References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
See detailA survey: Scheduling of Automated Guided Vehicles in Flexible (Re-)Manufacturing Systems
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Müller, Rainer; Brüls, Oliver; Abba, Gabriel (Eds.) et al Robotix-Academy Conference for Industrial Robotics (RACIR) 2019 (2019, June)

This work gives a state-of-the-art overview regarding the scheduling of Automated Guided Vehicles (AGV) in Flexible (Re-)Manufacturing Systems (FMS/FRMS). Different, general approaches are available to ... [more ▼]

This work gives a state-of-the-art overview regarding the scheduling of Automated Guided Vehicles (AGV) in Flexible (Re-)Manufacturing Systems (FMS/FRMS). Different, general approaches are available to solve this task. In this regard an overview of currently available fleet management software and research in this field as well as the simultaneous scheduling of machines and AGVs is given. Production scheduling and transport scheduling have been vastly studied by many researchers, but most of the works address these both problems separately. However, these two problems are closely linked and influence each other. By looking at them together, it is possible to achieve an improvement in the overall scheduling. The different works are examined regarding the consideration of one available machine for each tasks, or if alternative machines are available and if the approaches are static or dynamic. Especially the appropriability of the presented works regarding the use in remanufacturing systems is examined. Remanufacturing is a process for used products to make them “as good as new or better”. Due to unknown condition of the used products many challenges occur during the remanufacturing process which are special to the domain of remanufacturing and not know from manufacturing. The resulting stochastic routing of products and material in particular places special demands on the flexibility and dynamic of the scheduling and control of the remanufacturing system. In order to meet the challenges of a real remanufacturing system, the scheduling algorithm should consider alternative machines as well as be dynamic. None of the approaches examined can meet these requirements, which is why new methods have to be developed. [less ▲]

Detailed reference viewed: 132 (0 UL)
Full Text
Peer Reviewed
See detailMachine Learning based Antenna Selection and Power Allocation in Multi-user MISO Systems
Vu, Thang Xuan UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in 2019 IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (2019, June)

Detailed reference viewed: 43 (13 UL)
Full Text
Peer Reviewed
See detailDesigning collaborative scenarios on tangible tabletop interfaces - insights from the implementation of paper prototypes in the context of a multidisciplinary design workshop
Sunnen, Patrick UL; Arend, Béatrice UL; Heuser, Svenja UL et al

in Proceedings of the 17th European Conference on Computer-Supported Cooperative Work: The International Venue on Practice-centred Computing and the Design of Cooperation Technologies - Exploratory Papers, Reports of the European Society for Socially Embedded Technologies (2019, June)

Within the context of the research project ORBIT (Overcoming Breakdowns in Teams with Interactive Tabletops), we design and study a joint problem-solving activity at an interactive tabletop, that gives ... [more ▼]

Within the context of the research project ORBIT (Overcoming Breakdowns in Teams with Interactive Tabletops), we design and study a joint problem-solving activity at an interactive tabletop, that gives participants the opportunity to develop their collaboration methods. To gain design insights for the development of a scenario soliciting participants to collaborate, we set up a multidisciplinary design workshop. During the latter, we explored and discussed three different collaborative scenarios, implemented as paper prototypes. In this paper, we report on first results gained from an exploratory analysis of the video data that was recorded in the context of this workshop. [less ▲]

Detailed reference viewed: 107 (13 UL)
Full Text
Peer Reviewed
See detailDeep learning based semantic situation awareness system for multirotor aerial robots using LIDAR
Sanchez Lopez, Jose Luis UL; Sampedro, Carlos; Cazzato, Dario UL et al

in 2019 International Conference on Unmanned Aircraft Systems (ICUAS) (2019, June)

In this work, we present a semantic situation awareness system for multirotor aerial robots, based on 2D LIDAR measurements, targeting the understanding of the environment and assuming to have a precise ... [more ▼]

In this work, we present a semantic situation awareness system for multirotor aerial robots, based on 2D LIDAR measurements, targeting the understanding of the environment and assuming to have a precise robot localization as an input of our algorithm. Our proposed situation awareness system calculates a semantic map of the objects of the environment as a list of circles represented by their radius, and the position and the velocity of their center in world coordinates. Our proposed algorithm includes three main parts. First, the LIDAR measurements are preprocessed and an object segmentation clusters the candidate objects present in the environment. Secondly, a Convolutional Neural Network (CNN) that has been designed and trained using an artificially generated dataset, computes the radius and the position of the center of individual circles in sensor coordinates. Finally, an indirect-EKF provides the estimate of the semantic map in world coordinates, including the velocity of the center of the circles in world coordinates.We have quantitative and qualitative evaluated the performance of our proposed situation awareness system by means of Software-In-The-Loop simulations using VRep with one and multiple static and moving cylindrical objects in the scene, obtaining results that support our proposed algorithm. In addition, we have demonstrated that our proposed algorithm is capable of handling real environments thanks to real laboratory experiments with non-cylindrical static (i.e. a barrel) and moving (i.e. a person) objects. [less ▲]

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailA GP Hyper-Heuristic Approach for Generating TSP Heuristics
Duflo, Gabriel UL; Kieffer, Emmanuel UL; Brust, Matthias R. UL et al

in 33rd IEEE International Parallel & Distributed Processing Symposium (IPDPS 2019) (2019, May 20)

Detailed reference viewed: 187 (50 UL)
Full Text
Peer Reviewed
See detailUltrareliable SWIPT using Unscheduled Short Packet Transmissions
Kisseleff, Steven UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE International Conference on Communications (ICC), B5G-URLLC Workshop, Shanghai, May 2019 (2019, May 20)

Large communication networks, e.g. Internet of Things (IoT), are known to be vulnerable to the co-channel interference from simultaneous transmissions. In the recent time, this problem has been ... [more ▼]

Large communication networks, e.g. Internet of Things (IoT), are known to be vulnerable to the co-channel interference from simultaneous transmissions. In the recent time, this problem has been extensively studied in various contexts. Due to a potentially very long duty cycle, orthogonal multiple access techniques are not well suited for such schemes. Instead, random medium access (RMA) seems promising, since it guarantees a lower bound for the network throughput even in presence of an infinite number of simultaneous transmissions while reducing the average length of the duty cycle. Such an RMA scheme is based on transmission of short data packets with unknown scheduling. Of course, a reliable symbol detection for this type of communication is very challenging not only due to a large amount of interference from the adjacent nodes, but also because of the uncertainty related to the presence or absence of overlapping packets. Interestingly, with increasing number of network nodes also the amount of energy, which can be harvested from the received signal, increases. This is especially beneficial for powering of a relay device, which may utilize the energy for further information processing and retransmission. In this paper, we address the design of a simultaneous information and power transfer scheme based on unscheduled short packet transmissions for ultrareliable communication. [less ▲]

Detailed reference viewed: 46 (4 UL)
Full Text
Peer Reviewed
See detailDemo: Blockchain for the Simplification and Automation of KYC Result Sharing
Norvill, Robert UL; Steichen, Mathis UL; Shbair, Wazen UL et al

in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)

Know Your Customer (KYC) processes performed by banks on their customers are redundant, cumbersome and costly. Therefore, a system is proposed to automate menial tasks and allow sharing of data related to ... [more ▼]

Know Your Customer (KYC) processes performed by banks on their customers are redundant, cumbersome and costly. Therefore, a system is proposed to automate menial tasks and allow sharing of data related to KYC. A blockchain dictates the collaboration between different participants and several services are built around it to support the functionality of the system as a whole. An access control system is used to share data legitimately. [less ▲]

Detailed reference viewed: 136 (14 UL)
Full Text
Peer Reviewed
See detailBlockZoom: Large-Scale Blockchain Testbed
Shbair, Wazen UL; Steichen, Mathis UL; Francois, Jerome et al

in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)

Future blockchain applications are anticipated to serve millions of users. Thus the evaluation of new blockchain applications have to consider large-scale assessment of the technologies behind the scene ... [more ▼]

Future blockchain applications are anticipated to serve millions of users. Thus the evaluation of new blockchain applications have to consider large-scale assessment of the technologies behind the scene. Most of current testing approaches have been done either on simulators or via local small blockchain networks. Hence, the performance in real world conditions is unpredictable. This demonstration introduces BlockZoom, a large-scale blockchain testbed that runs on top of a highly reconfigurable and controllable HPC platform. BlockZoom presents a reproducible environment for experimenting distributed ledgers technologies and smart contract applications. Through different configuration scenarios developers can evaluate the applications performance and the blockchain behavior at a scale comparable to the production environment. The target audience of this demonstration includes researchers and developers in blockchain technology. [less ▲]

Detailed reference viewed: 113 (8 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 212 (23 UL)
Full Text
Peer Reviewed
See detailNon-Intrusive Cognitive Measurement for the Amplitude Response of Wideband Transponders
Mazalli, N.; Andrenacci, Stefano UL; Chatzinotas, Symeon UL

in International Conference on Communications (2019, May)

In this paper we propose a new measurement procedure for the amplitude response of a wideband transponder in an in-orbit testing (IOT) context. The proposed procedure resorts to a direct sequence spread ... [more ▼]

In this paper we propose a new measurement procedure for the amplitude response of a wideband transponder in an in-orbit testing (IOT) context. The proposed procedure resorts to a direct sequence spread spectrum (DSSS) technique in order to limit the interference caused by the measurement signals to the traffic. Further, an adaptive approach exploiting the knowledge of the inband traffic power has been introduced. Such knowledge, acquired either a priori or by sensing the channel, allows to easily design measurement signals satisfying multiple performance requirements (i.e., accuracy, resolution, interference, duration, and complexity). The proposed procedure can be used as a design tool to optimize the dimensioning of the IOT system parameters, and to flexibly trade off a performance indicator against another. [less ▲]

Detailed reference viewed: 19 (13 UL)
Full Text
Peer Reviewed
See detailTowards sampling and simulation-based analysis of featured weighted automata
Cordy, Maxime UL; Legay, Axel; Lazreg, Sami et al

in Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (2019, May)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailOutage Performance of Integrated Satellite-Terrestrial Relay Networks with Opportunistic Scheduling
Huang, Qingquan; Zhu, Wei-Ping; Chatzinotas, Symeon UL et al

in ICC 2019 - 2019 IEEE International Conference on Communications (ICC) (2019, May)

In this paper, we investigate the outage performance of a multiuser threshold-based decode-and-forward integrated satellite-terrestrial relay network (ISTRN) with opportunistic user scheduling, where the ... [more ▼]

In this paper, we investigate the outage performance of a multiuser threshold-based decode-and-forward integrated satellite-terrestrial relay network (ISTRN) with opportunistic user scheduling, where the satellite link and terrestrial links undergo Shadowed-Rician (SR) fading and correlated Rayleigh fading, respectively. First, we propose a new probability density function (PDF) to statistically characterize the square sum of independent and identically distributed SR random variables, which is more accurate and concise than existing expressions. Next, based on the new PDF, we derive an analytical expression of outage probability (OP) of the considered network. Furthermore, the asymptotic OP expression is developed at high signal-to-noise ratio to reveal the achievable diversity order of the considered ISTRN. Finally, computer simulation is conducted to validate the analytical results, and show the impact of various parameters on the outage performance. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailLearning to Spot and Refactor Inconsistent Method Names
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations ... [more ▼]

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1-measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild. [less ▲]

Detailed reference viewed: 269 (20 UL)
Full Text
Peer Reviewed
See detailVIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION
Baptista, Renato UL; Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019 (2019, May)

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of ... [more ▼]

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of 3D information in RGB images. Most successful approaches make use of the concept of knowledge transfer by projecting 3D synthetic data to multiple viewpoints. Instead of relying on knowledge transfer, we propose to augment the RGB data by a third dimension by means of 3D skeleton estimation from 2D images using a CNN-based pose estimator. In order to ensure view-invariance, a pre-processing for alignment is applied followed by data expansion as a way for denoising. Finally, a Long-Short Term Memory (LSTM) architecture is used to model the temporal dependency between skeletons. The proposed network is trained to directly recognize actions from aligned 3D skeletons. The experiments performed on the challenging Northwestern-UCLA dataset show the superiority of our approach as compared to state-of-the-art ones. [less ▲]

Detailed reference viewed: 209 (31 UL)
Full Text
Peer Reviewed
See detailMCP: A Security Testing Tool Driven by Requirements
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in 2019 IEEE/ACM 41st International Conference on Software Engineering (2019, May)

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious ... [more ▼]

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious users). MCP relies on Natural Language Processing (NLP), a restricted form of misuse case specifications, and a test driver API implementing basic utility functions for security testing. NLP is used to identify the activities performed by the malicious user and the control flow of misuse case specifications. MCP matches the malicious user’s activities to the methods of the provided test driver API in order to generate executable security test cases that perform the activities described in the misuse case specifications. MCP has been successfully evaluated on an industrial case study. [less ▲]

Detailed reference viewed: 166 (28 UL)
Full Text
Peer Reviewed
See detailTowards Systematic Specification of Non-Functional Requirements for Sharing Economy Services
Symeonidis, Iraklis UL; Schroers, Jessica; Mustafa A. Mustafa, Mustafa A. et al

in Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services (2019, May)

Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of ... [more ▼]

Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of Circular Economy. In this paper, we assess existing SE services and identify their challenges in areas that are not technically connected to their core functionality but are essential in creating trust: information security and privacy, personal data protection and fair economic incentives. Existing frameworks for elicitation of non-functional requirements are heterogeneous in their focus and domain specific. Hence, we propose to develop a holistic methodology for non-functional requirements specification for SE systems following a top-down-top approach. A holistic methodology considering non-functional requirements is essential and can assist in the analysis and design of SE systems in a systematic and unified way applied from the early stages of the system development. [less ▲]

Detailed reference viewed: 87 (4 UL)
Full Text
Peer Reviewed
See detailROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL et al

in IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019 (2019, May)

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a ... [more ▼]

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level and network level, with dynamic policy enforcement points using software defined networking (SDN) to provide protection against a large class of attacks. Although SIEMs, IPS, and firewall have been previously used to secure computer networks, ROSDefender is applying them for the specific use case of robotic systems, where security is in many cases an afterthought. [less ▲]

Detailed reference viewed: 78 (6 UL)
Full Text
Peer Reviewed
See detailConvex Combination of Constraint Vectors for Set-membership Affine Projection Algorithms
Nagashima Ferreira, Tadeu; Alves Martins, Wallace UL; Lima, Markus et al

in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, May)

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both ... [more ▼]

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both convergence speed and steady-state mean-squared error is the choice of the so-called constraint vector. Optimal constraint vectors were recently proposed relying on convex optimization tools, which might some- times lead to prohibitive computational burden. This paper proposes a convex combination of simpler constraint vectors whose performance approaches the optimal solution closely, utilizing much fewer computations. Some illustrative examples confirm that the sub-optimal solution follows the accomplishments of the optimal one. [less ▲]

Detailed reference viewed: 63 (10 UL)
Full Text
Peer Reviewed
See detailMultifaceted automated analyses for variability-intensive embedded systems
Lazreg, Sami; Cordy, Maxime UL; Collet, Philippe et al

in Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019, May)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailDeep Reinforcement Learning based Continuous Control for Multicopter Systems
Manukyan, Anush UL; Olivares Mendez, Miguel Angel UL; Geist, Matthieu et al

in International Conference on Control, Decision and Information CoDIT, Paris 23-26 April 2019 (2019, April 26)

In this paper we apply deep reinforcement learning techniques on a multicopter for learning a stable hovering task in a continuous action state environment. We present a framework based on OpenAI GYM ... [more ▼]

In this paper we apply deep reinforcement learning techniques on a multicopter for learning a stable hovering task in a continuous action state environment. We present a framework based on OpenAI GYM, Gazebo and RotorS MAV simulator, utilized for successfully training different agents to perform various tasks. The deep reinforcement learning method used for the training is model-free, on-policy, actor-critic based algorithm called Trust Region Policy Optimization (TRPO). Two neural networks have been used as a nonlinear function approximators. Our experiments showed that such learning approach achieves successful results, and facilitates the process of controller design. [less ▲]

Detailed reference viewed: 31 (2 UL)
Full Text
Peer Reviewed
See detailEnseignants non spécialisés et (trans)disciplinarité. L’exemple de l’enseignement musical
Sagrillo, Damien UL

in Karsenti, T.; Goyer, S. (Eds.) Programme du colloque international en éducation et du Somme du numérique en éducation, 25 et 26 avril 2019. Montréal, QC: Centre de recherche interuniversitaire sur la formation et la profession enseignante, Chaire de recherche du Canada sur les technologies de l’information et de la communication (TIC) en éducation. (2019, April 25)

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme ... [more ▼]

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme l’observation à long terme dans des écoles fondamentales à Berlin. H. G. Bastian et son équipe (2002) ont démontré l’effet social bénéfique d’un enseignement musical approfondi. D’autres recherches ont dévoilé un manque de confiance tenace à l’égard de l’enseignement musical chez les étudiants et les enseignants (Holden et Button, 2006). D’autres encore ont analysé les potentialités d’un enseignement musical extrascolaire (Kivi, 2018). L’angoisse des formateurs non spécialisés devant l’éducation musicale se reflète souvent dans les arguments clichés comme : « Je n’ai pas fait du solfège; je ne suis pas musical; je ne peux pas chanter ». Le manque de connaissances déclaratives empêche donc le développement des savoir-faire. Nous présenterons des concepts développés relativement à deux traditions musicales (allemande et française) au Grand-Duché de Luxembourg. Notre objectif est de mettre à la disposition des futurs enseignants un éventail didactique. [less ▲]

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 180 (18 UL)
Full Text
Peer Reviewed
See detailIoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Engel, Thomas UL

in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19)

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼]

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲]

Detailed reference viewed: 531 (14 UL)
Full Text
Peer Reviewed
See detailA Calibrated Learning Approach to Distributed Power Allocation in Small Cell Networks
Zhang, Xinruo; Nakhai; Zheng, Gan UL et al

in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, April 17)

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time ... [more ▼]

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time division multiple access scheme to optimize the transmit power decisions at the small base stations (SBSs) and achieve max-min user fairness in the long run. Provided that the SBSs are autonomous decision makers, the aim of the proposed algorithm is to allow SBSs to gradually improve their forecast of the possible transmit power levels of the other SBSs and react with the best response based on the predicted results at individual time slots. Simulation results validate that in terms of achieving max-min signal-to-interference-plus-noise ratio, the proposed distributed design outperforms two benchmark schemes and achieves a similar performance as compared to the optimal centralized design. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailWhy do String Players Perform Easier per Memory than Wind Music Players? – Testing Instrumentalist Students’ Attention Levels During Music Reading
Buzás, Zsuzsanna; Sagrillo, Damien UL

in Molnár, Edit Katalin; Dancs, Katinka (Eds.) 17thConference on Educational Assessment (2019, April 13)

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice ... [more ▼]

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice, pianists who play as soloists with an orchestra do notneed written support as opposed to brass instrument soloists. Until now, no research has been conducted to discoverthe reasons why pianists and string players play easier by heart than brass instrument players.Music related activities involve numerous psychological processes, including perception and rapid processing of audio stimuli, attention and auditory, sensory and visual memory activation. Students with working memory impairments have difficulties with concentration as well as with organizing and monitoring the quality of their own work (Alloway et al., 2009).If the attention level is normal or high, the student is in an appropriate state for learning. It has been shown that participants with high working memory capacity perform significantly better on a variety of attention tasks (Fougnie, 2008).Attention supports the development of emerging reading skills by helping students regulate the cognitive demands inherently part of learning (Sáez et al., 2011).Thisstudy aims to test instrumentalist students’ attention and mediation levels during music reading by means of NeuroSky’s MindWave EEG device that translates brainwaves into digital information and beams it wirelessly to acomputer. We investigated 22right-handed wind instrumentalists, 12-14 years of age, and compared them with 21 violin players,matched for age and grade level. Students were asked to play an eight-bar composition bySzilvay. We analyzed attention and mediation levels, as well as alpha, beta and gamma band oscillatory responses to the musical piece during reading. The results of the data analysis were evaluated using e-Sense Metric. According to this metric, attention and meditation data arescaled between 1 and 100. The findings ofthe study revealed that the average attention level of the violin players was slightly highat61.53;while that of the wind players was 39.98, that is,slightly low. A significant difference was found between the averages of attention levelsbetween the string and the wind players (t=2.656, p=.026).With the use of EEG, the appearance of fatiguecan be detectedand the concentration levelscan be differentiatedfor the same exercise for different pupils. The results help us to improve instructionalmethods, and can also help us to reveal the processesof attention and mediation duringthe students’ music reading. Further research can involve the replication of the studywith pianists,comparing them with string players and wind music players. In an even more refined desing, a replication study could be carried out to compare pianists and brass instrument players. These further studies can serve as a basis for developing training programs of music reading comprehension for different instrumentalists. [less ▲]

Detailed reference viewed: 72 (1 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 219 (31 UL)
Full Text
Peer Reviewed
See detailTime Series Modeling of Market Price in Real-Time Bidding
Du, Manxing UL; Hammerschmidt, Christian UL; Varisteas, Georgios UL et al

in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2019, April)

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions ... [more ▼]

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions fluctuate heavily within short time spans. State-of-the-art methods neglect the temporal dependencies of bidders’ behaviors. In this paper, the bid requests are aggregated by time and the mean market price per aggregated segment is modeled as a time series. We show that the Long Short Term Memory (LSTM) neural network outperforms the state-of-the-art univariate time series models by capturing the nonlinear temporal dependencies in the market price. We further improve the predicting performance by adding a summary of exogenous features from bid requests. [less ▲]

Detailed reference viewed: 100 (13 UL)
Full Text
Peer Reviewed
See detailRobust Precoding Techniques for Multibeam Mobile Satellite Systems
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in 2019 IEEE Wireless Communications and Networking Conference (WCNC) (2019, April)

This paper presents designing precoding technique at the gateway of a multibeam mobile satellite systems, enabling full frequency reuse pattern among the beams. Such a system brings in two critical ... [more ▼]

This paper presents designing precoding technique at the gateway of a multibeam mobile satellite systems, enabling full frequency reuse pattern among the beams. Such a system brings in two critical challenges to overcome. The inter-beam interference makes applying interference mitigation techniques necessary. Further, when the user terminals are mobile the Channel State Information (CSI) becomes time-varying which is another challenge to overcome. Therefore, the gateway has only access to an outdated CSI, which can eventually limit the precoding gains. In this way, employing a proper CSI estimation mechanism at the gateway can improve the performance of the precoding scheme. In this context, the objectives of this paper are two folds. First, we present different CSI feedback mechanisms which aim at preserving a lower CSI variations at the gateway. Then, we develop the corresponding precoding schemes which are adapted with the proposed CSI feedback mechanisms. To keep the complexity of the proposed precoding schemes affordable, we consider a maritime communication scenario so that the signals received by mobile user terminals suffer from a lower pathloss compared to the Land Mobile communication. Finally, we provide several simulations results in order to evaluate the performance of the proposed precoding techniques. [less ▲]

Detailed reference viewed: 20 (2 UL)
Full Text
Peer Reviewed
See detailTopic-based Historical Information Selection for Personalized Sentiment Analysis
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges 24-26 April 2019 (2019, April)

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to ... [more ▼]

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to modeling individuality and understanding the current state of the person. We consider a user's expressions in the past as historical information, and target posts from social platforms for which Twitter texts are chosen as exemplary. While implementing the personalized model PERSEUS, we observed information loss due to the lack of flexibility regarding the design of the input sequence. To compensate this issue, we provide a procedure for information selection based on the similarities in the topics of a user's historical posts. Evaluation is conducted comparing different similarity measures, and improvements are seen with the proposed method. [less ▲]

Detailed reference viewed: 123 (31 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 163 (48 UL)
See detailComputational Metaphysics: New Insights on Gödel's Ontological Argument and Modal Collapse
Benzmüller, Christoph UL

in Kovac, Srecko; Swietorzecka, Kordula (Eds.) Formal Methods and Science in Philosophy III, Informal Proceedings (2019, April)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 212 (17 UL)
Full Text
Peer Reviewed
See detailStability Analysis of Power Networks under Cyber-Physical Attacks: an LPV-Descriptor Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Control, Decision and Information Technologies (2019, April)

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model ... [more ▼]

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model developed in [24], based on the well-known sector non-linearity approach and the convex polytopic transformation, the attacked system (descriptor model) is re-written in a more convenient form (Linear Parameter Varying-LPV) with unmeasurable premise variables. The so-called Lyapunov-based methods are applied in order to study the stability and security problems despite the presence of cyber-attacks. The conditions will be given in terms of Linear- Bilinear Matrix Inequality LMI- BMI constraints. [less ▲]

Detailed reference viewed: 114 (0 UL)
Full Text
Peer Reviewed
See detailEvaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly
Varisteas, Georgios UL; Frank, Raphaël UL; Sajadi Alamdari, Seyed Amin UL et al

in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)

Detailed reference viewed: 242 (47 UL)
Full Text
Peer Reviewed
See detailRobust Encryption, Extended
Geraud, Remi; Naccache, David; Rosie, Razvan UL

in Matsui, Mitsuru (Ed.) The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings (2019, March 01)

Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key ... [more ▼]

Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key context, it has been further extended to key-encapsulation mechanisms, and more recently to pseudorandom functions, message authentication codes and authenticated encryption. In this work, we motivate the importance of establishing similar guarantees for functional encryption schemes, even under adversarially generated keys. Our main security notion is intended to capture the scenario where a ciphertext obtained under a master key (corresponding to Authority 1) is decrypted by functional keys issued under a different master key (Authority 2). Furthermore, we show there exist simple functional encryption schemes where robustness under adversarial key-generation is not achieved. As a secondary and independent result, we formalize robustness for digital signatures – a signature should not verify under multiple keys – and point out that certain signature schemes are not robust when the keys are adversarially generated. We present simple, generic transforms that turn a scheme into a robust one, while maintaining the original scheme’s security. For the case of public-key functional encryption, we look into ciphertext anonymity and provide a transform achieving it. [less ▲]

Detailed reference viewed: 56 (2 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 125 (17 UL)
Full Text
Peer Reviewed
See detailA Hybrid Machine Learning and Schedulability Method for the Verification of TSN Networks
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 15th IEEE International Workshop on Factory Communication Systems (WFCS2019) (2019, March)

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible ... [more ▼]

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible without executing a conventional schedulability analysis. A disadvantage of ML-based timing verification with respect to schedulability analysis is the possibility of "false positives": configurations deemed feasible while they are not. In this work, in order to minimize the rate of false positives, we propose the use of a measure of the uncertainty of the prediction to drop it when the uncertainty is too high, and rely instead on schedulability analysis. In this hybrid verification strategy, the clear-cut decisions are taken by ML, while the more difficult ones are taken by a conventional schedulability analysis. Importantly, the trade-off achieved between prediction accuracy and computing time can be controlled. We apply this hybrid verification method to Ethernet TSN networks and obtain, for instance in the case of priority scheduling with 8 traffic classes, a 99% prediction accuracy with a speedup factor of 5.7 with respect to conventional schedulability analysis and a reduction of 46% of the false positives compared to ML alone. [less ▲]

Detailed reference viewed: 200 (25 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 176 (18 UL)
Full Text
Peer Reviewed
See detailShould You Consider Adware as Malware in Your Study?
Gao, Jun UL; Li, Li; Kong, Pingfan UL et al

in 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (2019, February 24)

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports ... [more ▼]

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports which are often provided free through online services such as VirusTotal. Unfortunately, these reports do not offer precise information for appropriately and uniquely assigning classes to samples in app datasets: AV engines indeed do not have a consensus on specifying information in labels. Furthermore, labels often mix information related to families, types, etc. In particular, the notion of “adware” is currently blurry when it comes to maliciousness. There is thus a need to thoroughly investigate cases where adware samples can actually be associated with malware (e.g., because they are tagged as adware but could be considered as malware as well). In this work, we present a large-scale analytical study of Android adware samples to quantify to what extent “adware should be considered as malware”. Our analysis is based on the Androzoo repository of 5 million apps with associated AV labels and leverages a state-of-the-art label harmonization tool to infer the malicious type of apps before confronting it against the ad families that each adware app is associated with. We found that all adware families include samples that are actually known to implement specific malicious behavior types. Up to 50% of samples in an ad family could be flagged as malicious. Overall the study demonstrates that adware is not necessarily benign. [less ▲]

Detailed reference viewed: 161 (15 UL)
Full Text
Peer Reviewed
See detailRobust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018 (2019, February 21)

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the ... [more ▼]

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the transmitter. In defining the SLP design problem, a general category of constructive interference regions (CIR) called distance preserving CIR (DPCIR) is adopted. In particular, we are interested in a robust SLP design minimizing the total transmit power subject to individual quality-of-service (QoS) requirements. We consider two common models for the channel uncertainty region, namely, spherical (norm-bounded) and stochastic. For the spherical uncertainty model, a worst-case robust precoder is proposed, while for the stochastically known uncertainties, we derive a convex optimization problem with probabilistic constraints. We simulate the performance of the proposed robust approaches, and compare them with the existing methods. Through the simulation results, we also show that there is an essential trade-off between the two robust approaches. [less ▲]

Detailed reference viewed: 136 (18 UL)
Full Text
Peer Reviewed
See detailCharacterizations of idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in 38th Linz Seminar on Fuzzy Set Theory (2019, February 05)

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means ... [more ▼]

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means of four conditions only: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. In particular, we show that associativity can be replaced with bisymmetry in this axiomatization. [less ▲]

Detailed reference viewed: 91 (18 UL)
Full Text
Peer Reviewed
See detailROSploit: Cybersecurity tool for ROS
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL

in International Conference on Robotic Computing (2019, February)

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack ... [more ▼]

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the potential threat posed by security vulnerabilities in ROS. In this article, we present a new tool to assist further security research in ROS, ROSploit. ROSploit is a modular two-pronged offensive tool covering both reconnaissance and exploitation of ROS systems, designed to assist researchers in testing exploits for ROS. [less ▲]

Detailed reference viewed: 142 (3 UL)
Full Text
Peer Reviewed
See detailReal-time attack detection on robot cameras: A self-driving car application
Lagraa, Sofiane UL; Cailac, Maxime; Rivera, Sean UL et al

in International Conference on Robotic Computing (2019, February)

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected ... [more ▼]

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially the image flows incoming from camera robots. In this paper, we perform a structured security assessment of robot cameras using ROS. We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras. Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method. We experiment our approach on robot cameras embedded on a self-driving car. [less ▲]

Detailed reference viewed: 169 (15 UL)
Full Text
Peer Reviewed
See detailA View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera
Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL; Baptista, Renato UL et al

in 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018 (2019, February)

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it ... [more ▼]

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it possible to extract a 3D skeleton from a single RGB image. Taking advantage of this impressive progress, we propose a simple framework for fast and view-invariant action recognition using a single RGB camera. The proposed pipeline can be seen as the association of two key steps. The first step is the estimation of a 3D skeleton from a single RGB image using a CNN-based pose estimator such as VNect. The second one aims at computing view-invariant skeleton-based features based on the estimated 3D skeletons. Experiments are conducted on two well-known benchmarks, namely, IXMAS and Northwestern-UCLA datasets. The obtained results prove the validity of our concept, which suggests a new way to address the challenge of RGB-based view-invariant action recognition. [less ▲]

Detailed reference viewed: 280 (22 UL)
Full Text
Peer Reviewed
See detailTowards Learning-Aided Configuration in 3D Printing: Feasibility Study and Application to Defect Prediction
Amand, Benoit; Cordy, Maxime UL; Heymans, Patrick et al

in Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, VAMOS 2019, Leuven, Belgium, February 06-08, 2019 (2019, February)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailROLE OF TARGETED BIOCHAR-ACTIVATION IN THE REMOVAL OF MACRO- AND MICROPOLLUTANTS FROM SECONDARY EFFLUENT WASTEWATER
Brunhoferova, Hana UL; Venditti, Silvia UL; Hansen, Joachim UL

in Book of Abstracts 8th International Symposium On Wetland Pollutant Dynamics and Control (2019, January 30)

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailDesign of a (yet another?) DevOps course
Capozucca, Alfredo UL; Guelfi, Nicolas UL; Ries, Benoît UL

in Bruel, Jean-Michel; Mazzara, Manuel; Meyer, Bertrand (Eds.) Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment (2019, January 19)

DevOps have received marginal attention inside the higher education level curricula despite of its boom in the industrial sector. This paper presents the design of an academic master-level course aimed at ... [more ▼]

DevOps have received marginal attention inside the higher education level curricula despite of its boom in the industrial sector. This paper presents the design of an academic master-level course aimed at DevOps. The proposed design is based on earlier experiences in teaching DevOps-related topics. The specification of the course design is provided using the SWEBOK Guide and Bloom’s taxonomy to enhance the quality of the course design specification, and ease its assessment once delivered. [less ▲]

Detailed reference viewed: 136 (23 UL)
Full Text
Peer Reviewed
See detailAssessing the impact of attacks on OPC-UA applications in the Industry 4.0 era
Polge, Julien UL; Robert, Jérémy UL; Le Traon, Yves UL

in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)

Detailed reference viewed: 137 (13 UL)
Full Text
Peer Reviewed
See detailEvaluation de l’engagement scolaire d’élèves en secondaire : quels facteurs sous-jacents sont en jeu ?
Kerger, Sylvie UL; Milmeister, Paul UL; Dierendonck, Christophe UL et al

in Actes du colloque of the 31ème coloque de l'ADMEE-Europe (2019, January 09)

Dans cette communication, nous allons, dans une perspective d’évitement du décrochage scolaire, nous pencher sur l’évaluation de l’engagement scolaire d’élèves en enseignement secondaire. Plus précisément ... [more ▼]

Dans cette communication, nous allons, dans une perspective d’évitement du décrochage scolaire, nous pencher sur l’évaluation de l’engagement scolaire d’élèves en enseignement secondaire. Plus précisément, nous tentons de mieux comprendre comment certains facteurs sous-jacents conditionnent ce dernier. En effet, l’engagement scolaire de l’élève peut être aussi bien lié à des facteurs individuels (sexe, catégorie socio-culturelle), qu’à des facteurs externes, tels que l’environnement scolaire. Nous posons les deux hypothèses suivantes : (1) Les élèves fréquentant les filières moins prestigieuses, ayant redoublé, ou issus d’un milieu social défavorable sont moins impliqués cognitivement (engagement cognitif) et ont plus souvent un comportement perturbateur (engagement comportemental). (2) Les perceptions de l’environnement scolaire et l’engagement scolaire des élèves sont associées positivement. Après avoir questionné 1473 élèves luxembourgeois, nous avons constaté que les facteurs individuels (le genre, position sociale des familles et la filière fréquentée) ne sont pas associés significativement à l’engagement cognitif des élèves, mais sont liés à l’engagement comportemental social (respect des règles). Les facteurs contextuels (perception de l'environnement scolaire, relation entre élèves et entre élèves et personnel, les climats éducatif, de justice, d’appartenance, de sécurité et la perception du bâtiment scolaire ainsi que l’orientation des buts centrés sur l’apprentissage ou sur la performance) sont liés aux deux variables dépendantes (engagement cognitif et engagement comportemental). Nos données confirment par ailleurs que l’orientation de l’école vers la performance est négativement liée à l’engagement des élèves. Nos deux hypothèses sont partiellement confirmées. Les deux variables dépendantes se distinguent en ce sens que l’engagement cognitif est lié quasi uniquement aux variables contextuelles, alors que les comportements perturbateurs sont aussi bien liés à des variables individuelles que contextuelles. Nos résultats montrent que l’évaluation de l’engagement scolaire peut fournir des informations aux enseignants permettant la mise en place de mesures pédagogiques agissant p.ex. sur les facteurs externes afin d’améliorer l’engagement scolaire des élèves. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailLa mesure des représentations et des pratiques parentales et leur mise en relation avec le développement des premières compétences numériques auprès d'élèves luxembourgeois du préscolaire.
Poncelet, Débora UL; Tinnes-Vigne, Mélanie; Dierendonck, Christophe UL

in Gremion, Christophe; Sylvestre, Emmanuel; Younes, Nathalie (Eds.) Actes du 31ème colloque scientifique international de l'Admée-Europe: Entre normalisation, contrôle et développement formatif. Evaluation sources de synergies ? (2019, January)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailSemantic Fuzzing with Zest
Padhye, Rohan; Lemieux, Caroline; Sen, Koushik et al

in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailArbitrary Ranking of Defeasible Subsumption
Casini, Giovanni UL; Harrison, Michael; Meyer, Thomas et al

in Proceedings of the 32nd International Workshop on Description Logics (2019)

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to ... [more ▼]

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to defeasible reasoning, the so-called KLM approach, is based on constructing specific rankings of defeasible information, and using these rankings to determine priorities in case of conflicting information. Here we propose a procedure that allows us to input any possible ranking of the defeasible concept inclusions contained in the knowledge base. We analyse and investigate the forms of defeasible reasoning obtained when conclusions drawn are obtained using these rankings. [less ▲]

Detailed reference viewed: 44 (3 UL)
Full Text
Peer Reviewed
See detailA parallel multi-population biased random-key genetic algorithm for electric distribution network reconfiguration
de Faria Junior, Haroldo UL; Tessaro Lunardi, Willian UL; Voos, Holger UL

in The Genetic and Evolutionary Computation Conference - GECCO'19 (2019)

This work presents a multi-population biased random-key genetic algorithm (BRKGA) for the electric distribution network reconfiguration problem (DNR). DNR belongs to the class of network design problems ... [more ▼]

This work presents a multi-population biased random-key genetic algorithm (BRKGA) for the electric distribution network reconfiguration problem (DNR). DNR belongs to the class of network design problems which include transportation problems, computer network restoration and telecommunication network design and can be used for loss minimization and load balancing, being an important tool for distribution network operators. A BRKGA is a class of genetic algorithms in which solutions are encoded as vectors of random keys, i.e. randomly generated real numbers from a uniform distribution in the interval [0, 1). A vector of random keys is translated into a solution of the optimization problem by a decoder. The decoder used generates only feasible solutions by using an efficient codification based upon the fundamentals of graph theory, restricting the search space. The parallelization is based on the single program multiple data paradigm and is executed on the cores of a multi-core processor. Time to target plots, which characterize the running times of stochastic algorithms for combinatorial optimization, are used to compare the performance of the serial and parallel algorithms. The proposed method has been tested on two standard distribution systems and the results show the effectiveness and performance of the parallel algorithm. [less ▲]

Detailed reference viewed: 93 (14 UL)
Full Text
Peer Reviewed
See detailDeformation quantization and Kähler geometry with moment maps
Futaki, Akito; La Fuente-Gravy, Laurent UL

in ICCM 2018 Proceedings, Taiwan 27-29 December 2018 (2019)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailSomatoforme Symptome: Zusammenhänge mit Low-Frequency-Herzratenvariabilität und Selbstberichte zu chronischem psychosozialen Stress, aber nicht mit HPA-Achsen-Aktivität
Hansen, G.; Larra, M. F.; Vögele, Claus UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Nach dem Perception-Filter-Modell der somatoformen Störungen (Rief & Barsky, 2005) könnte verstärkte Signalübermittlung von Körperorganen zur Symptomentstehung beitragen. Dabei wurden insbesondere das ... [more ▼]

Nach dem Perception-Filter-Modell der somatoformen Störungen (Rief & Barsky, 2005) könnte verstärkte Signalübermittlung von Körperorganen zur Symptomentstehung beitragen. Dabei wurden insbesondere das sympathische Nervensystem und die HPA-Achse als primäre physiologische Stressachsen diskutiert. Aufgrund hoher Heterogenität somatoformer Störungen ist die Befundlage zu beiden Achsen jedoch gemischt, was dafürspricht, größere Populationen ohne Multi-Komorbidität zu untersuchen. Bei einer studentischen Stichprobe (N=217; 113 w; Alter: 18-33 [M=23.0; SD=2.9] Jahre; BMI=22.2 [SD=2.8]) wurden selbstberichteter chronischer Stress (Trierer Inventar für Chronischen Stress/TICS) und somatoforme Symptome (Screening für Somatoforme Störungen/SOMS-2) erhoben. Alle Probanden lieferten Cortisol- Aufwachreaktionen (Erwachen, +15,+30,+45,+60 Min.) an zwei aufeinanderfolgenden Tagen, sowie ein Cortisol-Tagesprofil. Zusätzlich wurde im Labor in einer 10-minütigen Ruhemessung EKG zur Bestimmung der Ruhe-Herzratenvariabilität (RMSSD, pNN50, SDNN; Low- und High-Frequency) als Indikatoren des zentralen sympathischen und parasympathischen Tonus erfasst. Diejenigen TICS-Skalen, die psychosozialen Stress reflektieren, sowie „Chronische Besorgnis“ waren zwischen r=.16 und .26 mit somatoformen Symptomen korreliert. Die Skala „Chronische Besorgnis“ korrelierte außerdem positiv mit dem Tagescortisolspiegel (r=.19), sowie negativ mit SDNN (r=-.20), RMSSD (r=-.17), pNN50 (r=-.17), LF-Power (r=-.19) und HF-Power (r=-.16; alle ps < .05). Somatoforme Symptome korrelierten hingegen nicht mit Indikatoren der physiologischen Stressachsen. In einem Regressionsmodell mit Somatisierungsindex als Kriterium zeigte sich nur für die TICS-Skalen „Mangel an sozialer Anerkennung“ (b=.19) und „Chronische Besorgnis“ (b=.25), sowie LF-HRV (b=.20) signifikante Vorhersagekraft. Die Annahmen des Perception-Filter-Modells konnten nur hinsichtlich des sympathischen Nervensystems bestätigt werden, was daher als Frühindikator für somatoforme Störungen betrachtet werden könnte. Dennoch sind selbstberichteter chronischer Stress, vor allem „Besorgnis“, bei gesunden Probanden die stärksten Prädiktoren für somatoforme Symptome. [less ▲]

Detailed reference viewed: 28 (4 UL)
Full Text
Peer Reviewed
See detailTransmission of Collective Memory nad Jewish Identity in Postwar Jewish Generations through War Souvenirs
Bronec, Jakub UL

in International 26th annual CIDOC - ICOM Conference in 2018 (2019)

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian ... [more ▼]

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian Jews were living through the era of de-Stalinisation, and their narratives offer new insights into this segment of Jewish postwar history that differ from those of Jews living in liberal democratic European states. Based on personal documents, photos, letters and souvenirs, the conducted interviews highlight an interesting way of maintaining personal memories in Jewish families and how this varies from one generation to the next. In my contribution, I am planning to illustrate the importance of these small artefacts for the transmission of Jewish collective memory. My presentation showcases people widely referred to as the “second and third Jewish generation”, their attitude to current notions of Jewish memory and self-perception and their role in society. Some had to live under totalitarian oppression, others had to face a wave of Jewish Sephardic immigrants coming from overseas – and witnesses admit that the arrival of these newcomers often caused difficulties in Jewish communities. Small objects from the war, often displayed in their households, serve as a reminder of their roots and destiny, which should not be forgotten. This paper is a part of my broader research project examining distinctions and similarities in identity formation through generations of Czech, Slovak, French and Luxembourgish Jews, who grew up either under communism or in liberal Western Europe. The aim is to create an international virtual library and cloud storage, not only for professional educators but also for the public. [less ▲]

Detailed reference viewed: 56 (7 UL)
Full Text
Peer Reviewed
See detailExperimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks
Turcanu, Ion UL; Adamsky, Florian; Engel, Thomas UL

in IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (2019)

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision ... [more ▼]

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision requires the knowledge of the current state of the road traffic, which can be obtained by collecting Floating Car Data (FCD) information using Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p standard. Most of the existing FCD collection protocols have been evaluated via simulations and mathematical models, while the real-world implications have not been thoroughly investigated. This paper presents an open-source implementation of two state-of-the-art FCD collection algorithms, namely BASELINE and DISCOVER. These algorithms are implemented in an open-source vehicular prototyping platform and validated in a real-world experimental setup. [less ▲]

Detailed reference viewed: 131 (31 UL)
Full Text
Peer Reviewed
See detailVision-Based Aircraft Pose Estimation for UAVs Autonomous Inspection without Fiducial Markers
Cazzato, Dario UL; Olivares Mendez, Miguel Angel UL; Sanchez Lopez, Jose Luis UL et al

in IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society (2019)

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailImmersive Mixed Reality Object Interaction for Collaborative Context-Aware Mobile Training and Exploration
Botev, Jean UL; Mayer, Joe; Rothkugel, Steffen UL

in Proceedings of the 10th ACM Multimedia Systems Conference (MMSys) (2019)

Detailed reference viewed: 92 (19 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Vulnerability Prediction of Open-Source Software Releases
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailOn Domination and Control in Strategic Ability
Kurpiewski, Damian; Knapik, Micha L; Jamroga, Wojciech UL

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 5 (0 UL)
See detailFree Transit in Luxembourg: A case of post-political urban governance through policy mobility
Hesse, Markus UL; Carr, Constance UL

in Witlox, Frank (Ed.) Moving Towards More Sustainable Mobility and Transport through Smart Systems - Proceedings of the BIVEC-GIBET Transport Research Days 2019 (2019)

Detailed reference viewed: 77 (1 UL)
Full Text
Peer Reviewed
See detailDo interoceptive deficits contribute to decision-making problems in academic procrastination
Breden, I.-H.; Dincher, K.; Pereira Pedrosa, R. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides ... [more ▼]

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides the selection for the potentially best option. In the present study, we aimed at investigating if chronically procrastinating individuals show interoceptive deficits, which may explain poor decision-making performance. We tested 19 chronic procrastinators (14 females) and 22 nonprocrastinating control individuals (14 females), recruited from students and staff of the University of Luxembourg. This study consisted of a laboratory experiment including questionnaires assessing procrastinating behavior and two separate behavioral paradigms. Using the Schandry Heartbeat Perception Task as an indicator for interoceptive accuracy and the Iowa Gambling Task (IGT) for the assessment of decision-making performance. Questionnaire data confirmed significantly higher procrastination scores in that group. While male participants showed a significantly higher interoceptive accuracy score than their female counterparts, procrastinators and non-procrastinators did not differ significantly in interoception. Furthermore, no differences in the choice of deck selections were found between procrastinators and non-procrastinators. Interoceptive accuracy was unrelated to decision-making performance. No significant group differences were found for either analysis regarding the performance development as well as sex differences in the IGT. We observed a learning effect in the IGT, with choices for profitable decks increasing over time and poor choices declining. The current study did neither support reduced decision-making problems, nor interoceptive deficits in procrastination. Future studies should incorporate interoceptive indicators of other organ systems and self-report measures to elucidate possible alterations in procrastination. [less ▲]

Detailed reference viewed: 55 (2 UL)
Full Text
Peer Reviewed
See detailKnow Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation
Du, Manxing UL; Cowen-Rivers, Alexander I.; Wen, Ying et al

in Proceedings of the 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019) (2019)

Detailed reference viewed: 318 (0 UL)
Full Text
Peer Reviewed
See detailResources and Competences required at the Institutional Level for a Patient – Healthcare Professional Partnership
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has ... [more ▼]

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has given rise to patients who are active players in their care, and participate in decision-making. Central to these changes, are patients and healthcare professionals’, whose backgrounds and experiences reflect both cultural factors that influence health decisions, and a power shift from professional dominance to a more equitable partnership style. Our study aims to determine resources and competences required at the institutional level to implementing a partnership Semi-structured focus groups with 20 chronic disease patients and interviews with 15 healthcare professionals were conducted. Thematic content analysis was performed with NVivo 12 to categorize verbatim. Items were grouped into dimensions, and themes common to both parties were grouped together. Three major areas emerged: 1) Training to develop a partnership culture - Training healthcare professionals in patient psychology, developing therapeutic education programs for patients and enriching available information with patients’ experiential knowledge. 2) Creation of information / support centers for: Interdisciplinary meetings, facilitating the provision of structured, verified and pertinent information and providing administrative aid to patients. 3) Development of e-health solutions to: Provide information 24/7; facilitate collaborative content creation by healthcare professionals, patients and researchers, and for sharing and updating patient files among professionals. Our findings will help design, implement, monitor and evaluate suitable actions, and help promote sustainable forms of expertise – inclusion of experiential knowledge and resource patients within the healthcare team [less ▲]

Detailed reference viewed: 69 (3 UL)
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in 61st IISL COLLOQUIUM ON THE LAW OF OUTER SPACE (2019)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 71 (2 UL)
Full Text
Peer Reviewed
See detailTwo-stage RGB-based Action Detection using Augmented 3D Poses
Papadopoulos, Konstantinos UL; Ghorbel, Enjie UL; Baptista, Renato UL et al

in 18th International Conference on Computer Analysis of Images and Patterns SALERNO, 3-5 SEPTEMBER, 2019 (2019)

In this paper, a novel approach for action detection from RGB sequences is proposed. This concept takes advantage of the recent development of CNNs to estimate 3D human poses from a monocular camera. To ... [more ▼]

In this paper, a novel approach for action detection from RGB sequences is proposed. This concept takes advantage of the recent development of CNNs to estimate 3D human poses from a monocular camera. To show the validity of our method, we propose a 3D skeleton-based two-stage action detection approach. For localizing actions in unsegmented sequences, Relative Joint Position (RJP) and Histogram Of Displacements (HOD) are used as inputs to a k-nearest neighbor binary classifier in order to define action segments. Afterwards, to recognize the localized action proposals, a compact Long Short-Term Memory (LSTM) network with a de-noising expansion unit is employed. Compared to previous RGB-based methods, our approach offers robustness to radial motion, view-invariance and low computational complexity. Results on the Online Action Detection dataset show that our method outperforms earlier RGB-based approaches. [less ▲]

Detailed reference viewed: 116 (10 UL)
Full Text
Peer Reviewed
See detailA Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in Emerging Technologies for Authorization and Authentication (2019)

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome ... [more ▼]

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome for the average user. To make more accessible the use of encrypted email, a secure email application named pEp automates the key management operations; pEp still requires the users to carry out the verification, however, the authentication process is simple: users have to compare familiar words instead of strings of random characters, then the application shows the users what level of trust they have achieved via colored visual indicators. Yet, users may not execute the authentication ceremony as intended, pEp's trust rating may be wrongly assigned, or both. To learn whether pEp's trust ratings (and the corresponding visual indicators) are assigned consistently, we present a formal security analysis of pEp's authentication ceremony. From the software implementation in C, we derive the specifications of an abstract protocol for public key distribution, encryption and trust establishment; then, we model the protocol in a variant of the applied pi calculus and later formally verify and validate specific privacy and authentication properties. We also discuss alternative research directions that could enrich the analysis. [less ▲]

Detailed reference viewed: 84 (13 UL)
Full Text
Peer Reviewed
See detailA Memory-Based Label Propagation Algorithm for Community Detection
Fiscarelli, Antonio Maria UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Complex Networks and Their Applications VII (2019)

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dissimilarity between them. Several methods have been proposed but many of ... [more ▼]

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dissimilarity between them. Several methods have been proposed but many of them are not suitable for large-scale networks because they have high complexity and use global knowledge. The Label Propagation Algorithm (LPA) assigns a unique label to every node and propagates the labels locally, while applying the majority rule to reach a consensus. Nodes which share the same label are then grouped into communities. Although LPA excels with near linear execution time, it gets easily stuck in local optima and often returns a single giant community. To overcome these problems we propose MemLPA, a novel LPA where each node implements memory and the decision rule takes past states of the network into account. We demonstrate through extensive experiments on the Lancichinetti-Fortunato-Radicchi benchmark and a set of real-world networks that MemLPA outperforms most of state-of-the-art community detection algorithms. [less ▲]

Detailed reference viewed: 119 (15 UL)
Full Text
Peer Reviewed
See detailCHARIOT – Towards a Continuous High-level Adaptive Runtime Integration Testbed
Barnes, Chloe M.; Bellman, Kirstie; Botev, Jean UL et al

in Proceedings of the 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (2019)

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailPersonalized Sentiment Analysis and a Framework with Attention-Based Hawkes Process Model
Guo, Siwen UL; Höhn, Sviatlana UL; Xu, Feiyu et al

in Agents and Artificial Intelligence (2019)

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality ... [more ▼]

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the data sparsity issue, thus it is difficult to develop. In this article, we take texts from social platforms and propose a preliminary model for evaluating the effectiveness of including user information from the past, and offer a solution for the data sparsity. Furthermore, we present a finer-designed, enhanced model that focuses on frequent users and offers to capture the decay of past opinions using various gaps between the creation time of the text. An attention-based Hawkes process on top of a recurrent neural network is applied for this purpose, and the performance of the model is evaluated with Twitter data. With the proposed framework, positive results are shown which opens up new perspectives for future research. [less ▲]

Detailed reference viewed: 166 (39 UL)
Full Text
Peer Reviewed
See detailProactive Middleware for Fault Detection and Advanced Conflict Handling in Sensor Fusion
Neyens, Gilles UL; Zampunieris, Denis UL

in Proceedings of the 18th International Conference, ICAISC 2019 Zakopane, Poland, June 16–20, 2019, Part I & II (2019)

Robots traditionally have a wide array of sensors that allow them to react to the environment and make appropriate decisions. These sensors can give incorrect or imprecise data due to malfunctioning or ... [more ▼]

Robots traditionally have a wide array of sensors that allow them to react to the environment and make appropriate decisions. These sensors can give incorrect or imprecise data due to malfunctioning or noise. Sensor fusion methods try to overcome some of these issues by using the data coming from different sensors and combining it. However, they often don’t take sensor malfunctioning and a priori knowledge about the sensors and the environment into account, which can produce conflicting information for the robot to work with. In this paper, we present an architecture and process in order to overcome some of these limitations based on a proactive rule-based system. [less ▲]

Detailed reference viewed: 105 (11 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Extended Abstract)
Steen, Alexander UL; Benzmüller, Christoph UL

in Benzmüller, Christoph; Stuckenschmidt, Heiner (Eds.) {KI} 2019: Advances in Artificial Intelligence - 42nd German Conference on AI, Kassel, Germany, September 23-26, 2019, Proceedings (2019)

Detailed reference viewed: 43 (1 UL)
Full Text
Peer Reviewed
See detailGeneration of Patients-as-Partner Items Through a Qualitative Data Analysis : Initial Item Reduction
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Health psychology aspires to find ways for evaluating the Patient as a Partner. The Montréal model, proposes a verbal and conceptual interpretation. Developed by a University of Montréal research team ... [more ▼]

Health psychology aspires to find ways for evaluating the Patient as a Partner. The Montréal model, proposes a verbal and conceptual interpretation. Developed by a University of Montréal research team, this approach advances that patients should play an active role in the healthcare process. Quantitative assessments employing a methodological framework involving a qualitative approach do not exist. Our study aimed at analyzing a procedure for generating patient as a partner related items and to elaborate their classification. Five semi-structured focus groups with 20 chronic disease patients and 15 professionals (doctors, nurses) were conducted. A qualitative analysis, combining inductive (data abstraction was conducted from specific to general), and deductive (guided by a predefined protocol) methods was employed to create a flexible framework of analysis. A thematic categorical content analysis of the transcriptions was conducted. Verbatim were extracted and classified into categories. Cluster analysis using Sorensen’s coeffient was performed with the software N’Vivo 12. Sorensen’s similarity analysis helped to structure a conceptual framework for the assessment of patient as partner at the doctor patient interaction level. The content of each category was verfied through consensus by multidisciplinary experts, who formulated items to capture the overall patient as partner experience. Our list of items constituted fundamental dimensions of partnership, constituting a first classification and a basis for the development of a routine clinical assessment tool. This process should guarantee that the items are acceptable, comprehensive and relevant (reflecting the lived experience of the participants) ensuring a validity of the future questionnaire. [less ▲]

Detailed reference viewed: 73 (3 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (2019)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 109 (3 UL)
Full Text
Peer Reviewed
See detailA Decade of Featured Transition Systems
Cordy, Maxime UL; Devroey, Xavier; Legay, Axel et al

in From Software Engineering to Formal Methods and Tools, and Back - Essays Dedicated to Stefania Gnesi on the Occasion of Her 65th Birthday (2019)

Detailed reference viewed: 19 (2 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in Springer Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). (2019)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 661 (48 UL)
Full Text
Peer Reviewed
See detailInterozeptive Genauigkeit: Ein methodischer Vergleich von zwei Heartbeat Tracking Paradigmen
Haciahmet, C.; Opdensteinen, K.; Schaan, L. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert ... [more ▼]

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert nach Melloni et al., 2013) - welche Interozeptive Genauigkeit (IG) anhand des Vergleichs von objektiver und selbst-berichteter Herzrate erfassen (Garfinkel et al., 2015). Die Paradigmen unterscheiden sich hinsichtlich des mentalen Zählens (HTT) und motorischen Tappings (aHTT) von kardiovaskulären Empfindungen. Tapping wird in Biofeedback-Studien zur Verbesserung der IG angewendet (Ring et al., 2015), bislang jedoch kaum mit mentalem Zählen verglichen. 74 gesunde Versuchspersonen (MAlter = 22.66, SDAlter = 2.74, 49 Frauen) bearbeiteten den HTT und den aHTT. Die IGScores des HTT waren im Durchschnitt signifikant höher als im aHTT (t(73) = 2.73, p = .01, d = .28). Bei einem Cut-Off von IG = 0.70 konnten 37 gute Herzschlagwahrnehmer/innen im HTT und 27 gute Herzschlagwahrnehmer/innen im aHTT klassifiziert werden. Auch im Selbstbericht zur eigenen Herzschlagwahrnehmungsfähigkeit, zeigte sich bei den Probanden ein höheres Konfidenzrating im HTT als im aHTT (MHTT = 5.00, SD = 2.04; MaHTT = 3.88, SD = 1.77; Z(74) = -5.24, p < .01, d = .59). Zusammenfassend weisen die Ergebnisse auf eine bessere Herzschlagwahrnehmung im HTT hin, sowohl bezüglich der IG-Scores als auch im Selbstbericht. Eine Erklärung für die niedrigeren Interozeptionswerte im aHTT könnte sein, dass die sensorische und motorische Interferenz der Tapping-Aufgaben mit der Detektion von afferenten Herzsensationen konkurrieren, weshalb der salientere Tapping-Stimulus den Aufmerksamkeitsfokus von internalen Prozessen ablenkt (Pennebaker & Hoover, 1984). Zukünftige Studien sollten prüfen, welche spezifischen Einsatzmöglichkeiten sich für HTT und aHTT anbieten, hinsichtlich einer akkuraten und ökonomischen Erfassung von IG. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 48 (23 UL)
Full Text
Peer Reviewed
See detailPhase field modeling of interfacial crack propagation in quasi-brittle heterogeneous materials
Nguyen, Thanh Tung UL; Yvonnet, Julien; Waldmann, Danièle UL et al

in International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2019)

Detailed reference viewed: 51 (12 UL)
See detailCharles-Ferdinand Nothomb et les Belges germanophones: contribution à l'histoire des relations entre P.S.C. et C.S.P.
Brüll, Christoph UL

in Annaert, Phiilippe; Lanneau, Catherine; Dujardin, Vincent (Eds.) Charles-Ferdinand Nothomb. Une homme d'Etat, une époque. Actes du colloque tenu à Saint-Hubert le 10 juin 2016 (2019)

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailErhöhte Reaktivität Herzschlag-evozierter Potenziale während der Aufmerksamkeits- fokussierung auf den eigenen Herzschlag und erhöhte kardiovaskuläre Aktivität bei Personen mit hoher somatoformer Symptombelastung
Schulz, André UL; Rost, S.; Dierolf, Angelika UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte ... [more ▼]

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte Signalübermittlung von Körperorganen und (2.) verringerte Filterfunktion im ZNS zu (3.) verstärkter Wahrnehmung von Symptomen führt. Bislang existiert jedoch keine Evidenz, die diesen Zusammenhang an einer von somatoformen Symptomen belasteten Population unterstützt. Um diesen Sachverhalt aufzudecken, wurden zunächst 486 Personen aus der Allgemeinbevölkerung anhand einer Online- Version des Screenings für Somatoforme Störungen (SOMS-2) anhand des oberen und unteren Centils in Personen mit hoher (HSB) und niedriger somatoformer Symptombelastung (NSB) geteilt. Jeweils 29 NSB- (21 Frauen; 26,0 J.) und HSBPersonen (27 Frauen; 28,4 J.) wurden im Labor anhand (1.) verstärkter Körpersignale hinsichtlich kardiovaskulärer Aktivität und Cortisol-Aufwachreaktion, sowie (2.) Filterfunktionen im ZNS hinsichtlich Herzschlag-evozierter Potentiale (HEPs) während der Durchführung eines Herzschlagwahrnehmungstests und während Ruhe untersucht. HEPs reflektieren die Repräsentation kardio-afferenter Signale im ZNS. Die HSB-Gruppe zeigte eine höhere Ruhe-Herzrate (72,7 vs. 66,8 bpm) und eine geringere Herzratenvariabilität (RMSSD: 36,8 vs. 52,5 ms) als die LSB-Gruppe. Außerdem zeigten die HSB-Personen bei der Aufmerksamkeitsfokussierung auf den eigenen Herzschlag eine höhere Reaktivität der HEP-Amplitude als die LSB-Personen. Es gab keine Gruppenunterschiede hinsichtlich der Cortisol-Aufwachreaktion. Die Ergebnisse belegen sowohl (1.) die verstärkte Signalübermittlung von Körperorganen, als auch (2.) verringerte Filterfunktionen bei Personen mit hoher somatoformer Symptombelastung. Dies spricht für die Gültigkeit des Perception-Filter-Modells. Die erhöhte HEP-Reaktivität bezüglich der Aufmerksamkeitsfokussierung auf Körperprozesse könnte einen Biomarker für Personen mit hohem Risiko für die Entwicklung von somatoformen Störungen darstellen. [less ▲]

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailFELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms
Cardoso Dos Santos, Luan UL; Groszschädl, Johann UL; Biryukov, Alex UL

in Smart Card Research and Advanced Applications, 18th International Conference (2019)

Cryptographic algorithms that can simultaneously provide both encryption and authentication play an increasingly important role in modern security architectures and protocols (e.g.\ TLS v1.3). Dozens of ... [more ▼]

Cryptographic algorithms that can simultaneously provide both encryption and authentication play an increasingly important role in modern security architectures and protocols (e.g.\ TLS v1.3). Dozens of authenticated encryption systems have been designed in the past five years, which has initiated a large body of research in cryptanalysis. The interest in authenticated encryption has further risen after the National Institute of Standards and Technology (NIST) announced an initiative to standardize ``lightweight'' authenticated ciphers and hash functions that are suitable for resource-constrained devices. However, while there already exist some cryptanalytic results on these recent designs, little is known about their performance, especially when they are executed on small 8, 16, and 32-bit microcontrollers. In this paper, we introduce an open-source benchmarking tool suite for a fair and consistent evaluation of Authenticated Encryption with Associated Data (AEAD) algorithms written in C or assembly language for 8-bit AVR, 16-bit MSP430, and 32-bit ARM Cortex-M3 platforms. The tool suite is an extension of the FELICS benchmarking framework and provides a new AEAD-specific low-level API that allows users to collect very fine-grained and detailed results for execution time, RAM consumption, and binary code size in a highly automated fashion. FELICS-AEAD comes with two pre-defined evaluation scenarios, which were developed to resemble security-critical operations commonly carried out by real IoT applications to ensure the benchmarks are meaningful in practice. We tested the AEAD tool suite using five authenticated encryption algorithms, namely AES-GCM and the CAESAR candidates ACORN, ASCON, Ketje-Jr, and NORX, and present some preliminary results. [less ▲]

Detailed reference viewed: 62 (13 UL)
Full Text
Peer Reviewed
See detailStrategic Analysis in the Realm of Enterprise Modeling – On the Example of Blockchain-Based Initiatives for the Electricity Sector
de Kinderen, Sybren; Kaczmarek-Heß, Monika; Razo-Zapata, Ivan et al

in WIRTSCHAFTSINFORMATIK 2019 PROCEEDINGS (2019)

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailAutomated Search for Configurations of Deep Neural Network Architectures
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in Automated Search for Configurations of Convolutional Neural Network Architectures (2019)

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as ... [more ▼]

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the variability of DNN architectures with a Feature Model (FM) that generalizes over existing architectures. Each valid configuration of the FM corresponds to a valid DNN model that can be built and trained. Second, we implement, on top of Tensorflow, an automated procedure to deploy, train and evaluate the performance of a configured model. Third, we propose a method to search for configurations and demonstrate that it leads to good DNN models. We evaluate our method by applying it on image classification tasks (MNIST, CIFAR-10) and show that, with limited amount of computation and training, our method can identify high-performing architectures (with high accuracy). We also demonstrate that we outperform existing state-of-the-art architectures handcrafted by ML researchers. Our FM and framework have been released to support replication and future research. [less ▲]

Detailed reference viewed: 144 (26 UL)
Peer Reviewed
See detailDLA: Detecting and Localizing Anomalies in Containerized Microservice Architectures Using Markov Models
Samir, Areeg UL; Pahl, Claus

in Samir, Areeg (Ed.) the 7th International Conference on Future Internet of Things and Cloud (2019)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailInterozeption bei akutem Stress und Stress-assoziierten Erkrankungen
Schulz, André UL

in Schmidt, S. (Ed.) 14. Kongress der Fachgruppe Gesundheitspsychologie. Das richtige Maß ‒ Gesundheitspsychologie zwischen Individualisierung und Bevölkerungsbezug. (2019)

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum ... [more ▼]

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum beinhaltet efferente Signalübermittlung vom Gehirn an periphere Körperprozesse. Daher kann die Interaktion von Interozeption und Stress auch als bi-direktionale Signalübermittlung zwischen Gehirn und Körper angesehen werden. Die präsentierte Studienreihe besteht aus 10 Einzelstudien, die folgende Ziele verfolgt: (1.) Die bidirektionale Hirn-Körper-Kommunikation im Normalzustand bei Gesunden zu verstehen und (2.) die Bedeutung potenziell dysregulierter Hirn-Körper-Kommunikation bei Stress-assoziierten Krankheiten aufzudecken. Methode: Dabei werden verschiedene Ebenen interozeptiver Signalübermittlung, wie frühe Repräsentation im zentralen Nervensystem (ZNS), bewusste Wahrnehmung und Aufmerksamkeitslenkung auf Körperprozesse, sowie deren Interpretation untersucht. Die beiden physiologischen Stress-Achsen, die Hypothalamus- Hypophysen-Nebennierenrinden-Achse und die sympatho-adreno-medulläre (SAM-)Achse, stehen dabei im Mittelpunkt der Untersuchungen. Ergebnisse: Zunächst wird anhand von Studien mit Stresstests und pharmakologischen Designs aufgezeigt, dass eine Aktivierung der SAM-Achse sowohl das kardiovaskuläre System stimuliert, aber auch die Aufmerksamkeitslenkung beeinträchtigt. Cortisol wiederum verstärkt Hirn-Körper-Kommunikation vor allem auf Ebene der (kortikalen) ZNS-Repräsentation. Depersonalisierungsstörung, somatoforme Störungen, Depression, posttraumatische Belastungsstörung und Borderline-Persönlichkeitsstörung zeichnen sich alle durch ein hochspezifisches Pattern der Dysregulation hinsichtlich Interozeption und physiologischer Stressachsen aus, was die Heterogenität der Körpersymptome erklären könnte. Darüber hinaus zeigt sich, dass Hirn-Körper-Kommunikation auch den Verlauf kardiovaskulärer Erkrankungen vorhersagen kann. Diskussion: Die Ergebnisse sprechen für die Entwicklung von Präventionsansätzen, die Hirn-Körper-Kommunikation mit bestimmten Trainings zu stärken, um den psychischen und körperlichen Gesundheitsverlauf positiv beeinflussen zu können. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailSimple Conditionals with Constrained Right Weakening
Casini, Giovanni UL; Meyer, Thomas; Varzinczak, Ivan

in Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI 2019) (2019)

In this paper we introduce and investigate a very basic semantics for conditionals that can be used to define a broad class of conditional reasoning systems. We show that it encompasses the most popular ... [more ▼]

In this paper we introduce and investigate a very basic semantics for conditionals that can be used to define a broad class of conditional reasoning systems. We show that it encompasses the most popular kinds of conditional reasoning developed in logic-based KR. It turns out that the semantics we propose is appropriate for a structural analysis of those conditionals that do not satisfy the property of Right Weakening. We show that it can be used for the further development of an analysis of the notion of relevance in conditional reasoning. [less ▲]

Detailed reference viewed: 55 (5 UL)
Full Text
Peer Reviewed
See detailReal-Time Human Head Imitation for Humanoid Robots
Cazzato, Dario UL; Cimarelli, Claudio UL; Sanchez Lopez, Jose Luis UL et al

in Proceedings of the 2019 3rd International Conference on Artificial Intelligence and Virtual Reality (2019)

Detailed reference viewed: 46 (9 UL)
Full Text
Peer Reviewed
See detailHerzschlag-evozierte Potenziale bei Bulimia nervosa
Lutz, Annika UL; Van Dyck, Zoé UL; Schulz, André UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben ... [more ▼]

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben sich je nach betrachtetem Organsystem (Herz, Magen), Verarbeitungsebene (neuronal, Selbstbericht) und Diagnose. Die bisherige Befundlage ist jedoch unübersichtlich und widersprüchlich. Für Bulimia nervosa (BN) wurde sowohl reduzierte, als auch unveränderte Herzschlagwahrnehmung berichtet. Mit dem vorliegenden Beitrag steuern wir weitere Ergebnisse zur Herzschlagwahr nehmung bei und ergänzen diese um einen physiologischen Indikator der kortikalen Verarbeitung kardio-afferenter Signale (Herzschlag-evozierte Potenziale, HEPs). Es wurden 22 Frauen mit akuter oder teilremittierter BN (BMI 23,94±3,61; Alter 31,86±11,20) und 22 gesunde Frauen untersucht (BMI 24,24±3,37; Alter 31,00±10,15). Die Stichproben wurden nach Alter und BMI parallelisiert. Die Teilnehmerinnen führten eine Herzschlagwahrnehmungsaufgabe nach Schandry durch, während ein 64-Kanal-EEG aufgezeichnet wurde. HEPs wurden als mittlere EEG-Amplitude von 455ms bis 595ms nach der R-Zacke berechnet. Die Ergebnisse zeigen keine signifikanten Gruppenunterschiede in Herzschlagwahrnehmung, HEPs und Herzrate. Dies bestätigt vorherige Befunde einer intakten Herzschlagwahrnehmung bei BN. Zusätzlich können wir von einer intakten kortikalen Verarbeitung kardio-afferenter Reize ausgehen. Die Wahrnehmung des Herzschlags ist insbesondere für die Verarbeitung und Regulation von Emotionen relevant. Auf Basis der vorliegenden und früheren Befunde ist davon auszugehen, dass defizitäre Emotionsregulation bei BN nicht auf veränderte Herzschlagwahrnehmung zurückzuführen ist. [less ▲]

Detailed reference viewed: 33 (3 UL)
Full Text
Peer Reviewed
See detailAn offline dictionary attack against zkPAKE protocol
Lopez Becerra, José Miguel UL; Ryan, Peter UL; Sala, Petra UL et al

in An offline dictionary attack against zkPAKE protocol (2019)

Password Authenticated Key Exchange (PAKE) allows a user to establish a secure cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security require- ments of ... [more ▼]

Password Authenticated Key Exchange (PAKE) allows a user to establish a secure cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security require- ments of PAKE is to prevent o ine dictionary attacks. In this paper, we revisit zkPAKE, an augmented PAKE that has been recently proposed by Mochetti, Resende, and Aranha (SBSeg 2015). Our work shows that the zkPAKE protocol is prone to o ine password guess- ing attack, even in the presence of an adversary that has only eavesdrop- ping capabilities. Results of performance evaluation show that our attack is practical and e cient.Therefore, zkPAKE is insecure and should not be used as a password-authenticated key exchange mechanism. [less ▲]

Detailed reference viewed: 115 (9 UL)
Full Text
Peer Reviewed
See detailUnderstanding and Modelling Human Attention for Soft Biometrics Purposes
Cazzato, Dario UL; Leo, Marco; Carcagnì, Pierluigi et al

in AIVR 2019: Proceedings of the 2019 3rd International Conference on Artificial Intelligence and Virtual Reality (2019)

Detailed reference viewed: 69 (10 UL)
Full Text
Peer Reviewed
See detailCache-Aided Massive MIMO: Linear Precoding Design and Performance Analysis
Wei, Xiao; Xiang, Lin UL; Cottatellucci, Laura et al

in Proc. IEEE ICC 2019 (2019)

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular ... [more ▼]

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular communications. In addition to reaping the conventional advantages of caching and massive MIMO, the proposed scheme also exploits the side information provided by cached files for interference cancellation at the receivers. This interference cancellation increases the degrees of freedom available for precoding design. In addition, the power freed by the cache-enabled offloading can benefit the transmissions to the users requesting non-cached files. The resulting performance gains are not possible if caching and massive MIMO are designed separately. We analyze the performance of cache-aided massive MIMO for cache-dependent maximum-ratio transmission (MRT), zero-forcing (ZF) precoding, and regularized zero-forcing (RZF) precoding. Lower bounds on the ergodic achievable rates are derived in closed form for MRT and ZF precoding. The ergodic achievable rate of RZF precoding is obtained for the case when the numbers of transmit antennas and users are large but their ratio is fixed. Compared to conventional massive MIMO, the proposed cache-aided massive MIMO scheme achieves a significantly higher ergodic rate especially when the number of users approaches the number of transmit antennas. [less ▲]

Detailed reference viewed: 59 (3 UL)
Full Text
Peer Reviewed
See detailA graph-based approach to explore relationship between hashtags and images
Zhong, Zhiqiang UL; Zhang, Yang; Pang, Jun UL

in Proceedings of the 20th International Conference on Web Information System Engineering (2019)

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailDecision Support for Security-Control Identification Using Machine Learning
Bettaieb, Seifeddine UL; Shin, Seung Yeob UL; Sabetzadeh, Mehrdad UL et al

in International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019 (2019)

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is ... [more ▼]

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. [Problem] An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Principal ideas/results] In this paper, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of ≈ 95% and average precision of ≈ 67%. [Contribution] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. [less ▲]

Detailed reference viewed: 243 (52 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 48 (23 UL)
Full Text
Peer Reviewed
See detailStrategy Logic with Simple Goals: Tractable Reasoning about Strategies
Belardinelli, Francesco; Jamroga, Wojciech UL; Kurpiewski, Damian et al

in Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (2019)

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailNAI: The Normative Reasoner
Libal, Tomer UL; Steen, Alexander UL

in Bex, Floris (Ed.) Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law (2019)

Detailed reference viewed: 29 (5 UL)
Full Text
Peer Reviewed
See detailDetecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system
Stojkovski, Borce UL; Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security ... [more ▼]

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security analysis allows for a new class of security properties in terms of misalignments between the system’s technical guarantees and the user’s impressions of them. For instance, a property that we call “false sense of insecurity” identifies a situation in which a secure system injects uncertainty in users, thus improperly transmitting the degree of protection that it actually provides; another, which we call “false sense of security”, captures situations in which a system instills a false sense of security beyond what a technical analysis would justify. Both situations leave room for attacks. In this paper we propose a model to define and reason about such socio-technical misalignments. The model refers to and builds on the concept of security ceremonies, but relies on user experience notions and on security analysis techniques to put together the information needed to verify misalignment properties about user’s impressions and system’s security guarantees. We discuss the innovative insight of this pilot model for a holistic understanding of a system’s security. We also propose a formal model that can be used with existing model checkers for an automatic analysis of misalignments. We exemplify the approach by modelling one specific application for end-to-end email encryption within which we analyze a few instances of misalignment properties. [less ▲]

Detailed reference viewed: 173 (43 UL)
Full Text
Peer Reviewed
See detailA Proposal for Security Assessment of Trustzone-M based Software
Iannillo, Antonio Ken UL; State, Radu UL

in 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) (2019)

With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical ... [more ▼]

With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical world or other software entities with minimal or no human input. This fast abstract proposes a methodology for the security assessment of software based on TrustZone-M, the ARM hardware security extension for microcontrollers. The methodology consists of the exploitation of a verification and validation framework to automatically test TrustZone-M based software. [less ▲]

Detailed reference viewed: 93 (8 UL)