References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailConversational Interfaces for Explainable AI: A Human-Centered Approach
Jenzsch, Sophie; Höhn, Sviatlana UL; Hochgeschwender, Nico UL

in Proceedings of EXTRAAMAS 2019 (2019)

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an ... [more ▼]

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an intelligent agent. We propose conversational interfaces (CI) to be the perfect setting, since they are intuitive for humans and computationally processible. While there are many approaches addressing technical issues of this human-agent communication problem, the user perspective appears to be widely neglected. With the purpose of better requirement understanding and identification of implicit expectations from a human-centered view, a Wizard of Oz experiment was conducted, where participants tried to elicit basic information from a pretended artificial agent (What are your capabilities?). The hypothesis that users pursue fundamentally different strategies could be verified with the help of Conversation Analysis. Results illustrate the vast variety in human communication and disclose both requirements of users and obstacles in the implementation of protocols for interacting agents. Finally, we infer essential indications for the implementation of such a CI. [less ▲]

Detailed reference viewed: 87 (3 UL)
See detailFree Transit in Luxembourg: A case of post-political urban governance through policy mobility
Hesse, Markus UL; Carr, Constance UL

in Witlox, Frank (Ed.) Moving Towards More Sustainable Mobility and Transport through Smart Systems - Proceedings of the BIVEC-GIBET Transport Research Days 2019 (2019)

Detailed reference viewed: 80 (1 UL)
See detailSelf-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models
Samir, Areeg UL; Pahl, C.

in The Fourth IEEE International Conference on Fog and Mobile Edge Computing (2019)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailRLS Waveform Adaptation for Massive MIMO Systems with Nonlinear Front-End
Bereyhi, A.; Asaad, S.; Müller, R.R et al

in IEEE International Workshop on Signal Processing Advances in Wireless Communication (2019)

To keep massive MIMO systems cost-efficient, power amplifiers with rather small output dynamic ranges are employed. They may distort the transmit signal and degrade the performance. This paper proposes a ... [more ▼]

To keep massive MIMO systems cost-efficient, power amplifiers with rather small output dynamic ranges are employed. They may distort the transmit signal and degrade the performance. This paper proposes a distortion aware precoding scheme for realistic scenarios in which RF chains have nonlinear characteristics. The proposed scheme utilizes the method of regularized least-squares (RLS) to jointly compensate the channel impacts and the distortion imposed by the RF chains. To construct the designed transmit waveform with low computational complexity, an iterative algorithm based on approximate message passing is developed. This algorithm is shown to track the achievable average signal distortion of the proposed scheme tightly, even for practical system dimensions. The results demonstrate considerable enhancement compared to the state of the art. Index Terms-Precoding, nonlinear power amplifiers, approximate message passing, regularized least-squares, massive MIMO. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailPrivacy and Linkability of Mining in Zcash
Biryukov, Alex UL; Feher, Daniel UL

in 2019 IEEE Conference on Communications and Network Security (CNS) (2019)

With the growth in popularity for cryptocurrencies the need for privacy preserving blockchains is growing as well. Zcash is such a blockchain, providing transaction privacy through zero-knowledge proofs ... [more ▼]

With the growth in popularity for cryptocurrencies the need for privacy preserving blockchains is growing as well. Zcash is such a blockchain, providing transaction privacy through zero-knowledge proofs. In this paper we analyze transaction linkability in Zcash based on the currency minting transactions (mining). Using predictable usage patterns and clustering heuristics on mining transactions an attacker can link to publicly visible addresses over 84% of the volume of the transactions that use a ZK-proof. Since majority of Zcash transactions are not yet using ZK-proofs, we show that overall 95.5% of the total number of Zcash transactions are potentially linkable to public addresses by just observing the mining activity. [less ▲]

Detailed reference viewed: 227 (20 UL)
Full Text
Peer Reviewed
See detailUsing crowd-sourced data to analyse the ongoing merger of [ɕ] and [ʃ] in Luxembourgish
Gilles, Peter UL

in Calhoun, Sasha; Escudero, Paola; Tabain, Marija (Eds.) et al Proceedings of the 19th International Congress of Phonetic Sciences. Melbourne, Australia (2019)

Similar to neighbouring German varieties, the recent language history of Luxembourgish is subject to an ongoing merger of the alveolopalatal fricative [ɕ] (deriving from the palatal fricative [ç]) and the ... [more ▼]

Similar to neighbouring German varieties, the recent language history of Luxembourgish is subject to an ongoing merger of the alveolopalatal fricative [ɕ] (deriving from the palatal fricative [ç]) and the postalveolar fricative [ʃ], leading progressively to the collapse, for example, of the minimal pair frech [fʀæɕ] 'cheeky, impertinent' and Fräsch [fʀæʃ] 'frog'. The present study will draw on a large dataset— which has been recorded using an innovative smartphone application—consisting of fricative realisations of more than 1,300 speakers. In an acoustic analysis, various parameters of the two fricatives will be studied (Centre of Gravity, spectral moments, Euclidian distance, DCT coefficients) and correlated with the speaker’s age. The results show that the merger is acoustically manifest for nearly all age groups. Only the oldest speakers keep the two fricatives distinct. [less ▲]

Detailed reference viewed: 102 (7 UL)
Full Text
Peer Reviewed
See detailGraph-based malicious login events investigation
Amrouche, Faouzi UL; Lagraa, Sofiane UL; Kaiafas, Georgios UL et al

in Amrouche, Faouzi; Lagraa, Sofiane; Kaiafas, Georgios (Eds.) et al 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 126 (21 UL)
Full Text
Peer Reviewed
See detailPower and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019 (2019)

Detailed reference viewed: 127 (25 UL)
Full Text
Peer Reviewed
See detailHerzschlag-evozierte Potenziale bei Bulimia nervosa
Lutz, Annika UL; Van Dyck, Zoé UL; Schulz, André UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben ... [more ▼]

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben sich je nach betrachtetem Organsystem (Herz, Magen), Verarbeitungsebene (neuronal, Selbstbericht) und Diagnose. Die bisherige Befundlage ist jedoch unübersichtlich und widersprüchlich. Für Bulimia nervosa (BN) wurde sowohl reduzierte, als auch unveränderte Herzschlagwahrnehmung berichtet. Mit dem vorliegenden Beitrag steuern wir weitere Ergebnisse zur Herzschlagwahr nehmung bei und ergänzen diese um einen physiologischen Indikator der kortikalen Verarbeitung kardio-afferenter Signale (Herzschlag-evozierte Potenziale, HEPs). Es wurden 22 Frauen mit akuter oder teilremittierter BN (BMI 23,94±3,61; Alter 31,86±11,20) und 22 gesunde Frauen untersucht (BMI 24,24±3,37; Alter 31,00±10,15). Die Stichproben wurden nach Alter und BMI parallelisiert. Die Teilnehmerinnen führten eine Herzschlagwahrnehmungsaufgabe nach Schandry durch, während ein 64-Kanal-EEG aufgezeichnet wurde. HEPs wurden als mittlere EEG-Amplitude von 455ms bis 595ms nach der R-Zacke berechnet. Die Ergebnisse zeigen keine signifikanten Gruppenunterschiede in Herzschlagwahrnehmung, HEPs und Herzrate. Dies bestätigt vorherige Befunde einer intakten Herzschlagwahrnehmung bei BN. Zusätzlich können wir von einer intakten kortikalen Verarbeitung kardio-afferenter Reize ausgehen. Die Wahrnehmung des Herzschlags ist insbesondere für die Verarbeitung und Regulation von Emotionen relevant. Auf Basis der vorliegenden und früheren Befunde ist davon auszugehen, dass defizitäre Emotionsregulation bei BN nicht auf veränderte Herzschlagwahrnehmung zurückzuführen ist. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailSatellite Links Integrated in 5G SDN-enabled Backhaul Networks: An Iterative Joint Power and Flow Assignment
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in European Signal Processing Conference (EUSIPCO), A Coruna, Spain, Sept. 2019 (2019)

Detailed reference viewed: 106 (13 UL)
Full Text
Peer Reviewed
See detailDesigning Set of Binary Sequences and Space-Time Receive Filter for Moving Targets in Colocated MIMO Radar Systems
Feraidooni, Mohammad Mahdi; Alaee-Kerahroodi, Mohammad UL; Imani, Sadjad et al

in 2019 20th International Radar Symposium (IRS) (2019)

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailTaking Defeasible Entailment beyond Rational Closure
Casini, Giovanni UL; Meyer, Thomas; Varzinczak, Ivan

in Proceedings of the 16th European Conference on Logics in Artificial Intelligence (JELIA-19) (2019)

We present a systematic approach for extending the KLM framework for defeasible entailment. We first present a class of basic defeasible entailment relations, characterise it in three distinct ways and ... [more ▼]

We present a systematic approach for extending the KLM framework for defeasible entailment. We first present a class of basic defeasible entailment relations, characterise it in three distinct ways and provide a high-level algorithm for computing it. This framework is then refined, with the refined version being characterised in a similar manner. We show that the two well-known forms of defeasible entailment, rational closure and lexicographic closure, fall within our refined framework, that rational closure is the most conservative of the defeasible entailment relations within the framework (with respect to subset inclusion), but that there are forms of defeasible entailment within our framework that are more “adventurous” than lexicographic closure. [less ▲]

Detailed reference viewed: 73 (6 UL)
Full Text
Peer Reviewed
See detailTwo-stage RGB-based Action Detection using Augmented 3D Poses
Papadopoulos, Konstantinos UL; Ghorbel, Enjie UL; Baptista, Renato UL et al

in 18th International Conference on Computer Analysis of Images and Patterns SALERNO, 3-5 SEPTEMBER, 2019 (2019)

In this paper, a novel approach for action detection from RGB sequences is proposed. This concept takes advantage of the recent development of CNNs to estimate 3D human poses from a monocular camera. To ... [more ▼]

In this paper, a novel approach for action detection from RGB sequences is proposed. This concept takes advantage of the recent development of CNNs to estimate 3D human poses from a monocular camera. To show the validity of our method, we propose a 3D skeleton-based two-stage action detection approach. For localizing actions in unsegmented sequences, Relative Joint Position (RJP) and Histogram Of Displacements (HOD) are used as inputs to a k-nearest neighbor binary classifier in order to define action segments. Afterwards, to recognize the localized action proposals, a compact Long Short-Term Memory (LSTM) network with a de-noising expansion unit is employed. Compared to previous RGB-based methods, our approach offers robustness to radial motion, view-invariance and low computational complexity. Results on the Online Action Detection dataset show that our method outperforms earlier RGB-based approaches. [less ▲]

Detailed reference viewed: 124 (11 UL)
Full Text
Peer Reviewed
See detailPrivate Votes on Untrusted Platforms: Models, Attacks and Provable Scheme
Bursuc, Sergiu UL; Dragan, Constantin-Catalin; Kremer, Steve

in Bursuc, Sergiu; Dragan, Constantin-Catalin; Kremer, Steve (Eds.) Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme (2019)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailComposable, Unconditionally Secure Message Authentication without any Secret Key
Ostrev, Dimiter UL

in 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019 (2019)

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and ... [more ▼]

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and reject a message coming from Eve with high probability. The system does not require any secret key shared between Alice and Bob, provides information theoretic security, and can safely be composed with other protocols in an arbitrary context. [less ▲]

Detailed reference viewed: 69 (8 UL)
Full Text
Peer Reviewed
See detailThe Higher-Order Prover Leo-III (Extended Abstract)
Steen, Alexander UL; Benzmüller, Christoph UL

in Benzmüller, Christoph; Stuckenschmidt, Heiner (Eds.) {KI} 2019: Advances in Artificial Intelligence - 42nd German Conference on AI, Kassel, Germany, September 23-26, 2019, Proceedings (2019)

Detailed reference viewed: 51 (1 UL)
Full Text
Peer Reviewed
See detailWhat’s in a Name: Gamifying the Intangible History of Larochette, Luxembourg
Morse, Christopher UL; de Kramer, Marleen UL

in Börner, Wolfgang; Uhlirz, Susanne (Eds.) Proceedings of the 23rd International Conference on Cultural Heritage and New Technologies 2018. CHNT 23, 2018 (Vienna 2019) (2019)

The Larochette app is part of a larger interdisciplinary project to create a digital reconstruction of the town and castle of Larochette, Luxembourg. The paper discusses the creation of an app that serves ... [more ▼]

The Larochette app is part of a larger interdisciplinary project to create a digital reconstruction of the town and castle of Larochette, Luxembourg. The paper discusses the creation of an app that serves to pique interest in linguistics and historical geography, traditionally dry subjects with little intrinsic appeal to children and the general public. This project harnesses this effect, presenting the results of the preceding landscape study in an interactive educational environment that rewards the user for engaging with the content. As the app allows natural movement and intuitive interaction, exploration and learning are prompted by curiosity. The goal of connecting place names to heritage is not explicitly stated, nor is it presented as an educational game. In short, this is the second phase of a collaborative case study in the digital experience of history, which is grounded in user experience design and informed by the historical and architectural expertise of the collaborators. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailEvaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models
Nejati, Shiva UL; Gaaloul, Khouloud UL; Menghi, Claudio UL et al

in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS ... [more ▼]

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness of models against some given formal properties. In this paper, we present an industrial Simulink model benchmark, provide a categorization of different model types in the benchmark, describe the recurring logical patterns in the model requirements, and discuss the results of applying model checking and model testing approaches to identify requirements violations in the benchmarked models. Based on the results, we discuss the strengths and weaknesses of model testing and model checking. Our results further suggest that model checking and model testing are complementary and by combining them, we can significantly enhance the capabilities of each of these approaches individually. We conclude by providing guidelines as to how the two approaches can be best applied together. [less ▲]

Detailed reference viewed: 147 (45 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in Grigoriou, Panos (Ed.) European Governance & Sovereignty (2019)

Detailed reference viewed: 65 (31 UL)
Full Text
Peer Reviewed
See detailStrategy Logic with Simple Goals: Tractable Reasoning about Strategies
Belardinelli, Francesco; Jamroga, Wojciech UL; Kurpiewski, Damian et al

in Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (2019)

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailMethodische Herausforderungen bei der Erfassung der interozeptiven Genauigkeit im Vorschulalter
Opdensteinen, K.; Schaan, L.; Pohl, A. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Im Vorschulalter entwickeln sich zentrale Fähigkeiten in Kognition, Sprache und Emotion. Dennoch ist wenig über das bewusste Erleben innerer Körperempfindungen bei Vorschulkindern bekannt, da es an ... [more ▼]

Im Vorschulalter entwickeln sich zentrale Fähigkeiten in Kognition, Sprache und Emotion. Dennoch ist wenig über das bewusste Erleben innerer Körperempfindungen bei Vorschulkindern bekannt, da es an altersangepassten Paradigmen zu Erfassung der interozeptiven Genauigkeit (IG) mangelt. Das Jumping Jack Paradigma (JJP) (Schaan et al., 2019) ist das erste explizite IG-Paradigma für Vorschulkinder, das eine Veränderung des Herzschlages durch eine körperliche Übung in die Erfassung integriert. Aufgrund methodischer Herausforderungen wurde das JJP modifiziert und an einer Stichprobe von 40 Kindern (22 Jungen, 4–6 Jahre) erprobt. Die Wahrnehmung des Herzschlags wurde zu sechs Zeitpunkten (3 Ratings in Ruhephasen und 3 nach Hampelmannsprüngen mit aufsteigender Sprungdauer je 15, 20 und 25s) auf einer 5-stufigen Ratingskala erfasst. Die Berechnung des IG-Wertes erfolgte durch Korrelationen zwischen der selbstberichteten und der objektiv-aufgezeichneten Herzrate. Die objektiv-gemessene Herzrate erhöhte sich in Abhängigkeit der Sprungdauer (F(2;78)=9.19, p<.001; pη²=0.19), während die selbstberichtete Herzrate nach dem zweiten Durchgang am höchsten eingeschätzt wurde (F(2;78)=9.37, p<.001; pη²=.19). Vorschulkinder variierten in ihrer IG (M=0.07, SD=0.37, Range:-0.74–0.88). Es zeigten sich keine signifikanten Unterschiede zwischen Mädchen und Jungen hinsichtlich der IG. Ältere Jungen zeigten eine höhere IG, verglichen mit jüngeren Jungen (χ²(2)=5.61, p=.05), während bei Mädchen kein Alterseffekt auftrat. Anhand des modifizierten JJP konnte gezeigt werden, dass einige Kinder bereits im Vorschulalter in der Lage sind, Veränderungen körpereigener Empfindungen wahrzunehmen. Die Induktion körperlichen Arousals scheint die Wahrnehmung des Herzschlages mit zunehmendem Alter vor allem bei Jungen zu erleichtern, da ältere Jungen sensitiver waren. Die Ergebnisse lassen vermuten, dass es im Vorschulalter Geschlechtsunterschiede bei der Körperwahrnehmung geben könnte. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailResources and Competences required at the Institutional Level for a Patient – Healthcare Professional Partnership
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has ... [more ▼]

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has given rise to patients who are active players in their care, and participate in decision-making. Central to these changes, are patients and healthcare professionals’, whose backgrounds and experiences reflect both cultural factors that influence health decisions, and a power shift from professional dominance to a more equitable partnership style. Our study aims to determine resources and competences required at the institutional level to implementing a partnership Semi-structured focus groups with 20 chronic disease patients and interviews with 15 healthcare professionals were conducted. Thematic content analysis was performed with NVivo 12 to categorize verbatim. Items were grouped into dimensions, and themes common to both parties were grouped together. Three major areas emerged: 1) Training to develop a partnership culture - Training healthcare professionals in patient psychology, developing therapeutic education programs for patients and enriching available information with patients’ experiential knowledge. 2) Creation of information / support centers for: Interdisciplinary meetings, facilitating the provision of structured, verified and pertinent information and providing administrative aid to patients. 3) Development of e-health solutions to: Provide information 24/7; facilitate collaborative content creation by healthcare professionals, patients and researchers, and for sharing and updating patient files among professionals. Our findings will help design, implement, monitor and evaluate suitable actions, and help promote sustainable forms of expertise – inclusion of experiential knowledge and resource patients within the healthcare team [less ▲]

Detailed reference viewed: 70 (3 UL)
Full Text
Peer Reviewed
See detailAnimal autobiographique et poétique de l'évolution. Lecture zoopoétique de l'oeuvre de Jean Portante
Thiltges, Sébastian UL

in Glesener, Jeanne; Raus, Tonia (Eds.) Jean Portante. Le travail de l'écriture ou la mémoire à l'oeuvre (2019)

La clé de voûte du roman Mrs Haroy ou La Mémoire de la baleine (Echternach : Phi, 1993 ; rééd. Bordeaux : Le Castor Astral, 1999) est le souvenir du cadavre embaumé d’une baleine abattue au large de l’île ... [more ▼]

La clé de voûte du roman Mrs Haroy ou La Mémoire de la baleine (Echternach : Phi, 1993 ; rééd. Bordeaux : Le Castor Astral, 1999) est le souvenir du cadavre embaumé d’une baleine abattue au large de l’île de Haroy en Norvège, exposé sur un wagon ferroviaire à la gare de Luxembourg. Ce spectacle représente non seulement une expérience fondatrice pour le narrateur, mais tisse un réseau métaphorique reliant l’écrivain, l’étranger et l’animal dans leur passage de frontière et dans leur exil. L’image a été abondamment commentée et sa portée littéraire, linguistique et socioculturelle au Luxembourg fut prodigieuse . Cependant, la critique demeure étonnamment silencieuse sur la genèse de la métaphore : puisant aussi bien dans des textes scientifiques et des récits de voyages que dans des œuvres littéraires, le romancier passe outre les traditionnelles frontières génériques entre description naturaliste et imaginaire culturel. De même, si l’image poétique et poétologique du poumon a fait l’objet d’études approfondies de l’œuvre de Jean Portante, incluant les recueils de poésie L’Étrange langue (Châtelineau : Le Taillis Pré, 2002) et Le Travail du poumon (Bordeaux : Le Castor Astral, 2007), la lecture d’un chapitre de Mrs Haroy, où les millions d’années de l’évolution des cétacés sont au cœur de l’élaboration d’une poétique romanesque reliant les temporalités du récit intime, du contexte sociohistorique d’une migration et des transformations des formes de vie, permettra de porter un regard nouveau sur l’invention formelle qui sous-tend l’image. Dans le cadre des études éco- et zoocritiques (environmental et animal studies), nous souhaitons refonder le motif de la baleine, que nous ne lirons pas uniquement en tant que métaphore, nécessairement anthropocentrique et réduisant la nature au rôle de palimpseste sur lequel viennent s’écrire les histoires humaines. L’intérêt écologique du roman de Jean Portante ne réside pas simplement dans la présence de l’animal prototypique de la défense des animaux, dans les descriptions des atrocités réelles ou fictionnelles que subissent les cétacés ni dans l’identification du narrateur avec le non-humain. En effet, pour Jean-François Lyotard, l’art et la littérature sont des discours « écologiques » parce qu’ils font parler des voix mises à l’écart, et Jacques Derrida de poursuivre, dans L’Animal que donc je suis , la déconstruction des oppositions heuristiques de l’Occident à travers l’expression poétique d’une vision écocentrée de soi-même dans la communauté du vivant. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailDo interoceptive deficits contribute to decision-making problems in academic procrastination
Breden, I.-H.; Dincher, K.; Pereira Pedrosa, R. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides ... [more ▼]

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides the selection for the potentially best option. In the present study, we aimed at investigating if chronically procrastinating individuals show interoceptive deficits, which may explain poor decision-making performance. We tested 19 chronic procrastinators (14 females) and 22 nonprocrastinating control individuals (14 females), recruited from students and staff of the University of Luxembourg. This study consisted of a laboratory experiment including questionnaires assessing procrastinating behavior and two separate behavioral paradigms. Using the Schandry Heartbeat Perception Task as an indicator for interoceptive accuracy and the Iowa Gambling Task (IGT) for the assessment of decision-making performance. Questionnaire data confirmed significantly higher procrastination scores in that group. While male participants showed a significantly higher interoceptive accuracy score than their female counterparts, procrastinators and non-procrastinators did not differ significantly in interoception. Furthermore, no differences in the choice of deck selections were found between procrastinators and non-procrastinators. Interoceptive accuracy was unrelated to decision-making performance. No significant group differences were found for either analysis regarding the performance development as well as sex differences in the IGT. We observed a learning effect in the IGT, with choices for profitable decks increasing over time and poor choices declining. The current study did neither support reduced decision-making problems, nor interoceptive deficits in procrastination. Future studies should incorporate interoceptive indicators of other organ systems and self-report measures to elucidate possible alterations in procrastination. [less ▲]

Detailed reference viewed: 59 (2 UL)
Full Text
Peer Reviewed
See detailErhöhte Reaktivität Herzschlag-evozierter Potenziale während der Aufmerksamkeits- fokussierung auf den eigenen Herzschlag und erhöhte kardiovaskuläre Aktivität bei Personen mit hoher somatoformer Symptombelastung
Schulz, André UL; Rost, S.; Dierolf, Angelika UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte ... [more ▼]

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte Signalübermittlung von Körperorganen und (2.) verringerte Filterfunktion im ZNS zu (3.) verstärkter Wahrnehmung von Symptomen führt. Bislang existiert jedoch keine Evidenz, die diesen Zusammenhang an einer von somatoformen Symptomen belasteten Population unterstützt. Um diesen Sachverhalt aufzudecken, wurden zunächst 486 Personen aus der Allgemeinbevölkerung anhand einer Online- Version des Screenings für Somatoforme Störungen (SOMS-2) anhand des oberen und unteren Centils in Personen mit hoher (HSB) und niedriger somatoformer Symptombelastung (NSB) geteilt. Jeweils 29 NSB- (21 Frauen; 26,0 J.) und HSBPersonen (27 Frauen; 28,4 J.) wurden im Labor anhand (1.) verstärkter Körpersignale hinsichtlich kardiovaskulärer Aktivität und Cortisol-Aufwachreaktion, sowie (2.) Filterfunktionen im ZNS hinsichtlich Herzschlag-evozierter Potentiale (HEPs) während der Durchführung eines Herzschlagwahrnehmungstests und während Ruhe untersucht. HEPs reflektieren die Repräsentation kardio-afferenter Signale im ZNS. Die HSB-Gruppe zeigte eine höhere Ruhe-Herzrate (72,7 vs. 66,8 bpm) und eine geringere Herzratenvariabilität (RMSSD: 36,8 vs. 52,5 ms) als die LSB-Gruppe. Außerdem zeigten die HSB-Personen bei der Aufmerksamkeitsfokussierung auf den eigenen Herzschlag eine höhere Reaktivität der HEP-Amplitude als die LSB-Personen. Es gab keine Gruppenunterschiede hinsichtlich der Cortisol-Aufwachreaktion. Die Ergebnisse belegen sowohl (1.) die verstärkte Signalübermittlung von Körperorganen, als auch (2.) verringerte Filterfunktionen bei Personen mit hoher somatoformer Symptombelastung. Dies spricht für die Gültigkeit des Perception-Filter-Modells. Die erhöhte HEP-Reaktivität bezüglich der Aufmerksamkeitsfokussierung auf Körperprozesse könnte einen Biomarker für Personen mit hohem Risiko für die Entwicklung von somatoformen Störungen darstellen. [less ▲]

Detailed reference viewed: 30 (4 UL)
See detailThat Escalated Quickly: The Cyber-ASAT Conundrum
Blount, Percy UL

in Blount, Percy; Masson-Zwaan, Tanja; Moro-Aguilar, Rafael (Eds.) et al 2018 Proceedings of the IISL (2019)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition
Derbez, Patrick UL; Lallemand, Virginie; Udovenko, Aleksei UL

in Patterson, Kenneth G.; Stebila, Douglas (Eds.) Selected Areas in Cryptography -- SAC 2019 (2019)

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous ... [more ▼]

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous editions, the focus was made on practical attacks: contestants were asked to recover a 128-bit secret key from a given set of 2^20 plaintext blocks. The suggested SKINNY instances are 4- to 20-round reduced variants of SKINNY-64-128 and SKINNY-128-128. In this paper, we explain how to solve the challenges for 10-round SKINNY-128-128 and for 12-round SKINNY-64-128 in time equivalent to roughly 2^52 simple operations. Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode. [less ▲]

Detailed reference viewed: 118 (0 UL)
Full Text
Peer Reviewed
See detailEnd-to-End Verifiable Quadratic Voting with Everlasting Privacy
Pereira, Olivier; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers (2019)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailProactive Middleware for Fault Detection and Advanced Conflict Handling in Sensor Fusion
Neyens, Gilles UL; Zampunieris, Denis UL

in Proceedings of the 18th International Conference, ICAISC 2019 Zakopane, Poland, June 16–20, 2019, Part I & II (2019)

Robots traditionally have a wide array of sensors that allow them to react to the environment and make appropriate decisions. These sensors can give incorrect or imprecise data due to malfunctioning or ... [more ▼]

Robots traditionally have a wide array of sensors that allow them to react to the environment and make appropriate decisions. These sensors can give incorrect or imprecise data due to malfunctioning or noise. Sensor fusion methods try to overcome some of these issues by using the data coming from different sensors and combining it. However, they often don’t take sensor malfunctioning and a priori knowledge about the sensors and the environment into account, which can produce conflicting information for the robot to work with. In this paper, we present an architecture and process in order to overcome some of these limitations based on a proactive rule-based system. [less ▲]

Detailed reference viewed: 117 (13 UL)
Full Text
Peer Reviewed
See detailNoCry: No More Secure Encryption Keys for Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (2019)

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific ... [more ▼]

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific strategy they implement, and all have pros and cons. However, three requirements concern them all: their implementation must be secure, be effective, and be efficient. Recently, Genç et al. proposed to stop a specific class of ransomware, the cryptographically strong one, by blocking unauthorized calls to cryptographically secure pseudo-random number generators, which are required to build strong encryption keys. Here, in adherence to the requirements, we discuss an implementation of that solution that is more secure (with components that are not vulnerable to known attacks), more effective (with less false negatives in the class of ransomware addressed) and more efficient (with minimal false positive rate and negligible overhead) than the original, bringing its security and technological readiness to a higher level. [less ▲]

Detailed reference viewed: 143 (7 UL)
Full Text
Peer Reviewed
See detailTheoretical Analysis and Implementation of Effective Receivers for Telecommand Space Links
Baldi, Marco; Bertinelli, Massimo; Chiaraluce, Franco et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailA Memory-Based Label Propagation Algorithm for Community Detection
Fiscarelli, Antonio Maria UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Complex Networks and Their Applications VII (2019)

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dissimilarity between them. Several methods have been proposed but many of ... [more ▼]

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dissimilarity between them. Several methods have been proposed but many of them are not suitable for large-scale networks because they have high complexity and use global knowledge. The Label Propagation Algorithm (LPA) assigns a unique label to every node and propagates the labels locally, while applying the majority rule to reach a consensus. Nodes which share the same label are then grouped into communities. Although LPA excels with near linear execution time, it gets easily stuck in local optima and often returns a single giant community. To overcome these problems we propose MemLPA, a novel LPA where each node implements memory and the decision rule takes past states of the network into account. We demonstrate through extensive experiments on the Lancichinetti-Fortunato-Radicchi benchmark and a set of real-world networks that MemLPA outperforms most of state-of-the-art community detection algorithms. [less ▲]

Detailed reference viewed: 135 (18 UL)
Full Text
Peer Reviewed
See detailArbitrary Ranking of Defeasible Subsumption
Casini, Giovanni UL; Harrison, Michael; Meyer, Thomas et al

in Proceedings of the 32nd International Workshop on Description Logics (2019)

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to ... [more ▼]

In this paper we propose an algorithm that generalises existing procedures for the implementation of defeasible reasoning in the framework of Description Logics (DLs). One of the well-known approaches to defeasible reasoning, the so-called KLM approach, is based on constructing specific rankings of defeasible information, and using these rankings to determine priorities in case of conflicting information. Here we propose a procedure that allows us to input any possible ranking of the defeasible concept inclusions contained in the knowledge base. We analyse and investigate the forms of defeasible reasoning obtained when conclusions drawn are obtained using these rankings. [less ▲]

Detailed reference viewed: 49 (3 UL)
See detailSpace Mining and Environmental Protection: Recycling International Agreements into New Legal Practices
Leterre, Gabrielle UL

in Proceedings of the 70th International Astronautical Congress 2019 (2019)

The increasing interest in extracting natural resources from celestial bodies raises many issues, among which guaranteeing environmental standards is paramount. There is more than a reasonable concern ... [more ▼]

The increasing interest in extracting natural resources from celestial bodies raises many issues, among which guaranteeing environmental standards is paramount. There is more than a reasonable concern that industrial exploitation of the outer space lead to similar or even greater disasters than the ones already afflicting Earth. There is a consensus among the legal community that international law does provide environmental protection through the Outer Space Treaty in its Article IX; it prevents harmful contamination, mandates due regard and recommends consultation. However, this provision, applicable to all space activities, is too general. It precludes the agreement from effectively protecting the outer space’s environment in the context of specific activities. The contribution aims at exploring appropriate legal responses. It is often proposed that such a response should be to prepare a new international agreement. However, treaty-making process involves a long time. Not even considering the reluctance of States to adopt binding international documents limiting their freedom in space, there is a high chance that space mining activities will have started by the time there is any kind of international agreement. This is why another approach must be envisaged; one which takes into account the analysis of existing environmental standards that could be leveraged to answer the challenges of space mining activities. Special attention will be paid to the enforcement of the Outer Space Treaty and how it should be combined with what is usually referred to as “soft laws”—such as the work of the international Committee on Space Research (COSPAR) on planetary protection policies. As a conclusion, the contribution attempts to answer the question of the transforming role of States in complementing existing international standards for the protection of the outer space environment. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailOn the Evolution of Keyword-Driven Test Suites
Rwemalika, Renaud UL; Kintis, Marinos UL; Papadakis, Mike UL et al

in 12th IEEE International Conference on Software Testing, Verification and Validation (2019)

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to ... [more ▼]

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to achieve. The problem becomes challenging when software evolves, as end-to-end test suites need to adapt and conform to the evolved software. Unfortunately, end-to-end tests are particularly fragile as any change in the application interface, e.g., application flow, location or name of graphical user interface elements, necessitates a change in the tests. This paper presents an industrial case study on the evolution of Keyword-Driven test suites, also known as Keyword-Driven Testing (KDT). Our aim is to demonstrate the problem of test maintenance, identify the benefits of Keyword-Driven Testing and overall improve the understanding of test code evolution (at the acceptance testing level). This information will support the development of automatic techniques, such as test refactoring and repair, and will motivate future research. To this end, we identify, collect and analyze test code changes across the evolution of industrial KDT test suites for a period of eight months. We show that the problem of test maintenance is largely due to test fragility (most commonly-performed changes are due to locator and synchronization issues) and test clones (over 30% of keywords are duplicated). We also show that the better test design of KDT test suites has the potential for drastically reducing (approximately 70%) the number of test code changes required to support software evolution. To further validate our results, we interview testers from BGL BNP Paribas and report their perceptions on the advantages and challenges of keyword-driven testing. [less ▲]

Detailed reference viewed: 210 (9 UL)
Full Text
Peer Reviewed
See detailDetecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system
Stojkovski, Borce UL; Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security ... [more ▼]

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security analysis allows for a new class of security properties in terms of misalignments between the system’s technical guarantees and the user’s impressions of them. For instance, a property that we call “false sense of insecurity” identifies a situation in which a secure system injects uncertainty in users, thus improperly transmitting the degree of protection that it actually provides; another, which we call “false sense of security”, captures situations in which a system instills a false sense of security beyond what a technical analysis would justify. Both situations leave room for attacks. In this paper we propose a model to define and reason about such socio-technical misalignments. The model refers to and builds on the concept of security ceremonies, but relies on user experience notions and on security analysis techniques to put together the information needed to verify misalignment properties about user’s impressions and system’s security guarantees. We discuss the innovative insight of this pilot model for a holistic understanding of a system’s security. We also propose a formal model that can be used with existing model checkers for an automatic analysis of misalignments. We exemplify the approach by modelling one specific application for end-to-end email encryption within which we analyze a few instances of misalignment properties. [less ▲]

Detailed reference viewed: 185 (43 UL)
Full Text
Peer Reviewed
See detail¿Hacia una Verdadera Acción Popular para la Protección del Medioambiente? Una Reflexión a la Luz de la Jurisprudencia Española y Europea
Muñoz, Susana UL

in Murillo, F. Javier; Mesa, Manuela (Eds.) Actas del I Congreso Internacional Derechos Humanos, Democracia, Cultura de Paz y No Violencia (2019)

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European ... [more ▼]

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European human rights law provide interpretative keys in favour of a true actio popularis open to citizens in defence of their individual rights and, ultimately, of environmental justice. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailPhase field modeling of crack initiation and propagation under complex loading
Nguyen, Thanh Tung UL; Yvonnet, Julien; Waldmann, Danièle UL

in International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2019)

Detailed reference viewed: 66 (17 UL)
Full Text
Peer Reviewed
See detailAn Efficient Machine Learning Method to Solve Imbalanced Data in Metabolic Disease Prediction
Cecchini, Vania Filipa UL; Nguyen, Thanh-Phuong UL; Pfau, Thomas UL et al

in Cecchini, Vania Filipa (Ed.) An Efficient Machine Learning Method to Solve Imbalanced Data in Metabolic Disease Prediction (2019)

Detailed reference viewed: 93 (15 UL)
Full Text
Peer Reviewed
See detailNAI: The Normative Reasoner
Libal, Tomer UL; Steen, Alexander UL

in Bex, Floris (Ed.) Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law (2019)

Detailed reference viewed: 30 (5 UL)
Peer Reviewed
See detailA Containerized Big Data Streaming Architecture for Edge Cloud Computing on Clustered Single-Board Devices
Scolati, Remo; Fronza, Ilenia; Ioini, Nabil El et al

in Samir, Areeg (Ed.) A Containerized Big Data Streaming Architecture for Edge Cloud Computing on Clustered Single-Board Devices (2019)

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailTransmission of Collective Memory nad Jewish Identity in Postwar Jewish Generations through War Souvenirs
Bronec, Jakub UL

in International 26th annual CIDOC - ICOM Conference in 2018 (2019)

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian ... [more ▼]

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian Jews were living through the era of de-Stalinisation, and their narratives offer new insights into this segment of Jewish postwar history that differ from those of Jews living in liberal democratic European states. Based on personal documents, photos, letters and souvenirs, the conducted interviews highlight an interesting way of maintaining personal memories in Jewish families and how this varies from one generation to the next. In my contribution, I am planning to illustrate the importance of these small artefacts for the transmission of Jewish collective memory. My presentation showcases people widely referred to as the “second and third Jewish generation”, their attitude to current notions of Jewish memory and self-perception and their role in society. Some had to live under totalitarian oppression, others had to face a wave of Jewish Sephardic immigrants coming from overseas – and witnesses admit that the arrival of these newcomers often caused difficulties in Jewish communities. Small objects from the war, often displayed in their households, serve as a reminder of their roots and destiny, which should not be forgotten. This paper is a part of my broader research project examining distinctions and similarities in identity formation through generations of Czech, Slovak, French and Luxembourgish Jews, who grew up either under communism or in liberal Western Europe. The aim is to create an international virtual library and cloud storage, not only for professional educators but also for the public. [less ▲]

Detailed reference viewed: 57 (7 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (2019)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 116 (3 UL)
Full Text
Peer Reviewed
See detailOff-line Correlator for Antenna Array Over Long Baselines
Ardito, Alessandro; Abelllo, Ricard; Aroumont, Anbazhagan et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailStrategic Analysis in the Realm of Enterprise Modeling – On the Example of Blockchain-Based Initiatives for the Electricity Sector
de Kinderen, Sybren; Kaczmarek-Heß, Monika; Razo-Zapata, Ivan et al

in WIRTSCHAFTSINFORMATIK 2019 PROCEEDINGS (2019)

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailSequential reprogramming of Boolean networks made practical
Mandon, Hugues; Su, Cui; Haar, Stefan et al

in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailQuantifying information flow in interactive systems
Mestel, David UL

in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (2019)

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is ... [more ▼]

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic. [less ▲]

Detailed reference viewed: 97 (6 UL)
Peer Reviewed
See detailDLA: Detecting and Localizing Anomalies in Containerized Microservice Architectures Using Markov Models
Samir, Areeg UL; Pahl, Claus

in Samir, Areeg (Ed.) the 7th International Conference on Future Internet of Things and Cloud (2019)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailInterozeptive Genauigkeit: Ein methodischer Vergleich von zwei Heartbeat Tracking Paradigmen
Haciahmet, C.; Opdensteinen, K.; Schaan, L. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert ... [more ▼]

Diese Arbeit untersucht zwei Herzschlagwahrnehmungsaufgaben mit unterschiedlichen Verarbeitungsmodi - Heartbeat Tracking Task (HTT; Schandry, 1981) und adaptierter Heartbeat Tracking Task (aHTT; adaptiert nach Melloni et al., 2013) - welche Interozeptive Genauigkeit (IG) anhand des Vergleichs von objektiver und selbst-berichteter Herzrate erfassen (Garfinkel et al., 2015). Die Paradigmen unterscheiden sich hinsichtlich des mentalen Zählens (HTT) und motorischen Tappings (aHTT) von kardiovaskulären Empfindungen. Tapping wird in Biofeedback-Studien zur Verbesserung der IG angewendet (Ring et al., 2015), bislang jedoch kaum mit mentalem Zählen verglichen. 74 gesunde Versuchspersonen (MAlter = 22.66, SDAlter = 2.74, 49 Frauen) bearbeiteten den HTT und den aHTT. Die IGScores des HTT waren im Durchschnitt signifikant höher als im aHTT (t(73) = 2.73, p = .01, d = .28). Bei einem Cut-Off von IG = 0.70 konnten 37 gute Herzschlagwahrnehmer/innen im HTT und 27 gute Herzschlagwahrnehmer/innen im aHTT klassifiziert werden. Auch im Selbstbericht zur eigenen Herzschlagwahrnehmungsfähigkeit, zeigte sich bei den Probanden ein höheres Konfidenzrating im HTT als im aHTT (MHTT = 5.00, SD = 2.04; MaHTT = 3.88, SD = 1.77; Z(74) = -5.24, p < .01, d = .59). Zusammenfassend weisen die Ergebnisse auf eine bessere Herzschlagwahrnehmung im HTT hin, sowohl bezüglich der IG-Scores als auch im Selbstbericht. Eine Erklärung für die niedrigeren Interozeptionswerte im aHTT könnte sein, dass die sensorische und motorische Interferenz der Tapping-Aufgaben mit der Detektion von afferenten Herzsensationen konkurrieren, weshalb der salientere Tapping-Stimulus den Aufmerksamkeitsfokus von internalen Prozessen ablenkt (Pennebaker & Hoover, 1984). Zukünftige Studien sollten prüfen, welche spezifischen Einsatzmöglichkeiten sich für HTT und aHTT anbieten, hinsichtlich einer akkuraten und ökonomischen Erfassung von IG. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailTraining binary classifiers as data structure invariants
Molina, Facundo; Degiovanni, Renzo Gaston UL; Ponzio, Pablo et al

in Proceedings of the 41st International Conference on Software Engineering ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019)

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and ... [more ▼]

We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and training it to identify valid and invalid instances of a data structure. The obtained classifier can then be used in place of the data structure’s invariant, in order to attempt to identify (in)correct behaviors in programs manipulating the structure. In order to produce the valid objects to train the network, an assumed-correct set of object building routines is randomly executed. Invalid instances are produced by generating values for object fields that “break” the collected valid values, i.e., that assign values to object fields that have not been observed as feasible in the assumed-correct program executions that led to the collected valid instances. We experimentally assess this approach, over a benchmark of data structures. We show that this learning technique produces classifiers that achieve significantly better accuracy in classifying valid/invalid objects compared to a technique for dynamic invariant detection, and leads to improved bug finding. [less ▲]

Detailed reference viewed: 77 (3 UL)
Full Text
Peer Reviewed
See detailVideo Indexing Using Face Appearance and Shot Transition Detection
Cazzato, Dario UL; Leo, Marco; Carcagni, Pierluigi et al

in Proceedings of the IEEE International Conference on Computer Vision Workshops (2019)

Detailed reference viewed: 37 (1 UL)
See detailA Controller Architecture for Anomaly Detection, Root Cause Analysis and Self-Adaptation for Cluster Architectures
Samir, Areeg UL; Pahl, Claus

in Samir, Areeg (Ed.) The Eleventh International Conference on Adaptive and Self-Adaptive Systems and Applications (2019)

Detailed reference viewed: 32 (0 UL)
See detail"Le maillage de l'oeuvre. Avant Propos"
Raus, Tonia UL; Glesener, Jeanne UL

in Glesener, Jeanne; Raus, Tonia (Eds.) Jean Portante. Le travail de l'écriture ou la mémoire à l'oeuvre (2019)

Detailed reference viewed: 8 (0 UL)
See detailZum Konstruktcharakter afrikanischer und europäischer Migrationswahrnehmung
Nonoa, Koku Gnatuloma UL

in Hertrampf, Marina Ortrud M.; Nickel, Beatrice (Eds.) (T)Räume der Migration (2019)

This contribution deals first with some manifestations of the migration's dilemma. Outgoing from the reality constituting capacity and character of speech and discourse, this analysis focuses then on the ... [more ▼]

This contribution deals first with some manifestations of the migration's dilemma. Outgoing from the reality constituting capacity and character of speech and discourse, this analysis focuses then on the performative and discursive construction of reality. Besides, this contribution analyses the con- structed character and the contrast between African's and European's perception of migration through reading and watching e.g. news and / or plays. [less ▲]

Detailed reference viewed: 52 (13 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 58 (26 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 58 (26 UL)
Full Text
Peer Reviewed
See detailKnow Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation
Du, Manxing UL; Cowen-Rivers, Alexander I.; Wen, Ying et al

in Proceedings of the 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019) (2019)

Detailed reference viewed: 355 (1 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 58 (26 UL)
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in 61st IISL COLLOQUIUM ON THE LAW OF OUTER SPACE (2019)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailOn Kilian's Randomization of Multilinear Map Encodings
Coron, Jean-Sébastien UL; Pereira, Vitor UL

in Coron, Jean-Sébastien; Pereira, Vitor (Eds.) On Kilian's Randomization of Multilinear Map Encodings (2019)

Detailed reference viewed: 55 (14 UL)
Full Text
Peer Reviewed
See detailOn Deception-Based Protection Against Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (2019)

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While ... [more ▼]

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them. [less ▲]

Detailed reference viewed: 135 (13 UL)
See detail"Georges Perec ou la méthode pratique de la critique"
Raus, Tonia

in Absalyamova, Elina; Van Nuijs, Laurence; Stiénon, Valérie (Eds.) "Figures du critique-écrivain. Formes et pratiques du discours métalittéraire (XIXe-XXIe siècles" (2019)

Detailed reference viewed: 3 (0 UL)
Full Text
Peer Reviewed
See detailNon-interactive Zero Knowledge Proofs in the Random Oracle Model
Iovino, Vincenzo UL; Visconti, Ivan

in Codes, Cryptology and Information Security (2019)

The Fiat-Shamir (FS) transform is a well known and widely used technique to convert any constant-round public-coin honest-verifier zero-knowledge (HVZK) proof or argument system CIPC=(Prov,Ver) in a non ... [more ▼]

The Fiat-Shamir (FS) transform is a well known and widely used technique to convert any constant-round public-coin honest-verifier zero-knowledge (HVZK) proof or argument system CIPC=(Prov,Ver) in a non-interactive zero-knowledge (NIZK) argument system NIZK=(NIZK.Prove, NIZK.Verify). The FS transform is secure in the random oracle (RO) model and is extremely efficient: it adds an evaluation of the RO for every message played by Ver. While a major effort has been done to attack the soundness of the transform when the RO is instantiated with a ``secure'' hash function, here we focus on a different limitation of the FS transform that exists even when there is a secure instantiation of the random oracle: the soundness of NIZK holds against polynomial-time adversarial provers only. Therefore even when CIPC is a proof system, NIZK is only an argument system. In this paper we propose a new transform from 3-round public-coin HVZK proof systems for several practical relations to NIZK proof systems in the RO model. Our transform outperforms the FS transform protecting the honest verifier from unbounded adversarial provers with no restriction on the number of RO queries. The protocols our transform can be applied to are the ones for proving membership to the range of a one-way group homomorphism as defined by [Maurer - Design, Codes and Cryptography 2015] except that we additionally require the function to be endowed with a trapdoor and other natural properties. For instance, we obtain new efficient instantiations of NIZK proofs for relations related to quadratic residuosity and the RSA function. As a byproduct, with our transform we obtain essentially for free the first efficient non-interactive zap (i.e., 1-round non-interactive witness indistinguishable proof system for several practical languages in the non-programmable RO model and in an ideal-PUF model. Our approach to NIZK proofs can be seen as an abstraction of the celebrated work of [Feige, Lapidot and Shamir - FOCS 1990]. [less ▲]

Detailed reference viewed: 86 (7 UL)
Full Text
Peer Reviewed
See detailSemantic Fuzzing with Zest
Padhye, Rohan; Lemieux, Caroline; Sen, Koushik et al

in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailA Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate
Schmitt, Xavier; Kubler, Sylvain; Robert, Jérémy UL et al

in International Conference on Social Networks Analysis, Management and Security (2019)

Detailed reference viewed: 76 (2 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Vulnerability Prediction of Open-Source Software Releases
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 84 (6 UL)
Full Text
Peer Reviewed
See detailZur Validität zweier Herzschlagwahrnehmungsaufgaben: Höheres zentrales Blutvolumen durch Kipptischmanipulation verbessert interozeptive Genauigkeit, aber nicht die Genauigkeit zur Schätzung von Zeitintervallen
Back, S.; Schaan, V. K.; Vögele, Claus UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Kardiale Interozeption wird typischerweise mittels Herzschlagzählaufgaben (Schandry, 1981) oder Herzschlagdiskriminationsaufgaben (Whitehead et al., 1977) erfasst. Jedoch sind die Determinanten der ... [more ▼]

Kardiale Interozeption wird typischerweise mittels Herzschlagzählaufgaben (Schandry, 1981) oder Herzschlagdiskriminationsaufgaben (Whitehead et al., 1977) erfasst. Jedoch sind die Determinanten der Herzschlagwahrnehmung hinsichtlich Aktivitätsindizes des kardiovaskulären Systems bisher ungeklärt. Die vorliegende Studie untersucht, ob die experimentelle Manipulation kardiovaskulärer Aktivität durch die Variation der Körperposition mittels Kipptisch einen Einfluss auf interozeptive Genauigkeit in Herzschlagzählaufgaben und Herzschlagdiskriminierungsaufgaben hat. Studierende (N=43) führten beide Herzschlagwahrnehmungsaufgaben in drei Körperpositionen (-10°,0° und 10°) durch. Zusätzlich wurde die Fähigkeit zur Einschätzung von Zeitintervallen geprüft (Kontrollaufgabe), da oft kritisiert wurde, dass interozeptive Genauigkeit basierend auf der Herzschlagzählaufgabe mit dieser Fähigkeit konfundiert ist. Die interozeptive Genauigkeit in der Herzschlagzählaufgabe war signifikant höher bei einem Neigungswinkel von -10° (über Kopf), sowie geringer bei 10° (Kopf aufrecht), jeweils im Vergleich zu 0° (horizontale Position). Deskriptiv ist das gleiche Muster bei der Herzschlagdiskriminationssaufgabe zu erkennen, jedoch statistisch nicht signifikant. Die Einschätzungsgenauigkeit von Zeitintervallen bleibt unabhängig von der Körperposition konstant. Regressionsanalysen zeigen, dass die Fähigkeit zur Diskriminierung von Herzschlägen signifikant die Herzschlagzählgenauigkeit vorhersagt und 32% der Gesamtvarianz aufklärt. Herzrate sowie die Einschätzungsgenauigkeit von Zeitintervallen tragen nicht signifikant als Prädiktoren in der Aufklärung der Zählgenauigkeit bei. Die Ergebnisse weisen darauf hin, dass kardiodynamische Parameter, wie z.B. Schlagvolumen, die durch die Variation der Körperposition manipuliert wurden, unabhängig von Variationen der Herzrate, eine Determinante interozeptiver Genauigkeit in Herzschlagzählaufgaben darstellen. Die Einschätzung von Zeitintervallen hat keinen Einfluss auf die Zähl- und Diskriminationsgenauigkeit von Herzschlägen und wird außerdem nicht von der Körperposition beeinflusst. Die Ergebnisse weisen auf gute konvergente und diskriminante Validität der Herzschlagwahrnehmungsaufgaben zur Erfassung kardialer Interozeption hin. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailHow Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program
Bernard, Nicolas UL; Leprévost, Franck UL

in Theeramunkong, Thanaruk; Bouvry, Pascal; Srichaikul, Piyawut (Eds.) Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (2019)

Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful ... [more ▼]

Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful deceptions may have disastrous consequences. Still, humans sometimes detect mistakes made by machines when they classify images. One can conceive a system able to solicit humans in case of doubts, namely when humans and machines may disagree. Using Information Hiding techniques, we describe a strategy to construct evolutionary algorithms able to fool both neural networks and humans for image recognition. Although this research is still exploratory, we already describe a concrete fitness function for a specific scenario. Additional scenarii and further research directions are provided. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Search for Configurations of Deep Neural Network Architectures
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in Automated Search for Configurations of Convolutional Neural Network Architectures (2019)

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as ... [more ▼]

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the variability of DNN architectures with a Feature Model (FM) that generalizes over existing architectures. Each valid configuration of the FM corresponds to a valid DNN model that can be built and trained. Second, we implement, on top of Tensorflow, an automated procedure to deploy, train and evaluate the performance of a configured model. Third, we propose a method to search for configurations and demonstrate that it leads to good DNN models. We evaluate our method by applying it on image classification tasks (MNIST, CIFAR-10) and show that, with limited amount of computation and training, our method can identify high-performing architectures (with high accuracy). We also demonstrate that we outperform existing state-of-the-art architectures handcrafted by ML researchers. Our FM and framework have been released to support replication and future research. [less ▲]

Detailed reference viewed: 160 (31 UL)
Full Text
Peer Reviewed
See detailStrategic Responsibility Under Imperfect Information
Yazdanpanah, Vahid; Dastani, Mehdi; Alechina, Natasha et al

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailOn Domination and Control in Strategic Ability (Extended Abstract)
Kurpiewski, Damian; Knapik, Michal; Jamroga, Wojciech UL

in Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC) (2019)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailRisk-Limiting Tallies
Jamroga, Wojciech UL; Roenne, Peter UL; Ryan, Peter UL et al

in Electronic Voting: Proceedings of E-Vote-ID (2019)

Detailed reference viewed: 13 (3 UL)
Full Text
See detailDas Verhältnis zwischen Hochschule und Wissenschaft in Deutschland: Expansion – Produktion – Kooperation
Dusdal, Jennifer UL; Oberg, Achim; Powell, Justin J W UL

in Burzan, Nicole (Ed.) Komplexe Dynamiken globaler und lokaler Entwicklungen: Der Verhandlungsband des 39. Kongresses der Deutschen Gesellschaft für Soziologie vom 24.-28. September 2018 an der Georg-August-Universität Göttingen (2019)

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten ... [more ▼]

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten Produzenten wissenschaftlichen Wissen seit 1900. Folgende Forschungsfragen sollen beantwortet werden: Wie haben institutionalisierte Strukturen, und darin verschiedene Organisationsformen, die langfristige Entwicklung wissenschaftlicher Produktivität beeinflusst und verändert? In welchen organisationalen Netzwerken entwickelt sich aktuell die Wissenschaft weiter? Die Annäherung an den Forschungsgegenstand erfolgt auf der Makroebene anhand von Indikatoren zur Erfassung der globalen Expansion, Kooperation und Produktion der Wissenschaft. Vor dem Hintergrund dieses Untersuchungsrahmens wird dann auf der Mesoebene das Zusammenspiel von Organisationsformen in Deutschland mittels netzwerkanalytischer Verfahren betrachtet. Ziel des Beitrags ist, die Orte und institutionellen Settings wissenschaftlicher Produktion zu identifizieren und anhand ihrer Aufgaben und Ziele voneinander abzugrenzen sowie ihre Beziehungen zueinander herauszuarbeiten. Als theoretische Basis werden neo-institutionalistische Ansätze zur Untersuchung und Erklärung der Expansion des Hochschulwesens und der Wissenschaft und zur Analyse von organisationalen Netzwerken herangezogen. Grundlage der empirischen Analyse bilden Publikationen in peer-reviewed Zeitschriften als Kennzeichen wissenschaftlicher Produktion. [less ▲]

Detailed reference viewed: 130 (26 UL)
Full Text
See detailMultisets in arithmetics
Perucca, Antonella UL

in Multimengen in der Arithmetik (2019)

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailDéveloppement d'une échelle de mesure de l'engagement scolaire des élèves en classe
Milmeister, Paul UL; Kerger, Sylvie UL; Poncelet, Débora UL et al

in Actes du 31e colloque de l’ADMEE Europe (2019)

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailSomatoforme Symptome: Zusammenhänge mit Low-Frequency-Herzratenvariabilität und Selbstberichte zu chronischem psychosozialen Stress, aber nicht mit HPA-Achsen-Aktivität
Hansen, G.; Larra, M. F.; Vögele, Claus UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Nach dem Perception-Filter-Modell der somatoformen Störungen (Rief & Barsky, 2005) könnte verstärkte Signalübermittlung von Körperorganen zur Symptomentstehung beitragen. Dabei wurden insbesondere das ... [more ▼]

Nach dem Perception-Filter-Modell der somatoformen Störungen (Rief & Barsky, 2005) könnte verstärkte Signalübermittlung von Körperorganen zur Symptomentstehung beitragen. Dabei wurden insbesondere das sympathische Nervensystem und die HPA-Achse als primäre physiologische Stressachsen diskutiert. Aufgrund hoher Heterogenität somatoformer Störungen ist die Befundlage zu beiden Achsen jedoch gemischt, was dafürspricht, größere Populationen ohne Multi-Komorbidität zu untersuchen. Bei einer studentischen Stichprobe (N=217; 113 w; Alter: 18-33 [M=23.0; SD=2.9] Jahre; BMI=22.2 [SD=2.8]) wurden selbstberichteter chronischer Stress (Trierer Inventar für Chronischen Stress/TICS) und somatoforme Symptome (Screening für Somatoforme Störungen/SOMS-2) erhoben. Alle Probanden lieferten Cortisol- Aufwachreaktionen (Erwachen, +15,+30,+45,+60 Min.) an zwei aufeinanderfolgenden Tagen, sowie ein Cortisol-Tagesprofil. Zusätzlich wurde im Labor in einer 10-minütigen Ruhemessung EKG zur Bestimmung der Ruhe-Herzratenvariabilität (RMSSD, pNN50, SDNN; Low- und High-Frequency) als Indikatoren des zentralen sympathischen und parasympathischen Tonus erfasst. Diejenigen TICS-Skalen, die psychosozialen Stress reflektieren, sowie „Chronische Besorgnis“ waren zwischen r=.16 und .26 mit somatoformen Symptomen korreliert. Die Skala „Chronische Besorgnis“ korrelierte außerdem positiv mit dem Tagescortisolspiegel (r=.19), sowie negativ mit SDNN (r=-.20), RMSSD (r=-.17), pNN50 (r=-.17), LF-Power (r=-.19) und HF-Power (r=-.16; alle ps < .05). Somatoforme Symptome korrelierten hingegen nicht mit Indikatoren der physiologischen Stressachsen. In einem Regressionsmodell mit Somatisierungsindex als Kriterium zeigte sich nur für die TICS-Skalen „Mangel an sozialer Anerkennung“ (b=.19) und „Chronische Besorgnis“ (b=.25), sowie LF-HRV (b=.20) signifikante Vorhersagekraft. Die Annahmen des Perception-Filter-Modells konnten nur hinsichtlich des sympathischen Nervensystems bestätigt werden, was daher als Frühindikator für somatoforme Störungen betrachtet werden könnte. Dennoch sind selbstberichteter chronischer Stress, vor allem „Besorgnis“, bei gesunden Probanden die stärksten Prädiktoren für somatoforme Symptome. [less ▲]

Detailed reference viewed: 34 (4 UL)
Full Text
Peer Reviewed
See detailCHARIOT – Towards a Continuous High-level Adaptive Runtime Integration Testbed
Barnes, Chloe M.; Bellman, Kirstie; Botev, Jean UL et al

in Proceedings of the 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (2019)

Detailed reference viewed: 73 (1 UL)
See detailDiscrete-Phase Sequence Design for Coexistence of MIMO Radar and MIMO Communications
Alaee-Kerahroodi, Mohammad UL; Mishra, Kumar Vijay; Shankar, M. R. Bhavani et al

in 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2019)

Detailed reference viewed: 61 (5 UL)
Full Text
Peer Reviewed
See detailSTV: Model Checking for Strategies under Imperfect Information
Kurpiewski, Damian; Jamroga, Wojciech UL; Knapik, Micha L

in Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (2019)

Detailed reference viewed: 9 (0 UL)
See detailCharles-Ferdinand Nothomb et les Belges germanophones: contribution à l'histoire des relations entre P.S.C. et C.S.P.
Brüll, Christoph UL

in Annaert, Phiilippe; Lanneau, Catherine; Dujardin, Vincent (Eds.) Charles-Ferdinand Nothomb. Une homme d'Etat, une époque. Actes du colloque tenu à Saint-Hubert le 10 juin 2016 (2019)

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailInterozeption bei akutem Stress und Stress-assoziierten Erkrankungen
Schulz, André UL

in Schmidt, S. (Ed.) 14. Kongress der Fachgruppe Gesundheitspsychologie. Das richtige Maß ‒ Gesundheitspsychologie zwischen Individualisierung und Bevölkerungsbezug. (2019)

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum ... [more ▼]

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum beinhaltet efferente Signalübermittlung vom Gehirn an periphere Körperprozesse. Daher kann die Interaktion von Interozeption und Stress auch als bi-direktionale Signalübermittlung zwischen Gehirn und Körper angesehen werden. Die präsentierte Studienreihe besteht aus 10 Einzelstudien, die folgende Ziele verfolgt: (1.) Die bidirektionale Hirn-Körper-Kommunikation im Normalzustand bei Gesunden zu verstehen und (2.) die Bedeutung potenziell dysregulierter Hirn-Körper-Kommunikation bei Stress-assoziierten Krankheiten aufzudecken. Methode: Dabei werden verschiedene Ebenen interozeptiver Signalübermittlung, wie frühe Repräsentation im zentralen Nervensystem (ZNS), bewusste Wahrnehmung und Aufmerksamkeitslenkung auf Körperprozesse, sowie deren Interpretation untersucht. Die beiden physiologischen Stress-Achsen, die Hypothalamus- Hypophysen-Nebennierenrinden-Achse und die sympatho-adreno-medulläre (SAM-)Achse, stehen dabei im Mittelpunkt der Untersuchungen. Ergebnisse: Zunächst wird anhand von Studien mit Stresstests und pharmakologischen Designs aufgezeigt, dass eine Aktivierung der SAM-Achse sowohl das kardiovaskuläre System stimuliert, aber auch die Aufmerksamkeitslenkung beeinträchtigt. Cortisol wiederum verstärkt Hirn-Körper-Kommunikation vor allem auf Ebene der (kortikalen) ZNS-Repräsentation. Depersonalisierungsstörung, somatoforme Störungen, Depression, posttraumatische Belastungsstörung und Borderline-Persönlichkeitsstörung zeichnen sich alle durch ein hochspezifisches Pattern der Dysregulation hinsichtlich Interozeption und physiologischer Stressachsen aus, was die Heterogenität der Körpersymptome erklären könnte. Darüber hinaus zeigt sich, dass Hirn-Körper-Kommunikation auch den Verlauf kardiovaskulärer Erkrankungen vorhersagen kann. Diskussion: Die Ergebnisse sprechen für die Entwicklung von Präventionsansätzen, die Hirn-Körper-Kommunikation mit bestimmten Trainings zu stärken, um den psychischen und körperlichen Gesundheitsverlauf positiv beeinflussen zu können. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailCache-Aided Massive MIMO: Linear Precoding Design and Performance Analysis
Wei, Xiao; Xiang, Lin UL; Cottatellucci, Laura et al

in Proc. IEEE ICC 2019 (2019)

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular ... [more ▼]

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular communications. In addition to reaping the conventional advantages of caching and massive MIMO, the proposed scheme also exploits the side information provided by cached files for interference cancellation at the receivers. This interference cancellation increases the degrees of freedom available for precoding design. In addition, the power freed by the cache-enabled offloading can benefit the transmissions to the users requesting non-cached files. The resulting performance gains are not possible if caching and massive MIMO are designed separately. We analyze the performance of cache-aided massive MIMO for cache-dependent maximum-ratio transmission (MRT), zero-forcing (ZF) precoding, and regularized zero-forcing (RZF) precoding. Lower bounds on the ergodic achievable rates are derived in closed form for MRT and ZF precoding. The ergodic achievable rate of RZF precoding is obtained for the case when the numbers of transmit antennas and users are large but their ratio is fixed. Compared to conventional massive MIMO, the proposed cache-aided massive MIMO scheme achieves a significantly higher ergodic rate especially when the number of users approaches the number of transmit antennas. [less ▲]

Detailed reference viewed: 64 (3 UL)
Full Text
Peer Reviewed
See detailDeploying Dynamic On-Board Signal Processing Schemes for Multibeam Satellite Systems
Joroughi, Vahid UL; Kibria, Mirza UL; Lagunas, Eva UL et al

in Deploying Dynamic On-Board Signal Processing Schemes for Multibeam Satellite Systems (2019)

This paper designs dynamic on-board signal processing schemes in a multiple gateway multibeam satellite system where full frequency reuse pattern is considered among the beams and feeds. In particular, we ... [more ▼]

This paper designs dynamic on-board signal processing schemes in a multiple gateway multibeam satellite system where full frequency reuse pattern is considered among the beams and feeds. In particular, we deploy on-board Joint Precoding, Feed selection and Signal switching mechanism (JPFS) so that the following advantages are realized, I) No need of Channel State Information (CSI) exchange among the gateways and satellite, since the performance of precoding is highly sensitive to the quality of CSI, II) In case one gateway fails, rerouting signals through other gateways can be applied without any extra signal processing, III) Properly selecting on-board feed/s to serve each user which generates maximum gain toward corresponding user, IV) Flexibly switching the signals received from the gateways to requested users where each user can dynamically request traffic from any gateway, and V) Multiple user with multiple traffic streams can be dynamically served at each beam. However, deploying such JPFS architecture imposes high complexity to the satellite payload. To tackle this issue, this study aims at deploying JPFS that can provide affordable complexity at the payload. In addition, while increasing the data demand imposes extensive bandwidth resources requirement in the feeder link, the proposed JPFS design works efficiently with available feeder link resources even if the data demand increases. The proposed design is evaluated with a close-to-real beam pattern and the latest broadband communication standard for satellite communications. [less ▲]

Detailed reference viewed: 59 (10 UL)
Full Text
Peer Reviewed
See detailPhase field modeling of interfacial crack propagation in quasi-brittle heterogeneous materials
Nguyen, Thanh Tung UL; Yvonnet, Julien; Waldmann, Danièle UL et al

in International Conference on Computational Modeling of Fracture and Failure of Materials and Structures (2019)

Detailed reference viewed: 55 (12 UL)
Full Text
Peer Reviewed
See detailDecision Support for Security-Control Identification Using Machine Learning
Bettaieb, Seifeddine UL; Shin, Seung Yeob UL; Sabetzadeh, Mehrdad UL et al

in International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019 (2019)

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is ... [more ▼]

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. [Problem] An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Principal ideas/results] In this paper, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of ≈ 95% and average precision of ≈ 67%. [Contribution] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. [less ▲]

Detailed reference viewed: 264 (57 UL)
Full Text
Peer Reviewed
See detailA non-invasive tool for attention-deficit disorder analysis based on gaze tracks
Cazzato, Dario UL; Castro, Silvia M.; Agamennoni, Osvaldo et al

in Proceedings of the 2nd International Conference on Applications of Intelligent Systems (2019)

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailAffordance-Experimentation-Actualization Theory in Artificial Intelligence Research : a Predictive Maintenance Story
Keller, Robert; Stohr, Alexander; Fridgen, Gilbert UL et al

in 40th International Conference on Information Systems (2019)

Artificial intelligence currently counts among the most prominent digital technologies and promises to generate significant business value in the future. Despite a growing body of knowledge, research ... [more ▼]

Artificial intelligence currently counts among the most prominent digital technologies and promises to generate significant business value in the future. Despite a growing body of knowledge, research could further benefit from incorporating technological features, human actors, and organizational goals into the examination of artificial intelligence-enabled systems. This integrative perspective is crucial for effective implementation. Our study intends to fill this gap by introducing affordance-experimentation-actualization theory to artificial intelligence research. In doing so, we conduct a case study on the implementation of predictive maintenance using affordance-experimentation-actualization theory as our theoretical lens. From our study, we find further evidence for the existence of the experimentation phase during which organizations make new technologies ready for effective use. We propose extending the experimentation phase with the activity of ‘conceptual exploration’ in order to make affordance-experimentation-actualization theory applicable to a broader range of technologies and the domain of AI-enabled systems in particular. [less ▲]

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailThe Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic
Horne, Ross James UL

in 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019). (2019)

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailSustainability's Coming Home : Preliminary Design Principles for the Sustainable Smart District
Keller, Robert; Röhrich, Felix; Schmidt, Lukas et al

in 14. International Business Informatics Conference (2019)

Consumer trends like local consumption, sharing of property, and environmental awareness change our habits and thereby our surroundings. These trends have their origin in our direct environment, in the ... [more ▼]

Consumer trends like local consumption, sharing of property, and environmental awareness change our habits and thereby our surroundings. These trends have their origin in our direct environment, in the districts of our city or community, where we live and socialize. Cities and districts are changing to “smart cities” and “smart districts” as a part of the ongoing digitalization. These changes offer the possibility to entrench the idea of sustainability and build a platform-based ecosystem for a sustainable smart district. This research aims to identify guidelines in form of preliminary design principles (PDPs) for sustainable smart districts. To achieve this, we conduct a structured literature review. On this basis, we derive and develop PDPs with the help of semi-structured interviews and a non-representative sample of the German population. The resulting nine PDPs describe a first insight into the design of sustainable smart districts. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailLegal Design Patterns: Towards A New Language for Legal Information Design
Rossi, Arianna UL; Ducato, Rossana; Haapio, Helena et al

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) 22nd International Legal Infomatics Symposium IRIS 2019 (2019)

Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to ... [more ▼]

Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to users and easier to prepare. In this paper, we take stock of existing legal design patterns and pattern libraries and present the idea of a legal design pattern language intended to lead to documenting and sharing good practices across disciplines and to more actionable pattern libraries. [less ▲]

Detailed reference viewed: 74 (6 UL)
Full Text
Peer Reviewed
See detailLightning Network: A Comparative Review of Transaction Fees and Data Analysis
Khan, Nida UL; State, Radu UL

in Springer Blockchain and Applications (2019)

Blockchain is a revolutionary, immutable database disrupting the finance industry with a potential to provide payments in a secure environment, unhindered by intermediaries. However, scalability and ... [more ▼]

Blockchain is a revolutionary, immutable database disrupting the finance industry with a potential to provide payments in a secure environment, unhindered by intermediaries. However, scalability and throughput issues plague the technology and prevent it's mass scale adoption. The paper focusses on Lightning Network, the off-chain, scalable and high throughput payment solution from Bitcoin. A comparison is conducted to highlight the fee incurred for payment transactions through Lightning Network, Raiden, Stellar, Bitcoin and conventional payment systems to assess its viability as a blockchain-based payment sys-tem. The paper also provides an analysis of the data of Lightning Network, to give a global overview of its usage and reachability. [less ▲]

Detailed reference viewed: 255 (35 UL)
Full Text
Peer Reviewed
See detailScalable control of asynchronous Boolean networks
Su, Cui; Paul, Soumya UL; Pang, Jun UL

in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding and Modelling Human Attention for Soft Biometrics Purposes
Cazzato, Dario UL; Leo, Marco; Carcagnì, Pierluigi et al

in AIVR 2019: Proceedings of the 2019 3rd International Conference on Artificial Intelligence and Virtual Reality (2019)

Detailed reference viewed: 76 (10 UL)
Full Text
Peer Reviewed
See detailSlicing based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks
Korrai, Praveenkumar UL; Lagunas, Eva UL; Sharma, Shree Krishna UL et al

in Slicing based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks (2019)

Detailed reference viewed: 133 (22 UL)
Full Text
Peer Reviewed
See detailExperimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks
Turcanu, Ion UL; Adamsky, Florian; Engel, Thomas UL

in IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (2019)

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision ... [more ▼]

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision requires the knowledge of the current state of the road traffic, which can be obtained by collecting Floating Car Data (FCD) information using Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p standard. Most of the existing FCD collection protocols have been evaluated via simulations and mathematical models, while the real-world implications have not been thoroughly investigated. This paper presents an open-source implementation of two state-of-the-art FCD collection algorithms, namely BASELINE and DISCOVER. These algorithms are implemented in an open-source vehicular prototyping platform and validated in a real-world experimental setup. [less ▲]

Detailed reference viewed: 134 (31 UL)
Full Text
Peer Reviewed
See detailThe Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 133 (11 UL)
Full Text
Peer Reviewed
See detailAn Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles
Kaiafas, Georgios UL; Hammerschmidt, Christian UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Hammerschmidt, Christian; State, Radu (Eds.) 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 59 (12 UL)
Full Text
Peer Reviewed
See detailDecoupling, Information Technology, and the Tradeoff between Organizational Reliability and Organizational Agility
Keller, Robert; Ollig, Philipp; Fridgen, Gilbert UL

in 27th European Conference on Information Systems (ECIS) (2019)

Information technology (IT) units within organizations pursue both organizational reliability and agility goals. Reliability ensures the stability and business continuity of organizations, whereas agility ... [more ▼]

Information technology (IT) units within organizations pursue both organizational reliability and agility goals. Reliability ensures the stability and business continuity of organizations, whereas agility helps to detect and exploit market opportunities. In our research, we study projects in 19 organizations and unravel the relationship between agility and reliability. We observe that in certain cases reliability can undermine agility and vice versa. Global rules, routines, and procedures can hinder organizational agility whereas responding creatively for agility can locally undermine global organizational reliability. Further, we find that organizations often use decoupling to deal with this trade-off. Although decoupling enables them to be agile and reliable at the same time, it risks undermining both capabilities in the future, by encouraging the accumulation of technical debt. We find indications of how technical debt limits opportunities to creatively respond and can increase vulnerabilities. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Reasoning with Complex Ethical Theories--A Case Study Towards Responsible AI
Fuenmayor, David; Benzmüller, Christoph UL

in 16th International Congress on Logic, Methodology and Philosophy of Science and Technology (CLMPST 2019) --- Bridging across Academic Cultures, Book of Abstracts (2019)

Detailed reference viewed: 41 (0 UL)