References of "Paper published in a book"
     in
Bookmark and Share    
See detailDiscrete-Phase Sequence Design for Coexistence of MIMO Radar and MIMO Communications
Alaee-Kerahroodi, Mohammad UL; Mishra, Kumar Vijay; Shankar, M. R. Bhavani et al

in 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2019)

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Vulnerability Prediction of Open-Source Software Releases
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailMart: A Mutant Generation Tool for LLVM
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL

in Titcheu Chekam, Thierry; Papadakis, Mike; Le Traon, Yves (Eds.) Mart: A Mutant Generation Tool for LLVM (2019)

Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites ... [more ▼]

Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites. Mutants creation (generation) tools are often characterized by their mutation operators and the way they create and represent the mutants. This paper presents Mart, a mutants generation tool, for LLVM bitcode, that supports the fine-grained definition of mutation operators (as matching rule - replacing pattern pair; uses 816 defined pairs by default) and the restriction of the code parts to mutate. New operators are implemented in Mart by implementing their matching rules and replacing patterns. Mart also implements in-memory Trivial Compiler Equivalence to eliminate equivalent and duplicate mutants during mutants generation. Mart generates mutant code as separated mutant files, meta-mutants file, weak mutation, and mutant coverage instrumented files. The generated LLVM bitcode files can be interpreted using an LLVM interpreter or compiled into native code. Mart is publicly available (https://github.com/thierry-tct/mart) for use by researchers and practitioners. Mart has been applied to generate mutants for several research experiments and generated more than 4,000,000 mutants. [less ▲]

Detailed reference viewed: 170 (14 UL)
Full Text
See detailRobotic assistants in factory routines - the ethical implications
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in RACIR 2019 (2019)

This paper is concerned with the problems which arise when humans are working alongside robotic assistants. The main question which appears is how to define the difference between humans and robots in ... [more ▼]

This paper is concerned with the problems which arise when humans are working alongside robotic assistants. The main question which appears is how to define the difference between humans and robots in terms of characteristics, similarities or differences and how to consequently treat humans and robots in the factory routine. Based on a literature analysis, a common ground for the treatment of human and robotic workforce in the manufacturing industry is established. Subsequently, a framework for their cooperation is deduced and an implementation of the solution suggested. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailInterozeption bei akutem Stress und Stress-assoziierten Erkrankungen
Schulz, André UL

in Schmidt, S. (Ed.) 14. Kongress der Fachgruppe Gesundheitspsychologie. Das richtige Maß ‒ Gesundheitspsychologie zwischen Individualisierung und Bevölkerungsbezug. (2019)

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum ... [more ▼]

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum beinhaltet efferente Signalübermittlung vom Gehirn an periphere Körperprozesse. Daher kann die Interaktion von Interozeption und Stress auch als bi-direktionale Signalübermittlung zwischen Gehirn und Körper angesehen werden. Die präsentierte Studienreihe besteht aus 10 Einzelstudien, die folgende Ziele verfolgt: (1.) Die bidirektionale Hirn-Körper-Kommunikation im Normalzustand bei Gesunden zu verstehen und (2.) die Bedeutung potenziell dysregulierter Hirn-Körper-Kommunikation bei Stress-assoziierten Krankheiten aufzudecken. Methode: Dabei werden verschiedene Ebenen interozeptiver Signalübermittlung, wie frühe Repräsentation im zentralen Nervensystem (ZNS), bewusste Wahrnehmung und Aufmerksamkeitslenkung auf Körperprozesse, sowie deren Interpretation untersucht. Die beiden physiologischen Stress-Achsen, die Hypothalamus- Hypophysen-Nebennierenrinden-Achse und die sympatho-adreno-medulläre (SAM-)Achse, stehen dabei im Mittelpunkt der Untersuchungen. Ergebnisse: Zunächst wird anhand von Studien mit Stresstests und pharmakologischen Designs aufgezeigt, dass eine Aktivierung der SAM-Achse sowohl das kardiovaskuläre System stimuliert, aber auch die Aufmerksamkeitslenkung beeinträchtigt. Cortisol wiederum verstärkt Hirn-Körper-Kommunikation vor allem auf Ebene der (kortikalen) ZNS-Repräsentation. Depersonalisierungsstörung, somatoforme Störungen, Depression, posttraumatische Belastungsstörung und Borderline-Persönlichkeitsstörung zeichnen sich alle durch ein hochspezifisches Pattern der Dysregulation hinsichtlich Interozeption und physiologischer Stressachsen aus, was die Heterogenität der Körpersymptome erklären könnte. Darüber hinaus zeigt sich, dass Hirn-Körper-Kommunikation auch den Verlauf kardiovaskulärer Erkrankungen vorhersagen kann. Diskussion: Die Ergebnisse sprechen für die Entwicklung von Präventionsansätzen, die Hirn-Körper-Kommunikation mit bestimmten Trainings zu stärken, um den psychischen und körperlichen Gesundheitsverlauf positiv beeinflussen zu können. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailSimple Conditionals with Constrained Right Weakening
Casini, Giovanni UL; Meyer, Thomas; Varzinczak, Ivan

in Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI 2019) (2019)

In this paper we introduce and investigate a very basic semantics for conditionals that can be used to define a broad class of conditional reasoning systems. We show that it encompasses the most popular ... [more ▼]

In this paper we introduce and investigate a very basic semantics for conditionals that can be used to define a broad class of conditional reasoning systems. We show that it encompasses the most popular kinds of conditional reasoning developed in logic-based KR. It turns out that the semantics we propose is appropriate for a structural analysis of those conditionals that do not satisfy the property of Right Weakening. We show that it can be used for the further development of an analysis of the notion of relevance in conditional reasoning. [less ▲]

Detailed reference viewed: 55 (5 UL)
Full Text
Peer Reviewed
See detailEffective bending stiffness of heavy steel-concrete composite columns with multiple encased steel profiles
Chrzanowski, Maciej UL; Odenbreit, Christoph UL; Degée, Hervé et al

in Proceedings of 9th International Conference on Steel and Aluminium Structures (ICSAS19) (2019)

Detailed reference viewed: 54 (6 UL)
Full Text
Peer Reviewed
See detailTheoretical Analysis and Implementation of Effective Receivers for Telecommand Space Links
Baldi, Marco; Bertinelli, Massimo; Chiaraluce, Franco et al

in 2019 8th International Workshop on Tracking, Telemetry and Command Systems for Space Applications (TTC) (2019)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailGraph-based malicious login events investigation
Amrouche, Faouzi UL; Lagraa, Sofiane UL; Kaiafas, Georgios UL et al

in Amrouche, Faouzi; Lagraa, Sofiane; Kaiafas, Georgios (Eds.) et al 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 108 (16 UL)
Full Text
Peer Reviewed
See detailProactive Legal Design: Embedding Values in the Design of Legal Artefacts
Rossi, Arianna UL; Haapio, Helena

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) International Legal Infomatics Symposium IRIS 2019 (2019)

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an ... [more ▼]

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an interdisciplinary and proactive approach to law, covering not only legal information and documents, but also legal services, processes, and systems. This paper introduces Legal Design in the context of forward-looking Legal Tech, especially through the lenses of data protection, and analyses the analogies among Value-Sensitive Design, Proactive Law, and Privacy by Design. [less ▲]

Detailed reference viewed: 53 (3 UL)
Full Text
Peer Reviewed
See detail‘Ego Anselmus Bocardus notarius civitatis Mediolani tradidi et scripsi’. Le parcours professionnel et social d’un notaire milanais (seconde moitié du XIIIe-début du XIVe s.)
Salemme, Timothy UL

in Nieus, Jean-François; Hermand, Xavier; Renard, Etienne (Eds.) Le scribe d’archives dans l’Occident médiéval, (2019)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailExperimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks
Turcanu, Ion UL; Adamsky, Florian; Engel, Thomas UL

in IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (2019)

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision ... [more ▼]

The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision requires the knowledge of the current state of the road traffic, which can be obtained by collecting Floating Car Data (FCD) information using Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p standard. Most of the existing FCD collection protocols have been evaluated via simulations and mathematical models, while the real-world implications have not been thoroughly investigated. This paper presents an open-source implementation of two state-of-the-art FCD collection algorithms, namely BASELINE and DISCOVER. These algorithms are implemented in an open-source vehicular prototyping platform and validated in a real-world experimental setup. [less ▲]

Detailed reference viewed: 131 (31 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in Grigoriou, Panos (Ed.) European Governance & Sovereignty (2019)

Detailed reference viewed: 65 (31 UL)
Full Text
See detailDigital Resources and Tools in Historical Research
Zaagsma, Gerben UL; Wieneke, Lars UL

in Kollmann, Stefanie; Müller, Lars; Reh, Sabine (Eds.) et al Picture archives and the emergence of visual history of education. ISCHE 40 pre-conference workshop. 3rd workshop "Pictura Paedagogica Online: educational knowledge in images (2018, December 21)

One of the characteristic features of modern life is the omnipresence of images - in public life as well as in the private surroundings. At latest with coining the term "Visual history" at the beginning ... [more ▼]

One of the characteristic features of modern life is the omnipresence of images - in public life as well as in the private surroundings. At latest with coining the term "Visual history" at the beginning of the nineteen nineties historical disciplines are dealing with this ever growing pool of pictorial sources. This is also true for educational history - especially when keeping in mind that the use of images in an educational context is common practice since early modern ages. This concerns the presentation practices, the design of didactic visual media and their use in educational practice as well as the illustrated traces of historical educational practice and historical educational knowledge (e.g. photographs of school buildings or educational scenes). There are various digital picture archives to address the research questions of many historical disciplines. These databases, though, differ widely in purpose and design - and of course they cannot serve every scientific demand. According to Gerhard Paul there should be at least four layers of information evaluation when analysing historical images (reality of depiction, genesis, use and impact). Thus, building up a corpus of image sources with sufficient accompanying information can be quite challenging. As major topic the Pre-Conference Workshop will focus on the impact of the discipline on developing and maintaining of a picture archive. (DIPF/Orig.) [less ▲]

Detailed reference viewed: 136 (8 UL)
Full Text
Peer Reviewed
See detailLSRepair: Live Search of Fix Ingredients for Automated Program Repair
Liu, Kui UL; Koyuncu, Anil UL; Kim, Kisub UL et al

in 25th Asia-Pacific Software Engineering Conference (APSEC) (2018, December 07)

Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search ... [more ▼]

Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search space. State-of-the approaches often find fix ingredients by using mutation operators or leveraging manually-crafted templates. We argue that the fix ingredients can be searched in an online mode, leveraging code search techniques to find potentially-fixed versions of buggy code fragments from which repair actions can be extracted. In this study, we present an APR tool, LSRepair, that automatically explores code repositories to search for fix ingredients at the method-level granularity with three strategies of similar code search. Our preliminary evaluation shows that code search can drive a faster fix process (some bugs are fixed in a few seconds). LSRepair helps repair 19 bugs from the Defects4J benchmark successfully. We expect our approach to open new directions for fixing multiple-lines bugs. [less ▲]

Detailed reference viewed: 245 (25 UL)
Full Text
Peer Reviewed
See detailA Memory-Based Label Propagation Algorithm for Community Detection
Fiscarelli, Antonio Maria UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Aiello, Luca Maria; Cherifi, Chantal; Cherifi, Hocine (Eds.) et al Complex Networks and Their Applications VII (2018, December 02)

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dis- similarity between them. Several methods have been proposed but many of ... [more ▼]

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dis- similarity between them. Several methods have been proposed but many of them are not suitable for large-scale networks because they have high complexity and use global knowledge. The Label Propagation Algorithm (LPA) assigns a unique label to every node and propagates the labels locally, while applying the majority rule to reach a consensus. Nodes which share the same label are then grouped into communities. Although LPA excels with near linear execution time, it gets easily stuck in local optima and often returns a single giant community. To overcome these problems we propose MemLPA, a novel LPA where each node imple- ments memory and the decision rule takes past states of the network into account. We demonstrate through extensive experiments on the Lancichinetti-Fortunato-Radicchi benchmark and a set of real-world net- works that MemLPA outperforms most of state-of-the-art community detection algorithms. [less ▲]

Detailed reference viewed: 157 (40 UL)
Full Text
Peer Reviewed
See detailOsiris: Hunting for Integer Bugs in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Schütte, Julian; State, Radu UL

in 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018 (2018, December)

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed ... [more ▼]

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed once deployed to the blockchain. They typically implement the business logic of distributed apps and carry billions of dollars worth of coins. In that respect, it is imperative that smart contracts are correct and have no vulnerabilities or bugs. However, research has identified different classes of vulnerabilities in smart contracts, some of which led to prominent multi-million dollar fraud cases. In this paper we focus on vulnerabilities related to integer bugs, a class of bugs that is particularly difficult to avoid due to some characteristics of the Ethereum Virtual Machine and the Solidity programming language. In this paper we introduce Osiris – a framework that combines symbolic execution and taint analysis, in order to accurately find integer bugs in Ethereum smart contracts. Osiris detects a greater range of bugs than existing tools, while providing a better specificity of its detection. We have evaluated its performance on a large experimental dataset containing more than 1.2 million smart contracts. We found that 42,108 contracts contain integer bugs. Be- sides being able to identify several vulnerabilities that have been reported in the past few months, we were also able to identify a yet unknown critical vulnerability in a couple of smart contracts that are currently deployed on the Ethereum blockchain. [less ▲]

Detailed reference viewed: 323 (17 UL)
Full Text
Peer Reviewed
See detailRobust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Robust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System (2018, December)

This paper aims to design joint precoding and onboard beamforming at a multiple gateway multibeam satellite system. Full frequency reuse pattern is considered among the beams and each gateway serves a ... [more ▼]

This paper aims to design joint precoding and onboard beamforming at a multiple gateway multibeam satellite system. Full frequency reuse pattern is considered among the beams and each gateway serves a cluster of adjacent beams such that multiple clusters are served through a set of gateways. However, two issues are required to be addressed. First, the interference in both user and feeder links is the bottleneck of the whole system and employing interference mitigation techniques is essential. Second, as the data demand increases, the ground and space segments should employ extensive bandwidth resources in the feeder link accordingly. This entails embedding an extra number of gateways aiming to support a fair balance between the increasing demand and the corresponding required feeder link resources. To tackle these problems, this paper studies the impact of employing a joint multiple gateway architecture and on-board beamforming scheme. It is shown that by properly designing the on-board beamforming scheme, the number of gateways can be kept affordable even if the data demand increases. The proposed beamforming scheme can partially mitigate the interference in the user link. While the user and feeder link channels vary over time, this paper focuses on designing fixed beamforming which is sufficiently robust to the variations in both channels, leading to keep payload complexity low. Moreover, Zero Forcing precoding technique is employed at the gateways to reject the interference in the feeder links as well as it helps the proposed fixed on-board beamforming by partially equalizing the interference in user link. [less ▲]

Detailed reference viewed: 142 (9 UL)
Full Text
Peer Reviewed
See detailA Family of Lightweight Twisted Edwards Curves for the Internet of Things
Ghatpande, Sankalp UL; Groszschädl, Johann UL; Liu, Zhe UL

in Blazy, Olivier; Yeun, Chan Y. (Eds.) Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (2018, December)

We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are ... [more ▼]

We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined by an equation of the form -x^2 + y^2 = 1 + dx^2y^2 over a prime field Fp, where d is a small non-square modulo p. The underlying prime fields are based on "pseudo-Mersenne" primes given by p = 2^k - c and have in common that p is congruent to 5 modulo 8, k is a multiple of 32 minus 1, and c is at most eight bits long. Due to these common features, our primes facilitate a parameterized implementation of the low-level arithmetic so that one and the same arithmetic function is able to process operands of different length. Each of the twisted Edwards curves we introduce in this paper is birationally equivalent to a Montgomery curve of the form -(A+2)y^2 = x^3 + Ax^2 + x where 4/(A+2) is small. Even though this contrasts with the usual practice of choosing A such that (A+2)/4 is small, we show that the Montgomery form of our curves allows for an equally efficient implementation of point doubling as Curve25519. The four curves we put forward roughly match the common security levels of 80, 96, 112 and 128 bits. In addition, their Weierstraß representations are isomorphic to curves of the form y^2 = x^3 - 3x + b so as to facilitate inter-operability with TinyECC and other legacy software. [less ▲]

Detailed reference viewed: 313 (30 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Core Concept Identification in Learning Resources
Manrique, Rubén; Grevisse, Christian UL; Mariño, Olga et al

in 8th Joint International Conference, JIST 2018, Awaji, Japan, November 26–28, 2018, Proceedings (2018, December)

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support ... [more ▼]

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support systems. We present a set of strategies for core concept identification on the basis of a semantic representation built using the open and available knowledge in the so-called Knowledge Graphs (KGs). Different unsupervised weighting strategies, as well as a supervised method that operates on the semantic representation, were implemented for core concept identification. In order to test the effectiveness of the proposed strategies, a human-expert annotated dataset of 96 learning resources extracted from MOOCs was built. In our experiments, we show the capacity of the semantic representation for the core-concept identification task as well as the superiority of the supervised method. [less ▲]

Detailed reference viewed: 408 (17 UL)
Full Text
Peer Reviewed
See detailCollaborative Data Delivery for Smart City-oriented Mobile Crowdsensing Systems
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 2018 (2018, December)

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing ... [more ▼]

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing infrastructures. In typical MCS systems, sensing tasks are allocated and reported on individual-basis. In this paper, we investigate on collaboration among users for data delivery as it brings a number of benefits for both users and sensing campaign organizers and leads to better coordination and use of resources. By taking advantage from proximity, users can employ device-to-device (D2D) communications like Wi-Fi Direct that are more energy efficient than 3G/4G technology. In such scenario, once a group is set, one of its member is elected to be the owner and perform data forwarding to the collector. The efficiency of forming groups and electing suitable owners defines the efficiency of the whole collaborative-based system. This paper proposes three policies optimized for MCS that are compliant with current Android implementation of Wi-Fi Direct. The evaluation results, obtained using CrowdSenSim simulator, demonstrate that collaborative-based approaches outperform significantly individual-based approaches. [less ▲]

Detailed reference viewed: 204 (20 UL)
Full Text
Peer Reviewed
See detailPower and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks
Lei, Lei UL; You, Lei; Yang, Yang UL et al

in IEEE Global Communications Conference (GLOBECOM) 2018 (2018, December)

Detailed reference viewed: 171 (24 UL)
Full Text
Peer Reviewed
See detailBlockPGP: A Blockchain-based Framework for PGP Key Servers
Yakubov, Alexander UL; Shbair, Wazen UL; State, Radu UL

in The Sixth International Symposium on Computing and Networking (2018, November 28)

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the ... [more ▼]

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the correspondent in information exchange as well as the information integrity. It implements asymmetric encryption with certificates shared through a network of PGP key servers. Many recent breaches show that certificate infrastructure can be compromised as well as exposed to operational errors. In this paper, we propose a new PGP management framework with the key server infrastructure implemented using blockchain technology. Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk. We also provided user access right control where only the certificate holder can change information related to the certificate. We designed and developed a prototype for key server deployment on permissioned Ethereum blockchain. Permissioned blockchain should allow to control the costs of PGP key server infrastructure maintenance at the present level. [less ▲]

Detailed reference viewed: 209 (7 UL)
Full Text
Peer Reviewed
See detailHoneyPAKEs
Lopez Becerra, José Miguel UL; Roenne, Peter UL; Ryan, Peter UL et al

in Security Protocols XXVI: Lecture Notes in Computer Science (2018, November 27)

We combine two security mechanisms: using a Password-based Authenticated Key Establishment (PAKE) protocol to protect the password for access control and the Honeywords construction of Juels and Rivest to ... [more ▼]

We combine two security mechanisms: using a Password-based Authenticated Key Establishment (PAKE) protocol to protect the password for access control and the Honeywords construction of Juels and Rivest to detect loss of password files. The resulting construction combines the properties of both mechanisms: ensuring that the password is intrinsically protected by the PAKE protocol during transmission and the Honeywords mechanisms for detecting attempts to exploit a compromised password file. Our constructions lead very naturally to two factor type protocols. An enhanced version of our protocol further provides protection against a compromised login server by ensuring that it does not learn the index to the true password. [less ▲]

Detailed reference viewed: 83 (12 UL)
Full Text
Peer Reviewed
See detailA Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

in Bandi, Ashok; Shankar, Bhavani; maleki, Sina (Eds.) et al 6th IEEE Global Conference on Signal and Information Processing, November 26–29, 2018 Anaheim, California, USA (2018, November 26)

Detailed reference viewed: 172 (51 UL)
Full Text
Peer Reviewed
See detailAn international case-vignette study to assess general practitioners’ willingness to deprescribe (LESS)
Tabea Jungo, Katharina; Mantelli, Sophie; Rozsnyai, Zsofia et al

in Collins, Claire (Ed.) Abstract Book of the 87th EGPRN Meeting (2018, November 14)

Background: Globally, many oldest-old (>80 years of age) suffer from several chronic conditions and take multiple medications. Ideally, their general practitioners (GPs) regularly and systematically ... [more ▼]

Background: Globally, many oldest-old (>80 years of age) suffer from several chronic conditions and take multiple medications. Ideally, their general practitioners (GPs) regularly and systematically search for inappropriate medications and, if necessary, deprescribe those. However, deprescribing is challenging due to numerous barriers not only within patients, but also within GPs. Research questions: How does the willingness to deprescribe in oldest-old with polypharmacy differ in GPs from different countries? What factors do GPs in different contexts perceive as important for deprescribing? Method: We assess GPs' willingness to deprescribe and the factors GPs perceive to influence their deprescribing decisions in a cross-sectional survey using case-vignettes of oldest-old patients with polypharmacy. We approach GPs in 28 European countries as well as in Israel, Brazil and New Zealand through national coordinators, who administer the survey in their GP network. The case vignettes differ in how dependent patients are and whether or not they have a history of cardiovascular disease (CVD). For each case vignette, GPs are asked if and which medication they would deprescribe. GPs further rate to what extent pre-defined factors influence their deprescribe decisions. We will compare the willingness to deprescribe and the factors influencing deprescribing across countries. Multilevel models will be used to analyze the proportions of the deprescribed medications per case along the continuum of dependency and history of CVD and to analyze the factors perceived as influencing deprescribing decisions. Results: As of early-July 2018, the survey has been distributed in 14 countries and >650 responses have been returned. We will present first results at the conference. Conclusions: First, assessing GPs’ willingness to deprescribe and comparing the factors influencing GPs’ deprescribing decisions across countries will allow an understanding of the expected variation in the willingness to deprescribe across different contexts. Second, it will enable the tailoring of specific interventions that might facilitate deprescribing in oldest-old patients. Points for discussion: How can we explain differences across countries? How can the results be translated into practice in order to help GPs to optimize deprescribing practices? What factors could help GPs to implement deprescribing in oldest-old patients with polypharmacy? [less ▲]

Detailed reference viewed: 40 (2 UL)
Full Text
Peer Reviewed
See detailDefining feasibility of Primary care strategies to disclose, counsel and provide access to advocacy on family violence.
Pas; Gomez Bravo, Raquel UL; Clavería, Ana et al

in Collins, Claire (Ed.) Abstract Book of the 87th EGPRN Meeting (2018, November 14)

Background: Family violence (FV) is a widespread public health problem and serious consequences. One third of European women suffer from partner violence in their adult lifetime while on fourth of ... [more ▼]

Background: Family violence (FV) is a widespread public health problem and serious consequences. One third of European women suffer from partner violence in their adult lifetime while on fourth of situations of partner violence children are present. Elderly abuse is present between 10 to 20 % of the population above 60 General practice is often a point of contact for victims but they tend to hesitate or feel ashamed to ask for assistance. GPs generally lack training in disclosing and supporting FV, feel uncomfortable about asking and may be hindered by lack of facilities where to refer. In 2018, WONCA encourages all national colleges and academies to develop policy and implementation strategies on family violence identification and response for intimate partner violence, child abuse and elder abuse. This recommendation states it is needed to develop research and define performance and outcome measures for general practitioners/family doctors and primary care teams in each of our member nations; implementation strategies for comprehensive family violence care should be enabled and evaluated. Research questions: To define needs and concerns of practice teams and analyze possibilities for practice management across European Countries. Method: A Delphi approach modified according to RAND is proposed to develop a consensus using online collection of data. A steering group will be composed of delegates recruited form EGPRN and EUROPREV members to constitute a nominal group validating questions and authorising feedback to respondents for each Delphi round. Country representatives in the project will select a representative sample in each country to allow for generalisability of conclusions per country and European wise. Collaboration with national colleges is encouraged. A meeting at EGPRN in October 2018 will further detail the methodology. A constant comparative methodology using computer software (eg. NVIVO or similar) will be followed analysing data on each question highlighting similarities and differences between answers thus constructing an underlying model about concerns and possible solutions proposed. Points for discussion: How to constitute a sample per country to allow for generalisability. What are main focuses for consensus development? [less ▲]

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailEmpowering reuse of digital cultural heritage in context-aware crosscuts of European history
Antoniou, A; Lopez-Nores, M; Yannick, N et al

in Wallace, M; Antoniou, A (Eds.) Proceedings of the Workshop on Cultural Informatics co-located with the EUROMED International Conference on Digital Heritage 2018 (EUROMED 2018) (2018, November 03)

The paper presents the H2020 CrossCult project, providing a short overview, a summary of the platform developed by the project, a description of the consortium, lessons learnt in three main dimensions ... [more ▼]

The paper presents the H2020 CrossCult project, providing a short overview, a summary of the platform developed by the project, a description of the consortium, lessons learnt in three main dimensions (humanities, technology and business), the open challenges and the main tools developed by the project. [less ▲]

Detailed reference viewed: 42 (1 UL)
Full Text
Peer Reviewed
See detailRevisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Atashpendar, Arash UL; Policharla, Guru Vamsi; Roenne, Peter UL et al

in Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (2018, November 02)

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily ... [more ▼]

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange. [less ▲]

Detailed reference viewed: 203 (56 UL)
Full Text
Peer Reviewed
See detailVisualizing the Learning Progress of Self-Driving Cars
Mund, Sandro; Frank, Raphaël UL; Varisteas, Georgios UL et al

in 21st International Conference on Intelligent Transportation Systems (2018, November 02)

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models ... [more ▼]

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models perform so well. In order for them to become a commercially viable solution, it first needs to be understood why a certain behavior is triggered and how and what those networks learn from human-generated driving data to ensure safety. One research direction is to visualize what the network sees by highlighting regions of an image that influence the outcome of the model. In this vein, we propose a generic visualization method using Attention Heatmaps (AHs) to highlight what a given Convolutional Neural Network (CNN) learns over time. To do so, we rely on a novel occlusion technique to mask different regions of an input image to observe the effect on a predicted steering signal. We then gradually increase the amount of training data and study the effect on the resulting Attention Heatmaps, both in terms of visual focus and temporal behavior. [less ▲]

Detailed reference viewed: 185 (16 UL)
Full Text
See detailCréer des liens entre les formations d'enseignant et de travailleur social pour favoriser les liens professionnels ultérieurs
Dujardin, Céline UL; Poncelet, Débora UL

in Sulova, Lenka; Pourtois, Jean-Pierre; Desmet, Huguette (Eds.) et al La qualité de vie de l'enfant aujourd'hui (2018, November)

La plupart des enfants d’aujourd’hui fréquentent plusieurs institutions éducatives en dehors de la famille. Au Luxembourg, il s’agit d’abord de la maison relais qui est destinée à prendre le relais entre ... [more ▼]

La plupart des enfants d’aujourd’hui fréquentent plusieurs institutions éducatives en dehors de la famille. Au Luxembourg, il s’agit d’abord de la maison relais qui est destinée à prendre le relais entre l’école et la famille dans le but de permettre aux parents à mieux concilier la vie professionnelle et la vie familiale. Ensuite, d’autres institutions éducatives s’ajoutent à la prise en charge de l’enfant, notamment en cas de difficultés d’apprentissage qui nécessitent une prise en charge professionnelle extrascolaire ou en cas de difficultés liées au parent qui sera accompagné par un service d’assistance en famille et de soutien à la parentalité. L’Université du Luxembourg offre avec son Bachelor en Sciences de l’Education la formation des enseignants ainsi qu’avec son Bachelor en Sciences Sociales et Educatives la formation des travailleurs sociaux. Dans le but d’approcher les deux formations sur leurs points communs et leurs similitudes, nous constatons de plus en plus l’importance de ces liens. Les liens entre les deux formations réfèrent aux liens professionnels ultérieurs, primordiaux pour la co-éducation école-famille-communauté. Dans le cours universitaire « relations école-famille », nous avons mené une première expérience en automne 2016 avec les futurs enseignants en intégrant les autres institutions éducatives dans les relations école-famille afin de sensibiliser les futurs enseignants aux enfants et familles en difficulté. Pour finir, cette expérience dans la formation universitaire est confrontée aux conceptions de réflexion et d’attitude professionnelle de ces professions relationnelles. [less ▲]

Detailed reference viewed: 62 (8 UL)
Full Text
Peer Reviewed
See detailEfficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers
Cheng, Hao UL; Dinu, Dumitru-Daniel; Groszschädl, Johann UL

in Lanet, Jean-Louis; Toma, Cristian (Eds.) Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (2018, November)

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides ... [more ▼]

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides strong resistance to collision and preimage attacks, and is assumed to remain secure in the dawning era of quantum computers. However, the compression function of SHA-512 is challenging to implement on small 8 and 16-bit microcontrollers because of their limited register space and the fact that 64-bit rotations are generally slow on such devices. In this paper, we present the first highly-optimized Assembler implementation of SHA-512 for the ATmega family of 8-bit AVR microcontrollers. We introduce a special optimization technique for the compression function based on a duplication of the eight working variables so that they can be more efficiently loaded from RAM via the indirect addressing mode with displacement (using the ldd and std instruction). In this way, we were able to achieve high performance without unrolling the main loop of the compression function, thereby keeping the code size small. When executed on an 8-bit AVR ATmega128 microcontroller, the compression function takes slightly less than 60k clock cycles, which corresponds to a compression rate of roughly 467 cycles per byte. The binary code size of the full SHA-512 implementation providing a standard Init-Update-Final (IUF) interface amounts to approximately 3.5 kB. [less ▲]

Detailed reference viewed: 245 (31 UL)
Full Text
Peer Reviewed
See detailDeploying Joint Beamforming and Precoding in Multibeam Satellite Networks with Time Variant Traffic
Joroughi, Vahid; Lagunas, Eva UL; Andrenacci, Stefano UL et al

in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, California, USA (2018, November)

Detailed reference viewed: 50 (13 UL)
Full Text
Peer Reviewed
See detailDeformation-Based Abnormal Motion Detection using 3D Skeletons
Baptista, Renato UL; Demisse, Girum UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA) (2018, November)

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a ... [more ▼]

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a sequence, based on few joints of a 3D skeleton, and a deformation-based distance function. We further introduce a time-variation model that is specifically designed for assessing the quality of a motion; we refer to a distance function that is based on such a model as~\emph{motion quality distance}. The overall advantages of the proposed approach are 1) lower dimensional yet representative sequence representation and 2) a distance function that emphasizes time variation, the motion quality distance, which is a particularly important property for quality assessment. We validate our approach using a publicly available dataset, SPHERE-StairCase2014 dataset. Qualitative and quantitative results show promising performance. [less ▲]

Detailed reference viewed: 106 (5 UL)
Full Text
Peer Reviewed
See detailA Protocol to Strengthen Password-Based Authentication
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL; Stojkovski, Borce UL

in Emerging Technologies for Authorization and Authentication (2018, November)

We discuss a password-based authentication protocol that we argue to be robust against password-guessing and o -line dictionary attacks. The core idea is to hash the passwords with a seed that comes from ... [more ▼]

We discuss a password-based authentication protocol that we argue to be robust against password-guessing and o -line dictionary attacks. The core idea is to hash the passwords with a seed that comes from an OTP device, making the resulting identity token unpredictable for an adversary. We believe that the usability of this new protocol is the same as that of password-based methods with OTP, but has the advan- tage of not burdening users with having to choose strong passwords. [less ▲]

Detailed reference viewed: 180 (64 UL)
Full Text
Peer Reviewed
See detailFraudDroid: Automated Ad Fraud Detection for Android Apps
Dong, Feng; Wang, Haoyu; Li, Li et al

in ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (2018, November)

Detailed reference viewed: 145 (5 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 231 (9 UL)
Full Text
Peer Reviewed
See detailAn Approach to Incorporate Emotions in a Chatbot with Seq2Seq Model
Zheng, Yaqiong; Guo, Siwen UL; Schommer, Christoph UL

in Benelux Conference on Artificial Intelligence, ‘s-Hertogenbosch 8-9 November 2018 (2018, November)

Detailed reference viewed: 134 (35 UL)
Full Text
Peer Reviewed
See detailAdvancing the Security of Trustworthy Self-IoT (Position Paper)
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Ladid, Latif UL et al

in International Conference on Smart Applications, Communications and Networking (SmartNets) (2018, November)

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a ... [more ▼]

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. [less ▲]

Detailed reference viewed: 270 (19 UL)
Full Text
See detailFLEXCAP – Cost competitive flexible process for highly aesthetic closures manufacturing
Kakogiannos, Ioannis UL; Hichri, Bassem UL; Plapper, Peter UL

in Kakogiannos, Ioannis; Hichri, Bassem; Plapper, Peter (Eds.) Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018, November)

Detailed reference viewed: 167 (2 UL)
Full Text
Peer Reviewed
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex UL; Udovenko, Aleksei UL

in Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018 (2018, November)

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation ... [more ▼]

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces. Structure hiding must provide protection against circuit analysis attacks. In this paper we focus on developing the value hiding component. It includes protection against the DCA attack by Bos et al. and protection against a new attack called algebraic attack. We present a provably secure first-order protection against the new al- gebraic attack. The protection is based on small gadgets implementing secure masked XOR and AND operations. Furthermore, we give a proof of compositional security allowing to freely combine secure gadgets. We derive concrete security bounds for circuits built using our construction. [less ▲]

Detailed reference viewed: 804 (20 UL)
Full Text
See detailIndustry 4.0 – Implementation of an automated assembly line in a wooden modular house production plant: The case Leko Labs
de Vincenzo, Vincenzo UL; Hichri, Bassem UL; Plapper, Peter UL

in De vincenzo, Vincenzo; Hichri, Bassem; Plapper, Peter (Eds.) Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018, November)

Detailed reference viewed: 196 (10 UL)
Full Text
Peer Reviewed
See detailPrésences de souverains dans l'espace du "regnum Lotharii": Itinéraires, lieux de pouvoir et fidélités "Lotharingiennes" (869-936)
Pettiau, Hérold UL

in Pettiau, Hérold; Margue, Michel (Eds.) La Lotharingie en question. Identités, oppositions, intégration. LOtharingische Identitäten im Spannungsfeld zwischen integrativen und partikularen Kräften. Actes des 14es Journées Lotharingiennes (2018, October 25)

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailForward Secrecy for SPAKE2
Lopez Becerra, José Miguel UL; Ostrev, Dimiter UL; Skrobot, Marjan

in Baek, Joonsang; Willy, Susilo (Eds.) Provable Security (2018, October 25)

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3 ... [more ▼]

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3. Although it has been proven secure in the Find-then-Guess model of Bellare, Pointcheval and Rogaway (EUROCRYPT 2000), whether it satisfies some notion of forward secrecy remains an open question. In this work, we prove that the SPAKE2 protocol satisfies the so-called weak forward secrecy introduced by Krawczyk (CRYPTO 2005). Furthermore, we demonstrate that the incorporation of key-confirmation codes in SPAKE2 results in a protocol that provably satisfies the stronger notion of perfect forward secrecy. As forward secrecy is an explicit requirement for cipher suites supported in the TLS handshake, we believe this work could fill the gap in the literature and facilitate the adoption of SPAKE2 in the recently approved TLS 1.3. [less ▲]

Detailed reference viewed: 71 (16 UL)
Full Text
Peer Reviewed
See detailSoLeMiO: Semantic Integration of Learning Material in Office
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Proceedings of E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2018 (2018, October 15)

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information ... [more ▼]

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information might be required by the learner. However, leaving the study context to search for related material may lead to distraction or even abandonment of the learning task. Furthermore, traditional learning resources do not foster active learning. In this paper, we present SoLeMiO, a plugin for Office applications, which identifies key concepts in a document and thereby integrates related, heterogeneous resources from an open corpus. We employ concept recognition tools to determine concepts from different domains. Thereupon, resources from different repositories are suggested to the learner and can be consulted from within the current document. Aside from traditional learning resources, active learning is fostered through gamification activities. We showcase the applicability of our approach in multiple disciplines with concrete examples. [less ▲]

Detailed reference viewed: 67 (11 UL)
Full Text
Peer Reviewed
See detailIoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Engel, Thomas UL

in IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks (2018, October)

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the ... [more ▼]

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for IoT are well recognised, to allow a smooth integration of M2M and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for MQTT and CoAP, identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2M-Satellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links. [less ▲]

Detailed reference viewed: 199 (6 UL)
Full Text
Peer Reviewed
See detailMesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content
Sobon-Muehlenbrock, Elena UL; Greger, Manfred UL; Schlienz, Markus UL

in Mesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content (2018, October)

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of ... [more ▼]

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of synthetic kitchen waste, further called model kitchen waste (MKW) with the same amounts of carbohydrates, fats and proteins. In this study the anaerobic degradation of this MKW (named MKW1; 23 % rapeseed oil) was investigated under mesophilic and thermophilic conditions at 2 different loadings. Additional experiments were performed with lower (MKW2; 14.7 %) and higher (MKW3; 27.2 %) rapeseed oil content at the expense of starch. An organic loading of 5 gVS/l leads to a fast and undisturbed degradation under mesophilic conditions. The volatile fatty acids (mainly acetic acid) appeared only during the first 3 days. Finally the amount of biogas been produced is weakly correlated with the oil content. Under thermophilic conditions the biogas production was retarded and the concentrations of the volatile fatty acids were generally higher whereas acetic acid was present for a period of 10 days. The final biogas amount was higher than compared to mesophilc conditions. At a higher loading of 25 gVS/l a strong retardation of biogas production was observed which correlates with very high concentrations of volatile fatty acids over the whole runtime period of 50 days. [less ▲]

Detailed reference viewed: 74 (13 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 307 (86 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 341 (48 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 176 (25 UL)
Full Text
Peer Reviewed
See detailDas Palux-Projekt in Luxemburg: Forschungsdesign und erste Ergebnisse einer Pilotstudie
Eckelt, Melanie UL; Hutmacher, Djenna UL; Steffgen, Georges UL et al

in Bartsch, Fabienne; Mombeck, Mona; Müller, Merle (Eds.) et al Tägliche Herausforderungen meistern - Sportlehrkräfte im Fokus (2018, October)

Detailed reference viewed: 86 (16 UL)
Full Text
Peer Reviewed
See detailMoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies
Li, Li; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2018, October)

Detailed reference viewed: 117 (4 UL)
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in Proceedings of the 69th International Astronautical Congress 2018 (2018, October)

This paper addresses the main legal challenges related to future human exploration of the Moon, with the goal to show possible solutions. In order to do so, it first presents an overview of current lunar ... [more ▼]

This paper addresses the main legal challenges related to future human exploration of the Moon, with the goal to show possible solutions. In order to do so, it first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 59 (1 UL)
Full Text
Peer Reviewed
See detailSemi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
Jhawar, Ravi UL; Lounis, Karim UL; Mauw, Sjouke UL et al

in Katsikas, Sokratis; Alcaraz, Cristina (Eds.) Security and Trust Management. STM 2018. (2018, October)

Detailed reference viewed: 81 (5 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 136 (10 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Teacher Support for Learning Material Authoring
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Advances in Computing - CCC 2018 (2018, September 26)

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning ... [more ▼]

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning material in popular authoring software. As teachers create their learning material, SoLeMiO identifies the concepts they want to address. In order to identify relevant concepts in a reliable, automatic and unambiguous way, we employ state of the art concept recognition and entity linking tools. From the recognized concepts, we build a semantic representation by exploiting additional information from Open Knowledge Graphs through expansion and filtering strategies. These concepts and the semantic representation of the learning material support the authoring process in two ways. First, teachers will be recommended related, heterogeneous resources from an open corpus, including digital libraries, domain-specific knowledge bases, and MOOC platforms. Second, concepts are proposed for semi-automatic tagging of the newly authored learning resource, fostering its reuse in different e-learning contexts. Our approach currently supports resources in English, French, and Spanish. An evaluation of concept identification in lecture video transcripts and a user study based on the quality of tag and resource recommendations yielded promising results concerning the feasibility of our technique. [less ▲]

Detailed reference viewed: 119 (18 UL)
Full Text
Peer Reviewed
See detailSparsity-Aided Low-Implementation cost based On-Board beamforming Design for High Throughput Satellite Systems
Bandi, Ashok UL

in Bandi, Ashok; Joroughi, Vahid; Shankar, Bhavani (Eds.) et al 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC),Berlin, Sept. 10-12, 2018 (2018, September 10)

Detailed reference viewed: 90 (10 UL)
Full Text
Peer Reviewed
See detailComparison of Design Codes for Composite Beams of Steel and Concrete in Europe and China
Zhang, Qingjie UL; Schäfer, Markus UL; Santos-Ferreira, Katia

in 12th Japanese-German Bridge Symposium (2018, September 04)

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a ... [more ▼]

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a part of the Eurocodes, which are European harmonized design codes for buildings and bridges. In this paper, the equivalent Chinese codes are compared to the structure and contents of Eurocodes. EN1994-1-1, which is the first part of Eurocode 4 for general buildings, and JGJ138-2016 have similar design scopes, both cover topics of composite beams, columns, slabs, and connections. JGJ138-2016 also covers the design of composite shear walls and seismic design, while EN1994-1-1 considers more about durability and time effects. For the more technical comparison, the general design bases such as safety concept and design action effects are alike. The material property values by the two codes are mostly similar except for concrete. For structural members, the focus here is mainly on the comparison of composite beams in steel and concrete. The comparisons are explained with the help of parameter studies and theoretical comparisons. [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailParticularities for plastic design of composite beams with deep plastic neutral axis
Schäfer, Markus UL; Zhang, Qingjie UL

in 12th Japanese-German Bridge Symposium (2018, September 04)

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the ... [more ▼]

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the moment resistance for composite beams follows the rules stated in EN 1994-1-1. Based on the slenderness c/t of the compressed parts of the steel-section, composite cross-sections are classified into four cross-section classes. This classification indirectly reflects the rotation capacity and susceptibility to local buckling. For class 1 and 2 cross-sections, the plastic moment resistance of the crosssection may be considered. Otherwise, an elastic design (for class 3) or an elastic design considering local buckling effects (for class 4) is necessary. If the plastic resistance of the cross-section is assumed, it is considered that each cross-section fibre may plastify without limitation of the strain values. For normal composite beams subjected to the sagging moments and with a high plastic neutral axis, the real moment resistance is quite greater than one obtained by the method of the plastic design. For sections with a large compression zone, xpl, a concrete failure in the compression zone can happen before the plastic moment resistance of the composite cross-section, Mpl,Rd, is reached. Strain limit design, therefore, becomes critical. EN 1994-1-1 provides a limitation of the plastic design resistance only for sections with steel grades S420 and S460. However, there is no guidance given for lower steel grades or the determination of the corresponding concrete compression force. This paper points out, that the rotation capacity of a composite section is dependent on the slenderness of steel crosssection parts and on the behaviour of the concrete part. A comparison of plastic and strain limited moment resistances as well as the analysis of partial shear diagram-based strain limited design results in new findings for the limits of plastic design methods. [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailOntology Coverage Tool and Document Browser for Learning Material Exploration
Grevisse, Christian UL; Meder, Jeff Alphonse Antoine UL; Botev, Jean UL et al

in 2018 Thirteenth International Conference on Digital Information Management (ICDIM) (2018, September)

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and ... [more ▼]

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and semantic information. Implicit links between documents are hardly understood without a proper visualization. On the other hand, it is difficult for teachers to keep track of the topics covered by a large collection. In this paper, we present an ontology coverage tool and document browser for learning material exploration. Both learners and teachers can benefit from a visualization of an ontology and the documents related to the comprised concepts, overcoming the limitations of traditional file explorers. Guiding users through a visual query process, learners can quickly pinpoint relevant learning material. The visualization, which has been implemented as a web application using the D3.js JavaScript library, can be integrated into different e-learning applications to further enhance the workflow of learners. Finally, teachers are provided an overview of topic coverage within the collection. [less ▲]

Detailed reference viewed: 154 (20 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 179 (31 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (2018, September)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 588 (19 UL)
Full Text
Peer Reviewed
See detailExperimental validation of adaptive control for a Shape Memory Alloy actuated lightweight robotic arm
Quintanar Guzman, Serket UL; Kannan, Somasundar UL; Voos, Holger UL et al

in ASME 2018 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems, San Antonio 10-12 September 2018 (2018, September)

This article presents the experimental validation of a Direct Adaptive Control for angular position regulation of a lightweight robotic arm. The robotic arm is single degree-of-freedom (DOF) system ... [more ▼]

This article presents the experimental validation of a Direct Adaptive Control for angular position regulation of a lightweight robotic arm. The robotic arm is single degree-of-freedom (DOF) system, actuated by two Shape Memory Alloy (SMA) wires. The proposed adaptive control is capable of adapting itself to the hysteretic behavior of SMA wires and update its behavior to deal with the changing parameters of the material over time. The closed-loop approach is tested experimentally showing its effectiveness to deal with the highly nonlinear dynamics of the SMA wires. These results are discussed and compared with a classical control approach. The updated design and hardware development and modeling of the robotic arm are shown. [less ▲]

Detailed reference viewed: 109 (8 UL)
Full Text
Peer Reviewed
See detailA Temporal Model for Interactive Diagnosis of Adaptive Systems
Mouline, Ludovic UL; Benelallam, Amine; Fouquet, François UL et al

in Mouline, Ludovic; Benelallam, Amine; Fouquet, François (Eds.) et al 2018 IEEE International Conference on Autonomic Computing (ICAC) (2018, September)

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or ... [more ▼]

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or suboptimal system states. Developers thus need diagnosis support that trace system states to the previous circumstances –targeted requirements, input context– that had resulted in these decisions. However, the lack of efficient temporal representation limits the tracing ability of current approaches. To tackle this problem, we first propose a knowledge formalism to define the concept of a decision. Second, we describe a novel temporal data model to represent, store and query decisions as well as their relationship with the knowledge (context, requirements, and actions). We validate our approach through a use case based on the smart grid at Luxembourg. We also demonstrate its scalability both in terms of execution time and consumed memory. [less ▲]

Detailed reference viewed: 107 (8 UL)
Full Text
Peer Reviewed
See detailA Closer Look at Real-World Patches
Liu, Kui UL; Kim, Dongsun UL; Koyuncu, Anil UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution (ICSME) (2018, September)

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown ... [more ▼]

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown that the state-of-the-art techniques in automated repair tend to generate patches only for a small number of bugs even with quality issues (e.g., incorrect behavior and nonsensical changes). To improve automated program repair (APR) techniques, the community should deepen its knowledge on repair actions from real-world patches since most of the techniques rely on patches written by human developers. Previous investigations on real-world patches are limited to statement level that is not sufficiently fine-grained to build this knowledge. In this work, we contribute to building this knowledge via a systematic and fine-grained study of 16,450 bug fix commits from seven Java open-source projects. We find that there are opportunities for APR techniques to improve their effectiveness by looking at code elements that have not yet been investigated. We also discuss nine insights into tuning automated repair tools. For example, a small number of statement and expression types are recurrently impacted by real-world patches, and expression-level granularity could reduce search space of finding fix ingredients, where previous studies never explored. [less ▲]

Detailed reference viewed: 143 (24 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 341 (49 UL)
Full Text
Peer Reviewed
See detailAutomated Identification of Desynchronisation Attacks on Shared Secrets
Mauw, Sjouke UL; Smith, Zachary Daniel UL; Toro Pozo, Jorge Luis UL et al

in Automated Identification of Desynchronisation Attacks on Shared Secrets (2018, September)

Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be ... [more ▼]

Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be vulnerable to desynchronisation attacks, a denial of service attack in which the agents are tricked into updating their keys improperly, so that they are no longer able to communicate. In this work we introduce a method that can be used to automatically verify (or falsify) resistance to desynchronisation attacks for a range of protocols. This approach is then used to identify previously unreported vulnerabilities in two published RFID grouping protocols. [less ▲]

Detailed reference viewed: 115 (8 UL)
Full Text
Peer Reviewed
See detailHybrid MPI+OpenMP Implementation of eXtended Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

in Proc. of the 9th Workshop on Applications for Multi-Core Architectures (WAMCA'18), part of 30th Intl. Symp. on Computer Architecture and High Performance Computing (SBAC-PAD 2018) (2018, September)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material), by additional properties such as the chemical composition, thermodynamic state, stress/strain for each particle. It has been applied successfully to numerous industries involving the processing of granular materials such as sand, rock, wood or coke [16], [17]. In this context, computational simulation with (X)DEM has become a more and more essential tool for researchers and scientific engineers to set up and explore their experimental processes. However, increasing the size or the accuracy of a model requires the use of High Performance Computing (HPC) platforms over a parallelized implementation to accommodate the growing needs in terms of memory and computation time. In practice, such a parallelization is traditionally obtained using either MPI (distributed memory computing), OpenMP (shared memory computing) or hybrid approaches combining both of them. In this paper, we present the results of our effort to implement an OpenMP version of XDEM allowing hybrid MPI+OpenMP simulations (XDEM being already parallelized with MPI). Far from the basic OpenMP paradigm and recommendations (which simply summarizes by decorating the main computation loops with a set of OpenMP pragma), the OpenMP parallelization of XDEM required a fundamental code re-factoring and careful tuning in order to reach good performance. There are two main reasons for those difficulties. Firstly, XDEM is a legacy code devel- oped for more than 10 years, initially focused on accuracy rather than performance. Secondly, the particles in a DEM simulation are highly dynamic: they can be added, deleted and interaction relations can change at any timestep of the simulation. Thus this article details the multiple layers of optimization applied, such as a deep data structure profiling and reorganization, the usage of fast multithreaded memory allocators and of advanced process/thread-to-core pinning techniques. Experimental results evaluate the benefit of each optimization individually and validate the implementation using a real-world application executed on the HPC platform of the University of Luxembourg. Finally, we present our Hybrid MPI+OpenMP results with a 15%-20% performance gain and how it overcomes scalability limits (by increasing the number of compute cores without dropping of performances) of XDEM-based pure MPI simulations. [less ▲]

Detailed reference viewed: 177 (35 UL)
Full Text
Peer Reviewed
See detailModellierung und Validierung von Simulationsansätzen für die aussenliegende Lufttemperierung
Schmidt, Christoph Wilhelm; Scholzen, Frank UL; Maas, Stefan UL et al

in Tagungsband BauSim 2018 (2018, September)

Detailed reference viewed: 54 (1 UL)
Full Text
Peer Reviewed
See detailRevisiting Gaussian Mixture Models for Driver Identification
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (2018, September)

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼]

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲]

Detailed reference viewed: 100 (12 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 100 (7 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 251 (38 UL)
Full Text
Peer Reviewed
See detailSymbol-Level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata 25-28 June 2018 (2018, August 27)

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the ... [more ▼]

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the distance preserving constructive interference regions (DPCIR) are always polyhedral angles (shifted pointed cones) for any given constellation point with unbounded decision region. Then we prove that any signal in a given unbounded DPCIR has a norm larger than the norm of the corresponding vertex if and only if the convex hull of the constellation contains the origin. Using these properties, we show that the power of the noiseless received signal lying on an unbounded DPCIR is an strictly increasing function of two parameters. This allows us to reformulate the originally non-convex SLP max-min SINR as a convex optimization problem. We discuss the loss due to our proposed convex reformulation and provide some simulation results. [less ▲]

Detailed reference viewed: 112 (20 UL)
Full Text
Peer Reviewed
See detailMULTI-SCALE MODELLING OF SNOW MECHANICS
Kabore, Brice Wendlassida UL; Peters, Bernhard UL; Willibald, C. et al

in 41st Solid Mechanics Conference (2018, August 27)

Detailed reference viewed: 43 (8 UL)
Full Text
See detailMind and Language. AI in an Example of Similar Patterns of Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 52 (6 UL)
Full Text
See detailA Dynamic Associative Memory for Distant Reading
Kamlovskaya, Ekaterina UL; Schommer, Christoph UL; Sirajzade, Joshgun UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 99 (30 UL)
Full Text
Peer Reviewed
See detailEnergy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers
Franck, Christian UL; Groszschädl, Johann UL; Le Corre, Yann UL et al

in Awan, Irfan; Younas, Muhammad; Portela, Filipe (Eds.) Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops (W-FICLOUD 2018) (2018, August)

The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing ... [more ▼]

The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a "lightweight" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of "long" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 5.1 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields. [less ▲]

Detailed reference viewed: 140 (6 UL)
Full Text
Peer Reviewed
See detailInterference-Aware Scheduling Using Geometric Constraints
Bleuse, Raphaël UL; Dogeas, Konstantinos; Lucarelli, Giorgio et al

in Euro-Par 2018: Parallel Processing (2018, August)

The large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various jobs allocated on different nodes of the platform ... [more ▼]

The large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various jobs allocated on different nodes of the platform. The management of this huge communication demand is crucial for the performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network. In this paper, we consider two different types of communications: the flows induced by data exchanges during computations and the flows related to Input/Output operations. We propose a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, we limit the interferences of both communication types by adding geometric constraints on the allocation of jobs into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each job. We present this methodology on the case study of simple network topologies, namely the line and the ring. We propose theoretical lower and upper bounds under different assumptions with respect to the platform and jobs characteristics. The obtained results illustrate well the difficulty of the problem even on simple topologies. [less ▲]

Detailed reference viewed: 80 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Extraction of Semantic Legal Metadata Using Natural Language Processing
Sleimi, Amin UL; Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL et al

in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal ... [more ▼]

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal requirements. [Objectives] Our work is motivated by two observations: (1) The existing requirements engineering (RE) literature does not provide a harmonized view on the semantic metadata types that are useful for legal requirements analysis. (2) Automated support for the extraction of semantic legal metadata is scarce, and further does not exploit the full potential of natural language processing (NLP). Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the semantic legal metadata types proposed in RE. Subsequently, we conduct a qualitative study aimed at investigating how the identified metadata types can be extracted automatically. [Results and Conclusions] We propose (1) a harmonized conceptual model for the semantic metadata types pertinent to legal requirements analysis, and (2) automated extraction rules for these metadata types based on NLP. We evaluate the extraction rules through a case study. Our results indicate that the rules generate metadata annotations with high accuracy. [less ▲]

Detailed reference viewed: 377 (55 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems
Lei, Lei UL; Chang, Zheng; Hu, Yun et al

in IEEE/CIC International Conference on Communications in China (ICCC 2018) (2018, August)

Detailed reference viewed: 94 (15 UL)
Full Text
Peer Reviewed
See detailBlockchain-Based, Decentralized Access Control for IPFS
Steichen, Mathis UL; Fiz Pontiveros, Beltran UL; Norvill, Robert UL et al

in The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (2018, July 30)

Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the ... [more ▼]

Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the blockchain is replicated on many nodes, a lot of storage space is required without serving an immediate purpose, especially if the node operator does not need to view every file that is stored on the blockchain. It furthermore leads to an increase in the price of operating blockchain nodes because more data needs to be processed, transferred and stored. IPFS is a file sharing system that can be leveraged to more efficiently store and share large files. It relies on cryptographic hashes that can easily be stored on a blockchain. Nonetheless, IPFS does not permit users to share files with selected parties. This is necessary, if sensitive or personal data needs to be shared. Therefore, this paper presents a modified version of the InterPlanetary Filesystem (IPFS) that leverages Ethereum smart contracts to provide access controlled file sharing. The smart contract is used to maintain the access control list, while the modified IPFS software enforces it. For this, it interacts with the smart contract whenever a file is uploaded, downloaded or transferred. Using an experimental setup, the impact of the access controlled IPFS is analyzed and discussed. [less ▲]

Detailed reference viewed: 489 (40 UL)
Full Text
Peer Reviewed
See detailWind Music and Terminology. A Critical Review of an Immanent Phenomenon
Sagrillo, Damien UL

in Sagrillo, Damien (Ed.) Conference Guide (2018, July 20)

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A ... [more ▼]

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A band is a Band is Band”. However, he seemed to hesitate because he referred to Joseph Manfredo who, in his awarded dissertation, asked: “What is a Band?” In my lecture, I will bring this topic to the fore again and deal with the terminology used to designate a group of wind instruments, and I will come up with some suggestions for definitions. I will try to find an answer to questions such as: When is a band a symphonic band, or even a symphonic wind ensemble or “only” a community band? When I say: “I will try to find an answer”, I must admit that I cannot guarantee to find an acceptable one: Are these terms filled with a substance – what makes the difference? – or are they simply a grandiloquent absurdity? Do pretentious terms refer to “better” musicians or music? I will present my paper in English, but I will also deal with band designations in German, in French and my native language – Luxembourgish. [less ▲]

Detailed reference viewed: 132 (6 UL)
Full Text
Peer Reviewed
See detailStochastic Optimum Energy Management for Advanced Transportation Network
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (2018, July 19)

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced ... [more ▼]

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced driver assistance system which predictively plans for a safe and energy-efficient cruising velocity profile autonomously for battery electric vehicles. However, high entropy in transportation network leads to a challenging task to derive a computationally efficient and tractable model to predict the traffic flow. Stochastic optimal control has been developed to systematically find an optimal decision with the aim of performance improvement. However, most of the developed methods are not real-time algorithms. Moreover, they are mainly risk-neutral for safety-critical systems. This paper investigates on the real-time risk-sensitive nonlinear optimal control design subject to safety and ecological constraints. This system improves the efficiency of the transportation network at the microscopic level. Obtained results demonstrate the effectiveness of the proposed method in terms of states regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 117 (8 UL)
Full Text
Peer Reviewed
See detailConclusions générales: La Cour Constitutionnelle en tant qu'autorité de dialogue
Gerkrath, Jörg UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: Trop jeune pour mourir? (2018, July 17)

Detailed reference viewed: 77 (4 UL)
Full Text
Peer Reviewed
See detailThe Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement
Horne, Ross James UL; Mauw, Sjouke UL; Tiu, Alwen

in Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18) (2018, July 08)

Detailed reference viewed: 90 (9 UL)
Full Text
Peer Reviewed
See detailParent's attitudes towards mathematics, home math-related activities and their effect on preschoolers'skills in early numeracy
Poncelet, Débora UL; Tazouti, Youssef; Baye, Ariane et al

in Berqvist, Ewa; Österholm, Magnus; Granberg, Carina (Eds.) et al Proceedings of the 42nd Conference of the International Group for the Psychology of Mathematics Education (2018, July 07)

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailDeveloping early number competencies through games played in school and at home
Tinnes-Vigne, Mélanie UL; Poncelet, Débora UL; de Chambrier, Anne-Françoise et al

in Bergqvist, Ewa; Österholm, Magnus; Granberg, Carina (Eds.) et al Proceedings of the 42nd Conference of the International Group for the Psychology of Mathematics Education (2018, July 07)

Most research studies show that initial number knowledge constitutes the basis for understanding several major principles of mathematics. Moreover, early number competencies are considered as strong ... [more ▼]

Most research studies show that initial number knowledge constitutes the basis for understanding several major principles of mathematics. Moreover, early number competencies are considered as strong predictors of mathematics outcomes at the end of the first grade and even later on (Jordan, Kaplan, Ramineni & Locuniak, 2009). In preschool, the development of these competencies should obviously not give rise to formal learning but is developed through significant activities. However, while everyday situations offer significant contexts, they are still not sufficient to develop the basic number competencies necessary for first grade children (Cannon & Ginsburg, 2008). Adults have to create opportunities to learn mathematical competencies. Mathematical games can meet this requirement. The MathPlay project aims to develop early number competencies through games implemented in school and/or at home. According to the literature, early number competencies consist in counting, conservation ability, magnitude comparison, and (de)composition of numbers. To develop these competencies, we decided to adapt 8 well-known family games. To evaluate the effect of this play-based approach on the development of number competencies, an instrument was created and validated. A quasi-experimental research design (pre/post-test) was implemented in four countries: Luxembourg, Belgium, France and Switzerland. Seven hundred and twenty-five children from all these countries participated in this study. They were divided into one control group and one experimental group with two treatment conditions, X1 (with games at school), and X2 (with games both at school and at home). The post-test was administrated at two moments: just after the intervention and eight weeks later. Data is currently being analysed. This communication will present the first outcomes and will answer our research question: what is the immediate and deferred effect of this play-based approach (X1-X2) on students’ number competencies? [less ▲]

Detailed reference viewed: 81 (3 UL)
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (2018, July)

Detailed reference viewed: 267 (23 UL)
Full Text
Peer Reviewed
See detailCILAP-Architecture for Simultaneous Position- and Force-Control in Constrained Manufacturing Tasks
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in ICINCO 2018 Proceedings of the 15th International Conference on Informatics in Control, Automation and Robotics Volume 2 (2018, July)

This paper presents a parallel control concept for automated constrained manufacturing tasks, i.e. for simultaneous position- and force-control of industrial robotic manipulators. The manipulator’s ... [more ▼]

This paper presents a parallel control concept for automated constrained manufacturing tasks, i.e. for simultaneous position- and force-control of industrial robotic manipulators. The manipulator’s interaction with its environment results in a constrained non-linear switched system. In combination with internal and external uncertainties and in the presence of friction, the stable system performance is impaired. The aim is to mimic a human worker’s behaviour encoded as lists of successive desired positions and forces obtained from the records of a human performing the considered task operating the lightweight robot arm in gravity compensation mode. The suggested parallel control concept combines a model-free position- and a model-free torque-controller. These separate controllers combine conventional PID- and PI-control with adaptive neuro-inspired algorithms. The latter use concepts of a reward-like incentive, a learning system and an actuator-inhibitor-interplay. The elements Conventional controller, Incentive, Learning system and Actuator-Preventer interaction form the CILAP-concept. The main contribution of this work is a biologically inspired parallel control architecture for simultaneous position- and force-control of continuous in contrast to discrete manufacturing tasks without having recourse to visual inputs. The proposed control-method is validated on a surface finishing process-simulation. It is shown that it outperforms a conventional combination of PID- and PI-controllers. [less ▲]

Detailed reference viewed: 101 (10 UL)
Full Text
See detailPeut-on se moquer de tout ? L'étendue de la liberté d'expression face au sentiment religieux
Gerkrath, Jörg UL

in Institut Grand Ducal (Ed.) Actes de la Section des sciences morales et politiques (2018, July)

Detailed reference viewed: 122 (39 UL)
Full Text
Peer Reviewed
See detailCiD: Automating the Detection of API-related Compatibility Issues in Android Apps
Li, Li; Bissyande, Tegawendé François D Assise UL; Wang, Haoyu et al

in International Symposium on Software Testing and Analysis (ISSTA) (2018, July)

Detailed reference viewed: 135 (3 UL)
Full Text
Peer Reviewed
See detailDevice Grouping for Fast and Efficient Channel Access in IEEE 802.11ah based IoT Networks
Bhandari, Sabin; Sharma, Shree Krishna UL; Wang, Xianbin

in Proc. IEEE Int. Conf. Communications 2018 (2018, July)

The recent advances in Internet of Things (IoT) have led to numerous emerging applications ranging from eHealthcare to industrial control, which often demand stringent Quality of Service (QoS ... [more ▼]

The recent advances in Internet of Things (IoT) have led to numerous emerging applications ranging from eHealthcare to industrial control, which often demand stringent Quality of Service (QoS) requirements such as low-latency and high system reliability. However, the ever-increasing number of connected devices in ultra-dense IoT networks and the dynamic traffic patterns increase the channel access delay and packet collision rate. In this regard, this paper proposes a sector-based device grouping scheme for fast and efficient channel access in IEEE 802.11ah based IoT networks such that the total number of the connected devices within each sector is dramatically reduced. In the proposed framework, the Access Point (AP) divides its coverage area into different sectors, and then each sector is further divided into distinct groups based on the number of devices and their location information available from the cloud-center. Subsequently, individual groups within a sector are assigned to specific Random Access Window (RAW) slots, and the devices within distinct groups in different sectors access the allocated RAW slots by employing a spatial orthogonal access mechanism. The performance of the proposed sectorized device grouping scheme has been analyzed in terms of system delay and network throughput. Our simulation results show that the proposed scheme can significantly enhance the network throughput while simultaneously decreasing the system delay as compared to the conventional Distributed Coordination Function (DCF) and IEEE 802.11ah grouping scheme. [less ▲]

Detailed reference viewed: 55 (2 UL)
Full Text
Peer Reviewed
See detailTest Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a ... [more ▼]

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (near-)operational environment. Acceptance testing of a CPS often necessitates that the test cases be prioritized, as there are usually too many scenarios to consider given time constraints. CPS acceptance testing is further complicated by the uncertainty in the environment and the impact of testing on hardware. We propose an automated test case prioritization approach for CPS acceptance testing, accounting for time budget constraints, uncertainty, and hardware damage risks. Our approach is based on multi-objective search, combined with a test case minimization algorithm that eliminates redundant operations from an ordered sequence of test cases. We evaluate our approach on a representative case study from the satellite domain. The results indicate that, compared to test cases that are prioritized manually by satellite engineers, our automated approach more than doubles the number of test cases that fit into a given time frame, while reducing to less than one third the number of operations that entail the risk of damage to key hardware components. [less ▲]

Detailed reference viewed: 396 (72 UL)
Full Text
Peer Reviewed
See detailPRESENCE: Performance Metrics Models for Cloud SaaS Web Services
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Wasim, Umer; Varrette, Sébastien UL et al

in Proc. of the 11th IEEE Intl. Conf. on Cloud Computing (CLOUD 2018) (2018, July)

Detailed reference viewed: 99 (9 UL)
Full Text
Peer Reviewed
See detailInstilling teacher agency in professional development: an international outlook. Enabling teachers in Luxembourg to implement inclusive practice
Pit-Ten Cate, Ineke UL

in Sibilio, Maurizio; Aiello, Paola (Eds.) Lo sviluppo professionale dei docenti. Ragionare di agentività per una scuola inclusiva (2018, July)

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion ... [more ▼]

Teachers’ attitudes may be pivotal for the success of inclusive education. Attitudes can elicit positive or negative expectations and judgments, which in turn can enhance or limit the successful inclusion of students with special educational needs (SEN) in regular classrooms. Over the last decades, Luxembourg has invested significant effort in providing training to teachers and other professionals to improve educational services for students with SEN. The recent School Law (Summer 2017) stipulates how the inclusion of students with SEN can be facilitated. Although these changes all aim to facilitate the successful implementation of inclusive educational practice, it will be important to continue to investigate and interpret teachers’ attitudes and perceived competence and efficacy in the context of the educational system. [less ▲]

Detailed reference viewed: 46 (1 UL)
Full Text
Peer Reviewed
See detailEfficient Minimum-Energy Scheduling with Machine-Learning based Predictions for Multiuser MISO Systems
Lei, Lei UL; Vu, Thang Xuan UL; You, Lei et al

in 2018 IEEE International Conference on Communications (ICC) (2018, July)

Detailed reference viewed: 105 (21 UL)
Full Text
Peer Reviewed
See detailSome basic reflections on voice-controlled natural language human-Siri talk: Hey Siri, you are challenging the interface between the oral and the written.
Arend, Béatrice UL; Fixmer, Pierre UL

in Proceedings 10th International Conference on Education and New Learning Technologies (2018, July)

Detailed reference viewed: 69 (2 UL)
Full Text
Peer Reviewed
See detailInterference Localization On-Board the Satellite Using Drift Induced Virtual Array
Arora, Aakash UL; Maleki, Sina; Shankar, Bhavani UL et al

in Proc. 2018 International Conference on Signal Processing and Communications (SPCOM) (2018, July)

Herein, we investigate the interference received from other wireless networks into a satellite communication (SATCOM) link, and review approaches to identify the interference location using on-board ... [more ▼]

Herein, we investigate the interference received from other wireless networks into a satellite communication (SATCOM) link, and review approaches to identify the interference location using on-board satellite processing. Interference is an increasing problem for satellite communication links, and while receiving signals from gateways or user terminals, the uplink is prone to disturbance by interference due to jammers or unintentional transmissions. In this paper, our aim is to localize unknown interference sources present on the ground by estimating direction of arrival (DOA) information using onboard processing (OBP) in the satellite, and the satellite drift inducing a virtual array. In this work, the signal sampled by the drifting single antenna feed is modeled as using an arbitrary array. Building on this model, we perform the 2-D DOA (azimuth and elevation) estimation. The key challenges in such a design include single snapshot based DOA estimation with low complexity and robustness, arising out of limited on-board computational complexity as well as uncertainty in parameters like the drift speed. Employing realistic satellite drift patterns, the paper illustrates the performance of the proposed technique highlighting the accuracy in localization under adverse environments. We provide numerical simulations to show the effectiveness of our methodology. [less ▲]

Detailed reference viewed: 218 (56 UL)
Full Text
Peer Reviewed
See detailPush-out tests on demountable shear connectors of steel-concrete composite structures
Kozma, Andras UL; Odenbreit, Christoph UL; Braun, Matthias Volker UL et al

in Proceedings of the 12th International Conference on Advances in Steel-Concrete Composite Structures (2018, June 27)

The deconstruction of steel-concrete composite structures in buildings and the later separation of the materials is a labour- and cost intensive work. The shear studs are welded on the steel beam and ... [more ▼]

The deconstruction of steel-concrete composite structures in buildings and the later separation of the materials is a labour- and cost intensive work. The shear studs are welded on the steel beam and imbedded in the concrete deck and a large amount of cutting work becomes necessary. As a result, recycling is difficult and the potential for reusing entire elements is lost. The carbon footprint of composite structures could be decreased by application of the principles of “design for deconstruction and reuse”. This paper presents a desk top study and corresponding laboratory experiments on demountable shear connectors that facilitate recyclability and even provide the potential for reusing complete structural elements. In the Laboratory of Steel and Composite Structures of the University of Luxembourg 15 push-out tests have been carried out using different bolted connection systems suitable for multiple uses in order to verify their performance focusing on shear strength, stiffness, slip capacity, ductility and ability of demounting. The investigated systems included pre-stressed and epoxy resin injection bolts, solid slabs and composite slabs with profiled decking. The results showed that the tested demountable shear connections could provide higher shear resistance than conventional shear connections. The critical failure mode is shear failure of the bolts, while there was no visible damage observed on the connected members. Most of the tested connections could fulfil the ductility requirement according to by Eurocode 4. The application of epoxy resin in the hole clearance resulted in lower slip capacity. The outcome provides an important basis for the justification of the forthcoming enhancement and validation of numerical models of the demountable shear connections. The failure behaviour, the observed damages and the resulting ability of the elements for re-use are discussed in detail. [less ▲]

Detailed reference viewed: 214 (12 UL)
Full Text
Peer Reviewed
See detailComparison of design for composite columns in steel and concrete according to Eurocode 4 and Chinese design codes
Zhang, Qingjie UL; Schäfer, Markus UL

in Romero, Manuel (Ed.) Proceedings of the 12th International Conference on Advances in Steel-Concrete Composite Structures (ASCCS 2018) (2018, June 27)

This paper compares the design of composite columns in steel and concrete based on EN1994-1-1 and Chinese JGJ138-2016. First, the application ranges of the codes are pointed out. Both codes contain the ... [more ▼]

This paper compares the design of composite columns in steel and concrete based on EN1994-1-1 and Chinese JGJ138-2016. First, the application ranges of the codes are pointed out. Both codes contain the design of fully encased composite sections and concrete filled rectangular and circular tubes. However, there are different limitations on cross-section sizes, material strength classes, and others. JGJ138 has three separate chapters for the designs related to the three different types of columns. Eurocode 4 gives three different design methods: one general method based on nonlinear calculation, and two simplified methods based on European buckling curves or N-M iteration curves. For the materials, mechanical properties, such as design strength values, are compared based on the same material grade. For axial compression resistance and eccentrically compressive resistance, the two simplified methods from Eurocode 4 are compared with the design method according to JGJ138-2016 through theoretical and parameter studies. The influences of related parameters such as long-term effects, the buckling curves, and N-M iteration curves are also compared. For shear design, JGJ138-2016 considers mainly transverse shear resistances, while Eurocode 4 further considers shear connection and load introduction. The design transverse shear resistance is compared through theory. [less ▲]

Detailed reference viewed: 78 (5 UL)