References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in 61st IISL COLLOQUIUM ON THE LAW OF OUTER SPACE (2019)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 71 (2 UL)
See detailCharles-Ferdinand Nothomb et les Belges germanophones: contribution à l'histoire des relations entre P.S.C. et C.S.P.
Brüll, Christoph UL

in Annaert, Phiilippe; Lanneau, Catherine; Dujardin, Vincent (Eds.) Charles-Ferdinand Nothomb. Une homme d'Etat, une époque. Actes du colloque tenu à Saint-Hubert le 10 juin 2016 (2019)

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailOn the Evolution of Keyword-Driven Test Suites
Rwemalika, Renaud UL; Kintis, Marinos UL; Papadakis, Mike UL et al

in 12th IEEE International Conference on Software Testing, Verification and Validation (2019)

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to ... [more ▼]

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to achieve. The problem becomes challenging when software evolves, as end-to-end test suites need to adapt and conform to the evolved software. Unfortunately, end-to-end tests are particularly fragile as any change in the application interface, e.g., application flow, location or name of graphical user interface elements, necessitates a change in the tests. This paper presents an industrial case study on the evolution of Keyword-Driven test suites, also known as Keyword-Driven Testing (KDT). Our aim is to demonstrate the problem of test maintenance, identify the benefits of Keyword-Driven Testing and overall improve the understanding of test code evolution (at the acceptance testing level). This information will support the development of automatic techniques, such as test refactoring and repair, and will motivate future research. To this end, we identify, collect and analyze test code changes across the evolution of industrial KDT test suites for a period of eight months. We show that the problem of test maintenance is largely due to test fragility (most commonly-performed changes are due to locator and synchronization issues) and test clones (over 30% of keywords are duplicated). We also show that the better test design of KDT test suites has the potential for drastically reducing (approximately 70%) the number of test code changes required to support software evolution. To further validate our results, we interview testers from BGL BNP Paribas and report their perceptions on the advantages and challenges of keyword-driven testing. [less ▲]

Detailed reference viewed: 201 (8 UL)
See detail"Georges Perec ou la méthode pratique de la critique"
Raus, Tonia

in Absalyamova, Elina; Van Nuijs, Laurence; Stiénon, Valérie (Eds.) "Figures du critique-écrivain. Formes et pratiques du discours métalittéraire (XIXe-XXIe siècles" (2019)

Detailed reference viewed: 2 (0 UL)
Full Text
Peer Reviewed
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. (2019)

Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Beitrag untersucht die Veränderung von Grenzen ... [more ▼]

Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Beitrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man nur in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen dem Großherzogtum Luxemburg als Provinz des niederländischen Königreichs und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 84 (9 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 48 (23 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 48 (23 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 48 (23 UL)
Full Text
Peer Reviewed
See detailA Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the 35th Annual Computer Security Applications Conference (2019)

To protect their digital assets from malware attacks, most users and companies rely on anti-virus (AV) software. But AVs' protection is a full-time task and AVs are engaged in a cat-and-mouse game where ... [more ▼]

To protect their digital assets from malware attacks, most users and companies rely on anti-virus (AV) software. But AVs' protection is a full-time task and AVs are engaged in a cat-and-mouse game where malware, e.g., through obfuscation and polymorphism, denial of service attacks and malformed packets and parameters, try to circumvent AV defences or make them crash. On the other hand, AVs react by complementing signature-based with anomaly or behavioral detection, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-act, for instance by using adversarial inputs to avoid detection, et cetera. This paper investigates two novel moves for the malware side. The first one consists in simulating mouse events to control AVs, namely to send them mouse "clicks" to deactivate their protection. We prove that many AVs can be disabled in this way, and we call this class of attacks Ghost Control. The second one consists in controlling high-integrity white-listed applications, such as Notepad, by sending them keyboard events (such as "copy-and-paste") to perform malicious operations on behalf of the malware. We prove that the anti-ransomware protection feature of some AVs can be bypassed if we use Notepad as a "puppet" to rewrite the content of protected files as a ransomware would do. Playing with the words, and recalling the cat-and-mouse game, we call this class of attacks Cut-and-Mouse. [less ▲]

Detailed reference viewed: 27 (6 UL)
Full Text
Peer Reviewed
See detailKnow Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation
Du, Manxing UL; Cowen-Rivers, Alexander I.; Wen, Ying et al

in Proceedings of the 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019) (2019)

Detailed reference viewed: 318 (0 UL)
See detail"Portante postmoderne"
Raus, Tonia UL

in De Toffoli, Ian; Millim, Anne-Marie (Eds.) Modernismes au Luxembourg. Traditions - Variations - Ruptures (2019)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailUniform Sampling of SAT Solutions for Configurable Systems: Are We There Yet?
Plazar, Quentin; Acher, Mathieu; Perrouin, Gilless et al

in 12th IEEE Conference on Software Testing, Validation and Verification, ICST 2019, Xi'an, China, April 22-27, 2019 (2019)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailImmersive Mixed Reality Object Interaction for Collaborative Context-Aware Mobile Training and Exploration
Botev, Jean UL; Mayer, Joe; Rothkugel, Steffen UL

in Proceedings of the 10th ACM Multimedia Systems Conference (MMSys) (2019)

Detailed reference viewed: 92 (19 UL)
Full Text
Peer Reviewed
See detailRisk-Limiting Tallies
Jamroga, Wojciech UL; Roenne, Peter UL; Ryan, Peter UL et al

in Electronic Voting: Proceedings of E-Vote-ID (2019)

Detailed reference viewed: 9 (3 UL)
Full Text
Peer Reviewed
See detailMargin-based Active Online Learning Techniques for Cooperative Spectrum Sharing in CR Networks
Korrai, Praveenkumar UL; Lagunas, Eva UL; Sharma, Shree Krishna UL et al

in International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), Poznan, Poland, June 2019 (2019)

Detailed reference viewed: 136 (19 UL)
Full Text
Peer Reviewed
See detailLinear Precoding Design for Cache-aided Full-duplex Networks
Vu, Thang Xuan UL; Vu, Trinh Anh; Lei, Lei UL et al

in 2019 IEEE Wireless Communications and Networking Conference (WCNC) (2019)

Detailed reference viewed: 32 (4 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in Grigoriou, Panos (Ed.) European Governance & Sovereignty (2019)

Detailed reference viewed: 65 (31 UL)
Full Text
Peer Reviewed
See detailDesigning Set of Binary Sequences and Space-Time Receive Filter for Moving Targets in Colocated MIMO Radar Systems
Feraidooni, Mohammad Mahdi; Alaee-Kerahroodi, Mohammad UL; Imani, Sadjad et al

in 2019 20th International Radar Symposium (IRS) (2019)

Detailed reference viewed: 61 (1 UL)
Full Text
Peer Reviewed
See detailSTV: Model Checking for Strategies under Imperfect Information
Kurpiewski, Damian; Jamroga, Wojciech UL; Knapik, Micha L

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailHerzschlag-evozierte Potenziale bei Bulimia nervosa
Lutz, Annika UL; Van Dyck, Zoé UL; Schulz, André UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben ... [more ▼]

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben sich je nach betrachtetem Organsystem (Herz, Magen), Verarbeitungsebene (neuronal, Selbstbericht) und Diagnose. Die bisherige Befundlage ist jedoch unübersichtlich und widersprüchlich. Für Bulimia nervosa (BN) wurde sowohl reduzierte, als auch unveränderte Herzschlagwahrnehmung berichtet. Mit dem vorliegenden Beitrag steuern wir weitere Ergebnisse zur Herzschlagwahr nehmung bei und ergänzen diese um einen physiologischen Indikator der kortikalen Verarbeitung kardio-afferenter Signale (Herzschlag-evozierte Potenziale, HEPs). Es wurden 22 Frauen mit akuter oder teilremittierter BN (BMI 23,94±3,61; Alter 31,86±11,20) und 22 gesunde Frauen untersucht (BMI 24,24±3,37; Alter 31,00±10,15). Die Stichproben wurden nach Alter und BMI parallelisiert. Die Teilnehmerinnen führten eine Herzschlagwahrnehmungsaufgabe nach Schandry durch, während ein 64-Kanal-EEG aufgezeichnet wurde. HEPs wurden als mittlere EEG-Amplitude von 455ms bis 595ms nach der R-Zacke berechnet. Die Ergebnisse zeigen keine signifikanten Gruppenunterschiede in Herzschlagwahrnehmung, HEPs und Herzrate. Dies bestätigt vorherige Befunde einer intakten Herzschlagwahrnehmung bei BN. Zusätzlich können wir von einer intakten kortikalen Verarbeitung kardio-afferenter Reize ausgehen. Die Wahrnehmung des Herzschlags ist insbesondere für die Verarbeitung und Regulation von Emotionen relevant. Auf Basis der vorliegenden und früheren Befunde ist davon auszugehen, dass defizitäre Emotionsregulation bei BN nicht auf veränderte Herzschlagwahrnehmung zurückzuführen ist. [less ▲]

Detailed reference viewed: 33 (3 UL)
Full Text
Peer Reviewed
See detailMeeting the Lower Bound on Designing Set of Unimodular Sequences with Small Aperiodic/Periodic ISL
Alaee-Kerahroodi, Mohammad UL; Shankar, Bhavani; Mishra, Kumar Vijay et al

in 2019 20th International Radar Symposium (IRS) (2019)

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailThe Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Steichen, Mathis UL; State, Radu UL

in USENIX Security Symposium, Santa Clara, 14-16 August 2019 (2019)

Modern blockchains, such as Ethereum, enable the execution of so-called smart contracts - programs that are executed across a decentralised network of nodes. As smart contracts become more popular and ... [more ▼]

Modern blockchains, such as Ethereum, enable the execution of so-called smart contracts - programs that are executed across a decentralised network of nodes. As smart contracts become more popular and carry more value, they become more of an interesting target for attackers. In the past few years, several smart contracts have been exploited by attackers. However, a new trend towards a more proactive approach seems to be on the rise, where attackers do not search for vulnerable contracts anymore. Instead, they try to lure their victims into traps by deploying seemingly vulnerable contracts that contain hidden traps. This new type of contracts is commonly referred to as honeypots. In this paper, we present the first systematic analysis of honeypot smart contracts, by investigating their prevalence, behaviour and impact on the Ethereum blockchain. We develop a taxonomy of honeypot techniques and use this to build HoneyBadger - a tool that employs symbolic execution and well defined heuristics to expose honeypots. We perform a large-scale analysis on more than 2 million smart contracts and show that our tool not only achieves high precision, but is also highly efficient. We identify 690 honeypot smart contracts as well as 240 victims in the wild, with an accumulated profit of more than $90,000 for the honeypot creators. Our manual validation shows that 87% of the reported contracts are indeed honeypots. [less ▲]

Detailed reference viewed: 120 (13 UL)
Full Text
Peer Reviewed
See detailAutonomy and EU Competences in the Context of Free Trade and Investment Agreements
Neframi, Eleftheria UL; Gatti, Mauro UL

in Bosse Platiere, Isabelle; Rapoport, Cecile (Eds.) Negotiation and Conclusion of the New Generation of Free Trade Agreements (2019)

Detailed reference viewed: 154 (3 UL)
Full Text
Peer Reviewed
See detailCardiac cycle phase affect auditory-evoked potentials in response to acoustic startle stimuli, but not perceived intensity ratings
Bernard, Sam UL; Münch, E. E.; Hansen, G. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Startle stimuli presented in the early cardiac cycle phase elicit lower responses than stimuli presented in the late cardiac cycle phase. This effect, named ‚Cardiac modulation of startle (CMS)‘, was ... [more ▼]

Startle stimuli presented in the early cardiac cycle phase elicit lower responses than stimuli presented in the late cardiac cycle phase. This effect, named ‚Cardiac modulation of startle (CMS)‘, was proposed to reflect baro-afferent signal processing in the central nervous system. It is yet unclear, however, whether the CMS is due to a general sensory attenuation effect by baro-afferent signal transmission or to a specific neural pathway that selectively attenuates startle stimulus processing, but may eventually enhance other processes. The aim of the present study was, therefore, to address this issue. In this present study 23 female participants were presented acoustic stimuli of varying intensities (95, 100, and 105 dBA) during early (R-wave + 230 ms) and late (R+ 530 ms) cardiac cycle phase. Startle responses (EMG of the M. Orbicularis Oculi), auditory-evoked potentials (AEPs), and perceived intensity ratings of all stimuli were assessed. Higher startle stimulus intensities evoked higher perceived intensity ratings, stronger EMG startle responses, and higher N1, P2, and P3 AEPs. Startle stimuli in the early cardiac cycle phase elicited lower startle responses, and a positive shift of the N1 and P3 components as compared to the late cardiac cycle phase. Intensity ratings were unaffected by the cardiac cycle phases. The present AEP pattern associated with CMS appears to be unique across all startle modulation paradigms, supporting a more specific neural pathway, rather than a general sensory attenuation. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in Springer Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). (2019)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 661 (48 UL)
Full Text
Peer Reviewed
See detailHerzschlag-evozierte Potentiale bei der Borderline Persönlichkeitsstörung: Können Defizite in der kortikalen Repräsentation interozeptiver Signale durch Oxytocin beeinflusst werden?
Schmitz, M.; Müller, L. E.; Schulz, André UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Zu den Kernmerkmalen der Borderline Persönlichkeitsstörung (BPS) gehört eine emotionale Dysregulation. Diese zeigt sich v.a. in Schwierigkeiten im Erkennen und Regulieren eigener Emotionen und könnte eng ... [more ▼]

Zu den Kernmerkmalen der Borderline Persönlichkeitsstörung (BPS) gehört eine emotionale Dysregulation. Diese zeigt sich v.a. in Schwierigkeiten im Erkennen und Regulieren eigener Emotionen und könnte eng mit Defiziten in der Repräsentation und Perzeption körpereigener Signale zusammenhängen. Erste eigene Befunde weisen auf reduzierte Herzschlagevozierte Potentiale (HEPs) bei Patienten mit einer akuten BPS, jedoch nicht bei remittierten Patienten gegenüber gesunden Kontrollprobanden hin. Als mögliche Quellen konnten der anterior zinguläre und insuläre Kortex ermittelt werden. Ziele der vorliegenden Studie waren die Replikation reduzierter HEP-Amplituden in einer unabhängigen Stichprobe von N=53 Patientinnen mit BPS und N=60 gesunden Probandinnen und die Untersuchung des Einflusses von Oxytocin auf die HEPs. Effekte von Oxytocin auf interozeptive Prozesse werden diskutiert, bisher fehlte jedoch eine Untersuchung seiner Einflüsse auf die aufgabenunabhängige kortikale Repräsentation. In einem doppelblinden, randomisierten und placebokontrollierten Gruppendesign wurde ein 4-minütiges Ruhe EEG und EKG 85 Minuten nach Substanzapplikation (24 I.U. Oxytocin oder Placebo) abgeleitet. Zusätzlich wurde subjektive interozeptive Sensibilität in zwei Fragebögen abgefragt. Hypothesenkonform wiesen die Patientinnen mit BPS signifikant geringere mittlere HEP-Amplituden gegenüber den gesunden Probandinnen auf und berichteten über verringerte interozeptive Sensibilität. Die HEPs korrelierten außerdem negativ mit der Symptomschwere, emotionaler Dysregulation und früher Traumatisierung. Allerdings konnte kein Effekt von Oxytocin auf die HEPs gefunden werden. Unsere Ergebnisse bestätigen eine reduzierte kortikale Repräsentation interozeptiver Signale bei Patientinnen mit BPS, welche in Abwesenheit sozialer Stimuli nicht durch Oxytocin beeinflusst wird. Studien, welche die Modulation der HEPAmplitude während Emotionsregulation untersuchen, könnten helfen, Techniken zu identifizieren, um die Körperwahrnehmung bei Störungsbildern mit ausgeprägter emotionaler Dysregulation zu erhöhen. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailThe Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 104 (3 UL)
Full Text
Peer Reviewed
See detailWhat’s in a Name: Gamifying the Intangible History of Larochette, Luxembourg
Morse, Christopher UL; de Kramer, Marleen UL

in Börner, Wolfgang; Uhlirz, Susanne (Eds.) Proceedings of the 23rd International Conference on Cultural Heritage and New Technologies 2018. CHNT 23, 2018 (Vienna 2019) (2019)

The Larochette app is part of a larger interdisciplinary project to create a digital reconstruction of the town and castle of Larochette, Luxembourg. The paper discusses the creation of an app that serves ... [more ▼]

The Larochette app is part of a larger interdisciplinary project to create a digital reconstruction of the town and castle of Larochette, Luxembourg. The paper discusses the creation of an app that serves to pique interest in linguistics and historical geography, traditionally dry subjects with little intrinsic appeal to children and the general public. This project harnesses this effect, presenting the results of the preceding landscape study in an interactive educational environment that rewards the user for engaging with the content. As the app allows natural movement and intuitive interaction, exploration and learning are prompted by curiosity. The goal of connecting place names to heritage is not explicitly stated, nor is it presented as an educational game. In short, this is the second phase of a collaborative case study in the digital experience of history, which is grounded in user experience design and informed by the historical and architectural expertise of the collaborators. [less ▲]

Detailed reference viewed: 19 (3 UL)
Full Text
See detailSlim-floor beam bending moment resistance considering partial shear connection
Zhang, Qingjie UL; Schäfer, Markus UL

in Wald, Frantisek; Jandera, Michal (Eds.) Stability and Ductility of Steel Structures 2019 (2019)

Having the advantage of flat lower surface, high stiffness and integrated fire resistance, slim-floor composite beams are widely used and favoured in many design solutions. The current bending design ... [more ▼]

Having the advantage of flat lower surface, high stiffness and integrated fire resistance, slim-floor composite beams are widely used and favoured in many design solutions. The current bending design methods are mainly derived from plastic design methods for classical composite beam with consideration of the special features for slim-floor beams such as the transverse bending of bottom flange when used as support for slabs. Alternatively, more advanced strain-limited design method or FE-method can be used. In the case of full shear connection, with deep position of neutral axis and great compression zone height, there is a risk that plastic design method may overestimate the bending resistance of the cross section compared to the strain-limited design method. In the case of the partial shear connection, shear design diagram for slim-floor beams obtained by means of the strain-limited design can also differ significantly from the one obtained by plastic design method, thus further research on slim-floor beams is still necessary. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailQuantifying information flow in interactive systems
Mestel, David UL

in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (2019)

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is ... [more ▼]

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic. [less ▲]

Detailed reference viewed: 92 (6 UL)
Full Text
See detailDas Verhältnis zwischen Hochschule und Wissenschaft in Deutschland: Expansion – Produktion – Kooperation
Dusdal, Jennifer UL; Oberg, Achim; Powell, Justin J W UL

in Burzan, Nicole (Ed.) Komplexe Dynamiken globaler und lokaler Entwicklungen: Der Verhandlungsband des 39. Kongresses der Deutschen Gesellschaft für Soziologie vom 24.-28. September 2018 an der Georg-August-Universität Göttingen (2019)

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten ... [more ▼]

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten Produzenten wissenschaftlichen Wissen seit 1900. Folgende Forschungsfragen sollen beantwortet werden: Wie haben institutionalisierte Strukturen, und darin verschiedene Organisationsformen, die langfristige Entwicklung wissenschaftlicher Produktivität beeinflusst und verändert? In welchen organisationalen Netzwerken entwickelt sich aktuell die Wissenschaft weiter? Die Annäherung an den Forschungsgegenstand erfolgt auf der Makroebene anhand von Indikatoren zur Erfassung der globalen Expansion, Kooperation und Produktion der Wissenschaft. Vor dem Hintergrund dieses Untersuchungsrahmens wird dann auf der Mesoebene das Zusammenspiel von Organisationsformen in Deutschland mittels netzwerkanalytischer Verfahren betrachtet. Ziel des Beitrags ist, die Orte und institutionellen Settings wissenschaftlicher Produktion zu identifizieren und anhand ihrer Aufgaben und Ziele voneinander abzugrenzen sowie ihre Beziehungen zueinander herauszuarbeiten. Als theoretische Basis werden neo-institutionalistische Ansätze zur Untersuchung und Erklärung der Expansion des Hochschulwesens und der Wissenschaft und zur Analyse von organisationalen Netzwerken herangezogen. Grundlage der empirischen Analyse bilden Publikationen in peer-reviewed Zeitschriften als Kennzeichen wissenschaftlicher Produktion. [less ▲]

Detailed reference viewed: 115 (23 UL)
Full Text
Peer Reviewed
See detailNatural Strategic Ability under Imperfect Information
Jamroga, Wojciech UL; Malvone, Vadim; Murano, Aniello

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (2019)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 109 (3 UL)
Full Text
Peer Reviewed
See detailGeneration of Patients-as-Partner Items Through a Qualitative Data Analysis : Initial Item Reduction
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Health psychology aspires to find ways for evaluating the Patient as a Partner. The Montréal model, proposes a verbal and conceptual interpretation. Developed by a University of Montréal research team ... [more ▼]

Health psychology aspires to find ways for evaluating the Patient as a Partner. The Montréal model, proposes a verbal and conceptual interpretation. Developed by a University of Montréal research team, this approach advances that patients should play an active role in the healthcare process. Quantitative assessments employing a methodological framework involving a qualitative approach do not exist. Our study aimed at analyzing a procedure for generating patient as a partner related items and to elaborate their classification. Five semi-structured focus groups with 20 chronic disease patients and 15 professionals (doctors, nurses) were conducted. A qualitative analysis, combining inductive (data abstraction was conducted from specific to general), and deductive (guided by a predefined protocol) methods was employed to create a flexible framework of analysis. A thematic categorical content analysis of the transcriptions was conducted. Verbatim were extracted and classified into categories. Cluster analysis using Sorensen’s coeffient was performed with the software N’Vivo 12. Sorensen’s similarity analysis helped to structure a conceptual framework for the assessment of patient as partner at the doctor patient interaction level. The content of each category was verfied through consensus by multidisciplinary experts, who formulated items to capture the overall patient as partner experience. Our list of items constituted fundamental dimensions of partnership, constituting a first classification and a basis for the development of a routine clinical assessment tool. This process should guarantee that the items are acceptable, comprehensive and relevant (reflecting the lived experience of the participants) ensuring a validity of the future questionnaire. [less ▲]

Detailed reference viewed: 73 (3 UL)
Full Text
Peer Reviewed
See detailToward Real-world Vehicle Placement Optimization in Round-trip Carsharing
Changaival, Boonyarit UL; Danoy, Grégoire UL; Kliazovich, Dzmitry et al

in Proceedings of the Genetic and Evolutionary Computation Conference (2019)

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detail‘Ego Anselmus Bocardus notarius civitatis Mediolani tradidi et scripsi’. Le parcours professionnel et social d’un notaire milanais (seconde moitié du XIIIe-début du XIVe s.)
Salemme, Timothy UL

in Nieus, Jean-François; Hermand, Xavier; Renard, Etienne (Eds.) Le scribe d’archives dans l’Occident médiéval, (2019)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailFrom Classical to Non-monotonic Deontic Logic Using ASPIC+
Dong, Huimin; Liao, Beishui; Markovich, Réka UL et al

in Logic, Rationality, and Interaction - 7th International Workshop LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings (2019)

In this paper we use formal argumentation to design non-monotonic deontic logics, based on two monotonic deontic logics. In particular, we use the structured argumentation theory ASPIC􀀀 to define non ... [more ▼]

In this paper we use formal argumentation to design non-monotonic deontic logics, based on two monotonic deontic logics. In particular, we use the structured argumentation theory ASPIC􀀀 to define non-monotonic variants of well-understood modal logics. We illustrate the approach using argumentation about free-choice permission. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailLe projet ‘transfrontalier’ TRANSSCRIPT. Une base de données plurilingue pour les actes des ducs de Lorraine et des comtes de Luxembourg (XIIIe-XIVe s.)
Salemme, Timothy UL; GILI-THEBAUDEAU, Laura

in LOUBET BALOUZAT, Christelle (Ed.) Digitizing Medieval Sources-L’édition en ligne de documents d’archives médiévaux. Challenges and methodologies-Enjeux, méthodologie et défis (2019)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailA Proposal for Security Assessment of Trustzone-M based Software
Iannillo, Antonio Ken UL; State, Radu UL

in 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) (2019)

With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical ... [more ▼]

With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical world or other software entities with minimal or no human input. This fast abstract proposes a methodology for the security assessment of software based on TrustZone-M, the ARM hardware security extension for microcontrollers. The methodology consists of the exploitation of a verification and validation framework to automatically test TrustZone-M based software. [less ▲]

Detailed reference viewed: 93 (8 UL)
Full Text
Peer Reviewed
See detailACMiner: Extraction and Analysis of Authorization Checks inAndroid’s Middleware
Gorski III, Sigmund Albert; Andow, Benjamin; Nadkarni, Adwait et al

(2019)

Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android’s permission model is well studied, the ... [more ▼]

Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android’s permission model is well studied, the enforcementof the protection policy has received relatively little attention. Much of this enforcement is spread across system services,taking the form of hard-coded checks within their implementations.In this paper, we propose Authorization Check Miner (ACMiner),a framework for evaluating the correctness of Android’s access control enforcement through consistency analysis of authorization checks. ACMiner combines program and text analysis techniques to generate a rich set of authorization checks, mines the corresponding protection policy for each service entry point, and uses association rule mining at a service granularity to identify inconsistencies that may correspond to vulnerabilities. We used ACMiner to study the AOSP version of Android 7.1.1 to identify 28 vulnerabilities relating to missing authorization checks. In doing so, we demonstrate ACMiner’s ability to help domain experts process thousands of authorization checks scattered across millions of lines of code. [less ▲]

Detailed reference viewed: 11 (3 UL)
Full Text
Peer Reviewed
See detailTheoretical Analysis and Implementation of Effective Receivers for Telecommand Space Links
Baldi, Marco; Bertinelli, Massimo; Chiaraluce, Franco et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailDo interoceptive deficits contribute to decision-making problems in academic procrastination
Breden, I.-H.; Dincher, K.; Pereira Pedrosa, R. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides ... [more ▼]

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides the selection for the potentially best option. In the present study, we aimed at investigating if chronically procrastinating individuals show interoceptive deficits, which may explain poor decision-making performance. We tested 19 chronic procrastinators (14 females) and 22 nonprocrastinating control individuals (14 females), recruited from students and staff of the University of Luxembourg. This study consisted of a laboratory experiment including questionnaires assessing procrastinating behavior and two separate behavioral paradigms. Using the Schandry Heartbeat Perception Task as an indicator for interoceptive accuracy and the Iowa Gambling Task (IGT) for the assessment of decision-making performance. Questionnaire data confirmed significantly higher procrastination scores in that group. While male participants showed a significantly higher interoceptive accuracy score than their female counterparts, procrastinators and non-procrastinators did not differ significantly in interoception. Furthermore, no differences in the choice of deck selections were found between procrastinators and non-procrastinators. Interoceptive accuracy was unrelated to decision-making performance. No significant group differences were found for either analysis regarding the performance development as well as sex differences in the IGT. We observed a learning effect in the IGT, with choices for profitable decks increasing over time and poor choices declining. The current study did neither support reduced decision-making problems, nor interoceptive deficits in procrastination. Future studies should incorporate interoceptive indicators of other organ systems and self-report measures to elucidate possible alterations in procrastination. [less ▲]

Detailed reference viewed: 55 (2 UL)
Full Text
Peer Reviewed
See detailExplainable ASP
Dauphin, Jérémie UL; Satoh, Ken

in PRIMA 2019: Principles and Practice of Multi-Agent Systems - 22nd International Conference, Turin, Italy, October 28-31, 2019, Proceedings (2019)

Despite its proven relevance, ASP (answer set programming) suffers from a lack of transparency in its outputs. Much like other popular artificial intelligence systems such as deep learning, the results do ... [more ▼]

Despite its proven relevance, ASP (answer set programming) suffers from a lack of transparency in its outputs. Much like other popular artificial intelligence systems such as deep learning, the results do not come with any explanation to support their derivation. In this paper, we use a given answer set as guidance for a simplified top-down procedure of answer set semantics developed by Satoh and Iwayama to provide not only an explanation for the derivation (or non-derivation) of the atoms, but also an explanation for the consistency of the whole answer set itself. Additionally, we show that a full use of the Satoh-Iwayama procedure gives an explanation of why an atom is not present in any answer set. [less ▲]

Detailed reference viewed: 98 (10 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the Third Central European Cybersecurity Conference (2019)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 107 (33 UL)
Full Text
Peer Reviewed
See detailOn the use of supervised machine learning for assessing schedulability: application to Ethernet TSN
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 27th International Conference on Real-Time Networks and Systems (RTNS 2019) (2019)

In this work, we ask if Machine Learning (ML) can provide a viable alternative to conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints ... [more ▼]

In this work, we ask if Machine Learning (ML) can provide a viable alternative to conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints. Otherwise said, can an algorithm learn what makes it difficult for a system to be feasible and predict whether a configuration will be feasible without executing a schedulability analysis? To get insights into this question, we apply a standard supervised ML technique, k-nearest neighbors (k-NN), and compare its accuracy and running times against precise and approximate schedulability analyses developed in Network-Calculus. The experiments consider different TSN scheduling solutions based on priority levels combined for one of them with traffic shaping. The results obtained on an automotive network topology suggest that k-NN is efficient at predicting the feasibility of realistic TSN networks, with an accuracy ranging from 91.8% to 95.9% depending on the exact TSN scheduling mechanism and a speedup of 190 over schedulability analysis for 10^6 configurations. Unlike schedulability analysis, ML leads however to a certain rate "false positives'' (i.e., configurations deemed feasible while they are not). Nonetheless ML-based feasibility assessment techniques offer new trade-offs between accuracy and computation time that are especially interesting in contexts such as design-space exploration where false positives can be tolerated during the exploration process. [less ▲]

Detailed reference viewed: 64 (4 UL)
Full Text
Peer Reviewed
See detailOff-line Correlator for Antenna Array Over Long Baselines
Ardito, Alessandro; Abelllo, Ricard; Aroumont, Anbazhagan et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Extended Abstract)
Steen, Alexander UL; Benzmüller, Christoph UL

in Benzmüller, Christoph; Stuckenschmidt, Heiner (Eds.) {KI} 2019: Advances in Artificial Intelligence - 42nd German Conference on AI, Kassel, Germany, September 23-26, 2019, Proceedings (2019)

Detailed reference viewed: 43 (1 UL)
Full Text
Peer Reviewed
See detailErhöhte Reaktivität Herzschlag-evozierter Potenziale während der Aufmerksamkeits- fokussierung auf den eigenen Herzschlag und erhöhte kardiovaskuläre Aktivität bei Personen mit hoher somatoformer Symptombelastung
Schulz, André UL; Rost, S.; Dierolf, Angelika UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte ... [more ▼]

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte Signalübermittlung von Körperorganen und (2.) verringerte Filterfunktion im ZNS zu (3.) verstärkter Wahrnehmung von Symptomen führt. Bislang existiert jedoch keine Evidenz, die diesen Zusammenhang an einer von somatoformen Symptomen belasteten Population unterstützt. Um diesen Sachverhalt aufzudecken, wurden zunächst 486 Personen aus der Allgemeinbevölkerung anhand einer Online- Version des Screenings für Somatoforme Störungen (SOMS-2) anhand des oberen und unteren Centils in Personen mit hoher (HSB) und niedriger somatoformer Symptombelastung (NSB) geteilt. Jeweils 29 NSB- (21 Frauen; 26,0 J.) und HSBPersonen (27 Frauen; 28,4 J.) wurden im Labor anhand (1.) verstärkter Körpersignale hinsichtlich kardiovaskulärer Aktivität und Cortisol-Aufwachreaktion, sowie (2.) Filterfunktionen im ZNS hinsichtlich Herzschlag-evozierter Potentiale (HEPs) während der Durchführung eines Herzschlagwahrnehmungstests und während Ruhe untersucht. HEPs reflektieren die Repräsentation kardio-afferenter Signale im ZNS. Die HSB-Gruppe zeigte eine höhere Ruhe-Herzrate (72,7 vs. 66,8 bpm) und eine geringere Herzratenvariabilität (RMSSD: 36,8 vs. 52,5 ms) als die LSB-Gruppe. Außerdem zeigten die HSB-Personen bei der Aufmerksamkeitsfokussierung auf den eigenen Herzschlag eine höhere Reaktivität der HEP-Amplitude als die LSB-Personen. Es gab keine Gruppenunterschiede hinsichtlich der Cortisol-Aufwachreaktion. Die Ergebnisse belegen sowohl (1.) die verstärkte Signalübermittlung von Körperorganen, als auch (2.) verringerte Filterfunktionen bei Personen mit hoher somatoformer Symptombelastung. Dies spricht für die Gültigkeit des Perception-Filter-Modells. Die erhöhte HEP-Reaktivität bezüglich der Aufmerksamkeitsfokussierung auf Körperprozesse könnte einen Biomarker für Personen mit hohem Risiko für die Entwicklung von somatoformen Störungen darstellen. [less ▲]

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailMethodische Herausforderungen bei der Erfassung der interozeptiven Genauigkeit im Vorschulalter
Opdensteinen, K.; Schaan, L.; Pohl, A. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Im Vorschulalter entwickeln sich zentrale Fähigkeiten in Kognition, Sprache und Emotion. Dennoch ist wenig über das bewusste Erleben innerer Körperempfindungen bei Vorschulkindern bekannt, da es an ... [more ▼]

Im Vorschulalter entwickeln sich zentrale Fähigkeiten in Kognition, Sprache und Emotion. Dennoch ist wenig über das bewusste Erleben innerer Körperempfindungen bei Vorschulkindern bekannt, da es an altersangepassten Paradigmen zu Erfassung der interozeptiven Genauigkeit (IG) mangelt. Das Jumping Jack Paradigma (JJP) (Schaan et al., 2019) ist das erste explizite IG-Paradigma für Vorschulkinder, das eine Veränderung des Herzschlages durch eine körperliche Übung in die Erfassung integriert. Aufgrund methodischer Herausforderungen wurde das JJP modifiziert und an einer Stichprobe von 40 Kindern (22 Jungen, 4–6 Jahre) erprobt. Die Wahrnehmung des Herzschlags wurde zu sechs Zeitpunkten (3 Ratings in Ruhephasen und 3 nach Hampelmannsprüngen mit aufsteigender Sprungdauer je 15, 20 und 25s) auf einer 5-stufigen Ratingskala erfasst. Die Berechnung des IG-Wertes erfolgte durch Korrelationen zwischen der selbstberichteten und der objektiv-aufgezeichneten Herzrate. Die objektiv-gemessene Herzrate erhöhte sich in Abhängigkeit der Sprungdauer (F(2;78)=9.19, p<.001; pη²=0.19), während die selbstberichtete Herzrate nach dem zweiten Durchgang am höchsten eingeschätzt wurde (F(2;78)=9.37, p<.001; pη²=.19). Vorschulkinder variierten in ihrer IG (M=0.07, SD=0.37, Range:-0.74–0.88). Es zeigten sich keine signifikanten Unterschiede zwischen Mädchen und Jungen hinsichtlich der IG. Ältere Jungen zeigten eine höhere IG, verglichen mit jüngeren Jungen (χ²(2)=5.61, p=.05), während bei Mädchen kein Alterseffekt auftrat. Anhand des modifizierten JJP konnte gezeigt werden, dass einige Kinder bereits im Vorschulalter in der Lage sind, Veränderungen körpereigener Empfindungen wahrzunehmen. Die Induktion körperlichen Arousals scheint die Wahrnehmung des Herzschlages mit zunehmendem Alter vor allem bei Jungen zu erleichtern, da ältere Jungen sensitiver waren. Die Ergebnisse lassen vermuten, dass es im Vorschulalter Geschlechtsunterschiede bei der Körperwahrnehmung geben könnte. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailTraining binary classifiers as data structure invariants
Molina, Facundo; Degiovanni, Renzo Gaston UL; Ponzio, Pablo et al

in Proceedings of the 41st International Conference on Software Engineering ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019)

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and ... [more ▼]

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and training it to identify valid and invalid instances of a data structure. The obtained classifier can then be used in place of the data structure’s invariant, in order to attempt to identify (in)correct behaviors in programs manipulating the structure. In order to produce the valid objects to train the network, an assumed-correct set of object building routines is randomly executed. Invalid instances are produced by generating values for object fields that “break” the collected valid values, i.e., that assign values to object fields that have not been observed as feasible in the assumed-correct program executions that led to the collected valid instances. We experimentally assess this approach, over a benchmark of data structures. We show that this learning technique produces classifiers that achieve significantly better accuracy in classifying valid/invalid objects compared to a technique for dynamic invariant detection, and leads to improved bug finding. [less ▲]

Detailed reference viewed: 67 (3 UL)
Full Text
Peer Reviewed
See detailDemonstrator of Precoding Technique for a Multi-Beams Satellite System
Maturo, Nicola UL; Merlano Duncan, Juan Carlos UL; Krivochiza, Jevgenij UL et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 49 (10 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in Landesstelle für Gleichbehandlung - gegen Diskriminierung, Fachbereich LSBTI (Ed.) 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (2019)

Detailed reference viewed: 132 (23 UL)
Full Text
Peer Reviewed
See detailAsphalion: Trustworthy Shielding Against Byzantine Faults
Vukotic, Ivana UL; Rahli, Vincent UL; Verissimo, Paulo UL

in Vukotic, Ivana; Rahli, Vincent; Verissimo, Paulo (Eds.) Asphalion: Trustworthy Shielding Against Byzantine Faults (2019)

Detailed reference viewed: 99 (28 UL)
Full Text
Peer Reviewed
See detailSearch-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems
Cordy, Maxime UL; Muller, Steve; Papadakis, Mike UL et al

in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)

Detailed reference viewed: 108 (4 UL)
Full Text
Peer Reviewed
See detailEvaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models
Nejati, Shiva UL; gaaloul, Khouloud; Menghi, Claudio UL et al

in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS ... [more ▼]

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness of models against some given formal properties. In this paper, we present an industrial Simulink model benchmark, provide a categorization of different model types in the benchmark, describe the recurring logical patterns in the model requirements, and discuss the results of applying model checking and model testing approaches to identify requirements violations in the benchmarked models. Based on the results, we discuss the strengths and weaknesses of model testing and model checking. Our results further suggest that model checking and model testing are complementary and by combining them, we can significantly enhance the capabilities of each of these approaches individually. We conclude by providing guidelines as to how the two approaches can be best applied together. [less ▲]

Detailed reference viewed: 126 (33 UL)
Full Text
Peer Reviewed
See detailLightning Network: A Comparative Review of Transaction Fees and Data Analysis
Khan, Nida UL; State, Radu UL

in Springer Blockchain and Applications (2019)

Blockchain is a revolutionary, immutable database disrupting the finance industry with a potential to provide payments in a secure environment, unhindered by intermediaries. However, scalability and ... [more ▼]

Blockchain is a revolutionary, immutable database disrupting the finance industry with a potential to provide payments in a secure environment, unhindered by intermediaries. However, scalability and throughput issues plague the technology and prevent it's mass scale adoption. The paper focusses on Lightning Network, the off-chain, scalable and high throughput payment solution from Bitcoin. A comparison is conducted to highlight the fee incurred for payment transactions through Lightning Network, Raiden, Stellar, Bitcoin and conventional payment systems to assess its viability as a blockchain-based payment sys-tem. The paper also provides an analysis of the data of Lightning Network, to give a global overview of its usage and reachability. [less ▲]

Detailed reference viewed: 242 (35 UL)
Full Text
Peer Reviewed
See detailSlicing based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks
Korrai, Praveenkumar UL; Lagunas, Eva UL; Sharma, Shree Krishna UL et al

in Slicing based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks (2019)

Detailed reference viewed: 120 (21 UL)
Full Text
Peer Reviewed
See detailOn Domination and Control in Strategic Ability
Kurpiewski, Damian; Knapik, Micha L; Jamroga, Wojciech UL

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailCache-Aided Massive MIMO: Linear Precoding Design and Performance Analysis
Wei, Xiao; Xiang, Lin UL; Cottatellucci, Laura et al

in Proc. IEEE ICC 2019 (2019)

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular ... [more ▼]

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular communications. In addition to reaping the conventional advantages of caching and massive MIMO, the proposed scheme also exploits the side information provided by cached files for interference cancellation at the receivers. This interference cancellation increases the degrees of freedom available for precoding design. In addition, the power freed by the cache-enabled offloading can benefit the transmissions to the users requesting non-cached files. The resulting performance gains are not possible if caching and massive MIMO are designed separately. We analyze the performance of cache-aided massive MIMO for cache-dependent maximum-ratio transmission (MRT), zero-forcing (ZF) precoding, and regularized zero-forcing (RZF) precoding. Lower bounds on the ergodic achievable rates are derived in closed form for MRT and ZF precoding. The ergodic achievable rate of RZF precoding is obtained for the case when the numbers of transmit antennas and users are large but their ratio is fixed. Compared to conventional massive MIMO, the proposed cache-aided massive MIMO scheme achieves a significantly higher ergodic rate especially when the number of users approaches the number of transmit antennas. [less ▲]

Detailed reference viewed: 59 (3 UL)
Full Text
Peer Reviewed
See detailA Machine Learning-Based Approach for Demarcating Requirements in Textual Specifications
Abualhaija, Sallam UL; Arora, Chetan UL; Sabetzadeh, Mehrdad UL et al

in 27th IEEE International Requirements Engineering Conference (RE'19) (2019)

A simple but important task during the analysis of a textual requirements specification is to determine which statements in the specification represent requirements. In principle, by following suitable ... [more ▼]

A simple but important task during the analysis of a textual requirements specification is to determine which statements in the specification represent requirements. In principle, by following suitable writing and markup conventions, one can provide an immediate and unequivocal demarcation of requirements at the time a specification is being developed. However, neither the presence nor a fully accurate enforcement of such conventions is guaranteed. The result is that, in many practical situations, analysts end up resorting to after-the-fact reviews for sifting requirements from other material in a requirements specification. This is both tedious and time-consuming. We propose an automated approach for demarcating requirements in free-form requirements specifications. The approach, which is based on machine learning, can be applied to a wide variety of specifications in different domains and with different writing styles. We train and evaluate our approach over an independently labeled dataset comprised of 30 industrial requirements specifications. Over this dataset, our approach yields an average precision of 81.2% and an average recall of 95.7%. Compared to simple baselines that demarcate requirements based on the presence of modal verbs and identifiers, our approach leads to an average gain of 16.4% in precision and 25.5% in recall. [less ▲]

Detailed reference viewed: 510 (48 UL)
Full Text
Peer Reviewed
See detailDéveloppement d'une échelle de mesure de l'engagement scolaire des élèves en classe
Milmeister, Paul UL; Kerger, Sylvie UL; Poncelet, Débora UL et al

in Actes du 31e colloque de l’ADMEE Europe (2019)

Detailed reference viewed: 68 (0 UL)
Full Text
Peer Reviewed
See detailA Memory-Based Label Propagation Algorithm for Community Detection
Fiscarelli, Antonio Maria UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Complex Networks and Their Applications VII (2019)

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dissimilarity between them. Several methods have been proposed but many of ... [more ▼]

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dissimilarity between them. Several methods have been proposed but many of them are not suitable for large-scale networks because they have high complexity and use global knowledge. The Label Propagation Algorithm (LPA) assigns a unique label to every node and propagates the labels locally, while applying the majority rule to reach a consensus. Nodes which share the same label are then grouped into communities. Although LPA excels with near linear execution time, it gets easily stuck in local optima and often returns a single giant community. To overcome these problems we propose MemLPA, a novel LPA where each node implements memory and the decision rule takes past states of the network into account. We demonstrate through extensive experiments on the Lancichinetti-Fortunato-Radicchi benchmark and a set of real-world networks that MemLPA outperforms most of state-of-the-art community detection algorithms. [less ▲]

Detailed reference viewed: 119 (15 UL)
Full Text
Peer Reviewed
See detailProactive Middleware for Fault Detection and Advanced Conflict Handling in Sensor Fusion
Neyens, Gilles UL; Zampunieris, Denis UL

in Proceedings of the 18th International Conference, ICAISC 2019 Zakopane, Poland, June 16–20, 2019, Part I & II (2019)

Robots traditionally have a wide array of sensors that allow them to react to the environment and make appropriate decisions. These sensors can give incorrect or imprecise data due to malfunctioning or ... [more ▼]

Robots traditionally have a wide array of sensors that allow them to react to the environment and make appropriate decisions. These sensors can give incorrect or imprecise data due to malfunctioning or noise. Sensor fusion methods try to overcome some of these issues by using the data coming from different sensors and combining it. However, they often don’t take sensor malfunctioning and a priori knowledge about the sensors and the environment into account, which can produce conflicting information for the robot to work with. In this paper, we present an architecture and process in order to overcome some of these limitations based on a proactive rule-based system. [less ▲]

Detailed reference viewed: 105 (11 UL)
Full Text
Peer Reviewed
See detailA proof of concept to deceive humans and machines at image classification with evolutionary algorithms
Chitic, Raluca Ioana UL; Bernard, Nicolas; Leprévost, Franck UL

in Chitic, Iona Raluca; Bernard, Nicolas; Leprévost, Franck (Eds.) Proceedings of ACIIDS 2020 (2019)

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailCHARIOT – Towards a Continuous High-level Adaptive Runtime Integration Testbed
Barnes, Chloe M.; Bellman, Kirstie; Botev, Jean UL et al

in Proceedings of the 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (2019)

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailLegal Design Patterns: Towards A New Language for Legal Information Design
Rossi, Arianna UL; Ducato, Rossana; Haapio, Helena et al

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) 22nd International Legal Infomatics Symposium IRIS 2019 (2019)

Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to ... [more ▼]

Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to users and easier to prepare. In this paper, we take stock of existing legal design patterns and pattern libraries and present the idea of a legal design pattern language intended to lead to documenting and sharing good practices across disciplines and to more actionable pattern libraries. [less ▲]

Detailed reference viewed: 68 (6 UL)
Full Text
Peer Reviewed
See detailPersonalized Sentiment Analysis and a Framework with Attention-Based Hawkes Process Model
Guo, Siwen UL; Höhn, Sviatlana UL; Xu, Feiyu et al

in Agents and Artificial Intelligence (2019)

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality ... [more ▼]

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the data sparsity issue, thus it is difficult to develop. In this article, we take texts from social platforms and propose a preliminary model for evaluating the effectiveness of including user information from the past, and offer a solution for the data sparsity. Furthermore, we present a finer-designed, enhanced model that focuses on frequent users and offers to capture the decay of past opinions using various gaps between the creation time of the text. An attention-based Hawkes process on top of a recurrent neural network is applied for this purpose, and the performance of the model is evaluated with Twitter data. With the proposed framework, positive results are shown which opens up new perspectives for future research. [less ▲]

Detailed reference viewed: 166 (39 UL)
Full Text
Peer Reviewed
See detailControlling large Boolean networks with temporary and permanent perturbations
Su, Cui; Paul, Soumya UL; Pang, Jun UL

in Proceedings of the 23rd International Symposium on Formal Methods (FM'19) (2019)

Detailed reference viewed: 51 (1 UL)
Full Text
Peer Reviewed
See detailPopularity-driven Ontology Ranking using Qualitative Features
Kolbe, Niklas UL; Kubler, Sylvain UL; Le Traon, Yves UL

in The Semantic Web - ISWC 2019 (2019)

Efficient ontology reuse is a key factor in the Semantic Web to enable and enhance the interoperability of computing systems. One important aspect of ontology reuse is concerned with ranking most relevant ... [more ▼]

Efficient ontology reuse is a key factor in the Semantic Web to enable and enhance the interoperability of computing systems. One important aspect of ontology reuse is concerned with ranking most relevant ontologies based on a keyword query. Apart from the semantic match of query and ontology, the state-of-the-art often relies on ontologies' occurrences in the Linked Open Data (LOD) cloud to determine relevance. We observe that ontologies of some application domains, in particular those related to Web of Things (WoT), often do not appear in the underlying LOD datasets used to define ontologies' popularity, resulting in ineffective ranking scores. This motivated us to investigate - based on the problematic WoT case - whether the scope of ranking models can be extended by relying on qualitative attributes instead of an explicit popularity feature. We propose a novel approach to ontology ranking by (i) selecting a range of relevant qualitative features, (ii) proposing a popularity measure for ontologies based on scholarly data, (iii) training a ranking model that uses ontologies' popularity as prediction target for the relevance degree, and (iv) confirming its validity by testing it on independent datasets derived from the state-of-the-art. We find that qualitative features help to improve the prediction of the relevance degree in terms of popularity. We further discuss the influence of these features on the ranking model. [less ▲]

Detailed reference viewed: 76 (1 UL)
Full Text
Peer Reviewed
See detail¿Hacia una Verdadera Acción Popular para la Protección del Medioambiente? Una Reflexión a la Luz de la Jurisprudencia Española y Europea
Muñoz, Susana UL

in Murillo, F. Javier; Mesa, Manuela (Eds.) Actas del I Congreso Internacional Derechos Humanos, Democracia, Cultura de Paz y No Violencia (2019)

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European ... [more ▼]

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European human rights law provide interpretative keys in favour of a true actio popularis open to citizens in defence of their individual rights and, ultimately, of environmental justice. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailDetecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system
Stojkovski, Borce UL; Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security ... [more ▼]

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security analysis allows for a new class of security properties in terms of misalignments between the system’s technical guarantees and the user’s impressions of them. For instance, a property that we call “false sense of insecurity” identifies a situation in which a secure system injects uncertainty in users, thus improperly transmitting the degree of protection that it actually provides; another, which we call “false sense of security”, captures situations in which a system instills a false sense of security beyond what a technical analysis would justify. Both situations leave room for attacks. In this paper we propose a model to define and reason about such socio-technical misalignments. The model refers to and builds on the concept of security ceremonies, but relies on user experience notions and on security analysis techniques to put together the information needed to verify misalignment properties about user’s impressions and system’s security guarantees. We discuss the innovative insight of this pilot model for a holistic understanding of a system’s security. We also propose a formal model that can be used with existing model checkers for an automatic analysis of misalignments. We exemplify the approach by modelling one specific application for end-to-end email encryption within which we analyze a few instances of misalignment properties. [less ▲]

Detailed reference viewed: 173 (43 UL)
Full Text
Peer Reviewed
See detailA Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in Emerging Technologies for Authorization and Authentication (2019)

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome ... [more ▼]

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome for the average user. To make more accessible the use of encrypted email, a secure email application named pEp automates the key management operations; pEp still requires the users to carry out the verification, however, the authentication process is simple: users have to compare familiar words instead of strings of random characters, then the application shows the users what level of trust they have achieved via colored visual indicators. Yet, users may not execute the authentication ceremony as intended, pEp's trust rating may be wrongly assigned, or both. To learn whether pEp's trust ratings (and the corresponding visual indicators) are assigned consistently, we present a formal security analysis of pEp's authentication ceremony. From the software implementation in C, we derive the specifications of an abstract protocol for public key distribution, encryption and trust establishment; then, we model the protocol in a variant of the applied pi calculus and later formally verify and validate specific privacy and authentication properties. We also discuss alternative research directions that could enrich the analysis. [less ▲]

Detailed reference viewed: 84 (13 UL)
Full Text
Peer Reviewed
See detailAttack-Tree Series: A Case for Dynamic Attack Tree Analysis
Mauw, Sjouke UL; Gadyatskaya, Olga

in Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19) (2019)

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailSimulation-based Optimisation Of Selective Laser Sintering/Melting Process
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

in Euro PM2019 Congress Proceedings (2019)

In order to adapt Selective Laser Sintering (SLS) and Melting (SLM) to final products and volume production, many scientists have turned to statistical analysis for quality and process stability. Most of ... [more ▼]

In order to adapt Selective Laser Sintering (SLS) and Melting (SLM) to final products and volume production, many scientists have turned to statistical analysis for quality and process stability. Most of which are based on extensive experiments aiming at finding statistical correlations between input parameters such as layer thickness, orientation, scan speed, powder bed temperature, laser power... and resulting strength and residual stress of the manufactured part. However, the rise of computer simulation based on mathematical models allows predictions at a much lower cost. Mathematical modelling of SLS/SLM involves molecular level thermodynamics and thermo-mechanical behaviour of the powder material. In this study, we employ the newly developed Extended Discrete Element Model to reproduce the SLS process including the mechanisms of sintering and the evolution of fracture properties and self-supporting ability. Results show that such microscale model offers high precision and flexibility for finding optimal process parameters. [less ▲]

Detailed reference viewed: 40 (8 UL)
See detailDiscrete-Phase Sequence Design for Coexistence of MIMO Radar and MIMO Communications
Alaee-Kerahroodi, Mohammad UL; Mishra, Kumar Vijay; Shankar, M. R. Bhavani et al

in 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2019)

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailUsing crowd-sourced data to analyse the ongoing merger of [ɕ] and [ʃ] in Luxembourgish
Gilles, Peter UL

in Calhoun, Sasha; Escudero, Paola; Tabain, Marija (Eds.) et al Proceedings of the 19th International Congress of Phonetic Sciences. Melbourne, Australia (2019)

Similar to neighbouring German varieties, the recent language history of Luxembourgish is subject to an ongoing merger of the alveolopalatal fricative [ɕ] (deriving from the palatal fricative [ç]) and the ... [more ▼]

Similar to neighbouring German varieties, the recent language history of Luxembourgish is subject to an ongoing merger of the alveolopalatal fricative [ɕ] (deriving from the palatal fricative [ç]) and the postalveolar fricative [ʃ], leading progressively to the collapse, for example, of the minimal pair frech [fʀæɕ] 'cheeky, impertinent' and Fräsch [fʀæʃ] 'frog'. The present study will draw on a large dataset— which has been recorded using an innovative smartphone application—consisting of fricative realisations of more than 1,300 speakers. In an acoustic analysis, various parameters of the two fricatives will be studied (Centre of Gravity, spectral moments, Euclidian distance, DCT coefficients) and correlated with the speaker’s age. The results show that the merger is acoustically manifest for nearly all age groups. Only the oldest speakers keep the two fricatives distinct. [less ▲]

Detailed reference viewed: 84 (5 UL)
Full Text
Peer Reviewed
See detailAutomated Reasoning with Complex Ethical Theories--A Case Study Towards Responsible AI
Fuenmayor, David; Benzmüller, Christoph UL

in 16th International Congress on Logic, Methodology and Philosophy of Science and Technology (CLMPST 2019) --- Bridging across Academic Cultures, Book of Abstracts (2019)

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailAssessing Transition-based Test Selection Algorithms at Google
Leong, Claire; Abhayendra, Singh; Papadakis, Mike UL et al

in International Conference on Software Engineering (ICSE) (2019)

Detailed reference viewed: 84 (4 UL)
Full Text
Peer Reviewed
See detailProactive Legal Design: Embedding Values in the Design of Legal Artefacts
Rossi, Arianna UL; Haapio, Helena

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) International Legal Infomatics Symposium IRIS 2019 (2019)

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an ... [more ▼]

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an interdisciplinary and proactive approach to law, covering not only legal information and documents, but also legal services, processes, and systems. This paper introduces Legal Design in the context of forward-looking Legal Tech, especially through the lenses of data protection, and analyses the analogies among Value-Sensitive Design, Proactive Law, and Privacy by Design. [less ▲]

Detailed reference viewed: 53 (3 UL)
Full Text
Peer Reviewed
See detailDeformation quantization and Kähler geometry with moment maps
Futaki, Akito; La Fuente-Gravy, Laurent UL

in ICCM 2018 Proceedings, Taiwan 27-29 December 2018 (2019)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailDecision Support for Security-Control Identification Using Machine Learning
Bettaieb, Seifeddine UL; Shin, Seung Yeob UL; Sabetzadeh, Mehrdad UL et al

in International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019 (2019)

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is ... [more ▼]

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. [Problem] An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Principal ideas/results] In this paper, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of ≈ 95% and average precision of ≈ 67%. [Contribution] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. [less ▲]

Detailed reference viewed: 243 (52 UL)
Full Text
Peer Reviewed
See detailNature et modernité : réflexions théoriques suivies d’une lecture écologique de Fenn Kaß
Thiltges, Sébastian UL

in Millim, Anne-Marie; Toffoli, Ian (Eds.) Modernismen in Luxemburg: Traditionen - Variationen - Brüche (2019)

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new ... [more ▼]

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new subjects, like industry and urbanism, as an alternative to homeland literature’s depiction of earth and soil. Batty Weber depicts in Fenn Kaß (1913) the life of a defrocked priest who leaves his native countryside to become an engineer abroad. Seemingly a novel about modernity, the book also contains several descriptions of the protagonist’s relation to the natural environment, using repeatedly the metaphor of a liquid and dissolving body. By defining both interrelated concepts of nature and modernity, this paper provides an anthropological reading of texts, questioning how salient poetical motives can challenge sociological and epistemological contextualisation. [less ▲]

Detailed reference viewed: 48 (3 UL)
Full Text
Peer Reviewed
See detailA Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate
Schmitt, Xavier; Kubler, Sylvain; Robert, Jérémy UL et al

in International Conference on Social Networks Analysis, Management and Security (2019)

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailSatellite Links Integrated in 5G SDN-enabled Backhaul Networks: An Iterative Joint Power and Flow Assignment
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in European Signal Processing Conference (EUSIPCO), A Coruna, Spain, Sept. 2019 (2019)

Detailed reference viewed: 83 (10 UL)
Full Text
Peer Reviewed
See detailKlostervogtei zwischen monastischem Diskurs und bilateraler Aushandlung am Beispiel des zentralen lotharingischen Raums (10. – Anfang 12. Jahrhundert)
Margue, Michel UL

in Adermann, Kurt; Bünz, Enno (Eds.) Kirchenvogtei und adlige Herrschaftsbildung im europäischen Mittelalter (2019)

Within the Lotharingian space, the role played by advocacy in the shaping of princely territories from the tenth to the eleventh century has been viewed as fundamental by ancient studies sharing a ... [more ▼]

Within the Lotharingian space, the role played by advocacy in the shaping of princely territories from the tenth to the eleventh century has been viewed as fundamental by ancient studies sharing a juridical and institutional perspective. However, a recent reassessment of relationships between nobility and monasteries, makes necessary a re-evaluation of the links between advocates and monasteries. Our rereading is carried out in three steps: a critical view on the historiography of advocacy, a deconstruction of the monastic discourse on advocates and a fresh look at the links between comital advocates and abbey and on advocacy as a space of bilateral negotiation. The dominant discourse on the advocacy’s evolution has led to the development of an image from an institutional perspective, starting with its Carolingian origins and the « advocates-agents » of the central power (« Beamtenvogtei »), then moving to the ducal and comital advocates during the eleventh and twelfth centuries (« Edelvogtei » or « Herrenvogtei »), leading to the progressive abandonment of advocacy in the course of the last three centuries of the Middle Ages. To oversimplify, advocacy is pictured as an institution (« Rechtsinstitut ») with well-defined normative and juridical characteristics. However, its socio-cultural aspects, viewed in the larger context of relationships between nobility and regular clergy, remain neglected. As a result, advocacy is frequently perceived negatively as a source of conflicts with monasteries. It was in the course of the second half of the eleventh century that was born the image of a society polarised between a reformed monastic environment attempting at freeing itself from the laity and « usurping » counts-advocates « oppressors » of monks and rural communities. It then developed before entering modern and contemporary historiography. One needs to relativize and nuance such views, on the one hand by deconstructing the monastic discourse, by disclosing its strategies, and, on the other, by taking a wider look at other socio-cultural links between advocates and monasteries for which they ensure protectio. Indeed, the polarizing discourse carried by monastic sources hide many instances of positive representation of ducal and comital advocates, particularly between the middle of the tenth century and the middle of the twelfth, pertaining to the « high » advocacy exerted by dukes and counts. It is only with the development of the « inferior » advocacy (“Untervogtei”), which occurred in the beginning of the twelfth century, that advocacy started to be portrayed as a plague to be fought. One must therefore view the usage of that negative image of the advocate in terms of a strategy adopted by monasteries, aiming at permanently renegotiate rights between the two parts in the management of monastic patrimony. The analysis of links between the advocates and their monasteries necessitates taking into account elements that are at the same time complex and of various orders: social features such as the seigniorial world’s social and political hierarchy, economical factors such as the evolution of monastic lordship, religious factors such as memoria shared between monks and prominent laypeople. By taking into account other actors such as central power, ministerials and representatives of rural communities, the so-called gradual regulations of the advocates’ rights appear more like parts of exchange processes, of (re)negotiations or strengthening of common interests, shared between the lay and the monastic worlds. [less ▲]

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailPower and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019 (2019)

Detailed reference viewed: 121 (24 UL)
Full Text
Peer Reviewed
See detailStrategic Responsibility Under Imperfect Information
Yazdanpanah, Vahid; Dastani, Mehdi; Alechina, Natasha et al

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailTaking Defeasible Entailment beyond Rational Closure
Casini, Giovanni UL; Meyer, Thomas; Varzinczak, Ivan

in Proceedings of the 16th European Conference on Logics in Artificial Intelligence (JELIA-19) (2019)

We present a systematic approach for extending the KLM framework for defeasible entailment. We first present a class of basic defeasible entailment relations, characterise it in three distinct ways and ... [more ▼]

We present a systematic approach for extending the KLM framework for defeasible entailment. We first present a class of basic defeasible entailment relations, characterise it in three distinct ways and provide a high-level algorithm for computing it. This framework is then refined, with the refined version being characterised in a similar manner. We show that the two well-known forms of defeasible entailment, rational closure and lexicographic closure, fall within our refined framework, that rational closure is the most conservative of the defeasible entailment relations within the framework (with respect to subset inclusion), but that there are forms of defeasible entailment within our framework that are more “adventurous” than lexicographic closure. [less ▲]

Detailed reference viewed: 69 (6 UL)
Full Text
Peer Reviewed
See detailArbitrary Ranking of Defeasible Subsumption
Casini, Giovanni UL; Harrison, Michael; Meyer, Thomas et al

in Proceedings of the 32nd International Workshop on Description Logics (2019)

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to ... [more ▼]

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to defeasible reasoning, the so-called KLM approach, is based on constructing specific rankings of defeasible information, and using these rankings to determine priorities in case of conflicting information. Here we propose a procedure that allows us to input any possible ranking of the defeasible concept inclusions contained in the knowledge base. We analyse and investigate the forms of defeasible reasoning obtained when conclusions drawn are obtained using these rankings. [less ▲]

Detailed reference viewed: 44 (3 UL)
Full Text
Peer Reviewed
See detailTransmission of Collective Memory nad Jewish Identity in Postwar Jewish Generations through War Souvenirs
Bronec, Jakub UL

in International 26th annual CIDOC - ICOM Conference in 2018 (2019)

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian ... [more ▼]

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian Jews were living through the era of de-Stalinisation, and their narratives offer new insights into this segment of Jewish postwar history that differ from those of Jews living in liberal democratic European states. Based on personal documents, photos, letters and souvenirs, the conducted interviews highlight an interesting way of maintaining personal memories in Jewish families and how this varies from one generation to the next. In my contribution, I am planning to illustrate the importance of these small artefacts for the transmission of Jewish collective memory. My presentation showcases people widely referred to as the “second and third Jewish generation”, their attitude to current notions of Jewish memory and self-perception and their role in society. Some had to live under totalitarian oppression, others had to face a wave of Jewish Sephardic immigrants coming from overseas – and witnesses admit that the arrival of these newcomers often caused difficulties in Jewish communities. Small objects from the war, often displayed in their households, serve as a reminder of their roots and destiny, which should not be forgotten. This paper is a part of my broader research project examining distinctions and similarities in identity formation through generations of Czech, Slovak, French and Luxembourgish Jews, who grew up either under communism or in liberal Western Europe. The aim is to create an international virtual library and cloud storage, not only for professional educators but also for the public. [less ▲]

Detailed reference viewed: 56 (7 UL)
Full Text
Peer Reviewed
See detailA graph-based approach to explore relationship between hashtags and images
Zhong, Zhiqiang UL; Zhang, Yang; Pang, Jun UL

in Proceedings of the 20th International Conference on Web Information System Engineering (2019)

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailSequential reprogramming of Boolean networks made practical
Mandon, Hugues; Su, Cui; Haar, Stefan et al

in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Search for Configurations of Deep Neural Network Architectures
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in Automated Search for Configurations of Convolutional Neural Network Architectures (2019)

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as ... [more ▼]

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the variability of DNN architectures with a Feature Model (FM) that generalizes over existing architectures. Each valid configuration of the FM corresponds to a valid DNN model that can be built and trained. Second, we implement, on top of Tensorflow, an automated procedure to deploy, train and evaluate the performance of a configured model. Third, we propose a method to search for configurations and demonstrate that it leads to good DNN models. We evaluate our method by applying it on image classification tasks (MNIST, CIFAR-10) and show that, with limited amount of computation and training, our method can identify high-performing architectures (with high accuracy). We also demonstrate that we outperform existing state-of-the-art architectures handcrafted by ML researchers. Our FM and framework have been released to support replication and future research. [less ▲]

Detailed reference viewed: 144 (26 UL)
Full Text
Peer Reviewed
See detailSome Things are Easier for the Dumb and the Bright Ones (Beware the Average!)
Jamroga, Wojciech UL; Knapik, Michal

in Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (2019)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailPhase field modeling of interfacial crack propagation in quasi-brittle heterogeneous materials
Nguyen, Thanh Tung UL; Yvonnet, Julien; Waldmann, Danièle UL et al

in International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2019)

Detailed reference viewed: 51 (12 UL)
Full Text
Peer Reviewed
See detailResources and Competences required at the Institutional Level for a Patient – Healthcare Professional Partnership
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has ... [more ▼]

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has given rise to patients who are active players in their care, and participate in decision-making. Central to these changes, are patients and healthcare professionals’, whose backgrounds and experiences reflect both cultural factors that influence health decisions, and a power shift from professional dominance to a more equitable partnership style. Our study aims to determine resources and competences required at the institutional level to implementing a partnership Semi-structured focus groups with 20 chronic disease patients and interviews with 15 healthcare professionals were conducted. Thematic content analysis was performed with NVivo 12 to categorize verbatim. Items were grouped into dimensions, and themes common to both parties were grouped together. Three major areas emerged: 1) Training to develop a partnership culture - Training healthcare professionals in patient psychology, developing therapeutic education programs for patients and enriching available information with patients’ experiential knowledge. 2) Creation of information / support centers for: Interdisciplinary meetings, facilitating the provision of structured, verified and pertinent information and providing administrative aid to patients. 3) Development of e-health solutions to: Provide information 24/7; facilitate collaborative content creation by healthcare professionals, patients and researchers, and for sharing and updating patient files among professionals. Our findings will help design, implement, monitor and evaluate suitable actions, and help promote sustainable forms of expertise – inclusion of experiential knowledge and resource patients within the healthcare team [less ▲]

Detailed reference viewed: 69 (3 UL)
See detailSelf-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models
Samir, Areeg UL; Pahl, C.

in The Fourth IEEE International Conference on Fog and Mobile Edge Computing (2019)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailNAI: The Normative Reasoner
Libal, Tomer UL; Steen, Alexander UL

in Bex, Floris (Ed.) Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law (2019)

Detailed reference viewed: 29 (5 UL)
See detailFree Transit in Luxembourg: A case of post-political urban governance through policy mobility
Hesse, Markus UL; Carr, Constance UL

in Witlox, Frank (Ed.) Moving Towards More Sustainable Mobility and Transport through Smart Systems - Proceedings of the BIVEC-GIBET Transport Research Days 2019 (2019)

Detailed reference viewed: 77 (1 UL)