References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailHarnessing Higher-Order (Meta-)Logic to Represent and Reason with Complex Ethical Theories
Fuenmayor, David; Benzmüller, Christoph UL

in Nayak, A.; Sharma, A. (Eds.) PRICAI 2019: Trends in Artificial Intelligence (2019, August 23)

Detailed reference viewed: 95 (0 UL)
Full Text
Peer Reviewed
See detailEngineering Tunable Strain Fields in Suspended Graphene by Microelectromechanical Systems
Sonntag, Jens; Goldsche, Matthias; Khodkov, Tymofiy et al

in 2019 20th International Conference on Solid-State Sensors, Actuators and Microsystems Eurosensors XXXIII (TRANSDUCERS & EUROSENSORS XXXIII) (2019, August 22)

Detailed reference viewed: 51 (8 UL)
Full Text
Peer Reviewed
See detailFaster Visual-Based Localization with Mobile-PoseNet
Cimarelli, Claudio UL; Cazzato, Dario UL; Olivares Mendez, Miguel Angel UL et al

in International Conference on Computer Analysis of Images and Patterns (2019, August 22)

Precise and robust localization is of fundamental importance for robots required to carry out autonomous tasks. Above all, in the case of Unmanned Aerial Vehicles (UAVs), efficiency and reliability are ... [more ▼]

Precise and robust localization is of fundamental importance for robots required to carry out autonomous tasks. Above all, in the case of Unmanned Aerial Vehicles (UAVs), efficiency and reliability are critical aspects in developing solutions for localization due to the limited computational capabilities, payload and power constraints. In this work, we leverage novel research in efficient deep neural architectures for the problem of 6 Degrees of Freedom (6-DoF) pose estimation from single RGB camera images. In particular, we introduce an efficient neural network to jointly regress the position and orientation of the camera with respect to the navigation environment. Experimental results show that the proposed network is capable of retaining similar results with respect to the most popular state of the art methods while being smaller and with lower latency, which are fundamental aspects for real-time robotics applications. [less ▲]

Detailed reference viewed: 83 (4 UL)
Full Text
Peer Reviewed
See detailA new model selection criterion for finite mixture models
Schiltz, Jang UL

in Proceedings of the 62nd ISI World Statistics Congress (2019, August 20)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailDatabase Processing-in-Memory: A Vision
Kepe, Tiago rodrigo; Almeida, Eduardo Cunha; Alves, Marcos A.Z. et al

in Database Processing-in-Memory: A Vision (2019, August 03)

Detailed reference viewed: 88 (2 UL)
Full Text
Peer Reviewed
See detailKeynote lecture: Potential of the Deformation Area Difference (DAD)-Method for Condition Assessment of Bridge Structures
Waldmann, Danièle UL; Erdenebat, Dolgion

in Proceedings of SMAR 2019 - Fifth Conference on Smart Monitoring, Assessment and Rehabilitation of Civil Structures (2019, August)

Detailed reference viewed: 32 (6 UL)
Full Text
See detailChapter 18: Luxembourg
Sinnig, Julia UL

in Maisto, Guglielmo (Ed.) New Trends in the Definition of Permanent Establishment (2019, August)

Detailed reference viewed: 84 (9 UL)
Full Text
Peer Reviewed
See detailiFixR: bug report driven program repair
Koyuncu, Anil UL; Liu, Kui UL; Bissyande, Tegawendé François D Assise UL et al

in ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019, August)

Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization ... [more ▼]

Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization of patch generation for user-reported bugs. Although this ambition is aligned with the momentum of automated program repair, the literature has, so far, mostly focused on generate-and- validate setups where fault localization and patch generation are driven by a well-defined test suite. On the one hand, however, the common (yet strong) assumption on the existence of relevant test cases does not hold in practice for most development settings: many bugs are reported without the available test suite being able to reveal them. On the other hand, for many projects, the number of bug reports generally outstrips the resources available to triage them. Towards increasing the adoption of patch generation tools by practitioners, we investigate a new repair pipeline, iFixR, driven by bug reports: (1) bug reports are fed to an IR-based fault localizer; (2) patches are generated from fix patterns and validated via regression testing; (3) a prioritized list of generated patches is proposed to developers. We evaluate iFixR on the Defects4J dataset, which we enriched (i.e., faults are linked to bug reports) and carefully-reorganized (i.e., the timeline of test-cases is naturally split). iFixR generates genuine/plausible patches for 21/44 Defects4J faults with its IR-based fault localizer. iFixR accurately places a genuine/plausible patch among its top-5 recommendation for 8/13 of these faults (without using future test cases in generation-and-validation). [less ▲]

Detailed reference viewed: 96 (16 UL)
Full Text
Peer Reviewed
See detailGenerating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors
Menghi, Claudio UL; Nejati, Shiva UL; Gaaloul, Khouloud UL et al

in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE ’19), (2019, August)

Test automation requires automated oracles to assess test outputs. For cyber physical systems (CPS), oracles, in addition to be automated, should ensure some key objectives: (i) they should check test ... [more ▼]

Test automation requires automated oracles to assess test outputs. For cyber physical systems (CPS), oracles, in addition to be automated, should ensure some key objectives: (i) they should check test outputs in an online manner to stop expensive test executions as soon as a failure is detected; (ii) they should handle time- and magnitude-continuous CPS behaviors; (iii) they should provide a quantitative degree of satisfaction or failure measure instead of binary pass/fail outputs; and (iv) they should be able to handle uncertainties due to CPS interactions with the environment. We propose an automated approach to translate CPS requirements specified in a logic-based language into test oracles specified in Simulink - a widely-used development and simulation language for CPS. Our approach achieves the objectives noted above through the identification of a fragment of Signal First Order logic (SFOL) to specify requirements, the definition of a quantitative semantics for this fragment and a sound translation of the fragment into Simulink. The results from applying our approach on 11 industrial case studies show that: (i) our requirements language can express all the 98 requirements of our case studies; (ii) the time and effort required by our approach are acceptable, showing potentials for the adoption of our work in practice, and (iii) for large models, our approach can dramatically reduce the test execution time compared to when test outputs are checked in an offline manner. [less ▲]

Detailed reference viewed: 195 (58 UL)
Full Text
Peer Reviewed
See detailOn idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in Torra, Vicenç; Narukawa, Yasuo; Pasi, Gabriella (Eds.) et al Modeling Decisions for Artifical Intelligence (2019, July 24)

In this paper we describe the class of idempotent n-ary uninorms on a given chain.When the chain is finite, we axiomatize the latter class by means of the following conditions: associativity ... [more ▼]

In this paper we describe the class of idempotent n-ary uninorms on a given chain.When the chain is finite, we axiomatize the latter class by means of the following conditions: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. Also, we show that associativity can be replaced with bisymmetry in this new axiomatization. [less ▲]

Detailed reference viewed: 90 (7 UL)
Full Text
Peer Reviewed
See detailAnalysis of Multi-path Onion Routing-based Anonymization Networks
de La Cadena Ramos, Augusto Wladimir UL; Kaiser, Daniel UL; Mitseva, Asya UL et al

in Data and Applications Security and Privacy XXXIII, 2019 (2019, July 15)

Detailed reference viewed: 177 (18 UL)
Full Text
Peer Reviewed
See detailImproving Ontology Verbalization using Semantic-level Refinement
Ellampallil Venugopal, Vinu UL; Kumar, P Sreenivasa

in Description Logics 2019: Oslo, Norway (2019, July 11)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailCrowdsensed Data Learning-Driven Prediction of Local Businesses Attractiveness in Smart Cities
Capponi, Andrea UL; Vitello, Piergiorgio UL; Fiandrino, Claudio UL et al

in IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 2019 (2019, July)

Urban planning typically relies on experience-based solutions and traditional methodologies to face urbanization issues and investigate the complex dynamics of cities. Recently, novel data-driven ... [more ▼]

Urban planning typically relies on experience-based solutions and traditional methodologies to face urbanization issues and investigate the complex dynamics of cities. Recently, novel data-driven approaches in urban computing have emerged for researchers and companies. They aim to address historical urbanization issues by exploiting sensing data gathered by mobile devices under the so-called mobile crowdsensing (MCS) paradigm. This work shows how to exploit sensing data to improve traditionally experience-based approaches for urban decisions. In particular, we apply widely known Machine Learning (ML) techniques to achieve highly accurate results in predicting categories of local businesses (LBs) (e.g., bars, restaurants), and their attractiveness in terms of classes of temporal demands (e.g., nightlife, business hours). The performance evaluation is conducted in Luxembourg city and the city of Munich with publicly available crowdsensed datasets. The results highlight that our approach does not only achieve high accuracy, but it also unveils important hidden features of the interaction of citizens and LBs. [less ▲]

Detailed reference viewed: 225 (20 UL)
Full Text
Peer Reviewed
See detailLearning-Based Resource Allocation: Efficient Content Delivery Enabled by Convolutional Neural Network
Lei, Lei UL; Yaxiong, Yuan UL; Vu, Thang Xuan UL et al

in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2019 (2019, July)

Detailed reference viewed: 69 (25 UL)
Full Text
Peer Reviewed
See detailA Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Information Systems Security and Privacy (2019, July)

Password-based authentication is a widespread method to access into systems, thus password files are a valuable resource often target of attacks. To detect when a password file has been stolen, Juels and ... [more ▼]

Password-based authentication is a widespread method to access into systems, thus password files are a valuable resource often target of attacks. To detect when a password file has been stolen, Juels and Rivest introduced the Honeywords System in 2013. The core idea is to store the password with a list of decoy words that are ``indistinguishable'' from the password, called honeywords. An adversary that obtains the password file and, by dictionary attack, retrieves the honeywords can only guess the password when attempting to log in: but any incorrect guess will set off an alarm, warning that file has been compromised. In a recent conference paper, we studied the security of the Honeywords System in a scenario where the intruder also manages to corrupt the server's code (with certain limiting assumptions); we proposed an authentication protocol and proved it secure despite the corruption. In this extended journal version, we detail the analysis and we extend it, under the same attacker model, to the other two protocols of the original Honeywords System, the setup and change of password. We formally verify the security of both of them; further, we discuss that our design suggests a completely new approach that diverges from the original idea of the Honeywords System but indicates an alternative way to authenticate users which is robust to server's code-corruption. [less ▲]

Detailed reference viewed: 157 (8 UL)
Full Text
Peer Reviewed
See detailJoint Power Allocation and Distributed Beamforming Design for Multi-Carrier Asynchronous Two-Way Relay Networks
KianiHarchehgani, Sharareh; Shahbazpanahi, Shahram UL; Dong, Min et al

in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2019, Cannes, July 2019 (2019, July)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailTBar: Revisiting Template-based Automated Program Repair
Liu, Kui UL; Koyuncu, Anil UL; Kim, Dongsun et al

in 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) (2019, July)

We revisit the performance of template-based APR to build com-prehensive knowledge about the effectiveness of fix patterns, andto highlight the importance of complementary steps such as faultlocalization ... [more ▼]

We revisit the performance of template-based APR to build com-prehensive knowledge about the effectiveness of fix patterns, andto highlight the importance of complementary steps such as faultlocalization or donor code retrieval. To that end, we first investi-gate the literature to collect, summarize and label recurrently-usedfix patterns. Based on the investigation, we buildTBar, a straight-forward APR tool that systematically attempts to apply these fixpatterns to program bugs. We thoroughly evaluateTBaron the De-fects4J benchmark. In particular, we assess the actual qualitative andquantitative diversity of fix patterns, as well as their effectivenessin yielding plausible or correct patches. Eventually, we find that,assuming a perfect fault localization,TBarcorrectly/plausibly fixes74/101 bugs. Replicating a standard and practical pipeline of APRassessment, we demonstrate thatTBarcorrectly fixes 43 bugs fromDefects4J, an unprecedented performance in the literature (includ-ing all approaches, i.e., template-based, stochastic mutation-basedor synthesis-based APR). [less ▲]

Detailed reference viewed: 110 (10 UL)
Full Text
Peer Reviewed
See detailPLASTIC DESIGN FOR COMPOSITE BEAMS - ARE THERE ANY LIMITS?
Schäfer, Markus UL; Zhang, Qingjie UL; Braun et al

in Proceedings of the 9th International Conference on Steel and Aluminium Structures ICSAS19 (2019, July)

Due to the demand for sustainable constructions, composite structures have become more important and lead to slim and economic solutions with a low structural self-weight. EN 1994-1-1 differentiate four ... [more ▼]

Due to the demand for sustainable constructions, composite structures have become more important and lead to slim and economic solutions with a low structural self-weight. EN 1994-1-1 differentiate four different cross-section classes for the determination of moment resistance. For the plastic design of the moment resistance it is assumed, that each cross-sectional fibre can plastify without any limitation of the strains. For standard composite beams in case of sagging moments and a high-lying plastic neutral axis, plastic design and strain-limited design give similar results. In the case of sections with a large compression zone height xpl and limited rotation capacity, a concrete failure in the compression zone can occur before the plastic moment resistance Mpl,Rd, is reached. The strain limit design becomes decisive. This paper points out the impact of the concrete part on the design of composite beams. A parametric study comparing plastic and strain limited moment resistance of a considerable variety of cross-sections has been carried out to develop the beam design methods considering high compression zone height of next generation of Eurocodes. [less ▲]

Detailed reference viewed: 94 (2 UL)
Full Text
Peer Reviewed
See detailSimulation-based optimization using multi-agent technology for efficient and flexible production planning and control in remanufacturing
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in International Conference on Remanufacturing (ICoR) 2019 (2019, June 25)

Remanufacturing is a process for used products to make them “as good as new or better”. A remanufacturing system typically consists of the processes disassembly, cleaning, inspection, reconditioning ... [more ▼]

Remanufacturing is a process for used products to make them “as good as new or better”. A remanufacturing system typically consists of the processes disassembly, cleaning, inspection, reconditioning reassembly and testing. Due to unknown condition of the used products many challenges occur which are special to the domain of remanufacturing and not know from manufacturing. The resulting stochastic routing of products and material in particular places special demands on the flexibility of the production planning and control (PPC) in remanufacturing systems. In order to enable stochastic routing, Automated Guided Vehicles (AGVs) are used, which also contributes to increasing the complexity of the PPC. Especially the simultaneous scheduling of machines and AGVs has to be addressed in order to enable an optimal remanufacturing process. This paper provides an overview about current research activities in the field of PPC in remanufacturing and scheduling approaches for AGVs. Furthermore, a promising approach to enable the required flexibility of the remanufacturing system and to control the dynamics contained therein is the use of a multi-agent technology. The proposed approach consists of an optimization of the PPC using a multi-agent based simulation. The multi agent-based simulation consists of intelligent agents that negotiate with each other in order to find an optimal solution and achieve high flexibility. [less ▲]

Detailed reference viewed: 98 (1 UL)
Full Text
Peer Reviewed
See detailWhispering Botnet Command and Control Instructions
Steichen, Mathis UL; Ferreira Torres, Christof UL; Fiz Pontiveros, Beltran UL et al

in 2nd Crypto Valley Conference on Blockchain Technology, Zug 24-26 June 2019 (2019, June 25)

Detailed reference viewed: 114 (0 UL)
Full Text
Peer Reviewed
See detailAnytime Approximation in Probabilistic Databases via Scaled Dissociations
Van den Heuvel, Maarten; Ivanov, Peter; Gatterbauer, Wolfgang et al

in Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019 (2019, June 22)

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailAn enhanced interface model for friction fatigue problems of axially loaded piles
Kullolli, Borana; Baeßler, Matthias; Cuéllar, Pablo et al

in Proceedings of the ASME 2019 38th, International Conference on Ocean, Offshore and Arctic Engineering, Glasgow 9-14 June 2019 (2019, June 09)

The shaft bearing capacity often plays a dominant role for the overall structural behaviour of axially loaded piles in offshore deep foundations. Under cyclic loading, a narrow zone of soil at the pile ... [more ▼]

The shaft bearing capacity often plays a dominant role for the overall structural behaviour of axially loaded piles in offshore deep foundations. Under cyclic loading, a narrow zone of soil at the pile-soil interface is subject to cyclic shearing solicitations. Thereby, the soil may densify and lead to a decrease of confining stress around the pile due to micro-phenomena such as particle crushing, migration and rearrangement. This reduction of radial stress has a direct impact on the shaft capacity, potentially leading in extreme cases to pile failure. An adequate interface model is needed in order to model this behaviour numerically. Different authors have proposed models that take typical interface phenomena in account such as densification, grain breakage, normal pressure effect and roughness. However, as the models become more complex, a great number of material parameters need to be defined and calibrated. This paper proposes the adoption and transformation of an existing soil bulk model (Pastor- Zienkiewicz) into an interface model. To calibrate the new interface model, the results of an experimental campaign with the ring shear device under cyclic loading conditions are here presented. The constitutive model shows a good capability to reproduce typical features of sand behaviour such as cyclic compaction and dilatancy, which in saturated partially-drained conditions may lead to liquefaction and cyclic mobility phenomena. [less ▲]

Detailed reference viewed: 93 (5 UL)
Full Text
Peer Reviewed
See detailDeep learning based semantic situation awareness system for multirotor aerial robots using LIDAR
Sanchez Lopez, Jose Luis UL; Sampedro, Carlos; Cazzato, Dario UL et al

in 2019 International Conference on Unmanned Aircraft Systems (ICUAS) (2019, June)

In this work, we present a semantic situation awareness system for multirotor aerial robots, based on 2D LIDAR measurements, targeting the understanding of the environment and assuming to have a precise ... [more ▼]

In this work, we present a semantic situation awareness system for multirotor aerial robots, based on 2D LIDAR measurements, targeting the understanding of the environment and assuming to have a precise robot localization as an input of our algorithm. Our proposed situation awareness system calculates a semantic map of the objects of the environment as a list of circles represented by their radius, and the position and the velocity of their center in world coordinates. Our proposed algorithm includes three main parts. First, the LIDAR measurements are preprocessed and an object segmentation clusters the candidate objects present in the environment. Secondly, a Convolutional Neural Network (CNN) that has been designed and trained using an artificially generated dataset, computes the radius and the position of the center of individual circles in sensor coordinates. Finally, an indirect-EKF provides the estimate of the semantic map in world coordinates, including the velocity of the center of the circles in world coordinates.We have quantitative and qualitative evaluated the performance of our proposed situation awareness system by means of Software-In-The-Loop simulations using VRep with one and multiple static and moving cylindrical objects in the scene, obtaining results that support our proposed algorithm. In addition, we have demonstrated that our proposed algorithm is capable of handling real environments thanks to real laboratory experiments with non-cylindrical static (i.e. a barrel) and moving (i.e. a person) objects. [less ▲]

Detailed reference viewed: 81 (2 UL)
Full Text
See detailA survey: Scheduling of Automated Guided Vehicles in Flexible (Re-)Manufacturing Systems
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Müller, Rainer; Brüls, Oliver; Abba, Gabriel (Eds.) et al Robotix-Academy Conference for Industrial Robotics (RACIR) 2019 (2019, June)

This work gives a state-of-the-art overview regarding the scheduling of Automated Guided Vehicles (AGV) in Flexible (Re-)Manufacturing Systems (FMS/FRMS). Different, general approaches are available to ... [more ▼]

This work gives a state-of-the-art overview regarding the scheduling of Automated Guided Vehicles (AGV) in Flexible (Re-)Manufacturing Systems (FMS/FRMS). Different, general approaches are available to solve this task. In this regard an overview of currently available fleet management software and research in this field as well as the simultaneous scheduling of machines and AGVs is given. Production scheduling and transport scheduling have been vastly studied by many researchers, but most of the works address these both problems separately. However, these two problems are closely linked and influence each other. By looking at them together, it is possible to achieve an improvement in the overall scheduling. The different works are examined regarding the consideration of one available machine for each tasks, or if alternative machines are available and if the approaches are static or dynamic. Especially the appropriability of the presented works regarding the use in remanufacturing systems is examined. Remanufacturing is a process for used products to make them “as good as new or better”. Due to unknown condition of the used products many challenges occur during the remanufacturing process which are special to the domain of remanufacturing and not know from manufacturing. The resulting stochastic routing of products and material in particular places special demands on the flexibility and dynamic of the scheduling and control of the remanufacturing system. In order to meet the challenges of a real remanufacturing system, the scheduling algorithm should consider alternative machines as well as be dynamic. None of the approaches examined can meet these requirements, which is why new methods have to be developed. [less ▲]

Detailed reference viewed: 135 (0 UL)
Full Text
Peer Reviewed
See detailMachine Learning based Antenna Selection and Power Allocation in Multi-user MISO Systems
Vu, Thang Xuan UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in 2019 IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (2019, June)

Detailed reference viewed: 69 (15 UL)
Full Text
Peer Reviewed
See detailDesigning collaborative scenarios on tangible tabletop interfaces - insights from the implementation of paper prototypes in the context of a multidisciplinary design workshop
Sunnen, Patrick UL; Arend, Béatrice UL; Heuser, Svenja UL et al

in Proceedings of the 17th European Conference on Computer-Supported Cooperative Work: The International Venue on Practice-centred Computing and the Design of Cooperation Technologies - Exploratory Papers, Reports of the European Society for Socially Embedded Technologies (2019, June)

Within the context of the research project ORBIT (Overcoming Breakdowns in Teams with Interactive Tabletops), we design and study a joint problem-solving activity at an interactive tabletop, that gives ... [more ▼]

Within the context of the research project ORBIT (Overcoming Breakdowns in Teams with Interactive Tabletops), we design and study a joint problem-solving activity at an interactive tabletop, that gives participants the opportunity to develop their collaboration methods. To gain design insights for the development of a scenario soliciting participants to collaborate, we set up a multidisciplinary design workshop. During the latter, we explored and discussed three different collaborative scenarios, implemented as paper prototypes. In this paper, we report on first results gained from an exploratory analysis of the video data that was recorded in the context of this workshop. [less ▲]

Detailed reference viewed: 112 (14 UL)
Full Text
Peer Reviewed
See detailA GP Hyper-Heuristic Approach for Generating TSP Heuristics
Duflo, Gabriel UL; Kieffer, Emmanuel UL; Brust, Matthias R. UL et al

in 33rd IEEE International Parallel & Distributed Processing Symposium (IPDPS 2019) (2019, May 20)

Detailed reference viewed: 209 (55 UL)
Full Text
Peer Reviewed
See detailUltrareliable SWIPT using Unscheduled Short Packet Transmissions
Kisseleff, Steven UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE International Conference on Communications (ICC), B5G-URLLC Workshop, Shanghai, May 2019 (2019, May 20)

Large communication networks, e.g. Internet of Things (IoT), are known to be vulnerable to the co-channel interference from simultaneous transmissions. In the recent time, this problem has been ... [more ▼]

Large communication networks, e.g. Internet of Things (IoT), are known to be vulnerable to the co-channel interference from simultaneous transmissions. In the recent time, this problem has been extensively studied in various contexts. Due to a potentially very long duty cycle, orthogonal multiple access techniques are not well suited for such schemes. Instead, random medium access (RMA) seems promising, since it guarantees a lower bound for the network throughput even in presence of an infinite number of simultaneous transmissions while reducing the average length of the duty cycle. Such an RMA scheme is based on transmission of short data packets with unknown scheduling. Of course, a reliable symbol detection for this type of communication is very challenging not only due to a large amount of interference from the adjacent nodes, but also because of the uncertainty related to the presence or absence of overlapping packets. Interestingly, with increasing number of network nodes also the amount of energy, which can be harvested from the received signal, increases. This is especially beneficial for powering of a relay device, which may utilize the energy for further information processing and retransmission. In this paper, we address the design of a simultaneous information and power transfer scheme based on unscheduled short packet transmissions for ultrareliable communication. [less ▲]

Detailed reference viewed: 52 (5 UL)
Full Text
Peer Reviewed
See detailDemo: Blockchain for the Simplification and Automation of KYC Result Sharing
Norvill, Robert UL; Steichen, Mathis UL; Shbair, Wazen UL et al

in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)

Know Your Customer (KYC) processes performed by banks on their customers are redundant, cumbersome and costly. Therefore, a system is proposed to automate menial tasks and allow sharing of data related to ... [more ▼]

Know Your Customer (KYC) processes performed by banks on their customers are redundant, cumbersome and costly. Therefore, a system is proposed to automate menial tasks and allow sharing of data related to KYC. A blockchain dictates the collaboration between different participants and several services are built around it to support the functionality of the system as a whole. An access control system is used to share data legitimately. [less ▲]

Detailed reference viewed: 157 (21 UL)
Full Text
Peer Reviewed
See detailBlockZoom: Large-Scale Blockchain Testbed
Shbair, Wazen UL; Steichen, Mathis UL; Francois, Jerome et al

in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)

Future blockchain applications are anticipated to serve millions of users. Thus the evaluation of new blockchain applications have to consider large-scale assessment of the technologies behind the scene ... [more ▼]

Future blockchain applications are anticipated to serve millions of users. Thus the evaluation of new blockchain applications have to consider large-scale assessment of the technologies behind the scene. Most of current testing approaches have been done either on simulators or via local small blockchain networks. Hence, the performance in real world conditions is unpredictable. This demonstration introduces BlockZoom, a large-scale blockchain testbed that runs on top of a highly reconfigurable and controllable HPC platform. BlockZoom presents a reproducible environment for experimenting distributed ledgers technologies and smart contract applications. Through different configuration scenarios developers can evaluate the applications performance and the blockchain behavior at a scale comparable to the production environment. The target audience of this demonstration includes researchers and developers in blockchain technology. [less ▲]

Detailed reference viewed: 125 (8 UL)
Full Text
Peer Reviewed
See detailConvex Combination of Constraint Vectors for Set-membership Affine Projection Algorithms
Nagashima Ferreira, Tadeu; Alves Martins, Wallace UL; Lima, Markus et al

in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, May)

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both ... [more ▼]

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both convergence speed and steady-state mean-squared error is the choice of the so-called constraint vector. Optimal constraint vectors were recently proposed relying on convex optimization tools, which might some- times lead to prohibitive computational burden. This paper proposes a convex combination of simpler constraint vectors whose performance approaches the optimal solution closely, utilizing much fewer computations. Some illustrative examples confirm that the sub-optimal solution follows the accomplishments of the optimal one. [less ▲]

Detailed reference viewed: 71 (14 UL)
Full Text
Peer Reviewed
See detailMCP: A Security Testing Tool Driven by Requirements
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in 2019 IEEE/ACM 41st International Conference on Software Engineering (2019, May)

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious ... [more ▼]

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious users). MCP relies on Natural Language Processing (NLP), a restricted form of misuse case specifications, and a test driver API implementing basic utility functions for security testing. NLP is used to identify the activities performed by the malicious user and the control flow of misuse case specifications. MCP matches the malicious user’s activities to the methods of the provided test driver API in order to generate executable security test cases that perform the activities described in the misuse case specifications. MCP has been successfully evaluated on an industrial case study. [less ▲]

Detailed reference viewed: 198 (30 UL)
Full Text
Peer Reviewed
See detailOutage Performance of Integrated Satellite-Terrestrial Relay Networks with Opportunistic Scheduling
Huang, Qingquan; Zhu, Wei-Ping; Chatzinotas, Symeon UL et al

in ICC 2019 - 2019 IEEE International Conference on Communications (ICC) (2019, May)

In this paper, we investigate the outage performance of a multiuser threshold-based decode-and-forward integrated satellite-terrestrial relay network (ISTRN) with opportunistic user scheduling, where the ... [more ▼]

In this paper, we investigate the outage performance of a multiuser threshold-based decode-and-forward integrated satellite-terrestrial relay network (ISTRN) with opportunistic user scheduling, where the satellite link and terrestrial links undergo Shadowed-Rician (SR) fading and correlated Rayleigh fading, respectively. First, we propose a new probability density function (PDF) to statistically characterize the square sum of independent and identically distributed SR random variables, which is more accurate and concise than existing expressions. Next, based on the new PDF, we derive an analytical expression of outage probability (OP) of the considered network. Furthermore, the asymptotic OP expression is developed at high signal-to-noise ratio to reveal the achievable diversity order of the considered ISTRN. Finally, computer simulation is conducted to validate the analytical results, and show the impact of various parameters on the outage performance. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailTowards Systematic Specification of Non-Functional Requirements for Sharing Economy Services
Symeonidis, Iraklis UL; Schroers, Jessica; Mustafa A. Mustafa, Mustafa A. et al

in Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services (2019, May)

Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of ... [more ▼]

Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of Circular Economy. In this paper, we assess existing SE services and identify their challenges in areas that are not technically connected to their core functionality but are essential in creating trust: information security and privacy, personal data protection and fair economic incentives. Existing frameworks for elicitation of non-functional requirements are heterogeneous in their focus and domain specific. Hence, we propose to develop a holistic methodology for non-functional requirements specification for SE systems following a top-down-top approach. A holistic methodology considering non-functional requirements is essential and can assist in the analysis and design of SE systems in a systematic and unified way applied from the early stages of the system development. [less ▲]

Detailed reference viewed: 96 (4 UL)
Full Text
Peer Reviewed
See detailLearning to Spot and Refactor Inconsistent Method Names
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations ... [more ▼]

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1-measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild. [less ▲]

Detailed reference viewed: 289 (20 UL)
Full Text
Peer Reviewed
See detailNon-Intrusive Cognitive Measurement for the Amplitude Response of Wideband Transponders
Mazalli, N.; Andrenacci, Stefano UL; Chatzinotas, Symeon UL

in International Conference on Communications (2019, May)

In this paper we propose a new measurement procedure for the amplitude response of a wideband transponder in an in-orbit testing (IOT) context. The proposed procedure resorts to a direct sequence spread ... [more ▼]

In this paper we propose a new measurement procedure for the amplitude response of a wideband transponder in an in-orbit testing (IOT) context. The proposed procedure resorts to a direct sequence spread spectrum (DSSS) technique in order to limit the interference caused by the measurement signals to the traffic. Further, an adaptive approach exploiting the knowledge of the inband traffic power has been introduced. Such knowledge, acquired either a priori or by sensing the channel, allows to easily design measurement signals satisfying multiple performance requirements (i.e., accuracy, resolution, interference, duration, and complexity). The proposed procedure can be used as a design tool to optimize the dimensioning of the IOT system parameters, and to flexibly trade off a performance indicator against another. [less ▲]

Detailed reference viewed: 22 (13 UL)
Full Text
Peer Reviewed
See detailMultifaceted automated analyses for variability-intensive embedded systems
Lazreg, Sami; Cordy, Maxime UL; Collet, Philippe et al

in Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019, May)

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL et al

in IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019 (2019, May)

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a ... [more ▼]

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level and network level, with dynamic policy enforcement points using software defined networking (SDN) to provide protection against a large class of attacks. Although SIEMs, IPS, and firewall have been previously used to secure computer networks, ROSDefender is applying them for the specific use case of robotic systems, where security is in many cases an afterthought. [less ▲]

Detailed reference viewed: 88 (6 UL)
Full Text
Peer Reviewed
See detailTowards sampling and simulation-based analysis of featured weighted automata
Cordy, Maxime UL; Legay, Axel; Lazreg, Sami et al

in Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (2019, May)

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 229 (31 UL)
Full Text
Peer Reviewed
See detailVIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION
Baptista, Renato UL; Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019 (2019, May)

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of ... [more ▼]

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of 3D information in RGB images. Most successful approaches make use of the concept of knowledge transfer by projecting 3D synthetic data to multiple viewpoints. Instead of relying on knowledge transfer, we propose to augment the RGB data by a third dimension by means of 3D skeleton estimation from 2D images using a CNN-based pose estimator. In order to ensure view-invariance, a pre-processing for alignment is applied followed by data expansion as a way for denoising. Finally, a Long-Short Term Memory (LSTM) architecture is used to model the temporal dependency between skeletons. The proposed network is trained to directly recognize actions from aligned 3D skeletons. The experiments performed on the challenging Northwestern-UCLA dataset show the superiority of our approach as compared to state-of-the-art ones. [less ▲]

Detailed reference viewed: 236 (32 UL)
Full Text
Peer Reviewed
See detailDeep Reinforcement Learning based Continuous Control for Multicopter Systems
Manukyan, Anush UL; Olivares Mendez, Miguel Angel UL; Geist, Matthieu et al

in International Conference on Control, Decision and Information CoDIT, Paris 23-26 April 2019 (2019, April 26)

In this paper we apply deep reinforcement learning techniques on a multicopter for learning a stable hovering task in a continuous action state environment. We present a framework based on OpenAI GYM ... [more ▼]

In this paper we apply deep reinforcement learning techniques on a multicopter for learning a stable hovering task in a continuous action state environment. We present a framework based on OpenAI GYM, Gazebo and RotorS MAV simulator, utilized for successfully training different agents to perform various tasks. The deep reinforcement learning method used for the training is model-free, on-policy, actor-critic based algorithm called Trust Region Policy Optimization (TRPO). Two neural networks have been used as a nonlinear function approximators. Our experiments showed that such learning approach achieves successful results, and facilitates the process of controller design. [less ▲]

Detailed reference viewed: 57 (5 UL)
Full Text
Peer Reviewed
See detailEnseignants non spécialisés et (trans)disciplinarité. L’exemple de l’enseignement musical
Sagrillo, Damien UL

in Karsenti, T.; Goyer, S. (Eds.) Programme du colloque international en éducation et du Somme du numérique en éducation, 25 et 26 avril 2019. Montréal, QC: Centre de recherche interuniversitaire sur la formation et la profession enseignante, Chaire de recherche du Canada sur les technologies de l’information et de la communication (TIC) en éducation. (2019, April 25)

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme ... [more ▼]

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme l’observation à long terme dans des écoles fondamentales à Berlin. H. G. Bastian et son équipe (2002) ont démontré l’effet social bénéfique d’un enseignement musical approfondi. D’autres recherches ont dévoilé un manque de confiance tenace à l’égard de l’enseignement musical chez les étudiants et les enseignants (Holden et Button, 2006). D’autres encore ont analysé les potentialités d’un enseignement musical extrascolaire (Kivi, 2018). L’angoisse des formateurs non spécialisés devant l’éducation musicale se reflète souvent dans les arguments clichés comme : « Je n’ai pas fait du solfège; je ne suis pas musical; je ne peux pas chanter ». Le manque de connaissances déclaratives empêche donc le développement des savoir-faire. Nous présenterons des concepts développés relativement à deux traditions musicales (allemande et française) au Grand-Duché de Luxembourg. Notre objectif est de mettre à la disposition des futurs enseignants un éventail didactique. [less ▲]

Detailed reference viewed: 65 (2 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 189 (18 UL)
Full Text
Peer Reviewed
See detailIoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Engel, Thomas UL

in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19)

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼]

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲]

Detailed reference viewed: 574 (14 UL)
Full Text
Peer Reviewed
See detailA Calibrated Learning Approach to Distributed Power Allocation in Small Cell Networks
Zhang, Xinruo; Nakhai; Zheng, Gan UL et al

in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, April 17)

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time ... [more ▼]

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time division multiple access scheme to optimize the transmit power decisions at the small base stations (SBSs) and achieve max-min user fairness in the long run. Provided that the SBSs are autonomous decision makers, the aim of the proposed algorithm is to allow SBSs to gradually improve their forecast of the possible transmit power levels of the other SBSs and react with the best response based on the predicted results at individual time slots. Simulation results validate that in terms of achieving max-min signal-to-interference-plus-noise ratio, the proposed distributed design outperforms two benchmark schemes and achieves a similar performance as compared to the optimal centralized design. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailWhy do String Players Perform Easier per Memory than Wind Music Players? – Testing Instrumentalist Students’ Attention Levels During Music Reading
Buzás, Zsuzsanna; Sagrillo, Damien UL

in Molnár, Edit Katalin; Dancs, Katinka (Eds.) 17thConference on Educational Assessment (2019, April 13)

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice ... [more ▼]

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice, pianists who play as soloists with an orchestra do notneed written support as opposed to brass instrument soloists. Until now, no research has been conducted to discoverthe reasons why pianists and string players play easier by heart than brass instrument players.Music related activities involve numerous psychological processes, including perception and rapid processing of audio stimuli, attention and auditory, sensory and visual memory activation. Students with working memory impairments have difficulties with concentration as well as with organizing and monitoring the quality of their own work (Alloway et al., 2009).If the attention level is normal or high, the student is in an appropriate state for learning. It has been shown that participants with high working memory capacity perform significantly better on a variety of attention tasks (Fougnie, 2008).Attention supports the development of emerging reading skills by helping students regulate the cognitive demands inherently part of learning (Sáez et al., 2011).Thisstudy aims to test instrumentalist students’ attention and mediation levels during music reading by means of NeuroSky’s MindWave EEG device that translates brainwaves into digital information and beams it wirelessly to acomputer. We investigated 22right-handed wind instrumentalists, 12-14 years of age, and compared them with 21 violin players,matched for age and grade level. Students were asked to play an eight-bar composition bySzilvay. We analyzed attention and mediation levels, as well as alpha, beta and gamma band oscillatory responses to the musical piece during reading. The results of the data analysis were evaluated using e-Sense Metric. According to this metric, attention and meditation data arescaled between 1 and 100. The findings ofthe study revealed that the average attention level of the violin players was slightly highat61.53;while that of the wind players was 39.98, that is,slightly low. A significant difference was found between the averages of attention levelsbetween the string and the wind players (t=2.656, p=.026).With the use of EEG, the appearance of fatiguecan be detectedand the concentration levelscan be differentiatedfor the same exercise for different pupils. The results help us to improve instructionalmethods, and can also help us to reveal the processesof attention and mediation duringthe students’ music reading. Further research can involve the replication of the studywith pianists,comparing them with string players and wind music players. In an even more refined desing, a replication study could be carried out to compare pianists and brass instrument players. These further studies can serve as a basis for developing training programs of music reading comprehension for different instrumentalists. [less ▲]

Detailed reference viewed: 73 (1 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 231 (33 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 175 (53 UL)
See detailComputational Metaphysics: New Insights on Gödel's Ontological Argument and Modal Collapse
Benzmüller, Christoph UL

in Kovac, Srecko; Swietorzecka, Kordula (Eds.) Formal Methods and Science in Philosophy III, Informal Proceedings (2019, April)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailRobust Precoding Techniques for Multibeam Mobile Satellite Systems
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in 2019 IEEE Wireless Communications and Networking Conference (WCNC) (2019, April)

This paper presents designing precoding technique at the gateway of a multibeam mobile satellite systems, enabling full frequency reuse pattern among the beams. Such a system brings in two critical ... [more ▼]

This paper presents designing precoding technique at the gateway of a multibeam mobile satellite systems, enabling full frequency reuse pattern among the beams. Such a system brings in two critical challenges to overcome. The inter-beam interference makes applying interference mitigation techniques necessary. Further, when the user terminals are mobile the Channel State Information (CSI) becomes time-varying which is another challenge to overcome. Therefore, the gateway has only access to an outdated CSI, which can eventually limit the precoding gains. In this way, employing a proper CSI estimation mechanism at the gateway can improve the performance of the precoding scheme. In this context, the objectives of this paper are two folds. First, we present different CSI feedback mechanisms which aim at preserving a lower CSI variations at the gateway. Then, we develop the corresponding precoding schemes which are adapted with the proposed CSI feedback mechanisms. To keep the complexity of the proposed precoding schemes affordable, we consider a maritime communication scenario so that the signals received by mobile user terminals suffer from a lower pathloss compared to the Land Mobile communication. Finally, we provide several simulations results in order to evaluate the performance of the proposed precoding techniques. [less ▲]

Detailed reference viewed: 27 (5 UL)
Full Text
Peer Reviewed
See detailStability Analysis of Power Networks under Cyber-Physical Attacks: an LPV-Descriptor Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Control, Decision and Information Technologies (2019, April)

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model ... [more ▼]

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model developed in [24], based on the well-known sector non-linearity approach and the convex polytopic transformation, the attacked system (descriptor model) is re-written in a more convenient form (Linear Parameter Varying-LPV) with unmeasurable premise variables. The so-called Lyapunov-based methods are applied in order to study the stability and security problems despite the presence of cyber-attacks. The conditions will be given in terms of Linear- Bilinear Matrix Inequality LMI- BMI constraints. [less ▲]

Detailed reference viewed: 130 (0 UL)
Full Text
Peer Reviewed
See detailTopic-based Historical Information Selection for Personalized Sentiment Analysis
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges 24-26 April 2019 (2019, April)

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to ... [more ▼]

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to modeling individuality and understanding the current state of the person. We consider a user's expressions in the past as historical information, and target posts from social platforms for which Twitter texts are chosen as exemplary. While implementing the personalized model PERSEUS, we observed information loss due to the lack of flexibility regarding the design of the input sequence. To compensate this issue, we provide a procedure for information selection based on the similarities in the topics of a user's historical posts. Evaluation is conducted comparing different similarity measures, and improvements are seen with the proposed method. [less ▲]

Detailed reference viewed: 136 (34 UL)
Full Text
Peer Reviewed
See detailTime Series Modeling of Market Price in Real-Time Bidding
Du, Manxing UL; Hammerschmidt, Christian UL; Varisteas, Georgios UL et al

in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2019, April)

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions ... [more ▼]

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions fluctuate heavily within short time spans. State-of-the-art methods neglect the temporal dependencies of bidders’ behaviors. In this paper, the bid requests are aggregated by time and the mean market price per aggregated segment is modeled as a time series. We show that the Long Short Term Memory (LSTM) neural network outperforms the state-of-the-art univariate time series models by capturing the nonlinear temporal dependencies in the market price. We further improve the predicting performance by adding a summary of exogenous features from bid requests. [less ▲]

Detailed reference viewed: 119 (13 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 216 (17 UL)
Full Text
Peer Reviewed
See detailHigher-Order DCA against Standard Side-Channel Countermeasures
Bogdanov, Andrey; Rivain, Matthieu; Philip, S. Vejre et al

in Polian, Ilia; Stöttinger, Marc (Eds.) Constructive Side-Channel Analysis and Secure Design (2019, March 16)

At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack builds on the same principles as DPA in the ... [more ▼]

At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack builds on the same principles as DPA in the classical side-channel context, but uses computational traces consisting of plain values computed by the implementation during execution. It was shown to be able to recover the key of many existing AES white-box implementations. The DCA adversary is passive, and so does not exploit the full power of the white-box setting, implying that many white-box schemes are insecure even in a weaker setting than the one they were designed for. It is therefore important to develop implementations which are resistant to this attack. We investigate the approach of applying standard side-channel countermeasures such as masking and shuffling. Under some necessary conditions on the underlying randomness generation, we show that these countermeasures provide resistance to standard (first-order) DCA. Furthermore, we introduce higher-order DCA, along with an enhanced multivariate version, and analyze the security of the countermeasures against these attacks. We derive analytic expressions for the complexity of the attacks – backed up through extensive attack experiments – enabling a designer to quantify the security level of a masked and shuffled implementation in the (higher-order) DCA setting. [less ▲]

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailCombining Deep Gaussian Process and Rule-Based Method for Decision-Making in Self-Driving Simulation with Small Data
Fang, W.; Li, H.; Dang, S. et al

in 2019 15th International Conference on Computational Intelligence and Security (CIS) (2019, March 05)

Self-driving vehicle is a popular and promising field in artificial intelligence. Conventional architecture consists of multiple sensors, which work collaboratively to sense the units on road to yield a ... [more ▼]

Self-driving vehicle is a popular and promising field in artificial intelligence. Conventional architecture consists of multiple sensors, which work collaboratively to sense the units on road to yield a precise and safe driving strategy. Besides the precision and safety, the quickness of decision is also a major concern. In order to react quickly, the vehicle need to predict its next possible action, such as acceleration, brake and steering angle, according to its latest few actions and status. In this paper, we treat this decision-making problem as a regression problem and use deep gaussian process to predict its next action. The regression model is trained using simulation data sets and accurately captures the most significant features. Combined with rule-based method, it can be used in Torcs simulation engine to realize successful loop trip on virtual roads. The proposed method outperforms the existing reinforcement learning methods on the performance indicators of time consumption and the size of data volume. It may be useful for real road tests in the future. [less ▲]

Detailed reference viewed: 77 (3 UL)
Full Text
Peer Reviewed
See detailRobust Encryption, Extended
Geraud, Remi; Naccache, David; Rosie, Razvan UL

in Matsui, Mitsuru (Ed.) The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings (2019, March 01)

Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key ... [more ▼]

Robustness is a notion often tacitly assumed while working with encrypted data. Roughly speaking, it states that a ciphertext cannot be decrypted under different keys. Initially formalized in a public-key context, it has been further extended to key-encapsulation mechanisms, and more recently to pseudorandom functions, message authentication codes and authenticated encryption. In this work, we motivate the importance of establishing similar guarantees for functional encryption schemes, even under adversarially generated keys. Our main security notion is intended to capture the scenario where a ciphertext obtained under a master key (corresponding to Authority 1) is decrypted by functional keys issued under a different master key (Authority 2). Furthermore, we show there exist simple functional encryption schemes where robustness under adversarial key-generation is not achieved. As a secondary and independent result, we formalize robustness for digital signatures – a signature should not verify under multiple keys – and point out that certain signature schemes are not robust when the keys are adversarially generated. We present simple, generic transforms that turn a scheme into a robust one, while maintaining the original scheme’s security. For the case of public-key functional encryption, we look into ciphertext anonymity and provide a transform achieving it. [less ▲]

Detailed reference viewed: 63 (5 UL)
Full Text
Peer Reviewed
See detailEvaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly
Varisteas, Georgios UL; Frank, Raphaël UL; Sajadi Alamdari, Seyed Amin UL et al

in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)

Detailed reference viewed: 258 (47 UL)
Full Text
Peer Reviewed
See detailA Hybrid Machine Learning and Schedulability Method for the Verification of TSN Networks
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 15th IEEE International Workshop on Factory Communication Systems (WFCS2019) (2019, March)

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible ... [more ▼]

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible without executing a conventional schedulability analysis. A disadvantage of ML-based timing verification with respect to schedulability analysis is the possibility of "false positives": configurations deemed feasible while they are not. In this work, in order to minimize the rate of false positives, we propose the use of a measure of the uncertainty of the prediction to drop it when the uncertainty is too high, and rely instead on schedulability analysis. In this hybrid verification strategy, the clear-cut decisions are taken by ML, while the more difficult ones are taken by a conventional schedulability analysis. Importantly, the trade-off achieved between prediction accuracy and computing time can be controlled. We apply this hybrid verification method to Ethernet TSN networks and obtain, for instance in the case of priority scheduling with 8 traffic classes, a 99% prediction accuracy with a speedup factor of 5.7 with respect to conventional schedulability analysis and a reduction of 46% of the false positives compared to ML alone. [less ▲]

Detailed reference viewed: 204 (25 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 136 (17 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 180 (18 UL)
Full Text
Peer Reviewed
See detailShould You Consider Adware as Malware in Your Study?
Gao, Jun UL; Li, Li; Kong, Pingfan UL et al

in 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (2019, February 24)

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports ... [more ▼]

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports which are often provided free through online services such as VirusTotal. Unfortunately, these reports do not offer precise information for appropriately and uniquely assigning classes to samples in app datasets: AV engines indeed do not have a consensus on specifying information in labels. Furthermore, labels often mix information related to families, types, etc. In particular, the notion of “adware” is currently blurry when it comes to maliciousness. There is thus a need to thoroughly investigate cases where adware samples can actually be associated with malware (e.g., because they are tagged as adware but could be considered as malware as well). In this work, we present a large-scale analytical study of Android adware samples to quantify to what extent “adware should be considered as malware”. Our analysis is based on the Androzoo repository of 5 million apps with associated AV labels and leverages a state-of-the-art label harmonization tool to infer the malicious type of apps before confronting it against the ad families that each adware app is associated with. We found that all adware families include samples that are actually known to implement specific malicious behavior types. Up to 50% of samples in an ad family could be flagged as malicious. Overall the study demonstrates that adware is not necessarily benign. [less ▲]

Detailed reference viewed: 169 (16 UL)
Full Text
Peer Reviewed
See detailRobust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018 (2019, February 21)

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the ... [more ▼]

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the transmitter. In defining the SLP design problem, a general category of constructive interference regions (CIR) called distance preserving CIR (DPCIR) is adopted. In particular, we are interested in a robust SLP design minimizing the total transmit power subject to individual quality-of-service (QoS) requirements. We consider two common models for the channel uncertainty region, namely, spherical (norm-bounded) and stochastic. For the spherical uncertainty model, a worst-case robust precoder is proposed, while for the stochastically known uncertainties, we derive a convex optimization problem with probabilistic constraints. We simulate the performance of the proposed robust approaches, and compare them with the existing methods. Through the simulation results, we also show that there is an essential trade-off between the two robust approaches. [less ▲]

Detailed reference viewed: 158 (23 UL)
Full Text
Peer Reviewed
See detailCharacterizations of idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in 38th Linz Seminar on Fuzzy Set Theory (2019, February 05)

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means ... [more ▼]

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means of four conditions only: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. In particular, we show that associativity can be replaced with bisymmetry in this axiomatization. [less ▲]

Detailed reference viewed: 96 (18 UL)
Full Text
Peer Reviewed
See detailReal-time attack detection on robot cameras: A self-driving car application
Lagraa, Sofiane UL; Cailac, Maxime; Rivera, Sean UL et al

in International Conference on Robotic Computing (2019, February)

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected ... [more ▼]

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially the image flows incoming from camera robots. In this paper, we perform a structured security assessment of robot cameras using ROS. We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras. Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method. We experiment our approach on robot cameras embedded on a self-driving car. [less ▲]

Detailed reference viewed: 178 (15 UL)
Full Text
Peer Reviewed
See detailA View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera
Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL; Baptista, Renato UL et al

in 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018 (2019, February)

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it ... [more ▼]

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it possible to extract a 3D skeleton from a single RGB image. Taking advantage of this impressive progress, we propose a simple framework for fast and view-invariant action recognition using a single RGB camera. The proposed pipeline can be seen as the association of two key steps. The first step is the estimation of a 3D skeleton from a single RGB image using a CNN-based pose estimator such as VNect. The second one aims at computing view-invariant skeleton-based features based on the estimated 3D skeletons. Experiments are conducted on two well-known benchmarks, namely, IXMAS and Northwestern-UCLA datasets. The obtained results prove the validity of our concept, which suggests a new way to address the challenge of RGB-based view-invariant action recognition. [less ▲]

Detailed reference viewed: 328 (23 UL)
Full Text
Peer Reviewed
See detailROSploit: Cybersecurity tool for ROS
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL

in International Conference on Robotic Computing (2019, February)

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack ... [more ▼]

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the potential threat posed by security vulnerabilities in ROS. In this article, we present a new tool to assist further security research in ROS, ROSploit. ROSploit is a modular two-pronged offensive tool covering both reconnaissance and exploitation of ROS systems, designed to assist researchers in testing exploits for ROS. [less ▲]

Detailed reference viewed: 158 (4 UL)
Full Text
Peer Reviewed
See detailTowards Learning-Aided Configuration in 3D Printing: Feasibility Study and Application to Defect Prediction
Amand, Benoit; Cordy, Maxime UL; Heymans, Patrick et al

in Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, VAMOS 2019, Leuven, Belgium, February 06-08, 2019 (2019, February)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailROLE OF TARGETED BIOCHAR-ACTIVATION IN THE REMOVAL OF MACRO- AND MICROPOLLUTANTS FROM SECONDARY EFFLUENT WASTEWATER
Brunhoferova, Hana UL; Venditti, Silvia UL; Hansen, Joachim UL

in Book of Abstracts 8th International Symposium On Wetland Pollutant Dynamics and Control (2019, January 30)

Detailed reference viewed: 34 (6 UL)
Full Text
Peer Reviewed
See detailDesign of a (yet another?) DevOps course
Capozucca, Alfredo UL; Guelfi, Nicolas UL; Ries, Benoît UL

in Bruel, Jean-Michel; Mazzara, Manuel; Meyer, Bertrand (Eds.) Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment (2019, January 19)

DevOps have received marginal attention inside the higher education level curricula despite of its boom in the industrial sector. This paper presents the design of an academic master-level course aimed at ... [more ▼]

DevOps have received marginal attention inside the higher education level curricula despite of its boom in the industrial sector. This paper presents the design of an academic master-level course aimed at DevOps. The proposed design is based on earlier experiences in teaching DevOps-related topics. The specification of the course design is provided using the SWEBOK Guide and Bloom’s taxonomy to enhance the quality of the course design specification, and ease its assessment once delivered. [less ▲]

Detailed reference viewed: 148 (28 UL)
Full Text
Peer Reviewed
See detailAssessing the impact of attacks on OPC-UA applications in the Industry 4.0 era
Polge, Julien UL; Robert, Jérémy UL; Le Traon, Yves UL

in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)

Detailed reference viewed: 153 (13 UL)
Full Text
Peer Reviewed
See detailEvaluation de l’engagement scolaire d’élèves en secondaire : quels facteurs sous-jacents sont en jeu ?
Kerger, Sylvie UL; Milmeister, Paul UL; Dierendonck, Christophe UL et al

in Actes du colloque of the 31ème coloque de l'ADMEE-Europe (2019, January 09)

Dans cette communication, nous allons, dans une perspective d’évitement du décrochage scolaire, nous pencher sur l’évaluation de l’engagement scolaire d’élèves en enseignement secondaire. Plus précisément ... [more ▼]

Dans cette communication, nous allons, dans une perspective d’évitement du décrochage scolaire, nous pencher sur l’évaluation de l’engagement scolaire d’élèves en enseignement secondaire. Plus précisément, nous tentons de mieux comprendre comment certains facteurs sous-jacents conditionnent ce dernier. En effet, l’engagement scolaire de l’élève peut être aussi bien lié à des facteurs individuels (sexe, catégorie socio-culturelle), qu’à des facteurs externes, tels que l’environnement scolaire. Nous posons les deux hypothèses suivantes : (1) Les élèves fréquentant les filières moins prestigieuses, ayant redoublé, ou issus d’un milieu social défavorable sont moins impliqués cognitivement (engagement cognitif) et ont plus souvent un comportement perturbateur (engagement comportemental). (2) Les perceptions de l’environnement scolaire et l’engagement scolaire des élèves sont associées positivement. Après avoir questionné 1473 élèves luxembourgeois, nous avons constaté que les facteurs individuels (le genre, position sociale des familles et la filière fréquentée) ne sont pas associés significativement à l’engagement cognitif des élèves, mais sont liés à l’engagement comportemental social (respect des règles). Les facteurs contextuels (perception de l'environnement scolaire, relation entre élèves et entre élèves et personnel, les climats éducatif, de justice, d’appartenance, de sécurité et la perception du bâtiment scolaire ainsi que l’orientation des buts centrés sur l’apprentissage ou sur la performance) sont liés aux deux variables dépendantes (engagement cognitif et engagement comportemental). Nos données confirment par ailleurs que l’orientation de l’école vers la performance est négativement liée à l’engagement des élèves. Nos deux hypothèses sont partiellement confirmées. Les deux variables dépendantes se distinguent en ce sens que l’engagement cognitif est lié quasi uniquement aux variables contextuelles, alors que les comportements perturbateurs sont aussi bien liés à des variables individuelles que contextuelles. Nos résultats montrent que l’évaluation de l’engagement scolaire peut fournir des informations aux enseignants permettant la mise en place de mesures pédagogiques agissant p.ex. sur les facteurs externes afin d’améliorer l’engagement scolaire des élèves. [less ▲]

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailLa mesure des représentations et des pratiques parentales et leur mise en relation avec le développement des premières compétences numériques auprès d'élèves luxembourgeois du préscolaire.
Poncelet, Débora UL; Tinnes-Vigne, Mélanie; Dierendonck, Christophe UL

in Gremion, Christophe; Sylvestre, Emmanuel; Younes, Nathalie (Eds.) Actes du 31ème colloque scientifique international de l'Admée-Europe: Entre normalisation, contrôle et développement formatif. Evaluation sources de synergies ? (2019, January)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailAnimal autobiographique et poétique de l'évolution. Lecture zoopoétique de l'oeuvre de Jean Portante
Thiltges, Sébastian UL

in Glesener, Jeanne; Raus, Tonia (Eds.) Jean Portante. Le travail de l'écriture ou la mémoire à l'oeuvre (2019)

La clé de voûte du roman Mrs Haroy ou La Mémoire de la baleine (Echternach : Phi, 1993 ; rééd. Bordeaux : Le Castor Astral, 1999) est le souvenir du cadavre embaumé d’une baleine abattue au large de l’île ... [more ▼]

La clé de voûte du roman Mrs Haroy ou La Mémoire de la baleine (Echternach : Phi, 1993 ; rééd. Bordeaux : Le Castor Astral, 1999) est le souvenir du cadavre embaumé d’une baleine abattue au large de l’île de Haroy en Norvège, exposé sur un wagon ferroviaire à la gare de Luxembourg. Ce spectacle représente non seulement une expérience fondatrice pour le narrateur, mais tisse un réseau métaphorique reliant l’écrivain, l’étranger et l’animal dans leur passage de frontière et dans leur exil. L’image a été abondamment commentée et sa portée littéraire, linguistique et socioculturelle au Luxembourg fut prodigieuse . Cependant, la critique demeure étonnamment silencieuse sur la genèse de la métaphore : puisant aussi bien dans des textes scientifiques et des récits de voyages que dans des œuvres littéraires, le romancier passe outre les traditionnelles frontières génériques entre description naturaliste et imaginaire culturel. De même, si l’image poétique et poétologique du poumon a fait l’objet d’études approfondies de l’œuvre de Jean Portante, incluant les recueils de poésie L’Étrange langue (Châtelineau : Le Taillis Pré, 2002) et Le Travail du poumon (Bordeaux : Le Castor Astral, 2007), la lecture d’un chapitre de Mrs Haroy, où les millions d’années de l’évolution des cétacés sont au cœur de l’élaboration d’une poétique romanesque reliant les temporalités du récit intime, du contexte sociohistorique d’une migration et des transformations des formes de vie, permettra de porter un regard nouveau sur l’invention formelle qui sous-tend l’image. Dans le cadre des études éco- et zoocritiques (environmental et animal studies), nous souhaitons refonder le motif de la baleine, que nous ne lirons pas uniquement en tant que métaphore, nécessairement anthropocentrique et réduisant la nature au rôle de palimpseste sur lequel viennent s’écrire les histoires humaines. L’intérêt écologique du roman de Jean Portante ne réside pas simplement dans la présence de l’animal prototypique de la défense des animaux, dans les descriptions des atrocités réelles ou fictionnelles que subissent les cétacés ni dans l’identification du narrateur avec le non-humain. En effet, pour Jean-François Lyotard, l’art et la littérature sont des discours « écologiques » parce qu’ils font parler des voix mises à l’écart, et Jacques Derrida de poursuivre, dans L’Animal que donc je suis , la déconstruction des oppositions heuristiques de l’Occident à travers l’expression poétique d’une vision écocentrée de soi-même dans la communauté du vivant. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Extended Abstract)
Steen, Alexander UL; Benzmüller, Christoph UL

in Benzmüller, Christoph; Stuckenschmidt, Heiner (Eds.) {KI} 2019: Advances in Artificial Intelligence - 42nd German Conference on AI, Kassel, Germany, September 23-26, 2019, Proceedings (2019)

Detailed reference viewed: 51 (1 UL)
Full Text
Peer Reviewed
See detailHow Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program
Bernard, Nicolas UL; Leprévost, Franck UL

in Theeramunkong, Thanaruk; Bouvry, Pascal; Srichaikul, Piyawut (Eds.) Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (2019)

Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful ... [more ▼]

Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful deceptions may have disastrous consequences. Still, humans sometimes detect mistakes made by machines when they classify images. One can conceive a system able to solicit humans in case of doubts, namely when humans and machines may disagree. Using Information Hiding techniques, we describe a strategy to construct evolutionary algorithms able to fool both neural networks and humans for image recognition. Although this research is still exploratory, we already describe a concrete fitness function for a specific scenario. Additional scenarii and further research directions are provided. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in Springer Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). (2019)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 672 (48 UL)
Full Text
Peer Reviewed
See detailPopularity-driven Ontology Ranking using Qualitative Features
Kolbe, Niklas UL; Kubler, Sylvain UL; Le Traon, Yves UL

in The Semantic Web - ISWC 2019 (2019)

Efficient ontology reuse is a key factor in the Semantic Web to enable and enhance the interoperability of computing systems. One important aspect of ontology reuse is concerned with ranking most relevant ... [more ▼]

Efficient ontology reuse is a key factor in the Semantic Web to enable and enhance the interoperability of computing systems. One important aspect of ontology reuse is concerned with ranking most relevant ontologies based on a keyword query. Apart from the semantic match of query and ontology, the state-of-the-art often relies on ontologies' occurrences in the Linked Open Data (LOD) cloud to determine relevance. We observe that ontologies of some application domains, in particular those related to Web of Things (WoT), often do not appear in the underlying LOD datasets used to define ontologies' popularity, resulting in ineffective ranking scores. This motivated us to investigate - based on the problematic WoT case - whether the scope of ranking models can be extended by relying on qualitative attributes instead of an explicit popularity feature. We propose a novel approach to ontology ranking by (i) selecting a range of relevant qualitative features, (ii) proposing a popularity measure for ontologies based on scholarly data, (iii) training a ranking model that uses ontologies' popularity as prediction target for the relevance degree, and (iv) confirming its validity by testing it on independent datasets derived from the state-of-the-art. We find that qualitative features help to improve the prediction of the relevance degree in terms of popularity. We further discuss the influence of these features on the ranking model. [less ▲]

Detailed reference viewed: 83 (1 UL)
Full Text
Peer Reviewed
See detailSTV: Model Checking for Strategies under Imperfect Information
Kurpiewski, Damian; Jamroga, Wojciech UL; Knapik, Micha L

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailMajorization-Minimization Algorithms for Analog Beamforming with Large-Scale Antenna Arrays
Arora, Aakash UL; Tsinos, Christos UL; Shankar, Bhavani UL et al

in Proc. 7th IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2019 (2019)

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly ... [more ▼]

Beamforming with large-scale antenna arrays (LSAA) is one of the predominant operations in designing wireless communication systems. However, the implementation of a fully digital system significantly increases the number of required radio-frequency (RF) chains, which may be prohibitive. Thus, analog beamforming based on a phase-shifting network driven by a variable gain amplifier (VGA) is a potential alternative technology. In this paper, we cast the beamforming vector design problem as a beampattern matching problem, with an unknown power gain. This is formulated as a unit-modulus least-squares (ULS) problem where the optimal gain of the VGA is also designed in addition to the beamforming vector. We also consider a scenario where the receivers have the additional processing capability to adjust the phases of the incoming signals to mitigate specular multipath components. We propose efficient majorization-minimization (MM) based algorithms with convergence guarantees to a stationary point for solving both variants of the proposed ULS problem. Numerical results verify the effectiveness of the proposed solution in comparison with the existing state-of-the-art techniques. [less ▲]

Detailed reference viewed: 284 (47 UL)
Full Text
Peer Reviewed
See detailSustainability's Coming Home : Preliminary Design Principles for the Sustainable Smart District
Keller, Robert; Röhrich, Felix; Schmidt, Lukas et al

in 14. International Business Informatics Conference (2019)

Consumer trends like local consumption, sharing of property, and environmental awareness change our habits and thereby our surroundings. These trends have their origin in our direct environment, in the ... [more ▼]

Consumer trends like local consumption, sharing of property, and environmental awareness change our habits and thereby our surroundings. These trends have their origin in our direct environment, in the districts of our city or community, where we live and socialize. Cities and districts are changing to “smart cities” and “smart districts” as a part of the ongoing digitalization. These changes offer the possibility to entrench the idea of sustainability and build a platform-based ecosystem for a sustainable smart district. This research aims to identify guidelines in form of preliminary design principles (PDPs) for sustainable smart districts. To achieve this, we conduct a structured literature review. On this basis, we derive and develop PDPs with the help of semi-structured interviews and a non-representative sample of the German population. The resulting nine PDPs describe a first insight into the design of sustainable smart districts. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailAffordance-Experimentation-Actualization Theory in Artificial Intelligence Research : a Predictive Maintenance Story
Keller, Robert; Stohr, Alexander; Fridgen, Gilbert UL et al

in 40th International Conference on Information Systems (2019)

Artificial intelligence currently counts among the most prominent digital technologies and promises to generate significant business value in the future. Despite a growing body of knowledge, research ... [more ▼]

Artificial intelligence currently counts among the most prominent digital technologies and promises to generate significant business value in the future. Despite a growing body of knowledge, research could further benefit from incorporating technological features, human actors, and organizational goals into the examination of artificial intelligence-enabled systems. This integrative perspective is crucial for effective implementation. Our study intends to fill this gap by introducing affordance-experimentation-actualization theory to artificial intelligence research. In doing so, we conduct a case study on the implementation of predictive maintenance using affordance-experimentation-actualization theory as our theoretical lens. From our study, we find further evidence for the existence of the experimentation phase during which organizations make new technologies ready for effective use. We propose extending the experimentation phase with the activity of ‘conceptual exploration’ in order to make affordance-experimentation-actualization theory applicable to a broader range of technologies and the domain of AI-enabled systems in particular. [less ▲]

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailHow ill is your IT Portfolio? : Measuring Criticality in IT Portfolios Using Epidemiology
Guggenmos, Florian; Hofmann, Peter; Fridgen, Gilbert UL

in 40th International Conference on Information Systems, Munich, Germany, 2019 (2019)

IT project portfolios, consisting of IT projects, also interact with the entire IT landscape. In case of a failure of only one element, existing dependencies can lead to a cascade failure, which can cause ... [more ▼]

IT project portfolios, consisting of IT projects, also interact with the entire IT landscape. In case of a failure of only one element, existing dependencies can lead to a cascade failure, which can cause high losses. Despite the present effects of systemic risk, research into IT portfolio management lacks suitable methods to quantitatively assess systemic risk. We follow the design science research paradigm to develop and evaluate our ‘on track’ or ‘in difficulty’ (TD) method by applying the SI model, representing a recognized network diffusion model in epidemiology, in an IT portfolio context. We evaluate our method using a real-world dataset. We introduce a criticality measure for diffusion models in IT portfolios and compare the TD method’s results and the alpha centrality to human judgment as a benchmark. From our evaluation, we conclude that the TD method outperforms alpha centrality and is a suitable risk measure in IT portfolio management. [less ▲]

Detailed reference viewed: 1 (0 UL)
Full Text
Peer Reviewed
See detailDecoupling, Information Technology, and the Tradeoff between Organizational Reliability and Organizational Agility
Keller, Robert; Ollig, Philipp; Fridgen, Gilbert UL

in 27th European Conference on Information Systems (ECIS) (2019)

Information technology (IT) units within organizations pursue both organizational reliability and agility goals. Reliability ensures the stability and business continuity of organizations, whereas agility ... [more ▼]

Information technology (IT) units within organizations pursue both organizational reliability and agility goals. Reliability ensures the stability and business continuity of organizations, whereas agility helps to detect and exploit market opportunities. In our research, we study projects in 19 organizations and unravel the relationship between agility and reliability. We observe that in certain cases reliability can undermine agility and vice versa. Global rules, routines, and procedures can hinder organizational agility whereas responding creatively for agility can locally undermine global organizational reliability. Further, we find that organizations often use decoupling to deal with this trade-off. Although decoupling enables them to be agile and reliable at the same time, it risks undermining both capabilities in the future, by encouraging the accumulation of technical debt. We find indications of how technical debt limits opportunities to creatively respond and can increase vulnerabilities. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailEconomic inequality and intergenerational socioeconomic persistence: A European test of the Great Gatsby Curve hypothesis
Chauvel, Louis UL; Hartung, Anne UL

in Long-term consequences of the Great Recession for stratification, mobility and inequality. Abstracts booklet. (2019)

Detailed reference viewed: 168 (6 UL)
Full Text
Peer Reviewed
See detail(How) Can Blockchain Contribute to the Management of Systemic Risks in Global Supply Networks?
Fridgen, Gilbert UL; Körner, Marc-Fabian; Sedlmeir, Johannes et al

in 14. Internationale Tagung Wirtschaftsinformatik (2019)

Even though globalization has led to larger, faster, and more efficient supply chains, at the same time the new worldwide interconnection has also resulted in major challenges with respect to hidden ... [more ▼]

Even though globalization has led to larger, faster, and more efficient supply chains, at the same time the new worldwide interconnection has also resulted in major challenges with respect to hidden systemic risks. In particular, there is a lack of a holistic perspective on the entire supply network. This missing global view prohibits the anamnesis and management of underlying risks. Against this backdrop, in this paper we discuss the potential contributions of Blockchain technology to systemic risk management in global supply chains and networks. Given the increasing number of recent initiatives of businesses in the context of Blockchain, we argue that Blockchain technology can lower the hurdle for the use of secure multiparty computation. Ultimately, it may be possible to implement a corresponding monitoring mechanism for systemic risks without (i) the need of a central authority and (ii) revealing competition relevant, confidential information to other supply network participants. [less ▲]

Detailed reference viewed: 14 (3 UL)
See detailDiscrete-Phase Sequence Design for Coexistence of MIMO Radar and MIMO Communications
Alaee-Kerahroodi, Mohammad UL; Mishra, Kumar Vijay; Shankar, M. R. Bhavani et al

in 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2019)

Detailed reference viewed: 61 (5 UL)
Full Text
Peer Reviewed
See detailA learning-based framework for automatic parameterized verification
Li, Yongjian; Cao, Jialun; Pang, Jun UL

in Proceedings of the 37th International Conference on Computer Design (ICCD) (2019)

Detailed reference viewed: 29 (0 UL)
See detailSpace Mining and Environmental Protection: Recycling International Agreements into New Legal Practices
Leterre, Gabrielle UL

in Proceedings of the 70th International Astronautical Congress 2019 (2019)

The increasing interest in extracting natural resources from celestial bodies raises many issues, among which guaranteeing environmental standards is paramount. There is more than a reasonable concern ... [more ▼]

The increasing interest in extracting natural resources from celestial bodies raises many issues, among which guaranteeing environmental standards is paramount. There is more than a reasonable concern that industrial exploitation of the outer space lead to similar or even greater disasters than the ones already afflicting Earth. There is a consensus among the legal community that international law does provide environmental protection through the Outer Space Treaty in its Article IX; it prevents harmful contamination, mandates due regard and recommends consultation. However, this provision, applicable to all space activities, is too general. It precludes the agreement from effectively protecting the outer space’s environment in the context of specific activities. The contribution aims at exploring appropriate legal responses. It is often proposed that such a response should be to prepare a new international agreement. However, treaty-making process involves a long time. Not even considering the reluctance of States to adopt binding international documents limiting their freedom in space, there is a high chance that space mining activities will have started by the time there is any kind of international agreement. This is why another approach must be envisaged; one which takes into account the analysis of existing environmental standards that could be leveraged to answer the challenges of space mining activities. Special attention will be paid to the enforcement of the Outer Space Treaty and how it should be combined with what is usually referred to as “soft laws”—such as the work of the international Committee on Space Research (COSPAR) on planetary protection policies. As a conclusion, the contribution attempts to answer the question of the transforming role of States in complementing existing international standards for the protection of the outer space environment. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailA non-invasive tool for attention-deficit disorder analysis based on gaze tracks
Cazzato, Dario UL; Castro, Silvia M.; Agamennoni, Osvaldo et al

in Proceedings of the 2nd International Conference on Applications of Intelligent Systems (2019)

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailA Proposal for Security Assessment of Trustzone-M based Software
Iannillo, Antonio Ken UL; State, Radu UL

in 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) (2019)

With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical ... [more ▼]

With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical world or other software entities with minimal or no human input. This fast abstract proposes a methodology for the security assessment of software based on TrustZone-M, the ARM hardware security extension for microcontrollers. The methodology consists of the exploitation of a verification and validation framework to automatically test TrustZone-M based software. [less ▲]

Detailed reference viewed: 149 (14 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition
Derbez, Patrick UL; Lallemand, Virginie; Udovenko, Aleksei UL

in Patterson, Kenneth G.; Stebila, Douglas (Eds.) Selected Areas in Cryptography -- SAC 2019 (2019)

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous ... [more ▼]

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous editions, the focus was made on practical attacks: contestants were asked to recover a 128-bit secret key from a given set of 2^20 plaintext blocks. The suggested SKINNY instances are 4- to 20-round reduced variants of SKINNY-64-128 and SKINNY-128-128. In this paper, we explain how to solve the challenges for 10-round SKINNY-128-128 and for 12-round SKINNY-64-128 in time equivalent to roughly 2^52 simple operations. Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode. [less ▲]

Detailed reference viewed: 118 (0 UL)
Full Text
Peer Reviewed
See detailProactive Model for Handling Conflicts in Sensor Data Fusion Applied to Robotic Systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Proceedings of the 14th International Conference on Software Technologies (ICSOFT), 2019 Prague, Czech Republic, 26 - 28 July, 2019 (2019)

Robots have to be able to function in a multitude of different situations and environments. To help them achieve this, they are usually equipped with a large set of sensors whose data will be used in ... [more ▼]

Robots have to be able to function in a multitude of different situations and environments. To help them achieve this, they are usually equipped with a large set of sensors whose data will be used in order to make decisions. However, the sensors can malfunction, be influenced by noise or simply be imprecise. Existing sensor fusion techniques can be used in order to overcome some of these problems, but we believe that data can be improved further by computing context information and using a proactive rule-based system to detect potentially conflicting data coming from different sensors. In this paper we will present the architecture and scenarios for a generic model taking context into account. [less ▲]

Detailed reference viewed: 118 (10 UL)
Full Text
Peer Reviewed
See detailPersonalized Sentiment Analysis and a Framework with Attention-Based Hawkes Process Model
Guo, Siwen UL; Höhn, Sviatlana UL; Xu, Feiyu et al

in Agents and Artificial Intelligence (2019)

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality ... [more ▼]

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the data sparsity issue, thus it is difficult to develop. In this article, we take texts from social platforms and propose a preliminary model for evaluating the effectiveness of including user information from the past, and offer a solution for the data sparsity. Furthermore, we present a finer-designed, enhanced model that focuses on frequent users and offers to capture the decay of past opinions using various gaps between the creation time of the text. An attention-based Hawkes process on top of a recurrent neural network is applied for this purpose, and the performance of the model is evaluated with Twitter data. With the proposed framework, positive results are shown which opens up new perspectives for future research. [less ▲]

Detailed reference viewed: 173 (39 UL)
Full Text
Peer Reviewed
See detailTraining binary classifiers as data structure invariants
Molina, Facundo; Degiovanni, Renzo Gaston UL; Ponzio, Pablo et al

in Proceedings of the 41st International Conference on Software Engineering ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019)

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and ... [more ▼]

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and training it to identify valid and invalid instances of a data structure. The obtained classifier can then be used in place of the data structure’s invariant, in order to attempt to identify (in)correct behaviors in programs manipulating the structure. In order to produce the valid objects to train the network, an assumed-correct set of object building routines is randomly executed. Invalid instances are produced by generating values for object fields that “break” the collected valid values, i.e., that assign values to object fields that have not been observed as feasible in the assumed-correct program executions that led to the collected valid instances. We experimentally assess this approach, over a benchmark of data structures. We show that this learning technique produces classifiers that achieve significantly better accuracy in classifying valid/invalid objects compared to a technique for dynamic invariant detection, and leads to improved bug finding. [less ▲]

Detailed reference viewed: 77 (3 UL)
Full Text
Peer Reviewed
See detailNAI: The Normative Reasoner
Libal, Tomer UL; Steen, Alexander UL

in Bex, Floris (Ed.) Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law (2019)

Detailed reference viewed: 30 (5 UL)
Full Text
Peer Reviewed
See detailInterozeptive Genauigkeit: Ein methodischer Vergleich von zwei Heartbeat Tracking Paradigmen
Haciahmet, C.; Opdensteinen, K.; Schaan, L. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert ... [more ▼]

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert nach Melloni et al., 2013) - welche Interozeptive Genauigkeit (IG) anhand des Vergleichs von objektiver und selbst-berichteter Herzrate erfassen (Garfinkel et al., 2015). Die Paradigmen unterscheiden sich hinsichtlich des mentalen Zählens (HTT) und motorischen Tappings (aHTT) von kardiovaskulären Empfindungen. Tapping wird in Biofeedback-Studien zur Verbesserung der IG angewendet (Ring et al., 2015), bislang jedoch kaum mit mentalem Zählen verglichen. 74 gesunde Versuchspersonen (MAlter = 22.66, SDAlter = 2.74, 49 Frauen) bearbeiteten den HTT und den aHTT. Die IGScores des HTT waren im Durchschnitt signifikant höher als im aHTT (t(73) = 2.73, p = .01, d = .28). Bei einem Cut-Off von IG = 0.70 konnten 37 gute Herzschlagwahrnehmer/innen im HTT und 27 gute Herzschlagwahrnehmer/innen im aHTT klassifiziert werden. Auch im Selbstbericht zur eigenen Herzschlagwahrnehmungsfähigkeit, zeigte sich bei den Probanden ein höheres Konfidenzrating im HTT als im aHTT (MHTT = 5.00, SD = 2.04; MaHTT = 3.88, SD = 1.77; Z(74) = -5.24, p < .01, d = .59). Zusammenfassend weisen die Ergebnisse auf eine bessere Herzschlagwahrnehmung im HTT hin, sowohl bezüglich der IG-Scores als auch im Selbstbericht. Eine Erklärung für die niedrigeren Interozeptionswerte im aHTT könnte sein, dass die sensorische und motorische Interferenz der Tapping-Aufgaben mit der Detektion von afferenten Herzsensationen konkurrieren, weshalb der salientere Tapping-Stimulus den Aufmerksamkeitsfokus von internalen Prozessen ablenkt (Pennebaker & Hoover, 1984). Zukünftige Studien sollten prüfen, welche spezifischen Einsatzmöglichkeiten sich für HTT und aHTT anbieten, hinsichtlich einer akkuraten und ökonomischen Erfassung von IG. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailZur Validität zweier Herzschlagwahrnehmungsaufgaben: Höheres zentrales Blutvolumen durch Kipptischmanipulation verbessert interozeptive Genauigkeit, aber nicht die Genauigkeit zur Schätzung von Zeitintervallen
Back, S.; Schaan, V. K.; Vögele, Claus UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Kardiale Interozeption wird typischerweise mittels Herzschlagzählaufgaben (Schandry, 1981) oder Herzschlagdiskriminationsaufgaben (Whitehead et al., 1977) erfasst. Jedoch sind die Determinanten der ... [more ▼]

Kardiale Interozeption wird typischerweise mittels Herzschlagzählaufgaben (Schandry, 1981) oder Herzschlagdiskriminationsaufgaben (Whitehead et al., 1977) erfasst. Jedoch sind die Determinanten der Herzschlagwahrnehmung hinsichtlich Aktivitätsindizes des kardiovaskulären Systems bisher ungeklärt. Die vorliegende Studie untersucht, ob die experimentelle Manipulation kardiovaskulärer Aktivität durch die Variation der Körperposition mittels Kipptisch einen Einfluss auf interozeptive Genauigkeit in Herzschlagzählaufgaben und Herzschlagdiskriminierungsaufgaben hat. Studierende (N=43) führten beide Herzschlagwahrnehmungsaufgaben in drei Körperpositionen (-10°,0° und 10°) durch. Zusätzlich wurde die Fähigkeit zur Einschätzung von Zeitintervallen geprüft (Kontrollaufgabe), da oft kritisiert wurde, dass interozeptive Genauigkeit basierend auf der Herzschlagzählaufgabe mit dieser Fähigkeit konfundiert ist. Die interozeptive Genauigkeit in der Herzschlagzählaufgabe war signifikant höher bei einem Neigungswinkel von -10° (über Kopf), sowie geringer bei 10° (Kopf aufrecht), jeweils im Vergleich zu 0° (horizontale Position). Deskriptiv ist das gleiche Muster bei der Herzschlagdiskriminationssaufgabe zu erkennen, jedoch statistisch nicht signifikant. Die Einschätzungsgenauigkeit von Zeitintervallen bleibt unabhängig von der Körperposition konstant. Regressionsanalysen zeigen, dass die Fähigkeit zur Diskriminierung von Herzschlägen signifikant die Herzschlagzählgenauigkeit vorhersagt und 32% der Gesamtvarianz aufklärt. Herzrate sowie die Einschätzungsgenauigkeit von Zeitintervallen tragen nicht signifikant als Prädiktoren in der Aufklärung der Zählgenauigkeit bei. Die Ergebnisse weisen darauf hin, dass kardiodynamische Parameter, wie z.B. Schlagvolumen, die durch die Variation der Körperposition manipuliert wurden, unabhängig von Variationen der Herzrate, eine Determinante interozeptiver Genauigkeit in Herzschlagzählaufgaben darstellen. Die Einschätzung von Zeitintervallen hat keinen Einfluss auf die Zähl- und Diskriminationsgenauigkeit von Herzschlägen und wird außerdem nicht von der Körperposition beeinflusst. Die Ergebnisse weisen auf gute konvergente und diskriminante Validität der Herzschlagwahrnehmungsaufgaben zur Erfassung kardialer Interozeption hin. [less ▲]

Detailed reference viewed: 21 (1 UL)