References of "Paper published in a book"      in Complete repository Arts & humanities   Archaeology   Art & art history   Classical & oriental studies   History   Languages & linguistics   Literature   Performing arts   Philosophy & ethics   Religion & theology   Multidisciplinary, general & others Business & economic sciences   Accounting & auditing   Production, distribution & supply chain management   Finance   General management & organizational theory   Human resources management   Management information systems   Marketing   Strategy & innovation   Quantitative methods in economics & management   General economics & history of economic thought   International economics   Macroeconomics & monetary economics   Microeconomics   Economic systems & public economics   Social economics   Special economic topics (health, labor, transportation…)   Multidisciplinary, general & others Engineering, computing & technology   Aerospace & aeronautics engineering   Architecture   Chemical engineering   Civil engineering   Computer science   Electrical & electronics engineering   Energy   Geological, petroleum & mining engineering   Materials science & engineering   Mechanical engineering   Multidisciplinary, general & others Human health sciences   Alternative medicine   Anesthesia & intensive care   Cardiovascular & respiratory systems   Dentistry & oral medicine   Dermatology   Endocrinology, metabolism & nutrition   Forensic medicine   Gastroenterology & hepatology   General & internal medicine   Geriatrics   Hematology   Immunology & infectious disease   Laboratory medicine & medical technology   Neurology   Oncology   Ophthalmology   Orthopedics, rehabilitation & sports medicine   Otolaryngology   Pediatrics   Pharmacy, pharmacology & toxicology   Psychiatry   Public health, health care sciences & services   Radiology, nuclear medicine & imaging   Reproductive medicine (gynecology, andrology, obstetrics)   Rheumatology   Surgery   Urology & nephrology   Multidisciplinary, general & others Law, criminology & political science   Civil law   Criminal law & procedure   Criminology   Economic & commercial law   European & international law   Judicial law   Metalaw, Roman law, history of law & comparative law   Political science, public administration & international relations   Public law   Social law   Tax law   Multidisciplinary, general & others Life sciences   Agriculture & agronomy   Anatomy (cytology, histology, embryology...) & physiology   Animal production & animal husbandry   Aquatic sciences & oceanology   Biochemistry, biophysics & molecular biology   Biotechnology   Entomology & pest control   Environmental sciences & ecology   Food science   Genetics & genetic processes   Microbiology   Phytobiology (plant sciences, forestry, mycology...)   Veterinary medicine & animal health   Zoology   Multidisciplinary, general & others Physical, chemical, mathematical & earth Sciences   Chemistry   Earth sciences & physical geography   Mathematics   Physics   Space science, astronomy & astrophysics   Multidisciplinary, general & others Social & behavioral sciences, psychology   Animal psychology, ethology & psychobiology   Anthropology   Communication & mass media   Education & instruction   Human geography & demography   Library & information sciences   Neurosciences & behavior   Regional & inter-regional studies   Social work & social policy   Sociology & social sciences   Social, industrial & organizational psychology   Theoretical & cognitive psychology   Treatment & clinical psychology   Multidisciplinary, general & others     Showing results 201 to 300 of 4429     1 2 3 4 5 6 7 8     A Data-Driven Minimal Approach for CAN Bus Reverse EngineeringBuscemi, Alessio ; Castignani, German; Engel, Thomas et alin 3rd IEEE Connected and Automated Vehicles Symposium, Victoria, Canada, 4-5 October 2020 (2020)Current in-vehicle communication systems lack security features, such as encryption and secure authentication. The approach most commonly used by car manufacturers is to achieve security through obscurity ... [more ▼]Current in-vehicle communication systems lack security features, such as encryption and secure authentication. The approach most commonly used by car manufacturers is to achieve security through obscurity – keep the proprietary format used to encode the information secret. However, it is still possible to decode this information via reverse engineering. Existing reverse engineering methods typically require physical access to the vehicle and are time consuming. In this paper, we present a Machine Learning-based method that performs automated Controller Area Network (CAN) bus reverse engineering while requiring minimal time, hardware equipment, and potentially no physical access to the vehicle. Our results demonstrate high accuracy in identifying critical vehicle functions just from analysing raw traces of CAN data. [less ▲]Detailed reference viewed: 145 (7 UL) How to Develop a GDPR-Compliant Blockchain Solution for Cross-Organizational Workflow Management: Evidence from the German Asylum Procedure.Guggenmos, F; Lockl, J; Rieger, Alexander et alin Proceedings of the Hawaii International Conference on System Sciences 2020 (2020)Blockchain technology has the potential to resolve trust concerns in cross-organizational workflows and to reduce reliance on paper-based documents as trust anchors. Although these prospects are real, so ... [more ▼]Blockchain technology has the potential to resolve trust concerns in cross-organizational workflows and to reduce reliance on paper-based documents as trust anchors. Although these prospects are real, so is regulatory uncertainty. In particular, the reconciliation of blockchain with Europe’s General Data Protection Regulation (GDPR) is proving to be a significant challenge. We tackled this challenge with the German Federal Office for Migration and Refugees. Here, we explain how we used Action Research to guide the Federal Office in creating a GDPR-compliant blockchain solution for the German asylum procedure. Moreover, we explain the architecture of the Federal Office’s solution and present two design principles for developing GDPR- compliant blockchain solutions for cross- organizational workflow management. [less ▲]Detailed reference viewed: 52 (7 UL) Peter Waterhouses 'Prosperos Land' als Dynamisierung von T.S. Eliots 'The Waste Land'Schöneich, Dinah Mareike in Pajevic, Marko (Ed.) Mehrsprachigkeit und das Politische. Interferenzen in zeitgenössischer deutschsprachiger und baltischer Literatur (2020)Detailed reference viewed: 48 (1 UL) A Worst-Case Performance Optimization Based Design Approach to Robust Symbol-Level Precoding for Downlink MU-MIMOHaqiqatnejad, Alireza ; Shahbazpanahi, Shahram ; Ottersten, Björn in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Ottawa 11-14 November 2019 (2020)This paper addresses the optimization problem of symbol-level precoding (SLP) in the downlink of a multiuser multiple-input multiple-output (MU-MIMO) wireless system while the precoder's output is subject ... [more ▼]This paper addresses the optimization problem of symbol-level precoding (SLP) in the downlink of a multiuser multiple-input multiple-output (MU-MIMO) wireless system while the precoder's output is subject to partially-known distortions. In particular, we assume a linear distortion model with bounded additive noise. The original signal-to-interference- plus-noise ratio (SINR) -constrained SLP problem minimizing the total transmit power is first reformulated as a penalized unconstrained problem, which is referred to as the relaxed robust formulation. We then adopt a worst-case design approach to protect the users' intended symbols and the targeted constructive interference with a desired level of confidence. Due to the non-convexity of the relaxed robust formulation, we propose an iterative algorithm based on the block coordinate ascent-descent method. We show through simulation results that the proposed robust design is flexible in the sense that the CI constraints can be relaxed so as to keep a desirable balance between achievable rate and power consumption. Remarkably, the new formulation yields more energy-efficient solutions for appropriate choices of the relaxation parameter, compared to the original problem. [less ▲]Detailed reference viewed: 43 (9 UL) Post-Quantum Anonymous Veto NetworksDing, Jintai; Emery, Doug; Mueller, Johannes et alin E-Vote-ID 2020 (2020)Detailed reference viewed: 17 (0 UL) Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program RepairTian, Haoye ; Liu, Kui ; Kaboreé, Abdoul Kader et alin Tian, Haoye (Ed.) 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia (2020)A large body of the literature of automated program repair develops approaches where patches are generated to be validated against an oracle (e.g., a test suite). Because such an oracle can be imperfect ... [more ▼]A large body of the literature of automated program repair develops approaches where patches are generated to be validated against an oracle (e.g., a test suite). Because such an oracle can be imperfect, the generated patches, although validated by the oracle, may actually be incorrect. While the state of the art explore research directions that require dynamic information or rely on manually-crafted heuristics, we study the benefit of learning code representations to learn deep features that may encode the properties of patch correctness. Our work mainly investigates different representation learning approaches for code changes to derive embeddings that are amenable to similarity computations. We report on findings based on embeddings produced by pre-trained and re-trained neural networks. Experimental results demonstrate the potential of embeddings to empower learning algorithms in reasoning about patch correctness: a machine learning predictor with BERT transformer-based embeddings... [less ▲]Detailed reference viewed: 6 (0 UL) Accelerated verification of parametric protocols with decision treesLi, Yongjian; Cao, Taifeng; Jansen, David et alin Proceedings of the 38th International Conference on Computer Design (ICCD) (2020)Detailed reference viewed: 19 (0 UL) Dealing with Non-Uniform Demands in Flexible GEO Satellites: The Carrier Aggregation PerspectiveLagunas, Eva ; Kibria, Mirza; Al-Hraishawi, Hayder et alin 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), October 2020. (2020)Detailed reference viewed: 63 (7 UL) Flipping Geometric Triangulations on Hyperbolic SurfacesDespré, vincent; Schlenker, Jean-Marc ; Teillaud, Moniquein symposium on computational geometry (SoCG) (2020)We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with ... [more ▼]We consider geometric triangulations of surfaces, i.e., triangulations whose edges can be realized by disjoint locally geodesic segments. We prove that the flip graph of geometric triangulations with fixed vertices of a flat torus or a closed hyperbolic surface is connected. We give upper bounds on the number of edge flips that are necessary to transform any geometric triangulation on such a surface into a Delaunay triangulation. [less ▲]Detailed reference viewed: 17 (2 UL) ProxSGD: Training Structured Neural Networks under Regularization and ConstraintsYang, Yang; Yuan, Yaxiong ; Chatzimichailidis, Avraam et alin International Conference on Learning Representations (ICLR) 2020 (2020)Detailed reference viewed: 18 (1 UL) Gesonderte Ruhestätten für besondere Tote: Soldatengräber und Garnisonsfriedhöfe unter besonderer Berücksichtigung der Entwicklung in LuxemburgKolnberger, Thomas in Loew, Benedikt; Thewes, Guy; Klauck, Hans Peter (Eds.) Intra muros - Infrastruktur und Lebensalltag in Festungen - Einrichtungen der Fürsorge (2020)Detailed reference viewed: 136 (3 UL) Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe SchemeRoenne, Peter ; Atashpendar, Arash ; Kristian, Gjøsteen et alin Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]Detailed reference viewed: 327 (79 UL) ÆGIS: Shielding Vulnerable Smart Contracts Against AttacksFerreira Torres, Christof ; Steichen, Mathis ; Norvill, Robert et alin Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan (2020)In recent years, smart contracts have suffered major exploits, cost- ing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified ... [more ▼]In recent years, smart contracts have suffered major exploits, cost- ing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified once deployed. Though various tools have been proposed to detect vulnerable smart contracts, the majority fails to protect vulnera- ble contracts that have already been deployed on the blockchain. Only very few solutions have been proposed so far to tackle the issue of post-deployment. However, these solutions suffer from low precision and are not generic enough to prevent any type of attack. In this work, we introduce ÆGIS, a dynamic analysis tool that protects smart contracts from being exploited during runtime. Its capability of detecting new vulnerabilities can easily be extended through so-called attack patterns. These patterns are written in a domain-specific language that is tailored to the execution model of Ethereum smart contracts. The language enables the description of malicious control and data flows. In addition, we propose a novel mechanism to streamline and speed up the process of managing attack patterns. Patterns are voted upon and stored via a smart contract, thus leveraging the benefits of tamper-resistance and transparency provided by the blockchain. We compare ÆGIS to current state-of-the-art tools and demonstrate that our solution achieves higher precision in detecting attacks. Finally, we perform a large-scale analysis on the first 4.5 million blocks of the Ethereum blockchain, thereby confirming the occurrences of well reported and yet unreported attacks in the wild. [less ▲]Detailed reference viewed: 189 (8 UL) Towards Usable Protection Against HoneypotsFerreira Torres, Christof ; Steichen, Mathis ; State, Radu in IEEE International Conference on Blockchain and Cryptocurrency, Toronto, Canada 3-6 May 2020 (2020)The Ethereum blockchain enables the execution of so-called smart contracts. These are programs that facilitate the automated transfer of funds according to a given business logic without the participants ... [more ▼]The Ethereum blockchain enables the execution of so-called smart contracts. These are programs that facilitate the automated transfer of funds according to a given business logic without the participants requiring to trust one another. However, recently attackers started using smart contracts to lure users into traps by deploying contracts that pretend to give away funds but in fact contain hidden traps. This new type of scam is commonly referred to as honeypots. In this paper, we propose a system that aims to protect users from falling into these traps. The system consists of a plugin for MetaMask and a back-end service that continuously scans the Ethereum blockchain for honeypots. Whenever a user is about to perform a transaction through MetaMask, our plugin sends a request to the back-end and warns the user if the target contract is a honeypot. [less ▲]Detailed reference viewed: 55 (3 UL) Automated Recommendation of Templates for Legal RequirementsSleimi, Amin ; Ceci, Marcello ; Sabetzadeh, Mehrdad et alin Proceedings of the 28th IEEE International Requirements Engineering Conference (RE'20) (2020)[Context] In legal requirements elicitation, requirements analysts need to extract obligations from legal texts. However, legal texts often express obligations only indirectly, for example, by attributing ... [more ▼][Context] In legal requirements elicitation, requirements analysts need to extract obligations from legal texts. However, legal texts often express obligations only indirectly, for example, by attributing a right to the counterpart. This phenomenon has already been described in the Requirements Engineering (RE) literature. [Objectives] We investigate the use of requirements templates for the systematic elicitation of legal requirements. Our work is motivated by two observations: (1) The existing literature does not provide a harmonized view on the requirements templates that are useful for legal RE; (2) Despite the promising recent advancements in natural language processing (NLP), automated support for legal RE through the suggestion of requirements templates has not been achieved yet. Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the legal requirement templates proposed in RE. Subsequently, we conduct a qualitative study to define NLP rules for template recommendation. [Results and Conclusions] Our contributions consist of (a) a harmonized list of requirements templates pertinent to legal RE, and (b) rules for the automatic recommendation of such templates. We evaluate our rules through a case study on 400 statements from two legal domains. The results indicate a recall and precision of 82,3% and 79,8%, respectively. We show that introducing some limited interaction with the analyst considerably improves accuracy. Specifically, our human-feedback strategy increases recall by 12% and precision by 10,8%, thus yielding an overall recall of 94,3% and overall precision of 90,6%. [less ▲]Detailed reference viewed: 163 (10 UL) Receive Beamforming for Ultrareliable Random Access based SWIPTKisseleff, Steven ; Chatzinotas, Symeon ; Ottersten, Björn in Proceedings of IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications (2020)Ultrareliable uplink communication based on random access poses novel research challenges for the receiver design. Here, the uncertainty imposed by the random access and a large amount of interfering ... [more ▼]Ultrareliable uplink communication based on random access poses novel research challenges for the receiver design. Here, the uncertainty imposed by the random access and a large amount of interfering transmissions is the limiting factor for the system performance. Recently, this type of communication has been addressed in context of simultaneous wireless information and power transfer (SWIPT). The need to adapt the power splitting to the signal states according to the underlying random access has been tackled by introducing a predictor, which determines the valid states of the received signal based on the long-term observation. Hence, the power splitting factor is scaled accordingly in order to guarantee ultrareliable communication and maximized harvested energy.In this work, we extend the considered SWIPT scenario by introducing multiple antennas at the receiver side. Through this, the received energy can be substantially increased, if the energy harvesting parameters and the spatial filter coefficients are jointly optimized. Hence, we propose an optimization procedure, which aims at maximizing the harvested energy under the ultrareliability constraint. The mentioned prediction method is then combined with the optimization solution and the resulting system performance is numerically evaluated. [less ▲]Detailed reference viewed: 35 (1 UL) Reducing overfitting and improving generalization in training convolutional neural network under limited sample sizes in image recognitionThanapol, Panissara ; Lavangnananda, Kittichai; Bouvry, Pascal et alin 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (2020)Detailed reference viewed: 41 (0 UL) UC Updatable Databases and ApplicationsDamodaran, Aditya Shyam Shankar ; Rial, Alfredo in 12th International Conference on Cryptology (2020)We define an ideal functionality $\Functionality_{\UD}$ and a construction $\mathrm{\Pi_{\UD}}$ for an updatable database ($\UD$). $\UD$ is a two-party protocol between an updater and a reader. The ... [more ▼]We define an ideal functionality $\Functionality_{\UD}$ and a construction $\mathrm{\Pi_{\UD}}$ for an updatable database ($\UD$). $\UD$ is a two-party protocol between an updater and a reader. The updater sets the database and updates it at any time throughout the protocol execution. The reader computes zero-knowledge (ZK) proofs of knowledge of database entries. These proofs prove that a value is stored at a certain position in the database, without revealing the position or the value. (Non-)updatable databases are implicitly used as building block in priced oblivious transfer, privacy-preserving billing and other privacy-preserving protocols. Typically, in those protocols the updater signs each database entry, and the reader proves knowledge of a signature on a database entry. Updating the database requires a revocation mechanism to revoke signatures on outdated database entries. Our construction $\mathrm{\Pi_{\UD}}$ uses a non-hiding vector commitment (NHVC) scheme. The updater maps the database to a vector and commits to the database. This commitment can be updated efficiently at any time without needing a revocation mechanism. ZK proofs for reading a database entry have communication and amortized computation cost independent of the database size. Therefore, $\mathrm{\Pi_{\UD}}$ is suitable for large databases. We implement $\mathrm{\Pi_{\UD}}$ and our timings show that it is practical. In existing privacy-preserving protocols, a ZK proof of a database entry is intertwined with other tasks, e.g., proving further statements about the value read from the database or the position where it is stored. $\Functionality_{\UD}$ allows us to improve modularity in protocol design by separating those tasks. We show how to use $\Functionality_{\UD}$ as building block of a hybrid protocol along with other functionalities. [less ▲]Detailed reference viewed: 115 (15 UL) Session Subtyping and Multiparty Compatibility Using Circular SequentsHorne, Ross James in In 31st International Conference on Concurrency Theory (CONCUR 2020). (2020)Detailed reference viewed: 37 (2 UL) Ordinos: A Verifiable Tally-Hiding E-Voting SystemMueller, Johannes in Küsters, Ralf; Liedtke, Julian; Mueller, Johannes (Eds.) et al IEEE European Symposium on Security and Privacy (2020)Detailed reference viewed: 13 (0 UL) Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy SecretsVazquez Sandoval, Itzel ; Atashpendar, Arash; Lenzini, Gabriele in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (2020)We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password ... [more ▼]We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password-authenticated key exchange (PAKE). This not only allows users to authenticate each other via shared low-entropy secrets, e.g., memorable words, without a public key infrastructure or a trusted third party, but it also paves the way for automation and a series of cryptographic enhancements; improves security by minimizing the impact of human error and potentially improves usability. First, we study a few vulnerabilities in voice-based out-of-band authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. Next, we propose solving the problem of secure equality test using PAKE to achieve entity authentication and to establish a shared high-entropy secret key. Our solution lends itself to offline settings, compatible with the inherently asynchronous nature of email and modern messaging systems. The suggested approach enables enhancements in key management such as automated key renewal and future key pair authentications, multi-device synchronization, secure secret storage and retrieval, and the possibility of post-quantum security as well as facilitating forward secrecy and deniability in a primarily symmetric-key setting. We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols. [less ▲]Detailed reference viewed: 90 (19 UL) Towards Extending the Validation Possibilities of ADOxx with Alloyde Kinderen, Sybren; Ma, Qin ; Kaczmarek-Heß, Monikain Lecture Notes in Business Information Processing 400 (2020)While ADOxx is a popular platform for the creation and use of enterprise modeling languages, it provides only limited support for a well-formedness check of created enterprise models. In this paper, we ... [more ▼]While ADOxx is a popular platform for the creation and use of enterprise modeling languages, it provides only limited support for a well-formedness check of created enterprise models. In this paper, we propose to complement the meta modeling platform ADOxx with Alloy, which natively provides extensive model checking capabilities, so as to enable a well-formedness check of enterprise models created in ADOxx. Using the e3value modeling language as a point of departure, we particularly provide (a) a partial ADOxx implementation of e3value, (b) a proof-of-concept XML2Alloy parser, which allows for converting e3value models created in ADOxx into Alloy format, so that (c) e3value well-formedness constraints stated in Alloy can be used to check the valid- ity of an e3value model with the Alloy Evaluator. Beyond the specific proof-of-concept, we also discuss further possibilities of using ADOxx in conjunction with Alloy, particularly in checking the soundness of meta models underlying an enterprise modeling language. [less ▲]Detailed reference viewed: 20 (0 UL) Male knjizevnosti: pregled pojmovGlesener, Jeanne in Koron, Alenka; Leben, Andrej (Eds.) Literarna vecjezicnost v slovenskem in avstrijskem konteksti (2020)Detailed reference viewed: 43 (2 UL) SoK: Techniques for Verifiable Mix NetsMueller, Johannes in Haines, Thomas; Mueller, Johannes (Eds.) IEEE Computer Security Foundations Symposium (2020)Detailed reference viewed: 15 (0 UL) Attack-Tree Series: A Case for Dynamic Attack Tree AnalysisGadyatskaya, Olga ; Mauw, Sjouke in Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (2020)Detailed reference viewed: 56 (0 UL) A Report on the VarDial Evaluation Campaign 2020Găman, Mihaela; Hovy, Dirk; Ionescu, Radu et alin Zampieri, Marcos; Preslav, Yakov; Ljubešić, Nikola (Eds.) et al Proceedings of the 7th Workshop on NLP for Similar Languages, Varieties and Dialects (2020)Detailed reference viewed: 41 (0 UL) Commit-Aware Mutation TestingMa, Wei ; Laurent, Thomas; Ojdanić, Miloš et alin IEEE International Conference on Software Maintenance and Evolution (ICSME) (2020)Detailed reference viewed: 115 (38 UL) Towards Generalization of 3D Human Pose Estimation In The WildBaptista, Renato ; Saint, Alexandre Fabian A ; Al Ismaeil, Kassem et alin International Conference on Pattern Recognition (ICPR) Workshop on 3D Human Understanding, Milan 10-15 January 2021 (2020)In this paper, we propose 3DBodyTex.Pose, a dataset that addresses the task of 3D human pose estimation in-the-wild. Generalization to in-the-wild images remains limited due to the lack of adequate ... [more ▼]In this paper, we propose 3DBodyTex.Pose, a dataset that addresses the task of 3D human pose estimation in-the-wild. Generalization to in-the-wild images remains limited due to the lack of adequate datasets. Existent ones are usually collected in indoor controlled environments where motion capture systems are used to obtain the 3D ground-truth annotations of humans. 3DBodyTex.Pose offers high quality and rich data containing 405 different real subjects in various clothing and poses, and 81k image samples with ground-truth 2D and 3D pose annotations. These images are generated from 200 viewpoints among which 70 challenging extreme viewpoints. This data was created starting from high resolution textured 3D body scans and by incorporating various realistic backgrounds. Retraining a state-of-the-art 3D pose estimation approach using data augmented with 3DBodyTex.Pose showed promising improvement in the overall performance, and a sensible decrease in the per joint position error when testing on challenging viewpoints. The 3DBodyTex.Pose is expected to offer the research community with new possibilities for generalizing 3D pose estimation from monocular in-the-wild images. [less ▲]Detailed reference viewed: 65 (10 UL) L’édition de chartes à Luxembourg: de l’érudition aux nouvelles technologies (et vice-versa?)Salemme, Timothy in Bendheim, Amelie (Ed.) Tagungsband Mittelalter zwischen Faszination und Fortschritt (2020)Detailed reference viewed: 15 (0 UL) Higher-order graph convolutional embedding for temporal networksMo, Xian; Pang, Jun ; Liu, Zhimingin Proceedings of the 21st International Conference on Web Information System Engineering (WISE'20) (2020)Detailed reference viewed: 31 (0 UL) Localization Performance of 1-Bit Passive Radars in NB-IoT ApplicationsSedighi, Saeid ; Mishra, Kumar Vijay; Shankar, Bhavani et alin Sedighi, Saeid; Mishra, Kumar Vijay; Shankar, Bhavani (Eds.) et al Localization Performance of 1-Bit Passive Radars in NB-IoT Applications (2019, December 14)Location-based services form an important use-case in emerging narrowband Internet-of-Things (NB-IoT) networks. Critical to this offering is an accurate estimation of the location without overlaying the ... [more ▼]Location-based services form an important use-case in emerging narrowband Internet-of-Things (NB-IoT) networks. Critical to this offering is an accurate estimation of the location without overlaying the network with additional active sensors. The massive number of devices, low power requirement, and low bandwidths restrict the sampling rates of NB-IoT receivers. In this paper, we propose a novel low-complexity approach for NB-IoT target delay estimation in cases where one-bit analog-to-digital-converters (ADCs) are employed to sample the received radar signal instead of high-resolution ADCs. This problem has potential applications in the design of inexpensive NB-IoT radar and sensing devices. We formulate the target estimation as a multivariate fractional optimization problem and solve it via Lasserre's semi-definite program relaxation. Numerical experiments suggest feasibility of the proposed approach yielding high localization accuracy with a very low number of 1-bit samples. [less ▲]Detailed reference viewed: 85 (12 UL) Carrier Aggregation in Multi-Beam High Throughput Satellite SystemsKibria, Mirza ; Lagunas, Eva ; Maturo, Nicola et alin Carrier Aggregation in Multi-Beam High Throughput Satellite Systems (2019, December 10)Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the ... [more ▼]Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the demand for data-hungry applications has drawn large attention from different wireless network communities. Given the benefits of CA in the terrestrial wireless environment, it is of great interest to analyze and evaluate the potential impact of CA in the satellite domain. In this paper, we study CA in multi-beam high throughput satellite systems. We consider both inter-transponder and intra-transponder CA at the satellite payload level of the communication stack, and we address the problem of carrier-user assignment assuming that multiple users can be multiplexed in each carrier. The transmission parameters of different carriers are generated considering the transmission characteristics of carriers in different transponders. In particular, we propose a flexible carrier allocation approach for a CA enabled multi-beam satellite system targeting a proportionally fair user demand satisfaction. Simulation results and analysis shed some light on this rather unexplored scenario and demonstrate the feasibility of the CA in satellite communication systems. [less ▲]Detailed reference viewed: 45 (3 UL) Joint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite CommunicationsBandi, Ashok ; Shankar, Bhavani ; Chatzinotas, Symeon et alin Bandi, Ashok; Shankar, Bhavani; Chatzinotas, Symeon (Eds.) et al Joint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications (2019, December 09)Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam ... [more ▼]Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam coverage with a large number of users and limited frame length lead to the scheduling of only a few users. Moreover, in emerging aggressive frequency reuse systems, scheduling is coupled with precoding. This is addressed in this work, through the joint design of scheduling and precoding for frame-based MGMC satellite systems. This aim is formulated as the maximization of the sum-rate under per beam power constraint and minimum SINR requirement of scheduled users. Further, a framework is proposed to transform the non-smooth SR objective with integer scheduling and nonconvex SINR constraints as a difference-of-convex problem that facilitates the joint update of scheduling and precoding. Therein, an efficient convex-concave procedure based algorithm is proposed. Finally, the gains (up to 50%) obtained by the jointed design over state-of-the-art methods is shown through Monte-Carlo simulations. [less ▲]Detailed reference viewed: 160 (39 UL) UC Priced Oblivious Transfer with Purchase Statistics and Dynamic PricingDamodaran, Aditya Shyam Shankar ; Dubovitskaya, Maria; Rial, Alfredo in Progress in Cryptology – INDOCRYPT 2019 (2019, December)Priced oblivious transfer (POT) is a cryptographic protocol that can be used to protect customer privacy in e-commerce applications. Namely, it allows a buyer to purchase an item from a seller without ... [more ▼]Priced oblivious transfer (POT) is a cryptographic protocol that can be used to protect customer privacy in e-commerce applications. Namely, it allows a buyer to purchase an item from a seller without disclosing to the latter which item was purchased and at which price. Unfortunately, existing POT schemes have some drawbacks in terms of design and functionality. First, the design of existing POT schemes is not modular. Typically, a POT scheme extends a k-out-of-N oblivious transfer (OT) scheme by adding prices to the items. However, all POT schemes do not use OT as a black-box building block with certain security guarantees. Consequently, security of the OT scheme needs to be reanalyzed while proving security of the POT scheme, and it is not possible to swap the underlying OT scheme with any other OT scheme. Second, existing POT schemes do not allow the seller to obtain any kind of statistics about the buyer's purchases, which hinders customer and sales management. Moreover, the seller is not able to change the prices of items without restarting the protocol from scratch. We propose a POT scheme that addresses the aforementioned drawbacks. We prove the security of our POT in the UC framework. We modify a standard POT functionality to allow the seller to receive aggregate statistics about the buyer's purchases and to change prices dynamically. We present a modular construction for POT that realizes our functionality in the hybrid model. One of the building blocks is an ideal functionality for OT. Therefore, our protocol separates the tasks carried out by the underlying OT scheme from the additional tasks needed by a POT scheme. Thanks to that, our protocol is a good example of modular design and can be instantiated with any secure OT scheme as well as other building blocks without reanalyzing security from scratch. [less ▲]Detailed reference viewed: 120 (31 UL) Automatic Software Tuning of Parallel Programs for Energy-Aware ExecutionsVarrette, Sébastien ; Pinel, Frédéric ; Kieffer, Emmanuel et alin Proc. of 13th Intl. Conf. on Parallel Processing and Applied Mathematics (PPAM 2019) (2019, December)For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to ... [more ▼]For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to the type and characteristics of workload that the device is running. For this reason, this paper presents an automatic software tuning method for parallel program generation able to adapt and exploit the hardware features available on a target computing system such as an HPC facility or a cloud system in a better way than traditional compiler infrastructures. We propose a search based approach combining both exact methods and approximated heuristics evolving programs in order to find optimized configurations relying on an ever-increasing number of tunable knobs i.e., code transformation and execution options (such as the num- ber of OpenMP threads and/or the CPU frequency settings). The main objective is to outperform the configurations generated by traditional compiling infrastructures for selected KPIs i.e., performance, energy and power usage (for both for the CPU and DRAM), as well as the runtime. First experimental results tied to the local optimization phase of the proposed framework are encouraging, demonstrating between 8% and 41% improvement for all considered metrics on a reference benchmark- ing application (i.e., Linpack). This brings novel perspectives for the global optimization step currently under investigation within the presented framework, with the ambition to pave the way toward automatic tuning of energy-aware applications beyond the performance of the current state-of-the-art compiler infrastructures. [less ▲]Detailed reference viewed: 109 (23 UL) On the Formal Structure of Rules in Conflict of LawsMarkovich, Réka in Legal Knowledge and Information Systems 2019 (proceedings) (2019, December)Law has different methods and principles to resolve conflicts between norms, most of these come from Roman Law, they are well-known and much discussed. There is a whole branch of law, though, which is ... [more ▼]Law has different methods and principles to resolve conflicts between norms, most of these come from Roman Law, they are well-known and much discussed. There is a whole branch of law, though, which is much less discussed while having been created exactly in order to resolve special conflicts: conflict of laws. This system within Private International Law is dedicated to providing metarules in legal situations where more than one national legal systems’ rules could be applied: CoL rules indirectly settle the situation by declaring which one’s should. The formal representation of how these rules work contributes not only to the modelling of this branch of law but also provides methodologies for concerns arising from other conflicting normative systems, such as ethically sensitive situations where there are multiple stakeholders with different moral backgrounds. [less ▲]Detailed reference viewed: 80 (8 UL) Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex EnvironmentsWang, Min ; Voos, Holger in Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments (2019, December)Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ... [more ▼]Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ensure safety of the UAV as well as its surroundings, it is necessary for the UAV to boast the capability of detecting emergency situation and acting on its own when facing imminent threat. However, the majority of UAVs currently available in the market are not equipped with such capability. To fill in the gap, in this paper we present a complete sense-and-avoid solution for assisting unskilled pilots in ensuring a safe flight. Particularly, we propose a novel nonlinear vehicle control system which takes into account of sensor characteristics, an emergency evaluation policy and a novel optimization-based avoidance control strategy. The effectiveness of the proposed approach is demonstrated and validated in simulation with multiple moving objects. [less ▲]Detailed reference viewed: 71 (16 UL) Cryptanalysis of CLT13 Multilinear Maps with Independent SlotsCoron, Jean-Sébastien ; Notarnicola, Luca in Advances in Cryptology – ASIACRYPT 2019, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II (2019, December)Detailed reference viewed: 183 (9 UL) Temporal 3D Human Pose Estimation for Action Recognition from Arbitrary ViewpointsAdel Musallam, Mohamed; Baptista, Renato ; Al Ismaeil, Kassem et alin 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas 5-7 December 2019 (2019, December)This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from ... [more ▼]This work presents a new view-invariant action recognition system that is able to classify human actions by using a single RGB camera, including challenging camera viewpoints. Understanding actions from different viewpoints remains an extremely challenging problem, due to depth ambiguities, occlusion, and a large variety of appearances and scenes. Moreover, using only the information from the 2D perspective gives different interpretations for the same action seen from different viewpoints. Our system operates in two subsequent stages. The first stage estimates the 2D human pose using a convolution neural network. In the next stage, the 2D human poses are lifted to 3D human poses, using a temporal convolution neural network that enforces the temporal coherence over the estimated 3D poses. The estimated 3D poses from different viewpoints are then aligned to the same camera reference frame. Finally, we propose to use a temporal convolution network-based classifier for cross-view action recognition. Our results show that we can achieve state of art view-invariant action recognition accuracy even for the challenging viewpoints by only using RGB videos, without pre-training on synthetic or motion capture data. [less ▲]Detailed reference viewed: 228 (7 UL) The Impact of Human Mobility on Edge Data Center Deployment in Urban EnvironmentsVitello, Piergiorgio ; Capponi, Andrea ; Fiandrino, Claudio et alin IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]Detailed reference viewed: 112 (14 UL) A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of ThingsCheng, Hao ; Dinu, Dumitru-Daniel; Groszschädl, Johann et alin Laurent, Maryline; Giannetsos, Thanassis (Eds.) Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (2019, December)The dawning era of quantum computing has initiated various initiatives for the standardization of post-quantum cryptosystems with the goal of (eventually) replacing RSA and ECC. NTRU Prime is a variant of ... [more ▼]The dawning era of quantum computing has initiated various initiatives for the standardization of post-quantum cryptosystems with the goal of (eventually) replacing RSA and ECC. NTRU Prime is a variant of the classical NTRU cryptosystem that comes with a couple of tweaks to minimize the attack surface; most notably, it avoids rings with "worrisome" structure. This paper presents, to our knowledge, the first assembler-optimized implementation of Streamlined NTRU Prime for an 8-bit AVR microcontroller and shows that high-security lattice-based cryptography is feasible for small IoT devices. An encapsulation operation using parameters for 128-bit post-quantum security requires 8.2 million clock cycles when executed on an 8-bit ATmega1284 microcontroller. The decapsulation is approximately twice as costly and has an execution time of 15.6 million cycles. We achieved this performance through (i) new low-level software optimization techniques to accelerate Karatsuba-based polynomial multiplication on the 8-bit AVR platform and (ii) an efficient implementation of the coefficient modular reduction written in assembly language. The execution time of encapsulation and decapsulation is independent of secret data, which makes our software resistant against timing attacks. Finally, we assess the performance one could theoretically gain by using a so-called product-form polynomial as part of the secret key and discuss potential security implications. [less ▲]Detailed reference viewed: 142 (23 UL) A case study on the impact of masking moving objects on the camera pose regression with CNNsCimarelli, Claudio ; Cazzato, Dario ; Olivares Mendez, Miguel Angel et alin 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (2019, November 25)Robot self-localization is essential for operating autonomously in open environments. When cameras are the main source of information for retrieving the pose, numerous challenges are posed by the presence ... [more ▼]Robot self-localization is essential for operating autonomously in open environments. When cameras are the main source of information for retrieving the pose, numerous challenges are posed by the presence of dynamic objects, due to occlusion and continuous changes in the appearance. Recent research on global localization methods focused on using a single (or multiple) Convolutional Neural Network (CNN) to estimate the 6 Degrees of Freedom (6-DoF) pose directly from a monocular camera image. In contrast with the classical approaches using engineered feature detector, CNNs are usually more robust to environmental changes in light and to occlusions in outdoor scenarios. This paper contains an attempt to empirically demonstrate the ability of CNNs to ignore dynamic elements, such as pedestrians or cars, through learning. For this purpose, we pre-process a dataset for pose localization with an object segmentation network, masking potentially moving objects. Hence, we compare the pose regression CNN trained and/or tested on the set of masked images and the original one. Experimental results show that the performances of the two training approaches are similar, with a slight reduction of the error when hiding occluding objects from the views. [less ▲]Detailed reference viewed: 45 (8 UL) Authenticated Key Distribution: When the Coupon Collector is Your EnemyBeunardeau, Marc; El Orche, Fatima Ezzahra ; Maimut, Diana et alin Innovative Security Solutions for Information Technology and Communications (2019, November 14)We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other ... [more ▼]We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions. [less ▲]Detailed reference viewed: 143 (10 UL) Post-collusion security and distance boundingMauw, Sjouke ; Smith, Zachary Daniel ; Trujillo Rasua, Rolando et alin Post-collusion security and distance bounding (2019, November 11)Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat ... [more ▼]Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat some security goals, without revealing their long-term secrets. We develop a model based on multiset rewriting to reason about collusion in security protocols. We introduce the notion of postcollusion security, which verifies security properties claimed in sessions initiated after collusion occurred. We use post-collusion security to analyse terrorist fraud on protocols for securing physical proximity, known as distance-bounding protocols. In a terrorist fraud attack, agents collude to falsely prove proximity, whilst no further false proximity proof can be issued without further collusion. Our definitions and the Tamarin prover are used to develop a modular framework for verification of distance-bounding protocols that accounts for all types of attack from literature. We perform a survey of over 25 protocols, which include industrial protocols such as Mastercard’s contactless payment PayPass and NXP’s MIFARE Plus with proximity check. For the industrial protocols we confirm attacks, propose fixes, and deliver computer-verifiable security proofs of the repaired versions [less ▲]Detailed reference viewed: 95 (2 UL) Optimum Design for Sparse FDA-MIMO Automotive RadarSedighi, Saeid ; Shankar, Bhavani ; Mishra, Kumar Vijay et alin Sedighi, Saeid; Shankar, Bhavani; Mishra, Kumar Vijay (Eds.) et al Optimum Design for Sparse FDA-MIMO Automotive Radar (2019, November 03)Automotive radars usually employ multiple-input multiple-output (MIMO) antenna arrays to achieve high azimuthal resolution with fewer elements than a phased array. Despite this advantage, hardware costs ... [more ▼]Automotive radars usually employ multiple-input multiple-output (MIMO) antenna arrays to achieve high azimuthal resolution with fewer elements than a phased array. Despite this advantage, hardware costs and desired radar size limits the usage of more antennas in the array. Similar trade-off is encountered while attempting to achieve high range resolution which is limited by the signal bandwidth. However, nowadays given the demand for spectrum from communications services, wide bandwidth is not readily available. To address these issues, we propose a sparse variant of Frequency Diverse Array MIMO (FDA-MIMO) radar which enjoys the benefits of both FDA and MIMO techniques, including fewer elements, decoupling, and efficient joint estimation of target parameters. We then employ the Cram\'{e}r-Rao bound for angle and range estimation as a performance metric to design the optimal antenna placement and carrier frequency offsets for the transmit waveforms. Numerical experiments suggest that the performance of sparse FDA-MIMO radar is very close to the conventional FDA-MIMO despite 50\% reduction in the bandwidth and antenna elements. [less ▲]Detailed reference viewed: 75 (8 UL) ITU Framework: A Model for an International Regime of Space Resources?Hofmann, Mahulena in Hofmann, Mahulena (Ed.) Proceedings of the 61th Colloquium on the Law of Outer Space (2019, November)The contribution examines which elements of the ITU framework would be transferable to the future international regime of space resources activities. First, it gives a short description of space resources ... [more ▼]The contribution examines which elements of the ITU framework would be transferable to the future international regime of space resources activities. First, it gives a short description of space resources activities, followed by an overview of the ITU regime, which may be relevant from the perspective of space mining. Furthermore, it describes the provisions elaborated by The Hague Space Resources Governance Group, the Building Blocks, which show several resemblances with the ITU regime. [less ▲]Detailed reference viewed: 62 (0 UL) Assessing the Generalizability of code2vec Token EmbeddingsKang, Hong Jin; Bissyande, Tegawendé François D Assise ; David, Loin Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (2019, November)Many Natural Language Processing (NLP) tasks, such as sentiment analysis or syntactic parsing, have benefited from the development of word embedding models. In particular, regardless of the training ... [more ▼]Many Natural Language Processing (NLP) tasks, such as sentiment analysis or syntactic parsing, have benefited from the development of word embedding models. In particular, regardless of the training algorithms, the learned embeddings have often been shown to be generalizable to different NLP tasks. In contrast, despite recent momentum on word embeddings for source code, the literature lacks evidence of their generalizability beyond the example task they have been trained for. In this experience paper, we identify 3 potential downstream tasks, namely code comments generation, code authorship identification, and code clones detection, that source code token embedding models can be applied to. We empirically assess a recently proposed code token embedding model, namely code2vec’s token embeddings. Code2vec was trained on the task of predicting method names, and while there is potential for using the vectors it learns on other tasks, it has not been explored in literature. Therefore, we fill this gap by focusing on its generalizability for the tasks we have identified. Eventually, we show that source code token embeddings cannot be readily leveraged for the downstream tasks. Our experiments even show that our attempts to use them do not result in any improvements over less sophisticated methods. We call for more research into effective and general use of code embeddings. [less ▲]Detailed reference viewed: 41 (2 UL) Crafting Conversational Agents' Personality in a User-Centric ContextMano Ferreira, Cátia; Höhn, Sviatlana in Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019) (2019, November)Detailed reference viewed: 36 (0 UL) A Multilayer Low-Altitude Airspace Model for UAV Traffic ManagementSamir Labib, Nader ; Danoy, Grégoire ; Musial, Jedrzej et alin Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (2019, November)Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼]Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲]Detailed reference viewed: 161 (26 UL) A New Optimization Tool for Mega-Constellation Design and its Application to Trunking SystemsKisseleff, Steven ; Shankar, Bhavani ; Spano, Danilo et alin 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019 (2019, November)Detailed reference viewed: 100 (17 UL) Feasibility of Stellar as a Blockchain-based Micropayment SystemKhan, Nida ; Ahmad, Tabrez; State, Radu in Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain (2019, November)The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time ... [more ▼]The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time. The divisibility of a blockchain cryptocurrency to even fractions of a cent, caused microtransactions to become feasible to formerly non-existent denominations. These microtransactions have spurred the development of novel ways of monetizing online resources and hold the potential to aid in alleviation of poverty. The paper conducts a feasibility study on Stellar as a blockchain-based micropayment system. It highlights the computational and other issues that impedes its progress and utilizes a characterization model for micropayment systems to evaluate the efficacy of the Stellar platform. The paper conducts a comparison with the micropayment solutions from Bitcoin, Ethereum and PayPal. The paper analyzes a subset of transactions from the Stellar blockchain to aid in drawing a conclusion on the undertaken study and elaborates on the mitigation tools to enable fraud prevention in online monetary transactions. [less ▲]Detailed reference viewed: 167 (23 UL) Privacy Aspects and Subliminal Channels in ZcashBiryukov, Alex ; Feher, Daniel ; Vitto, Giuseppe in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit (2019, November)In this paper we analyze two privacy and security issues for the privacy-oriented cryptocurrency Zcash. First we study shielded transactions and show ways to fingerprint user transactions, including ... [more ▼]In this paper we analyze two privacy and security issues for the privacy-oriented cryptocurrency Zcash. First we study shielded transactions and show ways to fingerprint user transactions, including active attacks.We introduce two new attacks which we call Danaan-gift attack and Dust attack. Following the recent Sapling update of Zcash protocol we study the interaction between the new and the old zk-SNARK protocols and the effects of their interaction on transaction privacy. In the second part of the paper we check for the presence of subliminal channels in the zk-SNARK protocol and in Pedersen Commitments. We show presence of efficient 70-bit channels which could be used for tagging of shielded transactions which would allow the attacker (malicious transaction verifier) to link transactions issued by a maliciously modified zk-SNARK prover, while would be indistinguishable from regular transactions for the honest verifier/user. We discuss countermeasures against both of these privacy issues. [less ▲]Detailed reference viewed: 211 (14 UL) Enhanced Sketchnoting through Semantic Integration of Learning MaterialAtashpendar, Aryobarzan ; Grevisse, Christian ; Rothkugel, Steffen in Applied Informatics (2019, November)Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in ... [more ▼]Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in popularity, especially in teaching and learning. While current solutions already reduce the burden of organizing and searching through stacks of paper, they provide little support in finding additional information related to the notes, and search capabilities are mostly limited to textual queries and content. In this paper, we present a novel solution for digital sketchnoting aimed at enhancing the learning experience of students. In addition to common capabilities such as handwriting recognition, our note-taking app integrates semantic annotation and drawing recognition. Handwritten notes are recognized and passed through concept recognition and entity linking tools to enable a knowledge graph-based integration of contextually relevant learning resources. We extend traditional search capabilities by including the semantic metadata from the related material as well as enabling visual queries to find recognized sketches. Finally, resembling the exchange of paper notes among students, our app allows to share the semantically enhanced notes with other devices. [less ▲]Detailed reference viewed: 141 (30 UL) A Personalized Sentiment Model with Textual and Contextual InformationGuo, Siwen ; Höhn, Sviatlana ; Schommer, Christoph in The SIGNLL Conference on Computational Natural Language Learning, Hong Kong 3-4 November 2019 (2019, November)In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In ... [more ▼]In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In particular, we construct a hierarchical neural network that leverages valuable information from a person's past expressions, and offer a better understanding of the sentiment from the expresser's perspective. Additionally, we investigate how a person's sentiment changes over time so that recent incidents or opinions may have more effect on the person's current sentiment than the old ones. Psychological studies have also shown that individual variation exists in how easily people change their sentiments. In order to model such traits, we develop a modified attention mechanism with Hawkes process applied on top of a recurrent network for a user-specific design. Implemented with automatically labeled Twitter data, the proposed model has shown positive results employing different input formulations for representing the concerned information. [less ▲]Detailed reference viewed: 269 (17 UL) Characterization of the MSE Region under a Total Power Budget for Asynchronous Two-Way Relay NetworksRahimi, Razgar; Shahbazpanahi, Shahram ; Ottersten, Björn in The Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, 3-6 November 2019 (2019, November)Detailed reference viewed: 109 (0 UL) User Terminal Wideband Modem for Very High Throughput SatellitesKisseleff, Steven ; Maturo, Nicola ; Chatzinotas, Symeon et alin 37th International Communications Satellite Systems Conference (ICSSC), Japan, October 2019 (2019, November)Detailed reference viewed: 46 (5 UL) CrowdSenSim 2.0: a Stateful Simulation Platform for Mobile Crowdsensing in Smart CitiesMontori, Federico; Cortesi, Emanuele; Bedogni, Luca et alin MSWIM '19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami Beach, FL, USA, 2019. (2019, November)Mobile crowdsensing (MCS) has become a popular paradigm for data collection in urban environments. In MCS systems, a crowd supplies sensing information for monitoring phenomena through mobile devices ... [more ▼]Mobile crowdsensing (MCS) has become a popular paradigm for data collection in urban environments. In MCS systems, a crowd supplies sensing information for monitoring phenomena through mobile devices. Typically, a large number of participants is required to make a sensing campaign successful. For such a reason, it is often not practical for researchers to build and deploy large testbeds to assess the performance of frameworks and algorithms for data collection, user recruitment, and evaluating the quality of information. Simulations offer a valid alternative. In this paper, we present CrowdSenSim 2.0, a significant extension of the popular CrowdSenSim simulation platform. CrowdSenSim 2.0 features a stateful approach to support algorithms where the chronological order of events matters, extensions of the architectural modules, including an additional system to model urban environments, code refactoring, and parallel execution of algorithms. All these improvements boost the performances of the simulator and make the runtime execution and memory utilization significantly lower, also enabling the support for larger simulation scenarios. We demonstrate retro-compatibility with the older platform and evaluate as a case study a stateful data collection algorithm. [less ▲]Detailed reference viewed: 27 (1 UL) VPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular NetworksBoualouache, Abdelwahab ; Soua, Ridha ; Engel, Thomas in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efﬁcient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software deﬁned vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efﬁcient and ensures a shorter response time. [less ▲]Detailed reference viewed: 181 (46 UL) Software Engineering for Dataset Augmentation using Generative Adversarial NetworksJahic, Benjamin ; Guelfi, Nicolas ; Ries, Benoît in Proceedings of 10th IEEE International Conference on Software Engineering and Service Science (2019, October 19)Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity ... [more ▼]Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity. In this work, we present a novel software engineering approach for dataset augmentation using neural networks. We propose a rigorous process for generating synthetic data to improve the training of neural networks. Also, we demonstrate our approach to successfully improve the recognition of handwritten digits using conditional generative adversarial networks (cGAN). Finally, we shortly discuss selected important issues of our process, presenting related work and proposing some improvements. [less ▲]Detailed reference viewed: 220 (142 UL) Outer and Anti Joins in Temporal-Probabilistic DatabasesPapaioannou, Katerina; Theobald, Martin ; Böhlen, Michael H.in 35th IEEE International Conference on Data Engineering, ICDE 2019, Macao, China, April 8-11, 2019 (2019, October 16)Detailed reference viewed: 59 (2 UL) Performance Modelling of V2V based Collective Perceptions in Connected and Autonomous VehiclesHuang, Hui ; Fang, Wenqi; Li, Huiyunin 2019 IEEE 44th Conference on Local Computer Networks (LCN) (2019, October 14)With the introduction of Connected and Autonomous Vehicles (CAVs), it is possible to extend the limited horizon of vehicles on the road by collective perceptions, where vehicles periodically share their ... [more ▼]With the introduction of Connected and Autonomous Vehicles (CAVs), it is possible to extend the limited horizon of vehicles on the road by collective perceptions, where vehicles periodically share their sensory information with others using Vehide-2-Vehicle (V2V) communications. This technique relies on a certain number of participants to have a measurable advantage. Nevertheless, the spread of CAVs will take a considerable period of time, it is critical to understand the benefits and limits of V2V based collective perceptions in different market stages. In this work, we characterise the effective Field of View (eFoV) of a vehicle as the perception range using local sensors only, and the collective Field of View (cFoV) as the region learn from the network. Applying analytic and simulation studies in highway scenarios, we show that the eFoV drops quickly with the increase in traffic density due to blockage effects of surrounding vehicles, and it is insufficient to overcome this problem by increasing the sensing range of local sensors. On the other hand, vehicles can gain around 16 folds more information about the road environment by leveraging collective perceptions with only 10\% CAV penetration rate. When the penetration rate reaches to around 30\%, collective perceptions can provide 95\% coverage over the road environments. Our analyses also show that apart from the benefits, employing collective perceptions could result in heavy broadcast redundancy, hence wasting the already scarce network resources. This observation suggests that the sharing of sensory information should be controlled appropriately to avoid overloading the communication networks. [less ▲]Detailed reference viewed: 28 (2 UL) Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly DetectionRinaldi, Giulia ; Adamsky, Florian ; Soua, Ridha et alin 10th International Conference on Networks of the Future (NoF) (2019, October 04)The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼]The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲]Detailed reference viewed: 168 (15 UL) Optimized and flexible scheduling of AGVs and process machines in Re- manufacturing 4 .0 Systems using multi-agent technology and simultaneous schedulingGroß, Sebastian ; Gerke, Wolfgang; Plapper, Peter in Ramírez Fernández, Francisco Javier; Honrubia Escribano, Andrés (Eds.) Abstracts III International Workshop on Autonomous Remanufacturing 2019 (2019, October 02)In remanufacturing processes the condition of the used products is unknown. This leads to many challenges which are special to the domain of remanufacturing and not known from manufacturing. One of these ... [more ▼]In remanufacturing processes the condition of the used products is unknown. This leads to many challenges which are special to the domain of remanufacturing and not known from manufacturing. One of these challenges is the stochastic routing of products based on the unknown product conditions. This problem in particular requires a flexible scheduling and control system for the remanufacturing system as well as the intralogistics. The aim of this research is to optimize the scheduling and control of remanufacturing systems considering the flexible material transport by AGVs. Therefore the networking of all resources is organized as an embedded system treating the remanufacturing system as a cyber-physical system in the context of industry 4.0. The scheduling and control of the remanufacturing system will be achieved by a combination of multi-agent technology to deal with unexpected events and the optimization of the schedule by simultaneous scheduling of machines and AGVs. Machine scheduling and transport scheduling have been vastly studied by many researchers, but most of the works address both problems separately. However, these two problems are closely linked and influence each other. By looking at them together, it is possible to achieve an improvement in the overall schedule. In the first step of the research work, the simultaneous scheduling of machines and AGVs has been compared with the currently used sequential scheduling within a simulation study. For this purpose, benchmark instances known in the literature were used. The simulation results show the superiority of the simultaneous scheduling of machines and AGVs. [less ▲]Detailed reference viewed: 149 (0 UL) Handling duplicates in Dockerfiles families: Learning from expertsOumaziz, Mohamed; Falleri, Jean-Rémy; Blanc, Xavier et alin 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (2019, October)Detailed reference viewed: 22 (0 UL) On the Event-based Attack-tolerant Control: A Polytopic RepresentationBezzaoucha, Souad ; Voos, Holger in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant ... [more ▼]In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant control, and scheduling co-design strategy are proposed. From the event triggering definition (sample-and-hold strategy), polytopic writing of the event-triggered feedback control is first presented and then incorporated into the system dynamics for analysis. Our goal is to present a unique model that is able to deal with the co-design problem simultaneously and that can be handled by classical control synthesis tools. The novel representation, including data deception and attack tolerant control is formulated as a BMI optimization problem ensuring both stability and some level performance requirements (L2 attenuation of the cyber-attack). [less ▲]Detailed reference viewed: 52 (0 UL) Houston We Have a Law. A Model for National Regulation of Space Resources Activities.Salmeri, Antonino in Proceedings of the 70th International Astronautical Congress 2018 (2019, October)The field of space resources activities is rapidly maturing, but we still do not have a legal regime able to cope with such development. The United Nations Committee on the Peaceful Uses of Outer Space ... [more ▼]The field of space resources activities is rapidly maturing, but we still do not have a legal regime able to cope with such development. The United Nations Committee on the Peaceful Uses of Outer Space finally started to debate whether commercialization of space resources is permitted under current international space law only in 2018, and yet declaring that space resources activities are lawful is barely the start. In fact, the real challenge is how to regulate them in light of the obligations set forth in international space law, without jeopardizing their economic convenience. The present paper addresses precisely this question by presenting a draft law redacted in articles, coupled with a comprehensive explanatory note. Inter alia, the paper introduces a new “space resources activities” license and proposes a detailed authorization regime based on the grant of priority rights limited in size, number and time extension. Based on the above, the paper concludes praising the importance of domestic regulation of space resources activities, when based on the same language and spirit of the OST and coordinated through mutual recognition. [less ▲]Detailed reference viewed: 148 (1 UL) Simultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV ApproachBezzaoucha, Souad ; Voos, Holger in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time ... [more ▼]The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time-varying parameters with a multiplicative effect on the actuator input signal and the sensor output signal, respectively. Based on the sector non-linearity approach and the convex polytopic transformation, the nonlinear model is written in a Linear Parameter-Varying (LPV) form, then an observer allowing both state and attack reconstruction is designed by solving an LMI optimization problem. [less ▲]Detailed reference viewed: 68 (2 UL) Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and PrivacySamir Labib, Nader ; Brust, Matthias R. ; Danoy, Grégoire et alin Samir Labib, Nader; Brust, Matthias R.; Danoy, Grégoire (Eds.) et al Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy (2019, October)With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised ... [more ▼]With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised management, improved energy efficiency and a better quality living through a wide array of value-added services. However, as sensing, actuation, communication and control become increasingly more sophisticated, such promising data-driven systems generate, process, and exchange larger amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. In turn this affirms the importance of trustworthiness in IoT and emphasises the need of a solid technical and regulatory foundation. The goal of this paper is to first introduce the concept of trustworthiness in IoT, its main pillars namely, security, privacy and data protection, and then analyse the state-of-the-art in research and standardisation for each of these subareas. Throughout the paper, we develop and refer to Unmanned Aerial Vehicles (UAVs) as a promising value-added service example of mobile IoT devices. The paper then presents a thorough gap analysis and concludes with recommendations for future work. [less ▲]Detailed reference viewed: 145 (17 UL) User Experience Design for E-Voting: How mental models align with security mechanismsZollinger, Marie-Laure ; Distler, Verena ; Roenne, Peter et alin Electronic Voting (2019, October)This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]Detailed reference viewed: 130 (9 UL) SDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular NetworksBoualouache, Abdelwahab ; Soua, Ridha ; Engel, Thomas in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October)The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼]The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲]Detailed reference viewed: 201 (70 UL) An industrial study on the differences between pre-release and post-release bugsRwemalika, Renaud ; Kintis, Marinos; Papadakis, Mike et alin Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (2019, September 30)Software bugs constitute a frequent and common issue of software development. To deal with this problem, modern software development methodologies introduce dedicated quality assurance procedures. At the ... [more ▼]Software bugs constitute a frequent and common issue of software development. To deal with this problem, modern software development methodologies introduce dedicated quality assurance procedures. At the same time researchers aim at developing techniques capable of supporting the early discovery and fix of bugs. One important factor that guides such research attempts is the characteristics of software bugs and bug fixes. In this paper, we present an industrial study on the characteristics and differences between pre-release bugs, i.e. bugs detected during software development, and post-release bugs, i.e. bugs that escaped to production. Understanding such differences is of paramount importance as it will improve our understanding on the testing and debugging support that practitioners require from the research community, on the validity of the assumptions of several research techniques, and, most importantly, on the reasons why bugs escape to production. To this end, we analyze 37 industrial projects from our industrial partner and document the differences between pre-release bugs and post-release bugs. Our findings suggest that post-release bugs are more complex to fix, requiring developers to modify several source code files, written in different programming languages, and configuration files, as well. We also find that approximately 82% of the post-release bugs involve code additions and can be characterized as "omission" bugs. Finally, we conclude the paper with a discussion on the implications of our study and provide guidance to future research directions. [less ▲]Detailed reference viewed: 112 (5 UL) Increasing DG Integration Level by Network Configuration Subset AnalysisTorchyan, Khachatur ; Sachau, Juergen in Proceedings of the International Conference on Smart Energy Systems and Technologies, SEST 2019 (2019, September 26)With the increasing number of photovoltaic (PV) distributed generations (DG) being installed on the medium-voltage (MV) level and the fluctuations of the generation and loads, the supply security of the ... [more ▼]With the increasing number of photovoltaic (PV) distributed generations (DG) being installed on the medium-voltage (MV) level and the fluctuations of the generation and loads, the supply security of the grid requires closer attention. Grid-wide voltage profile, overloading of substation transformers and overloading of lines may become bottlenecks for large-scale integration of PV plants. Here, measures to avoid cost-intensive network reinforcement are of interest. In this paper, analysis of grid reconfiguration and its impact on hosting capacity (HC) and grid operation are studied. Additionally, several PV control scenarios are considered according to current grid codes and grid code enhancement suggestions are made. The study is performed on a 43-bus 20 kV MV network model representative of Luxembourg's grid structure. The modeling, reconfiguration, HC calculation and analysis are done using Pandapower software. The results indicate that by proper reconfiguration of the network the HC can be increased approximately four times compared to the worst configuration and the grid code improvement can further increase the HC by another 15%, depending on the configuration. [less ▲]Detailed reference viewed: 71 (2 UL) Inbetriebnahme und Monitoring einer Feldtestfläche zur außenliegenden LufttemperierungSchmidt, Christoph Wilhelm ; Altgeld, Horst; Groß, Bodo et alin Völker, Conrad; Kornadt, Oliver; Jentsch, Mark (Eds.) et al Schriftenreihe der Professur Bauphysik, Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II ... [more ▼]Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II, Förderkennzeichen 0327370Y) zugeordnet. Im Rahmen des Pro-jektes wurde ein Großdemonstrator mit außenliegender Wand- und Lufttemperierung (kurz aWT & aLT) zusammen mit einem niederexergetischen Versorgungssystem, bestehend aus Eisspeicher, Wärmepumpe und PVT-Hybridkollektoren realisiert. Zur Heizperiode 2018/19 wurde die „Feldtestanlage“ in Betrieb genommen, sodass derzeit Messdaten generiert wer-den. In dem Forschungsprojekt wird der Demonstrator über eine Heizperiode und eine Kühl-periode messtechnisch begleitet und ausgewertet. Dabei wird der Großdemonstrator und alle Komponenten umfassend messtechnisch ausgewertet (~300 Messwerte). Ziel des Beitrags ist eine Darstellung der Grundlagen der außenliegenden Lufttemperierung, als niederexergetische und schnell regelbare Ergänzung zur außenliegenden Wandtemperie-rung. Bei der außenliegenden Lufttemperierung wird zwischen thermisch aktivierter Be-standswand und neuem Wärmedämm-Verbundsystem ein Luftspalt geschaffen, durch den Außenluft geführt und temperiert werden kann. Diese temperierte Außenluft wird dem dahin-terliegenden Raum (im Feldtest ein Büroraum mit rund 20 m² Grundfläche und zwei Arbeits-plätzen) als Frischluft zur Verfügung gestellt. Aufbauend auf den Grundlagen wird die Inbe-triebnahme der bereits umgesetzten Feldtestfläche mit möglichen Regelstrategien geschildert. Abschließend sollen erste Messergebnisse der Feldtestfläche dargestellt und diskutiert wer-den. Interessant sind hier vor allem (im Vergleich zur außenliegenden Wandtemperierung) die möglichen Zeitkonstanten und die erreichbaren Wärmeströme nach Innen (z.B. mögliche Wärmeübertragung als Kombination aus Konvektion im Luftspalt und Wärmeleitung durch die Bestandswand). Themengebiet: Energieeffiziente Gebäude & Bauphysik und Sanierung & Behaglichkeit und Raumklima [less ▲]Detailed reference viewed: 121 (1 UL) Auswertung eines Großdemonstrators mit außenliegender Wandtemperierung, Wärmepumpe, Eisspeicher und PTV-HybridkollektorenSchmidt, Christoph Wilhelm ; Altgeld, Horst; Groß, Bodo et alin Völker, Conrad; Kornadt, Oliver; Jentsch, Mark (Eds.) et al Schriftenreihe der Professur Bauphysik, Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II ... [more ▼]Der Beitrag ist inhaltlich dem Forschungsprojekt „Low Exergy Utilisation - Einsatz von außen-liegender Wandtemperierung bei der Gebäudesanierung - Feldtest, CO2- Wärmepumpe mit Eisspeicher“ (kurz LEXU II, Förderkennzeichen 0327370Y) zugeordnet. Im Rahmen des Pro-jektes wurde ein Großdemonstrator mit außenliegender Wand- und Lufttemperierung (kurz aWT & aLT) zusammen mit einem niederexergetischen Versorgungssystem, bestehend aus Eisspeicher, Wärmepumpe und PVT-Hybridkollektoren realisiert. Zur Heizperiode 2018/19 wurde die „Feldtestanlage“ in Betrieb genommen, sodass derzeit Messdaten generiert wer-den. In dem Forschungsprojekt wird der Demonstrator über eine Heizperiode und eine Kühl-periode messtechnisch begleitet und ausgewertet. Dabei wird der Großdemonstrator und alle Komponenten umfassend messtechnisch ausgewertet (~300 Messwerte). Ziel des Beitrags ist eine Darstellung der messtechnischen Auswertung des Großdemonstra-tors über die aktuelle Heizperiode (2018/19) und die anstehende Kühlperiode (2019). Der Fo-kus der Auswertung liegt auf der Feldtestfassade der außenliegenden Wandtemperierung und adressiert die folgenden Fragestellungen: - Konnten die theoretischen Ergebnisse aus Berechnung und Simulation reproduziert werden? - Welche Heizleistungen sind über die außenliegende Wandtemperierung übertragbar? - Welches Fazit kann nach dem Betrieb der Anlage/Feldtestfläche über ca. ein Jahr ge-zogen werden? Je nach aktuellem Stand der begleitenden Simulations- und Potentialstudien können auch hier erste Ergebnisse präsentiert werden. Inhaltlich baut der Beitrag auf dem Beitrag „Außen-liegende Wand- und Lufttemperierung: Umsetzung eines Großdemonstrators“ von den Bau-physiktagen 2017 in Kaiserslautern auf. Im Anschluss an die dort beschriebene Umsetzung soll nun ein Fazit bzgl. Umsetzung, Monitoring und Simulation gezogen werden. [less ▲]Detailed reference viewed: 196 (2 UL) Evaluation von bauphysikalischen Vormessungen im Rahmen von komplexen InnendämmprojektenLatz, Sebastian ; Thewes, Andreas; Scholzen, Frank et alin Vogel, Albert (Ed.) Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer ... [more ▼]The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer reduces the temperature of the masonry during the heating period and considerably reduces the drying potential. If the moisture content is too high due to the absorption of driving rain from the outside and moisture from the interior climate, the masonry may be permanently damaged and mould may form. The proof of function can be achieved by hygrothermal simulations. These simulations require the input of sensitive boundary conditions and different material parameters. In order to obtain precise simulation results, these input values should be validated by building physics measurements. In order to be able to better assess the simulation parameters, various physical measurements for the preparation of a field test for interior insulation systems in a conference room were carried out on behalf of the administration of the bâtiments publics at the University of Luxembourg as part of the research project "Possibilities and limitations of interior insulation in the renovation of public buildings in Luxembourg". [less ▲]Detailed reference viewed: 200 (20 UL) Performance Analysis of MANET Routing Protocols in Urban VANETsDi Maio, Antonio ; Palattella, Maria Rita ; Engel, Thomas in Lecture Notes in Computer Science (volume 11803) (2019, September 25)Infrastructure-less communications between moving vehicles present emblematic challenges because of high node mobility and link volatility, which may harm the performances of different categories of ... [more ▼]Infrastructure-less communications between moving vehicles present emblematic challenges because of high node mobility and link volatility, which may harm the performances of different categories of emerging vehicular applications. In order to move data between vehicles that are not in direct communication range, several distributed routing protocols have been proposed and tested in vehicular networks, highlighting their strengths and weaknesses. Some previous works report disagreeing claims about routing protocol performances in similar vehicular scenarios. Therefore, in this work, we evaluate the performances in terms of Packet Delivery Ratio (PDR), packet delay, frame collision rate, and signaling rate of three well-known routing protocols (AODV, DSDV, and GPSR), simulating them in a realistic Manhattan scenario. Furthermore, we evaluate the impact of typical urban obstacles (e.g. buildings) on the considered performance metrics. We observed that, in the proposed urban scenario, AODV provided the best PDR, GPSR the best packet delay, and DSDV failed to provide satisfactory performances due to signaling-induced congestion. Simulations showed that considering the shadowing effects induced by the buildings in an urban scenario drastically changes the observed performances, i.e. reduces the frame collisions, decreases the PDR, and increases the packet delay. [less ▲]Detailed reference viewed: 80 (4 UL) Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using BisimilarityHorne, Ross James ; Mauw, Sjouke ; Smith, Zachary Daniel et alin Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (2019, September 23)We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that should protect the user from being ... [more ▼]We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that should protect the user from being traced from one session to another. While it is well known that there are attacks on BAC, allowing an attacker to link multiple uses of the same passport, due to differences in implementation; there still remains confusion about whether there is an attack on unlinkability directly on the BAC protocol as specified in the ICAO 9303 standard. This paper clarifies the nature of the debate, and sources of potential confusion. We demonstrate that the original privacy claims made are flawed, by uncovering attacks on a strong formulation of unlinkability. We explain why the use of the bisimilarity equivalence technique is essential for uncovering our attacks. We also clarify what assumptions lead to proofs of formulations of unlinkability using weaker notions of equivalence. Furthermore, we propose a fix for BAC within the scope of the standard, and prove that it is correct, again using a state-of-the-art approach to bisimilarity. [less ▲]Detailed reference viewed: 51 (2 UL) BODYFITR: Robust Automatic 3D Human Body FittingSaint, Alexandre Fabian A ; Shabayek, Abd El Rahman ; Cherenkova, Kseniya et alin Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP) (2019, September 22)This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications ... [more ▼]This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications related to healthcare, digital ergonomics, avatar creation and security, especially in industrial contexts for large-scale product design. Existing works either make prior assumptions on the pose, require manual annotation of the data or have difficulty handling complex poses. This work addresses these limitations by providing a novel automatic fitting pipeline with carefully integrated building blocks designed for a systematic and robust approach. It is validated on the 3DBodyTex dataset, with hundreds of high-quality 3D body scans, and shown to outperform prior works in static body pose and shape estimation, qualitatively and quantitatively. The method is also applied to the creation of realistic 3D avatars from the high-quality texture scans of 3DBodyTex, further demonstrating its capabilities. [less ▲]Detailed reference viewed: 159 (25 UL) Multi-flow congestion-aware routing in software-defined vehicular networksDi Maio, Antonio ; Palattella, Maria Rita ; Engel, Thomas in 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) Proceedings (2019, September 22)5G-enabled vehicular networks will soon allow their users to exchange safety and non-safety related information over heterogeneous communication interfaces. Routing vehicular data flows over multi-hop ... [more ▼]5G-enabled vehicular networks will soon allow their users to exchange safety and non-safety related information over heterogeneous communication interfaces. Routing vehicular data flows over multi-hop Vehicle-to-Vehicle (V2V) communications is one of the hardest challenges in vehicular networking, and it has been tackled in literature by using distributed algorithms. The distributed approach has shown significant inefficiencies in such dynamic vehicular scenarios, mainly due to poor network congestion control. To overcome the complexity of the envisioned architecture, and the inefficiency of distributed routing algorithms, we hereby propose to leverage the coordination capabilities of Software-Defined Networking (SDN) to determine optimal V2V multi-hop paths and to offload traffic from the Vehicle-to-Infrastructure-to-Vehicle (V2I2V) to the V2V communications, using both cellular and Wi-Fi technologies. In order to achieve this goal, we propose Multi-Flow Congestion-Aware Routing (MFCAR), a centralized routing algorithm that relies on graph theory to choose short and uncongested V2V paths. Realistic simulations prove that MFCAR outperforms well- established centralized routing algorithms (e.g. Dijkstra's) in terms of Packet Delivery Ratio (PDR), goodput and average packet delay, up to a five-fold performance gain. [less ▲]Detailed reference viewed: 46 (2 UL) Investigation of the moment redistribution for steel concrete continuous beamsYolacan, Taygun Firat ; Schäfer, Markus in The 14th Nordic Steel Construction Conference (2019, September 18)This study investigates moment redistribution phenomenon for pin ended double-span steel-concrete continuous composite beams and arise a question about moment redistribution for the continuous beams ... [more ▼]This study investigates moment redistribution phenomenon for pin ended double-span steel-concrete continuous composite beams and arise a question about moment redistribution for the continuous beams subjected to partially distributed or concentrated loading conditions. The overall objective of the study is to propose a methodology to fulfil the technical gaps adopted by Eurocode-4, which considers the redistribution for only uniformly load condition. A robust iterative algorithm is developed to obtain moment-curvature relations of the standard composite cross-sections. Flexural stiffness-curvature relations of the cross-sections are predicted through the moment-curvature relations. Flexural stiffness distribution along the composite beams is determined with curvature compatibility. Fourth order differential load-deflection equation is evaluated with finite difference solution scheme for continuous beam conditions and variable flexural stiffness along the beam length. A non-iterative incremental load-deflection algorithm is developed to calculate moment distribution in continuous beams with variable flexural stiffness. A benchmark example is solved with Eurocode- 4 provisions to validate the developed algorithms. Moment redistribution from hogging (negative) zone to sagging (positive) zone of uniformly loaded double-span continuous composite beam is illustrated considering the degree of flexural stiffness degradation in the composite medium. A question is arisen for moment redistribution in the continuous beams subjected to partially distributed or concentrated loading conditions. [less ▲]Detailed reference viewed: 20 (2 UL) Impact of reinforcement to moment resistance of composite slabsZhang, Qingjie ; Schäfer, Markus ; Kurz, Wolfgangin The 2019 World Congress on Advances in Structural Engineering and Mechanics (ASEM19) (2019, September 17)Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based ... [more ▼]Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based on plastic design methods. The current version of Eurocode 4 does not consider explicitly additional reinforcement in the ribs for sagging moment resistance. However, the construction industry requires this possibility in order to provide economical and flexible design. Regarding this situation, further investigations are necessary to prove the applicability of plastic design methods. In the case of high bottom reinforcement ratio, a deep position of the plastic neutral axis occurs, and concrete compression failure may happen before most parts of the profiled steel sheeting and reinforcement yield. This leads to an overestimation of the bending resistance according to the plastic design method. A parametric study, based on approximately 290.000 different combinations of various cross-section geometries and materials, is provided to compare the plastic moment resistance with the resistance determined by strain-limited design. The results show that limitations are necessary to be enabled for the general application of plastic design methods. [less ▲]Detailed reference viewed: 47 (4 UL) Learning-based Physical Layer Communications for Multiagent CollaborationMostaani, Arsham ; Simeone, Osvaldo; Chatzinotas, Symeon et alin Mostaani, Arsham; Simeone, Osvaldo; Chatzinotas, Symeon (Eds.) et al PIMRC 2019 Proceedings (2019, September 11)Consider a collaborative task carried out by two autonomous agents that can communicate over a noisy channel. Each agent is only aware of its own state, while the accomplishment of the task depends on the ... [more ▼]Consider a collaborative task carried out by two autonomous agents that can communicate over a noisy channel. Each agent is only aware of its own state, while the accomplishment of the task depends on the value of the joint state of both agents. As an example, both agents must simultaneously reach a certain location of the environment, while only being aware of their own positions. Assuming the presence of feedback in the form of a common reward to the agents, a conventional approach would apply separately: (\emph{i}) an off-the-shelf coding and decoding scheme in order to enhance the reliability of the communication of the state of one agent to the other; and (\emph{ii}) a standard multiagent reinforcement learning strategy to learn how to act in the resulting environment. In this work, it is argued that the performance of the collaborative task can be improved if the agents learn how to jointly communicate and act. In particular, numerical results for a baseline grid world example demonstrate that the jointly learned policy carries out compression and unequal error protection by leveraging information about the action policy. [less ▲]Detailed reference viewed: 92 (16 UL) Unravelling the border-facade of France : a multi-level modelling of cross-border commutingPigeron-Piroth, Isabelle ; Caruso, Geoffrey ; Le Texier, Marionin Caruso, Geoffrey; Gerber, Philippe; Jones, Catherine (Eds.) et al 21st European Colloquium on Theoretical and Quantitative Geography (ECTQG), Book of Abstracts, Mondorf-las-Bains, 5-9 septembre 2019 (2019, September 09)Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross ... [more ▼]Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross-border commuting raises a lot of concerns for planners on both side of each border, especially for provisioning transport infrastructure and local public services but also because it impacts land and housing markets, especially when salary differentials are high. While there is a lot of research about the daily functioning of specific borders (e.g. France-Switzerland or France-Luxembourg), generalization is lacking and spatial heterogeneities impede our understanding of the very determinants of cross-border commuting, such as the role of benefits differentials, transport costs and distance, or the relative availability of jobs at residential places and across the border. Further, these effects are most likely mediated differently by the socio-demographic characteristics of workers, their employment sector, and the quality of their residential environment at large. This suggests that an individual approach and a spatially detailed approach is needed, which contrasts sharply with the fact that most European-wide studies of cross-border commuting are conducted at very aggregated spatial scales (NUTS 2 or 3). [less ▲]Detailed reference viewed: 56 (4 UL) “It felt wrong to me to play that way” Understanding moral decision-making in video games through focus group discussionsHoll, Elisabeth ; Bernard, Steve; Melzer, André in Nebel, Steve; Pietschmann, Daniel; Schneider, Sascha (Eds.) et al Proceedings of the Media Psychology Division (2019, September 05)Detailed reference viewed: 61 (7 UL) Cryptocurrencies and Blockchain TechnologyBiryukov, Alex ; García-Alfaroin Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops (2019, September)Detailed reference viewed: 28 (0 UL) Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification.Bursuc, Sergiu ; Kremer, Stevein Bursuc, Sergiu; Kremer, Steve (Eds.) Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification. (2019, September)Detailed reference viewed: 29 (1 UL) On the Use of Vertex-Frequency Analysis for Anomaly Detection in Graph SignalsLewenfus, Gabriela; Alves Martins, Wallace ; Chatzinotas, Symeon et alin Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (2019, September)Detailed reference viewed: 117 (27 UL) Intersymbol and Intercarrier Interference in OFDM Transmissions Through Highly Dispersive ChannelsAlves Martins, Wallace ; Cruz-Roldán, Fernando; Moonen, Marc et alin Proc. of the 27th European Signal Processing Conference (EUSIPCO-2019) (2019, September)Detailed reference viewed: 83 (8 UL) Bridging the Gap between Requirements Modeling and Behavior-driven DevelopmentAlferez, Mauricio ; Pastore, Fabrizio ; Sabetzadeh, Mehrdad et alin Proceedings of 22nd IEEE / ACM International Conference on Model Driven Engineering Languages and Systems (MODELS) (2019, September)Acceptance criteria (AC) are implementation agnostic conditions that a system must meet to be consistent with its requirements and be accepted by its stakeholders. Each acceptance criterion is typically ... [more ▼]Acceptance criteria (AC) are implementation agnostic conditions that a system must meet to be consistent with its requirements and be accepted by its stakeholders. Each acceptance criterion is typically expressed as a natural-language statement with a clear pass or fail outcome. Writing AC is a tedious and error-prone activity, especially when the requirements specifications evolve and there are different analysts and testing teams involved. Analysts and testers must iterate multiple times to ensure that AC are understandable and feasible, and accurately address the most important requirements and workflows of the system being developed. In many cases, analysts express requirements through models, along with natural language, typically in some variant of the UML. AC must then be derived by developers and testers from such models. In this paper, we bridge the gap between requirements models and AC by providing a UML-based modeling methodology and an automated solution to generate AC. We target AC in the form of Behavioral Specifications in the context of Behavioral-Driven Development (BDD), a widely used agile practice in many application domains. More specially we target the well-known Gherkin language to express AC, which then can be used to generate executable test cases. We evaluate our modeling methodology and AC generation solution through an industrial case study in the financial domain. Our results suggest that (1) our methodology is feasible to apply in practice, and (2) the additional modeling effort required by our methodology is outweighed by the benefits the methodology brings in terms of automated and systematic AC generation and improved model precision. [less ▲]Detailed reference viewed: 507 (116 UL) A Way Forward. Regulating New Space Activities Through Multi-Stakeholder Adaptive GovernanceSalmeri, Antonino in Proceedings of the XXV International Congress of the Italian Association of Aeronautics and Astronautics (2019, September)Detailed reference viewed: 42 (5 UL) On Fairness Optimization for NOMA-Enabled Multi-Beam Satellite SystemsWang, Anyue ; Lei, Lei ; Lagunas, Eva et alin IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 2019 (2019, September)Detailed reference viewed: 109 (22 UL) Automated evaluation of embedded-system design alternativesCordy, Maxime ; Lazreg, Samiin Proceedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, Volume A, Paris, France, September 9-13, 2019 (2019, September)Detailed reference viewed: 22 (0 UL) Optimal Resource Allocation for NOMA-Enabled Cache Replacement and Content DeliveryLei, Lei ; Vu, Thang Xuan ; Xiang, Lin et alin IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2019) (2019, September)Detailed reference viewed: 76 (11 UL) Using Models to Enable Compliance Checking against the GDPR: An Experience ReportTorre, Damiano ; Soltana, Ghanem ; Sabetzadeh, Mehrdad et alin Proceedings of the IEEE / ACM 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS 19) (2019, September)The General Data Protection Regulation (GDPR) harmonizes data privacy laws and regulations across Europe. Through the GDPR, individuals are able to better control their personal data in the face of new ... [more ▼]The General Data Protection Regulation (GDPR) harmonizes data privacy laws and regulations across Europe. Through the GDPR, individuals are able to better control their personal data in the face of new technological developments. While the GDPR is highly advantageous to citizens, complying with it poses major challenges for organizations that control or process personal data. Since no automated solution with broad industrial applicability currently exists for GDPR compliance checking, organizations have no choice but to perform costly manual audits to ensure compliance. In this paper, we share our experience building a UML representation of the GDPR as a first step towards the development of future automated methods for assessing compliance with the GDPR. Given that a concrete implementation of the GDPR is affected by the national laws of the EU member states, GDPR’s expanding body of case laws and other contextual information, we propose a two-tiered representation of the GDPR: a generic tier and a specialized tier. The generic tier captures the concepts and principles of the GDPR that apply to all contexts, whereas the specialized tier describes a specific tailoring of the generic tier to a given context, including the contextual variations that may impact the interpretation and application of the GDPR. We further present the challenges we faced in our modeling endeavor, the lessons we learned from it, and future directions for research. [less ▲]Detailed reference viewed: 414 (48 UL) Time-Deconvolutive CNMF for Multichannel Blind Source SeparationDias, Thadeu; Biscainho, Luiz Wagner; Alves Martins, Wallace in Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (2019, September)Detailed reference viewed: 64 (6 UL) Update Internationales und Europäisches SteuerrechtSinnig, Julia in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2019: Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI (2019, September)Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die ... [more ▼]Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die neue wirtschaftliche Realität der digitalisierten Welt vor. Auf Ebene der Europäischen Union (EU) gilt die Verabschiedung der im März 2018 von der Europäischen Kommission vorgestellten Richtlinien-Vorschläge (RL-Vorschläge) zu einer Digitalsteuer und einer sog. signifikanten digitalen Präsenz, nach intensiver Diskussion im Rat, als unwahrscheinlich. Der Gerichtshof der Europäischen Union beschäftigt sich derzeit mit der unionsrechtlichen Vereinbarkeit nationaler Sonderabgaben, die umsatzbasiert erhoben werden. Dieser Beitrag bietet einen Überblick über wesentliche Entwicklungen im internationalen und europäischen Steuerrecht bzgl. der Besteuerung digitalisierter Unternehmen. Der Beitrag knüpft an den Vortrag von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademie 2018 in Bochum, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]Detailed reference viewed: 101 (5 UL) Joint User Grouping and Power Allocation for MISO Systems: Learning to ScheduleYuan, Yaxiong; Vu, Thang Xuan ; Lei, Lei et alin IEEE European Signal Processing Conference 2019 (2019, September)Detailed reference viewed: 66 (19 UL) An Approximate Solution for Symbol-Level Multiuser Precoding Using Support RecoveryHaqiqatnejad, Alireza ; Kayhan, Farbod ; Ottersten, Björn in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes 2-5 July 2019 (2019, August 29)In this paper, we propose a low-complexity method to approximately solve the SINR-constrained optimization problem of symbol-level precoding (SLP). First, assuming a generic modulation scheme, the ... [more ▼]In this paper, we propose a low-complexity method to approximately solve the SINR-constrained optimization problem of symbol-level precoding (SLP). First, assuming a generic modulation scheme, the precoding optimization problem is recast as a standard non-negative least squares (NNLS). Then, we improve an existing closed-form SLP (CF-SLP) scheme using the conditions for nearly perfect recovery of the optimal solution support, followed by solving a reduced system of linear equations. We show through simulation results that in comparison with the CF-SLP method, the improved approximate solution of this paper, referred to as ICF-SLP, significantly enhances the performance with a negligible increase in complexity. We also provide comparisons with a fast-converging iterative NNLS algorithm, where it is shown that the ICF-SLP method is comparable in performance to the iterative algorithm with a limited maximum number of iterations. Analytic discussions on the complexities of different methods are provided, verifying the computational efficiency of the proposed method. Our results further indicate that the ICF-SLP scheme performs quite close to the optimal SLP, particularly in the large system regime. [less ▲]Detailed reference viewed: 100 (14 UL) Modelling of interfacial crack propagation in strongly heterogeneous materials by using phase field methodNguyen, Thanh-Tung; Yvonnet, Julien; Waldmann, Danièle et alin Proceedings of the 8th GACM Colloquium on Computational Mechanics for Young Scientists from Academia and Industry (2019, August 28)Phase field model has been proved to be a useful tool to study the fracture behaviors in heterogeneous materials. This method is able to model complex, multiple crack fronts, and branching in both 2D/3D ... [more ▼]Phase field model has been proved to be a useful tool to study the fracture behaviors in heterogeneous materials. This method is able to model complex, multiple crack fronts, and branching in both 2D/3D without ad-hoc numerical treatments. In this study, a new interfacial cracking model in the phase field framework is proposed. The effects of both stiff and soft interphases on the fracture response of composite materials are considered. A dimensional-reduced model based on a rigorous asymptotic analysis is adapted to derive the null thickness imperfect interface models from an original configuration containing thin interphase. The idea of mixing the bulk and interfacial energy within the phase field framework is then used to describe the material degradation both on the interface and in bulk. Moreover, in order to ensure the physical crack propagation patterns, a unilateral contact condition is also proposed for the case of spring imperfect interface. The complex cracking phenomena on interfaces such as initiation, delamination, coalescence, deflection, as well as the competition between the interface and bulk cracking are successfully predicted by the present method. Concerning the numerical aspect, the one-pass staggered algorithm is adapted, providing an extremely robust approach to study interfacial cracking phenomena in a broad class of heterogeneous materials. [less ▲]Detailed reference viewed: 34 (3 UL) Towards context-aware automated writing evaluation systemsPatout, Pierre-André; Cordy, Maxime in Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (2019, August 26)Detailed reference viewed: 20 (0 UL)