References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailTowards Meta Model Provenance: a Goal-Driven Approach to Document the Provenance of Meta Models
de Kinderen, Sybren; Kaczmarek-Heß, Monika; Ma, Qin UL et al

in Lecture Notes in Business Information Processing 305 (2017)

Detailed reference viewed: 68 (2 UL)
See detail"La partie du tout: Roland Barthes par Roland Barthes / W ou le souvenir d'enfance de Georges Perec"
Raus, Tonia UL

in Bertrand, Jean-Pierre (Ed.) Roland Barthes: continuités. Cerisy 2016 (2017)

Detailed reference viewed: 4 (1 UL)
Full Text
Peer Reviewed
See detailThe Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study
Glauner, Patrick UL; Du, Manxing UL; Paraschiv, Victor et al

in Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017) (2017)

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we ... [more ▼]

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we revisit this question from a quantitative perspective. Concretely, we collect 54K abstracts of papers published between 2007 and 2016 in leading machine learning journals and conferences. We then use machine learning in order to determine the top 10 topics in machine learning. We not only include models, but provide a holistic view across optimization, data, features, etc. This quantitative approach allows reducing the bias of surveys. It reveals new and up-to-date insights into what the 10 most prolific topics in machine learning research are. This allows researchers to identify popular topics as well as new and rising topics for their research. [less ▲]

Detailed reference viewed: 180 (24 UL)
Full Text
Peer Reviewed
See detailIdentités monastiques dans un monde bouleversé: Représentations identitaires dans la Chronique de Saint-Hubert dite Cantatorium (diocèse de Liège, début XIIe s.)
Margue, Michel UL

in Vanderputten, Steven; Tjamke, Snijders; Diehl, Jay (Eds.) Medieval Liège at the crossroads of Europe: monastic society and culture, 1000 - 1300 (2017)

This volume collects studies on the role of monastic institutions in the exchange of cultural and socio-economic capital in the medieval diocese of Liège. During the high Middle Ages, the bishopric of ... [more ▼]

This volume collects studies on the role of monastic institutions in the exchange of cultural and socio-economic capital in the medieval diocese of Liège. During the high Middle Ages, the bishopric of Liège found itself at a cultural crossroads between the German Empire and the French lordships. The Liègeois themselves summed up the situation when they declared that: ‘Gaul considers us its most distant inhabitants, Germany as nearby citizens. In fact we are neither, but both at the same time’. This same complexity is also echoed by present-day historians, who have described Liège as a hub of interactions between two great civilisations. Medieval monastic communities in Liège were key sites of this exchange, actively participating in the cultural developments, social networks, and political structures of both regions. Bringing together the work of international scholars, this collection of essays addresses the problem of monastic identity and its formation in a region that was geographically wedged between two major competing socio-political powers. It investigates how monastic communities negotiated the uncertainties of this situation, while also capitalizing on the opportunities it presented. As such, this book sheds light on the agency of monastic identity formation in a small but complex region caught at the crossroads of two major powers. [less ▲]

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailQuantifying location sociality
Pang, Jun UL; Zhang, Yang

in Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (2017)

Detailed reference viewed: 94 (1 UL)
Full Text
Peer Reviewed
See detailConflict handling for autonomic systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Procedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Tucson, AZ, USA 18-22 September 2017 (2017)

Technological advances in recent years lead to the miniaturization of a whole arsenal of different sensors. They can be used to offer new services in eHealth applications, smart homes, robotics or smart ... [more ▼]

Technological advances in recent years lead to the miniaturization of a whole arsenal of different sensors. They can be used to offer new services in eHealth applications, smart homes, robotics or smart cities. With the increasing diversity and the cooperation needed between these sensors in order to provide the best possible services to the user the systems that use the data coming from these sensors need to be able to handle conflicting information and thus also conflicting actions. In this paper we propose an approach that uses Hidden Markov Models in a first step to analyse the incoming data and in a second step uses a rule engine in order to handle the occurring conflicts. [less ▲]

Detailed reference viewed: 112 (12 UL)
Full Text
Peer Reviewed
See detailAutomatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Milner, Kevin; Cremers, Cas; Yu, Jiangshan UL et al

in 30th IEEE Computer Security Foundations Symposium (2017)

Detailed reference viewed: 124 (14 UL)
See detailChristoph Schlingensief’s Theatre and the African Opera Village. Rediscovery (of African artistic practices)
Nonoa, Koku Gnatuloma UL

in Lehmann, Fabian; Siegert, Nadine; Vierke (Eds.) Schlingensief’s Crossing of Wagner and Africa (2017)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailAutomated labeling of unknown contracts in Ethereum
Norvill, Robert UL; Fiz Pontiveros, Beltran UL; State, Radu UL et al

in Computer Communication and Networks (ICCCN), 2017 26th International Conference on (2017)

Smart contracts have recently attracted interest from diverse fields including law and finance. Ethereum in particular has grown rapidly to accommodate an entire ecosystem of contracts which run using its ... [more ▼]

Smart contracts have recently attracted interest from diverse fields including law and finance. Ethereum in particular has grown rapidly to accommodate an entire ecosystem of contracts which run using its own crypto-currency. Smart contract developers can opt to verify their contracts so that any user can inspect and audit the code before executing the contract. However, the huge numbers of deployed smart contracts and the lack of supporting tools for the analysis of smart contracts makes it very challenging to get insights into this eco-environment, where code gets executed through transactions performing value transfer of a crypto-currency. We address this problem and report on the use of unsupervised clustering techniques and a seed set of verified contracts, in this work we propose a framework to group together similar contracts within the Ethereum network using only the contracts publicly available compiled code. We report qualitative and quantitative results on a dataset and provide the dataset and project code to the research community. [less ▲]

Detailed reference viewed: 60 (2 UL)
Full Text
Peer Reviewed
See detailDeepCity: A Feature Learning Framework for Mining Location Check-Ins
Pang, Jun UL; Zhang, Yang

in Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (2017)

Detailed reference viewed: 89 (6 UL)
Full Text
Peer Reviewed
See detailSelf-Regulated Multi-criteria Decision Analysis: An Autonomous Brokerage-Based Approach for Service Provider Ranking in the Cloud
Wasim, Muhammad Umer UL; Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Bouvry, Pascal UL et al

in 9th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2017), December 11-14, Hong Kong China. (2017)

The use of multi-criteria decision analysis (MCDA) by online broker to rank different service providers in the Cloud is based upon criteria provided by a customer. However, such ranking is prone to bias ... [more ▼]

The use of multi-criteria decision analysis (MCDA) by online broker to rank different service providers in the Cloud is based upon criteria provided by a customer. However, such ranking is prone to bias if the customer has insufficient domain knowledge. He/she may exclude relevant or include irrelevant criterion termed as ’misspecification of criterion’. This causes structural uncertainty within the MCDA leading to selection of suboptimal service provider by online broker. To cater such issue, we propose a self-regulated MCDA, which uses notion of factor analysis from the field of statistics. Two QoS based datasets were used for evaluation of proposed model. The prior dataset i.e., feedback from customers, was compiled using leading review websites such as Cloud Hosting Reviews, Best Cloud Computing Providers, and Cloud Storage Reviews and Ratings. The later dataset i.e., feedback from servers, was generated from Cloud brokerage architecture that was emulated using high performance computing (HPC) cluster at University of Luxembourg (HPC @ Uni.lu). The results show better performance of proposed model as compared to its counterparts in the field. The beneficiary of the research would be enterprises that view insufficient domain knowledge as a limiting factor for acquisition of Cloud services. [less ▲]

Detailed reference viewed: 187 (20 UL)
Full Text
Peer Reviewed
See detailModeling inter/trans granular failure using an anisotropic phase field approach
Nguyen, Thanh Tung UL; Réthoré, Julien; Yvonnet, Julien et al

in Fifth International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2017)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailMemoria documentaria e confezione di cartulari medievali nelle abbazie cistercensi: il caso di Chiaravalle milanese
Salemme, Timothy UL

in D'Acunto, Nicolangelo; Cariboni, Guido (Eds.) Costruzione identitaria e spazi sociali. Nuovi studi sul monachesimo cistercense nel Medioevo. Atti dell’Incontro di studio, Milano, 1-2 dicembre 2015, (2017)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailTowards a Real-Time Driver Identification Mechanism Based on Driving Sensing Data
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in 20th International Conference on Intelligent Transportation Systems (ITSC) (2017)

Detailed reference viewed: 210 (26 UL)
Full Text
Peer Reviewed
See detailManaging the Functional Variability of Robotic Perception Systems
Brugali, Davide; Hochgeschwender, Nico UL

in Proceedings of the IEEE International Conference on Robotic Computing (2017)

Detailed reference viewed: 99 (3 UL)
Full Text
Peer Reviewed
See detailThe Justification of Tyrannicide in the Chronicle of Dalimil. The Czech Nobility as the “Mystical Body” of the Realm.
Vomacka, Eloïse UL

in Valdoliso, Covadonga (Ed.) Debuerit habere regnum. Deposing and Proclaiming Kings in the Middle Ages (2017)

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailReverse Bayesian poisoning: How to use spam filters to manipulate online elections
Jonker, Hugo; Mauw, Sjouke UL; Schmitz, Tom UL

in Krimmer, L. (Ed.) Proc. 2nd International Joint Conference on Electronic Voting (2017)

E-voting literature has long recognised the threat of denial-of-service attacks: as attacks that (partially) disrupt the services needed to run the voting system. Such attacks violate availability ... [more ▼]

E-voting literature has long recognised the threat of denial-of-service attacks: as attacks that (partially) disrupt the services needed to run the voting system. Such attacks violate availability. Thankfully, they are typically easily detected. We identify and investigate a denial-of-service attack on a voter's spam filters, which is not so easily detected: reverse Bayesian poisoning, an attack that lets the attacker silently suppress mails from the voting system. Reverse Bayesian poisoning can disenfranchise voters in voting systems which rely on emails for essential communication (such as voter invitation or credential distribution). The attacker stealthily trains the voter's spam filter by sending spam mails crafted to include keywords from genuine mails from the voting system. To test the potential effect of reverse Bayesian poisoning, we took keywords from the Helios voting system's email templates and poisoned the Bogofilter spam filter using these keywords. Then we tested how genuine Helios mails are classified. Our experiments show that reverse Bayesian poisoning can easily suppress genuine emails from the Helios voting system. [less ▲]

Detailed reference viewed: 96 (1 UL)
Full Text
Peer Reviewed
See detailZeroizing Attacks on Indistinguishability Obfuscation over CLT13
Coron, Jean-Sébastien UL; Lee, Moon Sung; Lepoint, Tancrede et al

in Proceedings of PKC 2017 (2017)

Detailed reference viewed: 115 (18 UL)
Full Text
Peer Reviewed
See detailContour Drawing and Detection for Collaborative Context-Aware Mobile Training and Exploration
Botev, Jean UL; Rothkugel, Steffen UL; Mayer, Joe

in Proceedings of the 16th World Conference on Mobile and Contextual Learning (mLearn) (2017)

Detailed reference viewed: 105 (16 UL)
Full Text
Peer Reviewed
See detailPermanent Reencryption: How to Survive Generations of Cryptanalysts to Come
Volp, Marcus UL; Rocha, Francisco; Decouchant, Jérémie UL et al

in Twenty-fifth International Workshop on Security Protocols (2017)

Detailed reference viewed: 239 (25 UL)
Full Text
Peer Reviewed
See detailLaw as a Service (LaaS): Enabling Legal Protection over a Blockchain Network
Wasim, Muhammad Umer UL; Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Bouvry, Pascal UL et al

in 14th International Conference on Smart Cities: Improving Quality of Life using ICT & IoT (HONET-ICT 17), October 09-11, Irbid Jordan. (2017)

Breaches in online contracts (Service Level Agreements, SLAs) are usually compensated by gift vouchers at present, however as the online contracts emerge towards smart contracts, the breaches could ... [more ▼]

Breaches in online contracts (Service Level Agreements, SLAs) are usually compensated by gift vouchers at present, however as the online contracts emerge towards smart contracts, the breaches could potentially lead to court injunctions over blockchains. This research proposes Probability based Factor Model (PFM) that can be implemented over the blockchain to automatically identify breaches that can cause substantial damage and have high probability for recurrence. PFM can also issue court injunctions for the breaches. The underlying concept in PFM is built upon the notion of factor analysis and stochastic modeling from the discipline of Data Science. High performance computing (HPC) cluster at University of Luxembourg (HPC @ Uni.lu) and docker (a software container platform) were used to emulate contractual environment of three service providers: Redis, MongoDB, and Memcached Servers. The results showed that court injunction(s) was issued only for Redis and MongoDB Servers. Technically, this difference could be attributed to the fact that Memcached is simply used for caching and therefore, it is less prone to breach of contract. Whereas, Redis and MongoDB as databases and message brokers are performing more complex operations and are more likely to cause a breach. This research will benefit enterprises that view breach of contract as a limiting factor for implementation of smart contract in cyber physical system or internet of things. [less ▲]

Detailed reference viewed: 339 (41 UL)
Full Text
See detailPID and Biomimetic Variable Structure Path Tracking Control in Automated Surface Finishing Processes
Klecker, Sophie UL; Plapper, Peter UL; Hichri, Bassem UL

in Robotix-Academy Conference for Industrial Robotics (RACIR) 2017 (2017)

This paper addresses freeform surface following control as one of the main challenges in automating surface finishing processes. Successive changes in constraints between the tool attached to the robotic ... [more ▼]

This paper addresses freeform surface following control as one of the main challenges in automating surface finishing processes. Successive changes in constraints between the tool attached to the robotic manipulator and its surroundings are due to complex workpiece-geometries and result in a switched nonlinear system. The control problem of the latter is addressed by industrial state-of-the-art conventional PID control as well as by biomimetic variable structure control which are both applied to a benchmark path tracking problem as characteristically encountered in surface finishing. [less ▲]

Detailed reference viewed: 86 (8 UL)
Full Text
Peer Reviewed
See detailFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis
Huynen, Jean-Louis UL; Lenzini, Gabriele UL

in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied ... [more ▼]

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodology works also retrospectively. It assists analysts in retrieving the causes of an observed socio-technical attack, guiding them to understand where the information security management of the system has failed. The methodology is tuned to find causes that root in the human-related factors that an attacher can exploit to execute its intrusion. [less ▲]

Detailed reference viewed: 298 (17 UL)
See detailAspects diplomatiques des relations entre la papauté et les premiers chanoines réguliers en Lorraine (fin XIe - début XIIe siècles)
Engl, Hannes UL

in Nowak, Jessika (Ed.) Deutsch-Französisches Forschungsatelier 'Junge Mediävistik II' - Lotharingien (2017)

Detailed reference viewed: 75 (6 UL)
Full Text
Peer Reviewed
See detailA new decomposition method for attractor detection in large synchronous Boolean networks
Mizera, Andrzej UL; Pang, Jun UL; Qu, Hongyang et al

in Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (2017)

Detailed reference viewed: 126 (5 UL)
Full Text
Peer Reviewed
See detailUsing Hidden Markov Models and Rule-based Sensor Mediation on Wearable eHealth Devices
Neyens, Gilles UL; Zampunieris, Denis UL

in Procedings of the 11th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Barcelona, Spain 12-16 November 2017 (2017)

Improvements in sensor miniaturization allow wearable devices to provide more functionality while also being more comfortable for users to wear. The Samsung Simband©, for example, has 6 different sensors ... [more ▼]

Improvements in sensor miniaturization allow wearable devices to provide more functionality while also being more comfortable for users to wear. The Samsung Simband©, for example, has 6 different sensors Electrocardiogram (ECG), Photoplethysmogram (PPG), Galvanic Skin Response (GSR), Bio-Impedance (Bio-Z), Accelerometer and a thermometer as well as a modular sensor hub to easily add additional ones. This increased number of sensors for wearable devices opens new possibilities for a more precise monitoring of patients by integrating the data from the different sensors. This integration can be influenced by failing or malfunctioning sensors and noise. In this paper, we propose an approach that uses Hidden Markov Models (HMM) in combination with a rule-based engine to mediate among the different sensors’ data in order to allow the eHealth system to compute a diagnosis on the basis of the selected reliable sensors. We also show some preliminary results about the accuracy of the first stage of the proposed model. [less ▲]

Detailed reference viewed: 108 (8 UL)
Full Text
Peer Reviewed
See detailA Tool for Energy Management and Cost Assessment of Pumps in Waste Water Treatment Plant
Torregrossa, Dario; Leopold, Ulrich; Hernández-Sancho, Francesc et al

in Data, Information and Knowledge Visualization in Decision Support Systems, 282 (2017)

Detailed reference viewed: 54 (4 UL)
Full Text
Peer Reviewed
See detailEffects of adsorptive properties of sludge on engineered nanoparticles (Ag, TiO2, ZnO) during anaerobic digestion process
Rahimi, Anahita; Hansen, Joachim UL

in Proceeding of Nanoimpact Conference, Nanomaterial Fate and Speciation in the Environment, Monte Verita 2017 (2017)

Detailed reference viewed: 118 (8 UL)
Full Text
Peer Reviewed
See detailThe Conjoint Modeling of Value Networks and Regulations of Smart Grid Platforms: A Luxembourg Case Study
Razo-Zapata, Iván S.; Ma, Qin UL; Kaczmarek-Heß, Monika et al

in 19th IEEE Conference on Business Informatics, CBI 2017, Thessaloniki, Greece, July 24-27, 2017, Volume 2: Workshop Papers (2017)

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailSmallholder Farmers’ Adaptations of Agroecology in the Context of Livelihood Asset-Deprivation: Social and Ecological Consequences in Bilanga, Burkina Faso
Kapgen, Diane UL; Roudart, Laurence

in Tielkes, Eric (Ed.) Tropentag 2017: Future Agriculture: Social-ecological transitions and bio-cultural shifts (2017)

Detailed reference viewed: 31 (2 UL)
Peer Reviewed
See detailContrast classification rules for mining local differences in medical data
Aleksandrova, Marharyta UL; Chertov, Oleg; Brun, Armelle et al

in Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017 9th IEEE International Conference on (2017)

Detailed reference viewed: 107 (4 UL)
Full Text
Peer Reviewed
See detailDistributed Document Authoring for Location-Independent Collaborative Learning
Klein, Johannes UL; Botev, Jean UL; Rothkugel, Steffen UL

in ICERI 2017 Proceedings (2017)

Employing computer-supported collaborative learning for cooperative problem solving or as the basis for a shared learning environment regularly entails arbitrary restrictions and requirements for the ... [more ▼]

Employing computer-supported collaborative learning for cooperative problem solving or as the basis for a shared learning environment regularly entails arbitrary restrictions and requirements for the participants. Frequent interruptions to the individual’s and the group’s workflow due to transitions between data type-specific applications, the manual synchronization of one’s work, or the prerequisite of a constant server connection are common examples. In this paper, we propose the utilization of a distributed compound document authoring environment to address these issues and apply a user-centric rather than the traditional, system-focussed perspective on computer-supported collaborative learning. This includes fine-granular, real-time management and assessment functionalities for the supervisor as well as a responsive, unobtrusive and feature-rich work environment for the participants. [less ▲]

Detailed reference viewed: 107 (15 UL)
Full Text
Peer Reviewed
See detailExamination of a New Defense Mechanism: Honeywords
Genç, Ziya Alper UL; Kardaş, Süleyman; Kiraz,

in Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice (2017)

Past experiences show us that password breach is still one of the main methods of attackers to obtain personal or sensitive user data. Basically, assuming they have access to list of hashed passwords ... [more ▼]

Past experiences show us that password breach is still one of the main methods of attackers to obtain personal or sensitive user data. Basically, assuming they have access to list of hashed passwords, they apply guessing attacks, i.e., attempt to guess a password by trying a large number of possibilities. We certainly need to change our way of thinking and use a novel and creative approach in order to protect our passwords. In fact, there are already novel attempts to provide password protection. The Honeywords system of Juels and Rivest is one of them which provides a detection mechanism for password breaches. Roughly speaking, they propose a method for password-based authentication systems where fake passwords, i.e., "honeywords" are added into a password file, in order to detect impersonation. Their solution includes an auxiliary secure server called "honeychecker" which can distinguish a user's real password among her honeywords and immediately sets off an alarm whenever a honeyword is used. However, they also pointed out that their system needs to be improved in various ways by highlighting some open problems. In this paper, after revisiting the security of their proposal, we specifically focus on and aim to solve a highlighted open problem, i.e., active attacks where the adversary modifies the code running on either the login server or the honeychecker. [less ▲]

Detailed reference viewed: 199 (4 UL)
Full Text
Peer Reviewed
See detailModel-driven situational awareness for moving target defense
Jhawar, Ravi UL; Mauw, Sjouke UL

in Scanlon, Marc; Le-Khac, Nhien-An (Eds.) Proc. 16th European Conference on Cyber Warfare and Security (2017)

Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations to attackers. This approach decreases the success probabilities of attacks and increases attacker's ... [more ▼]

Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations to attackers. This approach decreases the success probabilities of attacks and increases attacker's workload since she must continually re-assess, re-engineer and re-launch her attacks. Existing research has provided a number of MTD techniques but approaches for gaining situational awareness and deciding when/how to apply these techniques are not well studied. In this paper, we present a conceptual framework that closely integrates a set of models with the system and obtains up-to-date situational awareness following the OODA loop methodology. To realize the framework, as the first step, we propose a modelling approach that provides insights about the dynamics between potential attacks and defenses, impact of attacks and adaptations on the system, and the state of the system. Based on these models, we demonstrate techniques to quantitatively assess the effectiveness of MTD and show how to formulate decision-making problems. [less ▲]

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailRAT 2.0
Höhn, Winfried UL; Schommer, Christoph UL

in Digital Humanities 2017: Conference Abstracts (2017)

Detailed reference viewed: 108 (9 UL)
Full Text
Peer Reviewed
See detailThe Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Advances in Cybersecurity 2017 (2017)

Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely ... [more ▼]

Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely just the beginning of a new era. According to a recent intelligence report by Cybersecurity Ventures, the total cost due to ransomware attacks is predicted to exceed $5 billion in 2017. How can this disruptive threat can be contained? Current anti-ransomware solutions are effective only against existing threats, and the worst is yet to come. Cyber criminals will design and deploy more sophisticated strategies, overcoming current defenses and, as it commonly happens in security, defenders and attackers will embrace a competition that will never end. In this arm race, anticipating how current ransomware will evolve may help at least being prepared for some future damage. In this paper, we describe existing techniques to mitigate ransomware and we discuss their limitations. Discussing how current ransomware could become even more disruptive and elusive is crucial to conceive more solid defense and systems that can mitigate zero-day ransomware, yielding higher security levels for information systems, including critical infrastructures such as intelligent transportation networks and health institutions. [less ▲]

Detailed reference viewed: 548 (20 UL)
Full Text
Peer Reviewed
See detailRecurrent Dynamical Projection for Time series-based Fraud detection
Antonelo, Eric Aislan UL; State, Radu UL

in ICANN 2017, Part II, LNCS 10614 (2017)

Detailed reference viewed: 141 (9 UL)
Full Text
Peer Reviewed
See detailModelling of microcracking in image-based models of highly heterogeneous materials using the phase field method
Yvonnet, Julien; Nguyen, Thanh Tung UL; Bornert, Michel et al

in 7th GACM Colloquium on Computational Mechanics (2017)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailAuthenticating compromisable storage systems
Yu, Jiangshan UL; Ryan, Mark; Chen, Liqun

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2017)

Detailed reference viewed: 92 (8 UL)
Full Text
Peer Reviewed
See detailA Combinatorial Solution to Non-Rigid 3D Shape-to-Image Matching
Bernard, Florian UL; Schmidt, Frank R.; Thunberg, Johan UL et al

in The proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017)

We propose a combinatorial solution for the problem of non-rigidly matching a 3D shape to 3D image data. To this end, we model the shape as a triangular mesh and allow each triangle of this mesh to be ... [more ▼]

We propose a combinatorial solution for the problem of non-rigidly matching a 3D shape to 3D image data. To this end, we model the shape as a triangular mesh and allow each triangle of this mesh to be rigidly transformed to achieve a suitable matching to the image. By penalising the distance and the relative rotation between neighbouring triangles our matching compromises between the image and the shape information. In this paper, we resolve two major challenges: Firstly, we address the resulting large and NP-hard combinatorial problem with a suitable graph-theoretic approach. Secondly, we propose an efficient discretisation of the unbounded 6-dimensional Lie group SE(3). To our knowledge this is the first combinatorial formulation for non-rigid 3D shape-to-image matching. In contrast to existing local (gradient descent) optimisation methods, we obtain solutions that do not require a good initialisation and that are within a bound of the optimal solution. We evaluate the proposed combinatorial method on the two problems of non-rigid 3D shape-to-shape and non-rigid 3D shape-to-image registration and demonstrate that it provides promising results. [less ▲]

Detailed reference viewed: 98 (6 UL)
Full Text
Peer Reviewed
See detailConcurrency-Based and User-Centric Collaboration for Distributed Compound Document Authoring
Klein, Johannes UL; Botev, Jean UL; Rothkugel, Steffen UL

in Proceedings of the 2017 IEEE 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD) (2017)

The collaborative authoring of complex document structures by geographically distributed users is no longer a special case in today's global economy or people's personal lives. However, integrating single ... [more ▼]

The collaborative authoring of complex document structures by geographically distributed users is no longer a special case in today's global economy or people's personal lives. However, integrating single-user application responsiveness and feature sets with the additional demands and expectations presented towards distributed multi-user environments remains a challenge. Current solutions approaching this challenge almost exclusively rely on traditional, file-based data structures. This often introduces arbitrary workflow restrictions to the user and reduces the potential to benefit from an otherwise inherently concurrent system. Our distributed compound document authoring environment aims at addressing these challenges while providing system-level collaboration support to the user. We attain this through the close integration of a fine-grained data structure with a highly scalable, priority-based concurrency model for command distribution and application. This paper discusses our enhanced data representation and concurrency model together with the evaluation of their prototypical implementation. [less ▲]

Detailed reference viewed: 92 (13 UL)
Full Text
Peer Reviewed
See detailQuality of doctor-patient communication in cardiovascular diseases and secondary preventive adherence. The role of gender
Bucki, Barbara UL; Le Bihan, Etienne UL; Baumann, Michèle UL

in Innovative ideas in Health Psychology (2017)

The doctor-patient communication intervenes on the preventive behaviours of chronic patients by reducing their risk factors – in cardiovascular diseases: hypertension, overweight, obesity ... [more ▼]

The doctor-patient communication intervenes on the preventive behaviours of chronic patients by reducing their risk factors – in cardiovascular diseases: hypertension, overweight, obesity, hypercholesterolemia, diabetes. What are the associations between the quality of communication and the improvement of secondary preventive behaviours? How does gender influence these relationships? Methods: 1,289 patients who underwent a coronary angiography in 2008/09 in Luxembourg completed a self-administered questionnaire at the time of the visit, and at a five-year follow-up. The probability of improving each preventive eating behaviour (decrease of salt, sugar, fat consumption and increase of fruits/vegetables), and the quality of doctor-patient communication (5-item scale) were evaluated using logistic regression models. Sex was introduced in interaction with the communication score. Findings: Among hypertensive respondents, a higher quality of communication was associated with a higher probability of decreasing the salt intake in women (OR [95% CI]: 1.139 [1.060; 1.223]) whereas in men, the OR was only 1.086 [1.017; 1.159]. ORs were also higher in women among patients with hypertension, overweight and hypercholesterolemia regarding the increase of fruits/vegetables consumption; among patients with diabetes and hypercholesterolemia regarding sugar decrease or cessation; and among patients with overweight and hypercholesterolemia regarding fat reduction or stop. ORs were slightly higher among men only among diabetic and obese patients, regarding the increase of fruits/vegetables consumption. Discussion: The quality of the communication showed an effect on the adoption of secondary preventive eating behaviours, especially in women patients. Motivational interviews could encourage, especially men patients, to adhere to the recommendations about lifestyle change. [less ▲]

Detailed reference viewed: 220 (13 UL)
Full Text
Peer Reviewed
See detailGeoreferencing of Place Markers in Digitized Early Maps by Using Similar Maps as Data Source
Höhn, Winfried UL; Schommer, Christoph UL

in Digital Humanities 2017: Conference Abstracts (2017)

Detailed reference viewed: 109 (14 UL)
See detailLuxemburg, Brabant und die Karolinger. Versuch einer Neubewertung der Selbstdarstellung der beiden ersten Kaiser aus dem Hause Luxemburg
Vomacka, Eloïse UL; Margue, Michel UL

in Dolezalova, Eva (Ed.) Ověnčený slávou, láskou i pohrdáním. Jan Lucemburský a Karel IV. v historické paměti (2017)

Detailed reference viewed: 61 (4 UL)
See detailDie deutschsprachige Übersetzung der Dalimil-Chronik. Ein Versuch der politischen Legitimation der städtischen Eliten im Böhmen der Luxemburger?
Vomacka, Eloïse UL

in Sieburg, Heinz (Ed.) Prag in der Zeit der Luxemburger. Literatur, religiöse Ideen und Herrschaftskulturen zwischen Bereicherung und Behauptung (2017)

Detailed reference viewed: 50 (5 UL)
Full Text
Peer Reviewed
See detailOptimized event notification in CAN through in-frame replies and Bloom filters
Bloom, Gadare; Cena, Gianluca; Cibrario Bertolotti, Ivan et al

in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS) (2017)

Thanks to its distributed and asynchronous medium access control mechanism, CAN is the ideal choice for interconnecting devices in event-driven systems. When timing requirements of applications are not ... [more ▼]

Thanks to its distributed and asynchronous medium access control mechanism, CAN is the ideal choice for interconnecting devices in event-driven systems. When timing requirements of applications are not particularly demanding, as in the case of, e.g., reactive and proactive maintenance, constraints on event delivery can be relaxed, so that their notification may rely on best-effort approaches. In this paper, a number of techniques are taken into account for notifying events in such a kind of systems, and their performance has been evaluated. Besides conventional CAN, a recent proposal for extending this protocol, termed CAN XR, is considered. Moreover, the adoption of Bloom filters to cope with rare events in very large systems has also been evaluated. [less ▲]

Detailed reference viewed: 101 (16 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (2017)

Detailed reference viewed: 95 (9 UL)
Full Text
Peer Reviewed
See detailInterozeption und Stress: die Psychophysiologie der bi-direktionalen Kommunikation auf der Hirn-Körper-Achse
Schulz, André UL

in Schächinger, H. (Ed.) Abstractband 43. Tagung Psychologie und Gehirn (2017)

Gehirn und Körper tauschen permanent Informationen aus. Interozeption, die Wahrnehmung von Körperprozessen, ist ein wichtiges Beispiel für aufsteigende Informationsübermittlung vom Körper zum Gehirn ... [more ▼]

Gehirn und Körper tauschen permanent Informationen aus. Interozeption, die Wahrnehmung von Körperprozessen, ist ein wichtiges Beispiel für aufsteigende Informationsübermittlung vom Körper zum Gehirn. Stress wiederum kann als prototypisch für absteigende Informationen vom Gehirn zum Körper gesehen werden. Eine Veränderung der Kommunikation auf der Hirn-Körper-Achse kann zur Entstehung körperlicher Symptome bei psychischen Störungen führen. Neueste Theorien zu Interozeption weisen darauf hin, dass es sich nicht um ein uniformes Konstrukt handelt, sondern in die Facetten ‚Bewusstheit‘ (Awareness), ‚Sensibilität‘ (Sensibility), ‚Genauigkeit‘ (Accuracy) und ZNS-Repräsentation afferenter Körpersignale separiert werden kann. Körperliche Symptome können aus der selektiven Veränderung weniger Facetten entstehen. Stress kann differenziert werden in psychologische (selbstberichteten Stress), sowie physiologische Komponenten, wie die Aktivität der beiden physiologischen Stressachsen, des autonomen Nervensystems und der HPA-Achse. In diesem Symposium werden erstmals Erkenntnisse zum Zusammenhang von Interozeption und Stress auf allen Beobachtungsebenen integriert. Zunächst werden Zusammenhänge von akuter Stressreaktivität und –Erholung mit ‚Interozeptiver Genauigkeit‘ bei gesunden Probanden diskutiert (van Dyck/Luxemburg). Anschließend werden Erkenntnisse zu chronischem Stress, ‚Interozeptiver Bewusstheit‘ und gesundheitlichen Beschwerden bei Angestellten präsentiert (Trojan/Landau). Danach wird die ZNS-Repräsentation von Körpersignalen und ‚Interozeptive Genauigkeit‘ bei Kindern und Jugendlichen besprochen (Mai/Ulm), da sich das Jugendalter als entwicklungsbedingte Phase besonderer Stressvulnerabilität erweist. Im der folgenden Studie wird ‚Interozeptive Genauigkeit‘, Stressbelastung und –reaktivität bei Erwachsenen mit einer Trennungserfahrung der Eltern im Kindesalter als Stressor untersucht (Schaan/Luxemburg). Abschließend werden Daten zu ZNS-Repräsentation von Körpersignalen und HPA-Achsenaktivität bei posttraumatischer Belastungsstörung präsentiert (Müller/Heidelberg). Letztlich wird eine Synthese der Einzelbefunde in eine erweiterte Theorie zu Interozeption und Stress diskutiert. [less ▲]

Detailed reference viewed: 199 (2 UL)
Full Text
Peer Reviewed
See detailClosing or Persisting Gender Gap? A Cohort Analysis of Education and Wages in the United States and Europe
Chauvel, Louis UL; Hartung, Anne UL; Bar-Haim, Eyal UL

in Population Association of America - PAA Annual Meeting 2017 (2017)

Detailed reference viewed: 110 (10 UL)
Full Text
Peer Reviewed
See detailZusammenhang zwischen interozeptiver Genauigkeit und kardiovaskulärer Veränderung nach akutem Stress bei gesunden Frauen
Rost, Silke UL; Van Dyck, Zoé UL; Schulz, André UL et al

in Schächinger, H. (Ed.) Abstractband 43. Tagung Psychologie und Gehirn (2017)

Einleitung:Interozeption als afferente und Stressverarbeitung als efferente Informationsverarbeitung können als komplementär hinsichtlich der Kommunikation zwischen Körper und Gehirn verstanden werden. Es ... [more ▼]

Einleitung:Interozeption als afferente und Stressverarbeitung als efferente Informationsverarbeitung können als komplementär hinsichtlich der Kommunikation zwischen Körper und Gehirn verstanden werden. Es wurde gezeigt, dass stressbedingte veränderte kardiovaskuläre Prozesse mit veränderter Interozeption zusammenhängen und in körperlichen Beschwerden resultieren können. Wenig erforscht ist in diesem Kontext jedoch die psychologische sowie physiologische Erregung, welche mit einem akuten mentalen Stressor einhergeht. Ziel der vorliegenden Studie ist es, diese Lücke zu schließen und den Zusammenhang zwischen interozeptiver Genauigkeit und kardiovaskulärer Reaktivität und Erholung nach einem mentalen Stressor in einer gesunden Stichprobe zu untersuchen. Methode: Es wurde die Pulsfrequenz von 69 Frauen (MAlter = 24.20 Jahre, Range 18-50 Jahre; MBMI = 23.19, Range 17.19-34.48) zur späteren Bestimmung der Herzratenvariabilität (HRV) gemessen. Zur Bestimmung der interozeptiven Genauigkeiten führten die Teilnehmerinnen eine Herzschlagzählaufgabe durch und als mentalen Stressor setzten wir eine choice reaction time task (CRTT) ein. Die Pulsfrequenz wurde während der CRTT sowie während einer 10-minütigen Erholungsphase aufgezeichnet um Werte der kardiovaskulären Stressreaktivität und – erholung zu erfassen. Ergebnisse: DieErgebnisse zeigten keinen Zusammenhang zwischen interozeptiver Genauigkeit und HRV-Reaktivität auf akuten mentalen Stress (r = .042, p = .785). Der Zusammenhang zwischen interozeptiver Genauigkeit und kardiovaskulärer Stresserholung nach der CRTT war negativ (r = -.377; p = .012). Diskussion: Ergebnisse der vorliegenden Studie liefern erste Hinweise dafür, dass eine gute Interozeptionsfähigkeit mit einer besseren kardiovaskulären Erholung nach einem mentalen Stressor zusammenhängen, d.h. kardiovaskuläre Prozesse positiv beeinflussen kann. Interventionen zur Verbesserung der Interozeptionsfähigkeit könnten kardiovaskuläre Erholung erleichtern und das damit einhergehende Risiko zukünftiger Herz-Kreislauf- Probleme verringern. [less ▲]

Detailed reference viewed: 110 (12 UL)
Full Text
Peer Reviewed
See detailBayesian Optimization Approach of General Bi-level Problems
Kieffer, Emmanuel UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in Proceedings of the Genetic and Evolutionary Computation Conference Companion (2017)

Detailed reference viewed: 174 (17 UL)
Full Text
Peer Reviewed
See detailDer Übergang in Arbeit und seine Auswirkungen auf die gesellschaftliche Integration und das Erwachsenwerden. Transitionsverläufe, Probleme und Bewältigungsmuster von Jugendlichen und jungen Erwachsenen.
Weis, Daniel UL; Joachim, Patrice UL

in Stephan Lessenich (Hg.) 2017: Geschlossene Gesellschaften. Verhandlungen des 38. Kongresses der Deutschen Gesellschaft für Soziologie in Bamberg 2016. (2017)

Im Beitrag werden eine Typologie von Transitionsverläufen und Bewältigungsmustern junger Menschen in Luxemburg sowie deren subjektive Perspektiven auf das Erwachsenwerden und Erwachsensein vorgestellt ... [more ▼]

Im Beitrag werden eine Typologie von Transitionsverläufen und Bewältigungsmustern junger Menschen in Luxemburg sowie deren subjektive Perspektiven auf das Erwachsenwerden und Erwachsensein vorgestellt. Durch die typologische Einordnung auf Basis der individuellen Erfahrungen und Deutungen können Erfolgsfaktoren, Gelingensbedingungen und Hemmnisse für den Übergang ins Erwerbsleben identifiziert werden. Dabei zeigt sich, dass der Übergang in Arbeit zwar maßgeblich die gesellschaftliche Integration junger Menschen beeinflusst, das subjektive Gefühl des Erwachsenseins davon aber durchaus unabhängig sein kann. [less ▲]

Detailed reference viewed: 107 (13 UL)
Full Text
Peer Reviewed
See detailEnhanced Trajectory-based Action Recognition using Human Pose
Papadopoulos, Konstantinos UL; Goncalves Almeida Antunes, Michel UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017 (2017)

Action recognition using dense trajectories is a popular concept. However, many spatio-temporal characteristics of the trajectories are lost in the final video representation when using a single Bag-of ... [more ▼]

Action recognition using dense trajectories is a popular concept. However, many spatio-temporal characteristics of the trajectories are lost in the final video representation when using a single Bag-of-Words model. Also, there is a significant amount of extracted trajectory features that are actually irrelevant to the activity being analyzed, which can considerably degrade the recognition performance. In this paper, we propose a human-tailored trajectory extraction scheme, in which trajectories are clustered using information from the human pose. Two configurations are considered; first, when exact skeleton joint positions are provided, and second, when only an estimate thereof is available. In both cases, the proposed method is further strengthened by using the concept of local Bag-of-Words, where a specific codebook is generated for each skeleton joint group. This has the advantage of adding spatial human pose awareness in the video representation, effectively increasing its discriminative power. We experimentally compare the proposed method with the standard dense trajectories approach on two challenging datasets. [less ▲]

Detailed reference viewed: 288 (60 UL)
Full Text
Peer Reviewed
See detail"Communauté du royaume" et affirmation de la noblesse dans les pays tchèques (XIIIe-XIVe siècles)
Vomacka, Eloïse UL

in Lachaud, Frédérique (Ed.) La « communauté du royaume » (Angleterre, Écosse, France, Empire, Scandinavie), de la fin du Xe siècle au début du XIVe siècle, théories et pratiques, Nancy – 6 novembre / 8 novembre 2014 (2017)

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailCoordination Mechanisms for Floating Content in Realistic Vehicular Scenario
Manzo, Gaetano; Soua, Ridha UL; Di Maio, Antonio UL et al

in Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario (2017)

The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the ... [more ▼]

The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the infrastructure, to the Vehicle-to-vehicle (V2V) network. Floating content (FC) represents a promising paradigm to share ephemeral content without direct support from infrastructure. It is based on constraining geographically within the Anchor Zone (AZ) the opportunistic replication of a given content among vehicles, in a way that strikes a balance between minimization of resource usage and content availability. Existing works on FC performance modeling are based on standard, homogeneous synthetic mobility models, and it is hence unclear how they actually fit in realistic mobility scenarios. Moreover, the approaches to FC dimensioning they propose assume users have full knowledge of Spatio-temporal mobility patterns, which is hard to achieve in practice. Finally, despite FC is an infrastructure-less communication paradigm, some form of infrastructure support could be available in the vast majority of those application scenarios for which it has been proposed. In this paper, we perform a first attempt at tackling these issues. We focus on how to dimension an Anchor Zone in a realistic vehicular scenario. We propose the first set of simple dimensioning strategies, based on the estimation of some key mobility parameters and of FC performance. We assess such strategies on measurement-based vehicular traces, providing a first indication of their relative performance, and of the feasibility of FC in practical scenarios. [less ▲]

Detailed reference viewed: 144 (13 UL)
Full Text
Peer Reviewed
See detailRational Enterprise Architecture
van der Torre, Leon UL; Van Zee, Marc UL

in Advances in Artificial Intelligence: From Theory to Practice - 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, Arras, France, June 27-30, 2017, Proceedings, Part I (2017)

We are interested in formal foundations for enterprise decision support. In this perspective, enterprise architecture is characterised by highly uncertain plans in a changing environment, and translates ... [more ▼]

We are interested in formal foundations for enterprise decision support. In this perspective, enterprise architecture is characterised by highly uncertain plans in a changing environment, and translates strategic goals into an IT strategy. Typically there are a large number of stakeholders with conflicting views, communicating plans of action, and explaining decisions instead of making them. An enterprise architecture considers qualitative before quantitative data, has stronger business focus than other disciplines, and politics, emotions, and soft skills play a bigger role than in other areas. We view a plan abstractly as a sequence of commitments in time, and each commitment in the plan may come with a number of underlying assumptions. If these underlying assumptions change, then parts of the plan may require revision, which in turn may invalidate other parts of the plan, and so on. Therefore, assumptions have an inherently non-monotonic character: they are assumed to be true, unless it becomes clear they are false. This is related to the resource-boundedness of enterprise architecture: an enterprise architect cannot always know all of the assumptions, especially for long term plans. [less ▲]

Detailed reference viewed: 131 (4 UL)
Full Text
Peer Reviewed
See detailBotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows
Lagraa, Sofiane UL; François, Jérôme; Lahmadi, Abdelkader et al

in CSNet 2017 Conference Proceedings (2017)

Botnets are one of the most dangerous and serious cybersecurity threats since they are a major vector of large-scale attack campaigns such as phishing, distributed denial-of-service (DDoS) attacks ... [more ▼]

Botnets are one of the most dangerous and serious cybersecurity threats since they are a major vector of large-scale attack campaigns such as phishing, distributed denial-of-service (DDoS) attacks, trojans, spams, etc. A large body of research has been accomplished on botnet detection, but recent security incidents show that there are still several challenges remaining to be addressed, such as the ability to develop detectors which can cope with new types of botnets. In this paper, we propose BotGM, a new approach to detect botnet activities based on behavioral analysis of network traffic flow. BotGM identifies network traffic behavior using graph-based mining techniques to detect botnets behaviors and model the dependencies among flows to traceback the root causes then. We applied BotGM on a publicly available large dataset of Botnet network flows, where it detects various botnet behaviors with a high accuracy without any prior knowledge of them. [less ▲]

Detailed reference viewed: 102 (2 UL)
Full Text
Peer Reviewed
See detailIntegration of Learning Material into an Advanced Project-Based Learning Support Platform
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in INTED 2017 Proceedings (2017)

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time ... [more ▼]

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time-intensive task, reusability in different contexts is desirable. In this paper, we propose to move from a material-centric to a student-centric approach, integrating learning material in an advanced project-based learning support platform. Our ecosystem, relying on semantic web technologies, comprises plugins for common authoring and project realization tools. [less ▲]

Detailed reference viewed: 161 (27 UL)
Full Text
Peer Reviewed
See detailMeeting the Challenges of Critical and Extreme Dependability and Security
Verissimo, Paulo UL; Volp, Marcus UL; Decouchant, Jérémie UL et al

in Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (2017)

The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue. This may ... [more ▼]

The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue. This may create enormous opportunities, but also brings about similarly extreme security and dependability risks. We predict an increase in very sophisticated targeted attacks, or advanced persistent threats (APT), and claim that this calls for expanding the frontier of security and dependability methods and techniques used in our current CII. Extreme threats require extreme defenses: we propose resilience as a unifying paradigm to endow systems with the capability of dynamically and automatically handling extreme adversary power, and sustaining perpetual and unattended operation. In this position paper, we present this vision and describe our methodology, as well as the assurance arguments we make for the ultra-resilient components and protocols they enable, illustrated with case studies in progress. [less ▲]

Detailed reference viewed: 106 (4 UL)
Full Text
Peer Reviewed
See detailA Visualization Approach for Adaptive Consent in the European Data Protection Framework
Rossi, Arianna UL; Palmirani, Monica

in Edelmann, Noella; Parycek, Peter (Eds.) Proceedings of the 7th International Conference for E-Democracy and Open Government (2017)

For the first time in the history of European data protection law, the use of visualizations and especially of icons is explicitly suggested as a way to improve the comprehensibility of the information ... [more ▼]

For the first time in the history of European data protection law, the use of visualizations and especially of icons is explicitly suggested as a way to improve the comprehensibility of the information about data handling practices provided to the data subjects, which plays a crucial role to obtain informed consent. Privacy icon sets have already been developed, but they differ in the kinds of information they depict and in the perspectives they embed. Moreover, they have not met widespread adoption, one reasons being that research has shown that possibility of misinterpretation of these symbols exist. Our research relies on legal Semantic Web technologies and on principles drawn from legal design and Human Computer Interaction to propose visualizations of privacy policies and consent forms. The final aim is to enhance the communication of data practices to users and to support their decision about whether to give or withhold consent [less ▲]

Detailed reference viewed: 105 (4 UL)
Full Text
Peer Reviewed
See detailArgumentation-based Methodology for Goal-oriented Requirements Language (GRL)
Ghanavati, Sepideh; Van Zee, Marc UL; Bex, Floris

in Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), Essen, Germany, June 12-13, 2017. (2017)

Goal-oriented Requirements Language (GRL) aims to capture goals and non-functional requirements of stakeholders and analyzing alternative solutions for realizing these goals. GRL also documents the ... [more ▼]

Goal-oriented Requirements Language (GRL) aims to capture goals and non-functional requirements of stakeholders and analyzing alternative solutions for realizing these goals. GRL also documents the rationale behind selecting certain goals or alternatives. However, it does not have any means to document and trace back all of the arguments that occur during the stakeholder’s discussion process. To address this, we have developed the RationalGRL framework. RationalGRL combines techniques for formal argumentation from artificial intelligence with goal modeling in GRL. However, we did not specify how practitioners can actually use this framework. In this paper we discuss the methodology for RationalGRL, which consists of two processes, goal modeling and argumentation, that can be done interchangeably. We motivate our approach with an example. [less ▲]

Detailed reference viewed: 43 (1 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Gestural Input for Immersive Large-Scale Distributed Virtual Environments
Botev, Jean UL; Rothkugel, Steffen UL

in Proceedings of the 8th ACM Multimedia Systems Conference (MMSys) (2017)

Detailed reference viewed: 124 (22 UL)
Full Text
Peer Reviewed
See detailPerformance of Compressive Sensing Based Energy Detection
Lagunas, Eva UL; Rugini, Luca

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, 8-13 October 2017 (2017)

Detailed reference viewed: 100 (4 UL)
Full Text
Peer Reviewed
See detailwalk2friends: Inferring Social Links from Mobility Profiles
Backes, Michael; Humbert, Mathias; Pang, Jun UL et al

in Proceedings of the 24th ACM International Conference on Computer and Communications Security (2017)

Detailed reference viewed: 87 (5 UL)
Full Text
Peer Reviewed
See detailThe Virtues of Automated Theorem Proving in Metaphysics --- A Case Study: E. J. Lowe's Modal Ontological Argument
Fuenmayor, David; Benzmüller, Christoph UL; Steen, Alexander UL et al

in The 2nd World Congress on Logic and Religion -- Book of Abstracts (2017)

Detailed reference viewed: 74 (2 UL)
See detailTransgression im europäischen Theaterverständnis? Hermann Nitschs Orgien Mysterien Theater und Christoph Schlingensiefs Aktion 18, „tötet Politik“
Nonoa, Koku Gnatuloma UL

in Bloch, Natalie; Heimböckel, Dieter; Tropper, Elisabeth (Eds.) Vorstellung Europa – Performing Europe. Interdisziplinäre Perspektiven auf Europa im Theater der Gegenwart (2017)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailBar Induction: The Good, the Bad, and the Ugly
Rahli, Vincent UL; Bickford, Mark; Constable, Robert

in Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) (2017)

Detailed reference viewed: 174 (21 UL)
Full Text
Peer Reviewed
See detailLangzeitkonsequenzen von frühkindlichem Stress: quadratischer Zusammenhang zwischen Stress und Interozeptionsfähigkeit
Schaan, Violetta UL; Schulz, André UL; Vögele, Claus UL

in Schächinger, H. (Ed.) Abstractband 43. Tagung Psychologie und Gehirn (2017)

Traumatische Belastungen während der Kindheit können das Risiko für die Entwicklung unsicherer Bindungsstile erhöhen, die bereits mit langfristigen psychischen und körperlichen Gesundheitsproblemen in ... [more ▼]

Traumatische Belastungen während der Kindheit können das Risiko für die Entwicklung unsicherer Bindungsstile erhöhen, die bereits mit langfristigen psychischen und körperlichen Gesundheitsproblemen in Beziehung gebracht wurden. Die zugrundeliegenden Prozesse sind allerdings noch weitestgehend unklar. Da interozeptive Signale die Regulation negativer Emotionen als Reaktion auf sozialer Zurückweisung begünstigen können, die infolge einer Stressbelastung verändert sein könnten, wurde insbesondere der Effekt von kindlichem Stress auf Interozeption untersucht. Wir präsentieren zwei Studien, die den Zusammenhang zwischen kindlichem Stress und Gesundheit im Erwachsenenalter sowie Körperwahrnehmung und Gedächtnisfähigkeit untersuchen. In der ersten Studie nahmen 199 Teilnehmer an einer Onlineumfrage teil, bei der Gesundheit, frühkindliches Trauma, Resilienz und Zurückweisungssensitivität gemessen wurden. Teilnehmer mit geschiedenen Eltern berichteten erhöhte psychische Belastungswerte, kindliches Trauma, Zurückweisungssensitivität und weniger Resilienz. Die Beziehung zwischen elterlicher Scheidung und psychischer Gesundheit konnte vollständig durch diese vier Faktoren erklärt werden (Varianzaufklärung 44%). In einer zweiten Studie wurden bei 60 Teilnehmern verschiedene Selbstberichts-Parameter erhoben und die Gedächtnis- und Interozeptionsfähigkeit (Schandry Herzschlagwahrnehmungstest/EKG) vor und nach einem sozial-evaluativen Kaltwasser-Stresstest untersucht. Die Reaktion des autonomen Nervensystems wurde mithilfe von Herzraten- und Blutdruckvariabilität bestimmt. Erwachsene mit einer Vorgeschichte von elterlicher Trennung berichteten mehr bindungsbezogene Angst und Vermeidung als Kontrollpersonen. Das Erlebnis einer elterlichen Scheidung war negativ mit der Gedächtnisleistung nach dem Stresstest korreliert. Weiterhin weisen die Ergebnisse auf einen quadratischen Zusammenhang zwischen kindlicher Stressbelastung und Interozeptionsfähigkeit hin. Basierend auf diesen Ergebnissen könnte ein ‚gesunder Normbereich‘ der Interozeptionsfähigkeit existieren. Kindlicher Stress könnte sowohl eine Verringerung, als auch eine Erhöhung der Interozeptionsfähigkeit bewirken, was beides mit gesundheitlichen Problemen assoziiert sein könnte. [less ▲]

Detailed reference viewed: 209 (4 UL)
Full Text
Peer Reviewed
See detailDefending Against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Brust, Matthias R. UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in 42nd IEEE Conference on Local Computer Networks (2017)

Detailed reference viewed: 203 (23 UL)
Full Text
Peer Reviewed
See detailTarget Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering
Brust, Matthias R. UL; Zurad, Maciej UL; Hentges, Laurent Philippe UL et al

in CYBCONF 2017-12-13 09:39:53 +0000 2017-12-13 09:39:53 +0000 (2017)

Detailed reference viewed: 147 (13 UL)
Full Text
Peer Reviewed
See detailMany Independent Objective (MIO) Algorithm for Test Suite Generation
Arcuri, Andrea UL

in Symposium on Search-Based Software Engineering (SSBSE) (2017)

Automatically generating test suites is intrinsically a multi- objective problem, as any of the testing targets (e.g, statements to exe- cute or mutants to kill) is an objective on its own. Test suite ... [more ▼]

Automatically generating test suites is intrinsically a multi- objective problem, as any of the testing targets (e.g, statements to exe- cute or mutants to kill) is an objective on its own. Test suite generation has peculiarities that are quite di erent from other more regular optimi- sation problems. For example, given an existing test suite, one can add more tests to cover the remaining objectives. One would like the smallest number of small tests to cover as many objectives as possible, but that is a secondary goal compared to covering those targets in the rst place. Furthermore, the amount of objectives in software testing can quickly become unmanageable, in the order of (tens/hundreds of) thousands, es- pecially for system testing of industrial size systems. Traditional multi- objective optimisation algorithms can already start to struggle with just four or ve objectives to optimize. To overcome these issues, di erent techniques have been proposed, like for example the Whole Test Suite (WTS) approach and the Many-Objective Sorting Algorithm (MOSA). However, those techniques might not scale well to very large numbers of objectives and limited search budgets (a typical case in system test- ing). In this paper, we propose a novel algorithm, called Many Indepen- dent Objective (MIO) algorithm. This algorithm is designed and tailored based on the speci c properties of test suite generation. An empirical study, on a set of arti cial and actual software, shows that the MIO al- gorithm can achieve higher coverage compared to WTS and MOSA, as it can better exploit the peculiarities of test suite generation. [less ▲]

Detailed reference viewed: 260 (41 UL)
Full Text
Peer Reviewed
See detailOn the Relation Between SIM and IND-RoR Security Models for PAKEs
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in Proceedings of the International Conference on Security and Cryptography (2017)

Password-based Authenticated Key-Exchange (PAKE) protocols allow users, who need only to share a password, to compute a high-entropy shared session key despite passwords being taken from a dictionary ... [more ▼]

Password-based Authenticated Key-Exchange (PAKE) protocols allow users, who need only to share a password, to compute a high-entropy shared session key despite passwords being taken from a dictionary. Security models for PAKE protocols aim to capture the desired security properties that such protocols must satisfy when executed in the presence of an active adversary. They are usually classified into i) indistinguishability-based (IND-based) or ii) simulation-based (SIM-based). The relation between these two security notions is unclear and mentioned as a gap in the literature. In this work, we prove that SIM-BMP security from Boyko et al.~(EUROCRYPT 2000) implies IND-RoR security from Abdalla et al.~(PKC 2005) and that IND-RoR security implies a slightly modified version of SIM-BMP security. We also investigate whether IND-RoR security implies (unmodified) SIM-BMP security. [less ▲]

Detailed reference viewed: 210 (16 UL)
Full Text
Peer Reviewed
See detailRESTful API Automated Test Case Generation
Arcuri, Andrea UL

in IEEE International Conference on Software Quality, Reliability & Security (QRS) (2017)

Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of ... [more ▼]

Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of its most popular kind. A RESTful web service will provide data via an API over the network using HTTP, possibly interacting with databases and other web services. Testing a RESTful API poses challenges, as inputs/outputs are sequences of HTTP requests/responses to a remote server. Many approaches in the literature do black-box testing, as the tested API is a remote service whose code is not available. In this paper, we consider testing from the point of view of the developers, which do have full access to the code that they are writing. Therefore, we propose a fully automated white-box testing approach, where test cases are automatically generated using an evolutionary algorithm. Tests are rewarded based on code coverage and fault finding metrics. We implemented our technique in a tool called EVOMASTER, which is open-source. Experiments on two open-source, yet non-trivial RESTful services and an industrial one, do show that our novel technique did automatically find 38 real bugs in those applications. However, obtained code coverage is lower than the one achieved by the manually written test suites already existing in those services. Research directions on how to further improve such approach are therefore discussed. [less ▲]

Detailed reference viewed: 192 (11 UL)
Full Text
Peer Reviewed
See detailLotharingien als Reformraum (10. bis Anfang des 12. Jahrhunderts). Einige einleitende Bemerkungen zum Gebrauch räumlicher und religiöser Kategorien
Margue, Michel UL

in Herbers, Klaus; Müller, Harald (Eds.) Lotharingien und das Papsttum im Früh- und Hochmittelalter: Wechselwirkungen im Grenzraum zwischen Germania und Gallia (2017)

This anthology is devoted to Lothringia, once a key territory in the Carolingian Empire and later a border and contact zone between the Kingdoms of Germany and France. The essays seek to encourage ... [more ▼]

This anthology is devoted to Lothringia, once a key territory in the Carolingian Empire and later a border and contact zone between the Kingdoms of Germany and France. The essays seek to encourage systematic research on the relationship between the papacy and this dynamic territory in the heart of Europe, thus encouraging consideration of a Lotharingia pontificia. [less ▲]

Detailed reference viewed: 96 (2 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

in 2017 IEEE 18th International Conference on Industrial Technology (ICIT2017) (2017)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 108 (5 UL)
Full Text
Peer Reviewed
See detailMIMO directional modulation M-QAM precoding for transceivers performance enhancement.
Kalantari, Ashkan UL; Tsinos, Christos UL; Soltanalian, Mojtaba UL et al

in MIMO directional modulation M-QAM precoding for transceivers performance enhancement. (2017)

Detailed reference viewed: 122 (1 UL)
Full Text
Peer Reviewed
See detailA data-driven model of explanations for a chatbot that helps to practice conversation in a foreign language
Höhn, Sviatlana UL

in Proceedings of SIGDial 2017 (2017)

This article describes a model of other-initiated self-repair for a chatbot that helps to practice conversation in a foreign lan- guage. The model was developed using a corpus of instant messaging ... [more ▼]

This article describes a model of other-initiated self-repair for a chatbot that helps to practice conversation in a foreign lan- guage. The model was developed using a corpus of instant messaging conversations between German native and non-native speakers. Conversation Analysis helped to create computational models from a small number of examples. The model has been validated in an AIML-based chatbot. Unlike typical retrieval-based dialogue systems, the explanations are generated at run-time from a linguistic database. [less ▲]

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailA Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons
Galetzka, Michael; Glauner, Patrick UL

in Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP (2017)

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special ... [more ▼]

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special cases to be considered. This holds true in particular for complex polygons whose edges intersect each other creating holes. In this paper we present a simple even-odd algorithm to solve this problem for complex polygons in linear time and prove its correctness for all possible points and polygons. We furthermore provide examples and implementation notes for this algorithm. [less ▲]

Detailed reference viewed: 167 (13 UL)
Full Text
Peer Reviewed
See detailCombining machine learning and genetic algorithms to solve the independent tasks scheduling problem
Dorronsoro, Bernabé; Pinel, Frédéric UL

in 2017 3rd IEEE International Conference on Cybernetics (CYBCONF) (2017)

Detailed reference viewed: 15 (2 UL)
Full Text
Peer Reviewed
See detailSoftware patents and scientific publications
Berge, Laurent UL; Doherr, Thorsten; Hussinger, Katrin UL

in Academy of Management Proceedings, 2017 (2017)

Detailed reference viewed: 85 (6 UL)
Full Text
Peer Reviewed
See detailObserver design for Lightweight Robotic arm actuated by Shape Memory Alloy (SMA) wire
Quintanar Guzman, Serket UL; Kannan, Somasundar UL; Voos, Holger UL et al

in Quintanar Guzman, Serket; Kannan, Somasundar; Voos, Holger (Eds.) et al 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, 16-17 November 2017 (2017)

Detailed reference viewed: 48 (5 UL)
Full Text
Peer Reviewed
See detailEnergy Optimization for Full-Duplex Self-Backhauled HetNet with Non-Orthogonal Multiple Access
Lei, Lei UL; Lagunas, Eva UL; Maleki, Sina UL et al

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017 (2017)

Detailed reference viewed: 167 (10 UL)
Full Text
Peer Reviewed
See detailCooperative localization of unmanned aerial vehicles in ROS - The Atlas node
Kremer, Paul; Dentler, Jan Eric UL; Kannan, Somasundar UL et al

in 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) (2017)

This paper is presenting the implementation and experimental validation of the cooperative robot localization framework “Atlas”. For ease of application, Atlas is implemented as a package for the Robot ... [more ▼]

This paper is presenting the implementation and experimental validation of the cooperative robot localization framework “Atlas”. For ease of application, Atlas is implemented as a package for the Robot Operating System (ROS). ATLAS is based on dynamic cooperative sensor fusion which optimizes the estimated pose with respect to noise, respective variance. This paper validates the applicability of Atlas by cooperatively localizing multiple real quadrotors using cameras and fiduciary markers. [less ▲]

Detailed reference viewed: 143 (7 UL)
Full Text
Peer Reviewed
See detailCOSPAR Recommendations in a New Context? Environmental Aspects of Space Mining
Hofmann, Mahulena UL

in Blount, Percy; Masson-Zwaan, Tanja; Moro-Aguilar, Rafael (Eds.) et al Proceedings of the International Institute of Space Law 2016 (2017)

Projects related to space mining open numerous questions, including the guarantees of environmental standards of space activities. this contribution analyses the scope of the competences of COSPAR, the ... [more ▼]

Projects related to space mining open numerous questions, including the guarantees of environmental standards of space activities. this contribution analyses the scope of the competences of COSPAR, the legal character of its recommendations, and their applicability to space mining. [less ▲]

Detailed reference viewed: 80 (6 UL)
Full Text
Peer Reviewed
See detailChizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations
Iannillo, Antonio Ken UL; Natella, R.; Cotroneo, D. et al

in 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE) (2017)

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailCoded Caching and Storage Planning in Heterogeneous Networks
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2017 IEEE Wireless Communications and Networking Conference (WCNC) (2017)

Detailed reference viewed: 116 (4 UL)
Full Text
Peer Reviewed
See detailUnsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion
Goncalves Almeida Antunes, Michel UL; Barreto, Joao P.; Aouada, Djamila UL et al

in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017 (2017)

The article concerns the automatic calibration of a camera with radial distortion from a single image. It is known that, under the mild assumption of square pixels and zero skew, lines in the scene ... [more ▼]

The article concerns the automatic calibration of a camera with radial distortion from a single image. It is known that, under the mild assumption of square pixels and zero skew, lines in the scene project into circles in the image, and three lines suffice to calibrate the camera up to an ambiguity between focal length and radial distortion. The calibration results highly depend on accurate circle estimation, which is hard to accomplish, because lines tend to project into short circular arcs. To overcome this problem, we show that, given a short circular arc edge, it is possible to robustly determine a line that goes through the center of the corresponding circle. These lines, henceforth called Lines of Circle Centres (LCCs), are used in a new method that detects sets of parallel lines and estimates the calibration parameters, including the center and amount of distortion, focal length, and camera orientation with respect to the Manhattan frame. Extensive experiments in both semi-synthetic and real images show that our algorithm outperforms state- of-the-art approaches in unsupervised calibration from a single image, while providing more information. [less ▲]

Detailed reference viewed: 560 (26 UL)
Full Text
Peer Reviewed
See detailSoftware patterns for fault injection in CPS engineering
Navet, Nicolas UL; Cibrario Bertolotti, Ivan; Hu, Tingting UL

in 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) (2017)

Software fault injection is a powerful technique to evaluate the robustness of an application and guide in the choice of fault-tolerant mechanisms. It however requires a lot of time and know-how to be ... [more ▼]

Software fault injection is a powerful technique to evaluate the robustness of an application and guide in the choice of fault-tolerant mechanisms. It however requires a lot of time and know-how to be properly implemented, which severely hinders its applicability. We believe software fault injection can be made more “affordable” by automating it and have it integrated within a model-driven engineering design flow. We first propose in this paper a framework supporting these objectives. Then, illustrating on the domain-specific language CPAL, we present injection patterns that can be embedded in the application code and discuss the types of faults each supports, as well as implementation issues. [less ▲]

Detailed reference viewed: 84 (4 UL)
Full Text
Peer Reviewed
See detailConcurrent Command and Consistency Management for Distributed Compound Document Authoring
Klein, Johannes UL; Botev, Jean UL; Rothkugel, Steffen UL

in Proceedings of the 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (2017)

Collaborative document authoring between geographically distributed users is increasingly common in our professional and personal lives. Corresponding systems aim to allow for the involvement of locally ... [more ▼]

Collaborative document authoring between geographically distributed users is increasingly common in our professional and personal lives. Corresponding systems aim to allow for the involvement of locally unavailable specialists while connecting familiar single-user functionality with an accessible, distributed multi-user environment. However, considering the highly dynamic processing loads on modern machines, accounting for network inadequacies, and providing a user-adjustable, mainly interruption-free work environment still presents some challenges. To address these challenges, we integrated our fine-granular data model, concurrency-based command application, and data-type specific consistency management into a distributed authoring environment. The collaboration environment provides individual sites sufficient independence to allow the local users to adapt their work experience based on personal preference and other, machine-related factors. This paper discusses our approach for a responsive, yet unobtrusive and adaptable distributed compound document authoring environment with the focus on concurrent and mainly autonomous command application and consistency management. [less ▲]

Detailed reference viewed: 106 (17 UL)
Full Text
Peer Reviewed
See detailTowards Formal Security Analysis of Industrial Control Systems
Rocchetto, Marco UL

in Towards Formal Security Analysis of Industrial Control Systems (2017)

Detailed reference viewed: 102 (8 UL)
Full Text
Peer Reviewed
See detailWeak Interference Detection with Signal Cancellation in Satellite Communications
Politis, Christos UL; Maleki, Sina UL; Tsinos, Christos UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017 (2017)

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference ... [more ▼]

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference efficiently. While there are efficient techniques to monitor strong interference in SATCOM, weak interference is not so easily detected because of its low interference to signal and noise ratio (ISNR). To address this issue, this paper proposes and develops a technique which takes place on-board the satellite by decoding the desired signal, removing it from the total received signal and applying an Energy Detector (ED) in the remaining signal for the detection of interference. Different from the existing literature, this paper considers imperfect signal cancellation, examining how the decoding errors affect the sensing performance, derives the expressions for the probability of false alarm and provides a set of simulations results, verifying the efficiency of the technique. [less ▲]

Detailed reference viewed: 301 (36 UL)
Full Text
Peer Reviewed
See detailChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow
Steichen, Mathis UL; Hommes, Stefan UL; State, Radu UL

in ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow (2017)

Recently, blockchains have been gathering a lot of interest. Many applications can benefit from the advantages of blockchains. Nevertheless, applications with more restricted privacy or participation ... [more ▼]

Recently, blockchains have been gathering a lot of interest. Many applications can benefit from the advantages of blockchains. Nevertheless, applications with more restricted privacy or participation requirements cannot rely on public blockchains. First, the whole blockchain can be downloaded at any time, thus making the data available to the public. Second, anyone can deploy a node, join the blockchain network and take part in the consensus building process. Private and consortium blockchains promise to combine the advantages of blockchains with stricter requirements on the participating entities. This is also the reason for the comparably small number of nodes that store and extend those blockchains. However, by targeting specific nodes, an attacker can influence how consensuses are reached and possibly even halt the blockchain operation. To provide additional security to the blockchain nodes, ChainGuard utilizes SDN functionalities to filter network traffic, thus implementing a firewall for blockchain applications. ChainGuard communicates with the blockchain nodes it guards to determine which origin of the traffic is legitimate. Packets from illegitimate sources are intercepted and thus cannot have an effect on the blockchain. As is shown with experiments, ChainGuard provides access control functionality and can effectively mitigate flooding attacks from several sources at once. [less ▲]

Detailed reference viewed: 106 (10 UL)
Full Text
Peer Reviewed
See detailSemantic annotation for places in LBSN through graph embedding
Wang, Yan; Qin, Zongxu; Pang, Jun UL et al

in Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (2017)

Detailed reference viewed: 92 (1 UL)
Full Text
Peer Reviewed
See detailAngst vor körperlicher Bewegung bei Patienten mit Herzinsuffizienz und gesunden Senioren – Ein psychophysiologisches Experiment basierend auf dem Schreckreflex-Paradigma
Hoffmann, Jeremy; Finke, Johannes; Vögele, Claus UL et al

in Schorr, A. (Ed.) Abstractband 13. Kongress der Fachgruppe Gesundheitspsychologie der DGPs (2017)

Detailed reference viewed: 84 (0 UL)
Full Text
Peer Reviewed
See detailExploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations
Riestock, Maik; Engelhard, Frank; Zug, Sebastian et al

in Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction (2017)

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailConcept Recognition in European and National Law
Nanda, Rohan; Siragusa, Giovanni; Di caro, Luigi et al

in proc. of The 30th international conference on Legal Knowledge and Information Systems (JURIX 2017) (2017)

Detailed reference viewed: 191 (51 UL)
Full Text
Peer Reviewed
See detailPrivacy-Preserving Verifiability: A Case for an Electronic Exam Protocol
Giustolisi, Rosario; Iovino, Vincenzo UL; Lenzini, Gabriele UL

in Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele (Eds.) Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol (2017)

We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of ... [more ▼]

We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new protocol maintains all the security properties of the original protocol, so proving that our privacy-preserving verifiability can be achieved starting from existing security. [less ▲]

Detailed reference viewed: 190 (16 UL)
Full Text
See detailExploring chaotic dynamics by partition of bifurcation diagram
Changaival, Boonyarit UL; Rosalie, Martin UL

in Proceeding of Workshop on Advance in Nonlinear Complex Systems and Applications (WANCSA) (2017)

Chaotic dynamical systems have been recently successfully used to replace uniform probability functions in several algorithms in optimization and machine learning. In this work, we propose a study on the ... [more ▼]

Chaotic dynamical systems have been recently successfully used to replace uniform probability functions in several algorithms in optimization and machine learning. In this work, we propose a study on the use of bifurcation diagrams and first return map in the Rössler system for producing chaotic dynamics. Then, we plan to use these chaotic dynamic for optimization problem. With a bifurcation diagram we can also distinguish the periodic solutions apart from the chaotic solutions. By studying the chaotic solutions, we can then achieve a first return map which is a signature of the dynamical system and thoroughly study the complexity of the latter with a certain set of parameters. As a result, the partition in the bifurcation diagram is provided. From the first return maps, we are able to confirm the complexity of the dynamics in those partitions along with the transitions between them. [less ▲]

Detailed reference viewed: 75 (5 UL)
Full Text
Peer Reviewed
See detailA phase field method for modeling stress corrosion crack propagation induced by anodic dissolution
Nguyen, Thanh Tung UL; Réthoré, Julien; Baietto, Marie-Christine et al

in 14th International Conference on Fracture (2017)

Detailed reference viewed: 13 (0 UL)