly zone is introduced. A challenging video sequence has been created flying with a UAV in an urban scenario and it has been used for this preliminary evaluation. Experiments show very encouraging results in terms of recognition, and a complete dataset to evaluate artificial intelligence-based solution will be prepared. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailNAI: Towards Transparent and Usable Semi-Automated Legal Analysis
Libal, Tomer UL; Steen, Alexander UL

in Schweighöfer, Erich; Hötzendorfer, Walter; Kummer, Franz (Eds.) et al Verantwortungsbewusste Digitalisierung, Tagungsband des 23. Internationalen Rechtsinformatik Symposions IRIS 2020 (2020, February 27)

A prototype for automated reasoning over legal documents, called NAI, is presented. It uses formalized representations of legal documents that are created using a graphical editor that is also provided as ... [more ▼]

A prototype for automated reasoning over legal documents, called NAI, is presented. It uses formalized representations of legal documents that are created using a graphical editor that is also provided as part of NAI. The prototype supports several automated reasoning procedures over the given formalizations, including the execution of user queries. The application of NAI is studied using a fragment of the Scottish Smoking Prohibition (Children in Motor Vehicles) Act 2016. [less ▲]

Detailed reference viewed: 85 (13 UL)
Full Text
Peer Reviewed
See detailPrivacy and Security of Big Data in AI Systems:A Research and Standards Perspective
Esmaeilzadeh Dilmaghani, Saharnaz UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in 2019 IEEE International Conference on Big Data (Big Data), 9-12 December 2019 (2020, February 24)

Detailed reference viewed: 150 (21 UL)
Full Text
Peer Reviewed
See detailPreventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach
Antoniadis, Nikolaos UL; Cordy, Maxime UL; Sifaleras, Angelo et al

in Communications in Computer and Information Science (2020, February 15)

Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that ... [more ▼]

Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that, the overload could trip the fuse, opening the circuit, and stopping the flow and heating. However, sustained overloads, even if they are below the safety limits, could also damage the wires. To prevent overload, smart grid operators can switch the fuses on or off to protect the circuits, or remotely curtail the over-producing/over-consuming users. Nevertheless, making the most appropriate decision is a daunting decision-making task, notably due to contractual and technical obligations. In this paper, we define and formulate the overloading prevention problem as a Multiobjective Mixed Integer Quadratically Constrained Program. We also suggest a solution method using a combinatorial optimization approach with a state-of-the-art exact solver. We evaluate this approach for this real-world problem together with Creos Luxembourg S.A., the leading grid operator in Luxembourg, and show that our method can suggest optimal countermeasures to operators facing potential overloading incidents. [less ▲]

Detailed reference viewed: 256 (34 UL)
Full Text
Peer Reviewed
See detailMobile App to SGX Enclave Secure Channel
Carvalho Ota, Fernando Kaway UL; Meira, Jorge Augusto UL; Cassagnes, Cyril UL et al

in 2019 IEEE International Symposium on Software Reliability Engineering Workshops (2020, February 13)

The current challenge for several applications is to guarantee the user’s privacy when using personal data. The broader problem is to transfer and process the data without exposing the sensitive content ... [more ▼]

The current challenge for several applications is to guarantee the user’s privacy when using personal data. The broader problem is to transfer and process the data without exposing the sensitive content to anyone, including the service provider(s). In this paper, we address this challenge by proposing a protocol to combine secure frameworks in order to exchange and process sensitive data, i.e. respecting user’s privacy. Our contribution is a protocol to perform a secure exchange of data between a mobile application and a trusted execution environment. In our experiments we show independent implementations of our protocol using three different encryption modes (i.e., CBC, ECB, GCM encryption). Our results support the feasibility and importance of an end-to-end secure channel protocol. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailIdentifying Unintended Harms of Cybersecurity Measures
Chua, Yi Ting; Parkin, Simon; Edwards, Matthew et al

in Proceedings of ECRIME 2019 (2020, February 01)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailExploring the Monero Peer-to-Peer Network
Cao, Tong UL; Yu, Jiangshan; Decouchant, Jérémie UL et al

in Cao, Tong; Yu, Jiangshan; Decouchant, Jérémie (Eds.) et al Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020 (2020, February)

Detailed reference viewed: 91 (20 UL)
Full Text
Peer Reviewed
See detailShort paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme
Zollinger, Marie-Laure UL; Roenne, Peter UL; Ryan, Peter UL

in International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting (2020, February)

Detailed reference viewed: 65 (5 UL)
Full Text
Peer Reviewed
See detailTowards Automatic CAD Modeling from 3D Scan Sketch based Representation
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Cherenkova, Kseniya UL et al

in Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2020), GRAPP (2020, February)

Detailed reference viewed: 119 (11 UL)
Full Text
Peer Reviewed
See detailSystematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging
Symeonidis, Iraklis UL; Lenzini, Gabriele UL

in International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020 (2020, February)

Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar ... [more ▼]

Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar threats, and how to comply with comparable system requirements. Assuming a scenario where servers may not be trusted, we review and analyze a list of threats specifically against message delivering, archiving, and contact synchronization. We also describe a list of requirements intended for whom undertakes the task of implementing secure and private messaging. The cryptographic solutions available to mitigate the threats and to comply with the requirements may differ, as the two applications are built on different assumptions and technologies. [less ▲]

Detailed reference viewed: 116 (12 UL)
Full Text
Peer Reviewed
See detailTeaching DevOps in Academia and Industry: Reflections and Vision
Bobrov, Evgeny; Bucchiarone, Antonio; Capozucca, Alfredo UL et al

in Bruel, Jean-Michel; Mazzara, Manuel; Meyer, Bertrand (Eds.) Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment (2020, January 19)

The new century brought us a kind of renaissance in software development methods. The advent of the Agile manifesto has led to greater appreciation of methodologies aimed at producing valuable software ... [more ▼]

The new century brought us a kind of renaissance in software development methods. The advent of the Agile manifesto has led to greater appreciation of methodologies aimed at producing valuable software through continuous incremental cycles. More recently, a new set of practices enclosed under the term DevOps has appeared to attain manifesto's objectives in more efficient manner. The software development community has already noticed the benefits brought by DevOps. Thus, the necessity of education in the field becomes more and more important, both from the technical and organisational point of view. This paper describes parallel experiences of teaching both undergraduate and graduate students at the university, and junior professional developers in industry, compares the two approaches and sums up the lessons learnt. A vision driven by the DevOps practices aimed at implementing a shift in the Software Engineering Higher Education curricula to takeover its current limitations is also reported at the end of the paper. [less ▲]

Detailed reference viewed: 75 (4 UL)
Full Text
Peer Reviewed
See detailComprendre l'état du parlementarisme contemporain en Europe
Poirier, Philippe UL

in Le Parlement depuis 2008 : Renforcement, statu quo ou retour au(x) fondement(s) de la Ve République (2020, January 10)

Cet ouvrage reprend les actes du colloque d'Aix-en-Provence de 2018 consacré au bilan de dix ans de mise en oeuvre de la révision constitutionnelle de 2008 dans son volet parlementaire. Faisant intervenir ... [more ▼]

Cet ouvrage reprend les actes du colloque d'Aix-en-Provence de 2018 consacré au bilan de dix ans de mise en oeuvre de la révision constitutionnelle de 2008 dans son volet parlementaire. Faisant intervenir des acteurs de la révision de 2008, des parlementaires, des membres du Conseil constitutionnel, des hauts fonctionnaires des assemblées et des universitaires, ce colloque a été construit autour des trois fonctions essentielles du Parlement : l'élaboration de la loi, le contrôle de l'exécutif et l'évaluation des politiques publiques afin de répondre à cette question : un changement pour quoi faire ? [less ▲]

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailBenchmarking Synchronous and Asynchronous Stream Processing Systems
Ellampallil Venugopal, Vinu UL; Theobald, Martin UL

in Ellampallil Venugopal, Vinu; Theobald, Martin (Eds.) Benchmarking Synchronous and Asynchronous Stream Processing Systems (2020, January 02)

Processing high-throughput data-streams has become a major challenge in areas such as real-time event monitoring, complex dataflow processing, and big data analytics. While there has been tremendous ... [more ▼]

Processing high-throughput data-streams has become a major challenge in areas such as real-time event monitoring, complex dataflow processing, and big data analytics. While there has been tremendous progress in distributed stream processing systems in the past few years, the high-throughput and low-latency (a.k.a. high sustainable-throughput) requirement of modern applications is pushing the limits of traditional data processing infrastructures. To understand the upper bound of the maximum sustainable throughput that is possible for a given node configuration, we have designed multiple hard-coded multi-threaded processes (called ad-hoc dataflows) in C++ using Message Passing Interface (MPI) and Pthread libraries. Our preliminary results show that our ad-hoc design on average is 5.2 times better than Flink and 9.3 times better than Spark. [less ▲]

Detailed reference viewed: 27 (6 UL)
Full Text
Peer Reviewed
See detailCzechoslovak Jewish emigrants in the clutches of Luxembourg pre-war migration bureaucracy
Bronec, Jakub UL

in Malach Center for Visual History on its 10th Anniversary: Compendium of Papers of the Prague Visual History and Digital Humanities Conference 2020 (2020, January)

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities ... [more ▼]

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities distinguish or give priority to citizens of particular nations? Who was involved in the approval process? Who played the most active role and collected the most controversial information about Jewish immigrants? [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailInternal wall insulation with a new aerogel panel: SLENTITE® for energetic retrofit in historic buildings
Günther, Eva; Bichlmair, Stefan; Latz, Sebastian UL et al

in 12th Nordic Symposium on Building Physics (2020, January)

We present two recent test case application examples of a new high-performance insulation panel with product name SLENTITE® used as core element of a rendered internal wall insulation system. The first ... [more ▼]

We present two recent test case application examples of a new high-performance insulation panel with product name SLENTITE® used as core element of a rendered internal wall insulation system. The first case study refers to the 18th-century building Alte Schäfflerei now the Fraunhofer Centre for Conservation and Energy Performance of Historic Buildings, at the monastery Benediktbeuern, southern Germany, where SLENTITE® was applied in 11/2017. The second test case was installed in 04/2019 in a heritage building situated in the historic center of Luxembourg. In Benediktbeuern, a single layer of insulation material was chosen, in Luxembourg we applied two layers of insulation. In both cases, detail work around the windows was a main task and we gained experience on product processing under real conditions. In terms of indoor room usage, the object in Benediktbeuern is used as exhibition hall with rare traffic and well controlled climate, whereas the object in Luxembourg is used as meeting room without climate control. Measured data of 20 months from the object in Benediktbeuern and first impressions of the performance in Luxembourg are discussed. [less ▲]

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailModeling for Three-Subset Division Property without Unknown Subset and Improved Cube Attacks
Hao, Yonglin; Leander, Gregor; Meier, Willi et al

in 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Croatia 10-14 May 2020 (2020, January)

Detailed reference viewed: 42 (2 UL)
Full Text
Peer Reviewed
See detailReceive Beamforming for Ultrareliable Random Access based SWIPT
Kisseleff, Steven UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in Proceedings of IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications (2020)

Ultrareliable uplink communication based on random access poses novel research challenges for the receiver design. Here, the uncertainty imposed by the random access and a large amount of interfering ... [more ▼]

Ultrareliable uplink communication based on random access poses novel research challenges for the receiver design. Here, the uncertainty imposed by the random access and a large amount of interfering transmissions is the limiting factor for the system performance. Recently, this type of communication has been addressed in context of simultaneous wireless information and power transfer (SWIPT). The need to adapt the power splitting to the signal states according to the underlying random access has been tackled by introducing a predictor, which determines the valid states of the received signal based on the long-term observation. Hence, the power splitting factor is scaled accordingly in order to guarantee ultrareliable communication and maximized harvested energy.In this work, we extend the considered SWIPT scenario by introducing multiple antennas at the receiver side. Through this, the received energy can be substantially increased, if the energy harvesting parameters and the spatial filter coefficients are jointly optimized. Hence, we propose an optimization procedure, which aims at maximizing the harvested energy under the ultrareliability constraint. The mentioned prediction method is then combined with the optimization solution and the resulting system performance is numerically evaluated. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailAttack-Tree Series: A Case for Dynamic Attack Tree Analysis
Gadyatskaya, Olga UL; Mauw, Sjouke UL

in Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (2020)

Detailed reference viewed: 56 (0 UL)
Full Text
See detailGesonderte Ruhestätten für besondere Tote: Soldatengräber und Garnisonsfriedhöfe unter besonderer Berücksichtigung der Entwicklung in Luxemburg
Kolnberger, Thomas UL

in Loew, Benedikt; Thewes, Guy; Klauck, Hans Peter (Eds.) Intra muros - Infrastruktur und Lebensalltag in Festungen - Einrichtungen der Fürsorge (2020)

Detailed reference viewed: 136 (3 UL)
Full Text
Peer Reviewed
See detailA Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV Swarms
Stolfi Rosso, Daniel UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in IEEE 17th Annual Consumer Communications & Networking Conference CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020 (2020)

Detailed reference viewed: 30 (4 UL)
Full Text
See detailVisualisierungen des Induktionsprinzips
Perucca, Antonella UL; Todorovic, Milko

in Beiträge zum Mathematikunterricht 2020 (2020)

Detailed reference viewed: 37 (8 UL)
Full Text
Peer Reviewed
See detailA Principle-Based Analysis of Weakly Admissible Semantics
Dauphin, Jérémie UL; Rienstra, Tjitze; van der Torre, Leon UL

in Computational Models of Argument - Proceedings of COMMA 2020, Perugia Italy, September 4-11, 2020 (2020)

Baumann, Brewka and Ulbricht recently introduced weak admissibility as an alternative to Dung’s notion of admissibility, and they use it to define weakly preferred, weakly complete and weakly grounded ... [more ▼]

Baumann, Brewka and Ulbricht recently introduced weak admissibility as an alternative to Dung’s notion of admissibility, and they use it to define weakly preferred, weakly complete and weakly grounded semantics of argumentation frameworks. In this paper we analyze their new semantics with respect to the principles discussed in the literature on abstract argumentation. Moreover, we introduce two variants of their new semantics, which we call qualified and semiqualified semantics, and we check which principles they satisfy as well. Since the existing principles do not distinguish our new semantics from the ones of Baumann et al., we also introduce some new principles to distinguish them. Besides selecting a semantics for an application, or for algorithmic design, our new principle-based analysis can also be used for the further search for weak admissibility semantics. [less ▲]

Detailed reference viewed: 29 (1 UL)
See detailIEEE Workshop on Parallel / Distributed Combinatorics and Optimization (PDCO 2020)
Danoy, Grégoire UL; Baz, Didier El; Boyer, Vincent et al

in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPSW 2020, New Orleans, LA, USA, May 18-22, 2020 (2020)

Detailed reference viewed: 58 (1 UL)
Full Text
Peer Reviewed
See detailA Report on the VarDial Evaluation Campaign 2020
Găman, Mihaela; Hovy, Dirk; Ionescu, Radu et al

in Zampieri, Marcos; Preslav, Yakov; Ljubešić, Nikola (Eds.) et al Proceedings of the 7th Workshop on NLP for Similar Languages, Varieties and Dialects (2020)

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailSidelobe Performance Analysis of Noise Waveforms Considering the Doppler Mismatch
Tedgue Beltrao, Gabriel UL; Pralon, Leandro; Alaeekerahroodi, Mohammad UL et al

in Proceedings of the 21st International Radar Symposium (IRS), Warsaw, Poland, 2020 (2020)

Waveform design and optimization algorithms generally assume a zero-Doppler ideal case to reach an optimum or satisfactory solution in terms of the matched filter output. Therefore, its performance is ... [more ▼]

Waveform design and optimization algorithms generally assume a zero-Doppler ideal case to reach an optimum or satisfactory solution in terms of the matched filter output. Therefore, its performance is usually characterized only in terms of the resultant waveforms autocorrelation function, neglecting the practical situation in which the received signal is modulated by the target’s Doppler shift. Within this context, this work investigates the Doppler mismatch effects in the Integrated Sidelobe Level (ISL) performance of previously designed/optimized noise waveforms. The analysis has shown that, despite much better results for steady targets, the increasing Doppler mismatch reduces the ISL performance of optimized waveforms, until similar levels achieved when no optimization is performed. To address that, a subpulse Doppler processing approach is also considered, and the results have shown that, besides increasing the Doppler tolerance, it has also increased the optimized waveform robustness to the Doppler mismatch, reducing the resultant ISL loss and thus extending its applicability. [less ▲]

Detailed reference viewed: 15 (3 UL)
Full Text
Peer Reviewed
See detailA Dynamics-based Approach for the Target Control of Boolean Networks
Su, Cui; Pang, Jun UL

in Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (2020)

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailCarrier and Power Assignment for Flexible Broadband GEO Satellite Communications System
Abdu, Tedros Salih UL; Lagunas, Eva UL; Kisseleff, Steven et al

in PIMRC 2020 Proceedings (2020)

Current multi-beam GEO satellite systems operate under a limited frequency reuse configuration and considering uniform power assignment across beams. The latter has been shown to be inefficient in ... [more ▼]

Current multi-beam GEO satellite systems operate under a limited frequency reuse configuration and considering uniform power assignment across beams. The latter has been shown to be inefficient in matching the geographic distribution of the traffic demand. In this context, next generation of broadband GEO satellite systems will be equipped with more flexible and reconfigurable payloads, facilitating on-demand resource allocation. In this paper, we consider both carrier and power assignment to match the requested beam demands while minimizing the total transmit power and the total utilized bandwidth. A novel optimization problem is formulated and, given its non-convex structure, we divide the problem into two tractable sub-problems. First, we estimate the number of adjacent frequency carriers required for each beam to satisfy its demand and, subsequently, we optimize the power allocation based on the previously assigned carriers. We validate the proposed method with extensive numerical results, which demonstrate its efficiency with respect to benchmark strategies. [less ▲]

Detailed reference viewed: 250 (68 UL)
Full Text
Peer Reviewed
See detailDeepVI: A Novel Framework for Learning Deep View-Invariant Human Action Representations using a Single RGB Camera
Papadopoulos, Konstantinos UL; Ghorbel, Enjie UL; Oyedotun, Oyebade UL et al

in IEEE International Conference on Automatic Face and Gesture Recognition, Buenos Aires 18-22 May 2020 (2020)

Detailed reference viewed: 78 (17 UL)
Full Text
Peer Reviewed
See detailSession Subtyping and Multiparty Compatibility Using Circular Sequents
Horne, Ross James UL

in In 31st International Conference on Concurrency Theory (CONCUR 2020). (2020)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailCramer-Rao Bound on DOA Estimation of Finite Bandwidth Signals Using a Moving Sensor
Arora, Aakash UL; Mysore Rama Rao, Bhavani Shankar UL; Ottersten, Björn UL

in Proc. 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2020)

In this paper, we provide a framework for the direction of arrival (DOA) estimation using a single moving sensor and evaluate performance bounds on estimation. We introduce a signal model which captures ... [more ▼]

In this paper, we provide a framework for the direction of arrival (DOA) estimation using a single moving sensor and evaluate performance bounds on estimation. We introduce a signal model which captures spatio-temporal incoherency in the received signal due to sensor motion in space and finite bandwidth of the signal, hitherto not considered. We show that in such a scenario, the source signal covariance matrix becomes a function of the source DOA, which is usually not the case. Due to this unknown dependency, traditional subspace techniques cannot be applied and conditions on source covariance needs to imposed to ensure identifiability. This motivates us to investigate the performance bounds through the Cramer-Rao Lower Bounds (CRLBs) to set benchmark performance for future estimators. This paper exploits the signal model to derive an appropriate CRLB, which is shown to be better than those in relevant literature. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailReducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognition
Thanapol, Panissara UL; Lavangnananda, Kittichai; Bouvry, Pascal UL et al

in 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (2020)

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailAccelerated verification of parametric protocols with decision trees
Li, Yongjian; Cao, Taifeng; Jansen, David et al

in Proceedings of the 38th International Conference on Computer Design (ICCD) (2020)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailCharacterising probabilistic alternating simulation for concurrent games
Zhang, Chenyi; Pang, Jun UL

in Proceedings of the 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE) (2020)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailMining Assumptions for Software Components using Machine Learning
Gaaloul, Khouloud UL; Menghi, Claudio UL; Nejati, Shiva UL et al

in Proceedings of the The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2020)

Software verification approaches aim to check a software component under analysis for all possible environments. In reality, however, components are expected to operate within a larger system and are ... [more ▼]

Software verification approaches aim to check a software component under analysis for all possible environments. In reality, however, components are expected to operate within a larger system and are required to satisfy their requirements only when their inputs are constrained by environment assumptions. In this paper, we propose EPIcuRus, an approach to automatically synthesize environment assumptions for a component under analysis (i.e., conditions on the component inputs under which the component is guaranteed to satisfy its requirements). EPIcuRus combines search-based testing, machine learning and model checking. The core of EPIcuRus is a decision tree algorithm that infers environment assumptions from a set of test results including test cases and their verdicts. The test cases are generated using search-based testing, and the assumptions inferred by decision trees are validated through model checking. In order to improve the efficiency and effectiveness of the assumption generation process, we propose a novel test case generation technique, namely Important Features Boundary Test (IFBT), that guides the test generation based on the feedback produced by machine learning. We evaluated EPIcuRus by assessing its effectiveness in computing assumptions on a set of study subjects that include 18 requirements of four industrial models. We show that, for each of the 18 requirements, EPIcuRus was able to compute an assumption to ensure the satisfaction of that requirement, and further, ≈78% of these assumptions were computed in one hour. [less ▲]

Detailed reference viewed: 261 (120 UL)
Full Text
Peer Reviewed
See detailDesign Challenges of Trustworthy Artificial Intelligence Learning Systems
Brust, Matthias R. UL; Bouvry, Pascal UL; Danoy, Grégoire UL et al

in Intelligent Information and Database Systems - 12th Asian Conference ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Companion Proceedings (2020)

Detailed reference viewed: 43 (7 UL)
Full Text
Peer Reviewed
See detailA Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Boyen, Xavier; Haines, Thomas; Mueller, Johannes UL

in Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (2020)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailShort Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
Haines, Thomas; Pereira, Olivier; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

Detailed reference viewed: 78 (0 UL)
Full Text
Peer Reviewed
See detailTowards Automating Inconsistency Checking of Legal Texts
Libal, Tomer UL; Tereza,

in Towards Automating Inconsistency Checking of Legal Texts (2020)

Inconsistencies in legal texts are sometimes hard to find and correct. In this paper a novel machine executable methodology is described, which can facilitate this process. We demonstrate the methodology ... [more ▼]

Inconsistencies in legal texts are sometimes hard to find and correct. In this paper a novel machine executable methodology is described, which can facilitate this process. We demonstrate the methodology on the American University of Paris Library Circulation Policy No. AA036EN. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailA bimodal simulation of defeasibility in thenormative domain
Libal, Tomer UL; van der Torre, Leon UL; Gabbay, Dov UL et al

in CEUR Workshop Proceedings (2020)

In the present work we illustrate how two sorts of defeasiblereasoning that are fundamental in the normative domain, that is, reasoning about exceptions and reasoning about violations, can be simulated ... [more ▼]

In the present work we illustrate how two sorts of defeasiblereasoning that are fundamental in the normative domain, that is, reasoning about exceptions and reasoning about violations, can be simulated via monotonic propositional theories based on a bimodal language with primitive operators representing knowledge and obligation. The proposed theoretical framework paves the way to using native theorem provers for multimodal logic, such as MleanCoP, in order to automate normative reasoning. [less ▲]

Detailed reference viewed: 10 (0 UL)
See detailPeter Waterhouses 'Prosperos Land' als Dynamisierung von T.S. Eliots 'The Waste Land'
Schöneich, Dinah Mareike UL

in Pajevic, Marko (Ed.) Mehrsprachigkeit und das Politische. Interferenzen in zeitgenössischer deutschsprachiger und baltischer Literatur (2020)

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailA Worst-Case Performance Optimization Based Design Approach to Robust Symbol-Level Precoding for Downlink MU-MIMO
Haqiqatnejad, Alireza UL; Shahbazpanahi, Shahram UL; Ottersten, Björn UL

in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Ottawa 11-14 November 2019 (2020)

This paper addresses the optimization problem of symbol-level precoding (SLP) in the downlink of a multiuser multiple-input multiple-output (MU-MIMO) wireless system while the precoder's output is subject ... [more ▼]

This paper addresses the optimization problem of symbol-level precoding (SLP) in the downlink of a multiuser multiple-input multiple-output (MU-MIMO) wireless system while the precoder's output is subject to partially-known distortions. In particular, we assume a linear distortion model with bounded additive noise. The original signal-to-interference- plus-noise ratio (SINR) -constrained SLP problem minimizing the total transmit power is first reformulated as a penalized unconstrained problem, which is referred to as the relaxed robust formulation. We then adopt a worst-case design approach to protect the users' intended symbols and the targeted constructive interference with a desired level of confidence. Due to the non-convexity of the relaxed robust formulation, we propose an iterative algorithm based on the block coordinate ascent-descent method. We show through simulation results that the proposed robust design is flexible in the sense that the CI constraints can be relaxed so as to keep a desirable balance between achievable rate and power consumption. Remarkably, the new formulation yields more energy-efficient solutions for appropriate choices of the relaxation parameter, compared to the original problem. [less ▲]

Detailed reference viewed: 43 (9 UL)
See detailMale knjizevnosti: pregled pojmov
Glesener, Jeanne UL

in Koron, Alenka; Leben, Andrej (Eds.) Literarna vecjezicnost v slovenskem in avstrijskem konteksti (2020)

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailA Meta-level Annotation Language for Legal Texts
Libal, Tomer UL

in Lecture Notes in Computer Science (2020)

There are many legal texts which can greatly benefit from the supportof automated reasoning. Such support depends on the existence of a logical for-malization of the legal text. Among the methods used for ... [more ▼]

There are many legal texts which can greatly benefit from the supportof automated reasoning. Such support depends on the existence of a logical for-malization of the legal text. Among the methods used for the creation of theseknowledge bases, annotation tools attempt to abstract over the logical languageand support non-logicians in their efforts to formalize documents. Nevertheless,legal documents use a rich language which is not easy to annotate. In this paper,an existing annotation tool is being extended in order to support the formalization of a complex example - the GDPR’s article 13. The complexity of the article prevents a direct annotation using logical and deontical operators. This is overcome by the implementation of several macros. We demonstrate the automated reasoning over the formalized article and argue that macros can be used to formalizecomplex legal texts. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailCPSDebug: a tool for explanation of failures in cyber-physical systems
Bartocci, Ezio; Manjunath, Niveditha; Mariani, Leonardo et al

in CPSDebug: a tool for explanation of failures in cyber-physical systems (2020)

Debugging Cyber-Physical System models is often challenging, as it requires identifying a potentially long, complex and heterogenous combination of events that resulted in a violation of the expected ... [more ▼]

Debugging Cyber-Physical System models is often challenging, as it requires identifying a potentially long, complex and heterogenous combination of events that resulted in a violation of the expected behavior of the system. In this paper we present CPSDebug, a tool for supporting designers in the debugging of failures in MAT- LAB Simulink/Stateflow models. CPSDebug implements a gray-box approach that combines testing, specification mining, and failure analysis to identify the causes of failures and explain their propagation in time and space. The evaluation of the tool, based on multiple usage scenarios and faults and direct feedback from engineers, shows that CPSDebug can effectively aid engineers during debugging tasks. [less ▲]

Detailed reference viewed: 123 (0 UL)
Full Text
See detailComputational Metabolomics: From Cheminformatics to Machine Learning (Dagstuhl Seminar 20051)
Böcker, Sebastian; Broeckling, Corey; Schymanski, Emma UL et al

in Dagstuhl Reports (2020)

Dagstuhl Seminar 20051 on Computational Metabolomics is the third edition of seminars onthis topic and focused on Cheminformatics and Machine Learning. With the advent of higherprecision instrumentation ... [more ▼]

Dagstuhl Seminar 20051 on Computational Metabolomics is the third edition of seminars onthis topic and focused on Cheminformatics and Machine Learning. With the advent of higherprecision instrumentation, application of metabolomics to a wider variety of small molecules, andever increasing amounts of raw and processed data available, developments in cheminformaticsand machine learning are sorely needed to facilitate interoperability and leverage further insightsfrom these data. Following on from Seminars 17491 and 15492, this edition convened bothexperimental and computational experts, many of whom had attended the previous sessions andbrought much-valued perspective to the week’s proceedings and discussions. Throughout theweek, participants first debated on what topics to discuss in detail, before dispersing into smaller,focused working groups for more in-depth discussions. This dynamic format was found to bemost productive and ensured active engagement amongst the participants. The abstracts inthis report reflect these working group discussions, in addition to summarising several informalevening sessions. Action points to follow-up on after the seminar were also discussed, includingfuture workshops and possibly another Dagstuhl seminar in late 2021 or 2022. [less ▲]

Detailed reference viewed: 56 (2 UL)
Full Text
Peer Reviewed
See detailHigher-order graph convolutional embedding for temporal networks
Mo, Xian; Pang, Jun UL; Liu, Zhiming

in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailNeuLP: An End-to-End Deep-Learning Model for Link Prediction
Zhong, Zhiqiang UL; Zhang, Yang; Pang, Jun UL

in Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)

Detailed reference viewed: 106 (1 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 327 (79 UL)
Full Text
Peer Reviewed
See detailAlzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)
Beierle, Christof; Biryukov, Alex UL; Cardoso Dos Santos, Luan UL et al

in Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (2020)

Detailed reference viewed: 111 (9 UL)
Full Text
Peer Reviewed
See detailAuthentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets
Vazquez Sandoval, Itzel UL; Atashpendar, Arash; Lenzini, Gabriele UL

in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (2020)

We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password ... [more ▼]

We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password-authenticated key exchange (PAKE). This not only allows users to authenticate each other via shared low-entropy secrets, e.g., memorable words, without a public key infrastructure or a trusted third party, but it also paves the way for automation and a series of cryptographic enhancements; improves security by minimizing the impact of human error and potentially improves usability. First, we study a few vulnerabilities in voice-based out-of-band authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. Next, we propose solving the problem of secure equality test using PAKE to achieve entity authentication and to establish a shared high-entropy secret key. Our solution lends itself to offline settings, compatible with the inherently asynchronous nature of email and modern messaging systems. The suggested approach enables enhancements in key management such as automated key renewal and future key pair authentications, multi-device synchronization, secure secret storage and retrieval, and the possibility of post-quantum security as well as facilitating forward secrecy and deniability in a primarily symmetric-key setting. We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols. [less ▲]

Detailed reference viewed: 90 (19 UL)
Full Text
Peer Reviewed
See detailPost-Quantum Anonymous Veto Networks
Ding, Jintai; Emery, Doug; Mueller, Johannes UL et al

in E-Vote-ID 2020 (2020)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailSoK: Techniques for Verifiable Mix Nets
Mueller, Johannes UL

in Haines, Thomas; Mueller, Johannes (Eds.) IEEE Computer Security Foundations Symposium (2020)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detail(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
Iovino, Vincenzo; Rial, Alfredo UL; Roenne, Peter UL et al

in 2020 IEEE 33rd Computer Security Foundations Symposium (2020)

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailVote Selling Resistant Voting
Boyd, Colin; Haines, Thomas; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailFeatureNET: Diversity-driven Generation of Deep Learning Models
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in International Conference on Software Engineering (ICSE) (2020)

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailNGAP: a novel hybrid metaheuristic algorithm for round-trip carsharing fleet planning
Changaival, Boonyarit UL; Danoy, Grégoire UL; Kliazovich et al

in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020)

Detailed reference viewed: 32 (4 UL)
Full Text
Peer Reviewed
See detailReading Aloud in Human-Computer Interaction: How Spatial Distribution of Digital Text Units at an Interactive Tabletop Contributes to the Participants’ Shared Understanding
Heuser, Svenja UL; Arend, Béatrice UL; Sunnen, Patrick UL

in Staphanidis, Constantine; Kurosu, Masaaki; Degen, Helmut (Eds.) et al HCI International 2020 - Late Breaking Papers: Multimodality and Intelligence (2020)

This paper is concerned with how the spatial distribution of written informings in a serious game activity at an interactive tabletop (ITT) induces participants to read aloud interactionally relevant ... [more ▼]

This paper is concerned with how the spatial distribution of written informings in a serious game activity at an interactive tabletop (ITT) induces participants to read aloud interactionally relevant information to each other in the process of co-constructing a shared understanding. Engaging in an unfamiliar game activity, the participants are all equally dependent on written informings from the interface that serve as a game manual and provide crucial information for jointly achieving the game task(s). When it comes to making use of these written informings, we find the participants to read them aloud, making them accountable within the group. Our findings from multimodal video analysis of two reading-aloud cases suggest that the written informing’s directionality and distribution (here, either designed as ‘distributed’ or ‘shared’ among the interface) regulate the participants’ access to information. And that participants who cannot visually access the information they are interested in reading (aloud) co-organize fine-grained joint successive actions build on and actualized by read-aloud utterances. These joint actions allow them to align their orientation and share their understanding of game activity-relevant content. [less ▲]

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailVerifiable Inner Product Encryption Scheme
Soroush, Najmeh UL; Iovino, Vincenzo; Rial, Alfredo UL et al

in Public-Key Cryptography – PKC 2020 (2020)

Detailed reference viewed: 83 (3 UL)
Full Text
Peer Reviewed
See detailTowards Generalization of 3D Human Pose Estimation In The Wild
Baptista, Renato UL; Saint, Alexandre Fabian A UL; Al Ismaeil, Kassem UL et al

in International Conference on Pattern Recognition (ICPR) Workshop on 3D Human Understanding, Milan 10-15 January 2021 (2020)

In this paper, we propose 3DBodyTex.Pose, a dataset that addresses the task of 3D human pose estimation in-the-wild. Generalization to in-the-wild images remains limited due to the lack of adequate ... [more ▼]

In this paper, we propose 3DBodyTex.Pose, a dataset that addresses the task of 3D human pose estimation in-the-wild. Generalization to in-the-wild images remains limited due to the lack of adequate datasets. Existent ones are usually collected in indoor controlled environments where motion capture systems are used to obtain the 3D ground-truth annotations of humans. 3DBodyTex.Pose offers high quality and rich data containing 405 different real subjects in various clothing and poses, and 81k image samples with ground-truth 2D and 3D pose annotations. These images are generated from 200 viewpoints among which 70 challenging extreme viewpoints. This data was created starting from high resolution textured 3D body scans and by incorporating various realistic backgrounds. Retraining a state-of-the-art 3D pose estimation approach using data augmented with 3DBodyTex.Pose showed promising improvement in the overall performance, and a sensible decrease in the per joint position error when testing on challenging viewpoints. The 3DBodyTex.Pose is expected to offer the research community with new possibilities for generalizing 3D pose estimation from monocular in-the-wild images. [less ▲]

Detailed reference viewed: 65 (10 UL)
Full Text
Peer Reviewed
See detailSequential Temporary and Permanent Control of Boolean Networks.
Su, Cui; Pang, Jun UL

in Proceedings of the 18th International Conference on Computational Methods in Systems Biology (CMSB) (2020)

Detailed reference viewed: 74 (0 UL)
Full Text
Peer Reviewed
See detailAttack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees.
Gabbay, Dov M. UL; Horne, Ross James UL; Mauw, Sjouke UL et al

in Graphical Models for Security - 7th International Workshop (2020)

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailHow to Develop a GDPR-Compliant Blockchain Solution for Cross-Organizational Workflow Management: Evidence from the German Asylum Procedure.
Guggenmos, F; Lockl, J; Rieger, Alexander et al

in Proceedings of the Hawaii International Conference on System Sciences 2020 (2020)

Blockchain technology has the potential to resolve trust concerns in cross-organizational workflows and to reduce reliance on paper-based documents as trust anchors. Although these prospects are real, so ... [more ▼]

Blockchain technology has the potential to resolve trust concerns in cross-organizational workflows and to reduce reliance on paper-based documents as trust anchors. Although these prospects are real, so is regulatory uncertainty. In particular, the reconciliation of blockchain with Europe’s General Data Protection Regulation (GDPR) is proving to be a significant challenge. We tackled this challenge with the German Federal Office for Migration and Refugees. Here, we explain how we used Action Research to guide the Federal Office in creating a GDPR-compliant blockchain solution for the German asylum procedure. Moreover, we explain the architecture of the Federal Office’s solution and present two design principles for developing GDPR- compliant blockchain solutions for cross- organizational workflow management. [less ▲]

Detailed reference viewed: 52 (7 UL)