References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailOn the use of supervised machine learning for assessing schedulability: application to Ethernet TSN
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 27th International Conference on Real-Time Networks and Systems (RTNS 2019) (2019)

In this work, we ask if Machine Learning (ML) can provide a viable alternative to conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints ... [more ▼]

In this work, we ask if Machine Learning (ML) can provide a viable alternative to conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints. Otherwise said, can an algorithm learn what makes it difficult for a system to be feasible and predict whether a configuration will be feasible without executing a schedulability analysis? To get insights into this question, we apply a standard supervised ML technique, k-nearest neighbors (k-NN), and compare its accuracy and running times against precise and approximate schedulability analyses developed in Network-Calculus. The experiments consider different TSN scheduling solutions based on priority levels combined for one of them with traffic shaping. The results obtained on an automotive network topology suggest that k-NN is efficient at predicting the feasibility of realistic TSN networks, with an accuracy ranging from 91.8% to 95.9% depending on the exact TSN scheduling mechanism and a speedup of 190 over schedulability analysis for 10^6 configurations. Unlike schedulability analysis, ML leads however to a certain rate "false positives'' (i.e., configurations deemed feasible while they are not). Nonetheless ML-based feasibility assessment techniques offer new trade-offs between accuracy and computation time that are especially interesting in contexts such as design-space exploration where false positives can be tolerated during the exploration process. [less ▲]

Detailed reference viewed: 67 (4 UL)
Full Text
Peer Reviewed
See detailUnderstanding and Modelling Human Attention for Soft Biometrics Purposes
Cazzato, Dario UL; Leo, Marco; Carcagnì, Pierluigi et al

in AIVR 2019: Proceedings of the 2019 3rd International Conference on Artificial Intelligence and Virtual Reality (2019)

Detailed reference viewed: 76 (10 UL)
Full Text
Peer Reviewed
See detailScalable control of asynchronous Boolean networks
Su, Cui; Paul, Soumya UL; Pang, Jun UL

in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailSequential reprogramming of Boolean networks made practical
Mandon, Hugues; Su, Cui; Haar, Stefan et al

in Proceedings of 17th International Conference on Computational Methods in Systems Biology (CMSB'19) (2019)

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailErhöhte Reaktivität Herzschlag-evozierter Potenziale während der Aufmerksamkeits- fokussierung auf den eigenen Herzschlag und erhöhte kardiovaskuläre Aktivität bei Personen mit hoher somatoformer Symptombelastung
Schulz, André UL; Rost, S.; Dierolf, Angelika UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte ... [more ▼]

Die psychobiologischen Mechanismen der Entstehung körperlicher Symptome bei somatoformen Störungen sind weitgehend unklar. Im Perception-Filter-Modell wird postuliert, dass (1.) verstärkte Signalübermittlung von Körperorganen und (2.) verringerte Filterfunktion im ZNS zu (3.) verstärkter Wahrnehmung von Symptomen führt. Bislang existiert jedoch keine Evidenz, die diesen Zusammenhang an einer von somatoformen Symptomen belasteten Population unterstützt. Um diesen Sachverhalt aufzudecken, wurden zunächst 486 Personen aus der Allgemeinbevölkerung anhand einer Online- Version des Screenings für Somatoforme Störungen (SOMS-2) anhand des oberen und unteren Centils in Personen mit hoher (HSB) und niedriger somatoformer Symptombelastung (NSB) geteilt. Jeweils 29 NSB- (21 Frauen; 26,0 J.) und HSBPersonen (27 Frauen; 28,4 J.) wurden im Labor anhand (1.) verstärkter Körpersignale hinsichtlich kardiovaskulärer Aktivität und Cortisol-Aufwachreaktion, sowie (2.) Filterfunktionen im ZNS hinsichtlich Herzschlag-evozierter Potentiale (HEPs) während der Durchführung eines Herzschlagwahrnehmungstests und während Ruhe untersucht. HEPs reflektieren die Repräsentation kardio-afferenter Signale im ZNS. Die HSB-Gruppe zeigte eine höhere Ruhe-Herzrate (72,7 vs. 66,8 bpm) und eine geringere Herzratenvariabilität (RMSSD: 36,8 vs. 52,5 ms) als die LSB-Gruppe. Außerdem zeigten die HSB-Personen bei der Aufmerksamkeitsfokussierung auf den eigenen Herzschlag eine höhere Reaktivität der HEP-Amplitude als die LSB-Personen. Es gab keine Gruppenunterschiede hinsichtlich der Cortisol-Aufwachreaktion. Die Ergebnisse belegen sowohl (1.) die verstärkte Signalübermittlung von Körperorganen, als auch (2.) verringerte Filterfunktionen bei Personen mit hoher somatoformer Symptombelastung. Dies spricht für die Gültigkeit des Perception-Filter-Modells. Die erhöhte HEP-Reaktivität bezüglich der Aufmerksamkeitsfokussierung auf Körperprozesse könnte einen Biomarker für Personen mit hohem Risiko für die Entwicklung von somatoformen Störungen darstellen. [less ▲]

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailAn offline dictionary attack against zkPAKE protocol
Lopez Becerra, José Miguel UL; Ryan, Peter UL; Sala, Petra UL et al

in An offline dictionary attack against zkPAKE protocol (2019)

Password Authenticated Key Exchange (PAKE) allows a user to establish a secure cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security require- ments of ... [more ▼]

Password Authenticated Key Exchange (PAKE) allows a user to establish a secure cryptographic key with a server, using only knowledge of a pre-shared password. One of the basic security require- ments of PAKE is to prevent o ine dictionary attacks. In this paper, we revisit zkPAKE, an augmented PAKE that has been recently proposed by Mochetti, Resende, and Aranha (SBSeg 2015). Our work shows that the zkPAKE protocol is prone to o ine password guess- ing attack, even in the presence of an adversary that has only eavesdrop- ping capabilities. Results of performance evaluation show that our attack is practical and e cient.Therefore, zkPAKE is insecure and should not be used as a password-authenticated key exchange mechanism. [less ▲]

Detailed reference viewed: 127 (9 UL)
Full Text
Peer Reviewed
See detailCache-Aided Massive MIMO: Linear Precoding Design and Performance Analysis
Wei, Xiao; Xiang, Lin UL; Cottatellucci, Laura et al

in Proc. IEEE ICC 2019 (2019)

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular ... [more ▼]

In this paper, we propose a novel joint caching and massive multiple-input multiple-output (MIMO) transmission scheme, referred to as cache-aided massive MIMO, for advanced downlink cellular communications. In addition to reaping the conventional advantages of caching and massive MIMO, the proposed scheme also exploits the side information provided by cached files for interference cancellation at the receivers. This interference cancellation increases the degrees of freedom available for precoding design. In addition, the power freed by the cache-enabled offloading can benefit the transmissions to the users requesting non-cached files. The resulting performance gains are not possible if caching and massive MIMO are designed separately. We analyze the performance of cache-aided massive MIMO for cache-dependent maximum-ratio transmission (MRT), zero-forcing (ZF) precoding, and regularized zero-forcing (RZF) precoding. Lower bounds on the ergodic achievable rates are derived in closed form for MRT and ZF precoding. The ergodic achievable rate of RZF precoding is obtained for the case when the numbers of transmit antennas and users are large but their ratio is fixed. Compared to conventional massive MIMO, the proposed cache-aided massive MIMO scheme achieves a significantly higher ergodic rate especially when the number of users approaches the number of transmit antennas. [less ▲]

Detailed reference viewed: 64 (3 UL)
Full Text
Peer Reviewed
See detailOn the Evolution of Keyword-Driven Test Suites
Rwemalika, Renaud UL; Kintis, Marinos UL; Papadakis, Mike UL et al

in 12th IEEE International Conference on Software Testing, Verification and Validation (2019)

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to ... [more ▼]

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to achieve. The problem becomes challenging when software evolves, as end-to-end test suites need to adapt and conform to the evolved software. Unfortunately, end-to-end tests are particularly fragile as any change in the application interface, e.g., application flow, location or name of graphical user interface elements, necessitates a change in the tests. This paper presents an industrial case study on the evolution of Keyword-Driven test suites, also known as Keyword-Driven Testing (KDT). Our aim is to demonstrate the problem of test maintenance, identify the benefits of Keyword-Driven Testing and overall improve the understanding of test code evolution (at the acceptance testing level). This information will support the development of automatic techniques, such as test refactoring and repair, and will motivate future research. To this end, we identify, collect and analyze test code changes across the evolution of industrial KDT test suites for a period of eight months. We show that the problem of test maintenance is largely due to test fragility (most commonly-performed changes are due to locator and synchronization issues) and test clones (over 30% of keywords are duplicated). We also show that the better test design of KDT test suites has the potential for drastically reducing (approximately 70%) the number of test code changes required to support software evolution. To further validate our results, we interview testers from BGL BNP Paribas and report their perceptions on the advantages and challenges of keyword-driven testing. [less ▲]

Detailed reference viewed: 210 (9 UL)
Full Text
Peer Reviewed
See detailPower and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019 (2019)

Detailed reference viewed: 127 (25 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Vulnerability Prediction of Open-Source Software Releases
Jimenez, Matthieu; Rwemalika, Renaud UL; Papadakis, Mike UL et al

in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Detailed reference viewed: 84 (6 UL)
Full Text
Peer Reviewed
See detailAutomated Reasoning with Complex Ethical Theories--A Case Study Towards Responsible AI
Fuenmayor, David; Benzmüller, Christoph UL

in 16th International Congress on Logic, Methodology and Philosophy of Science and Technology (CLMPST 2019) --- Bridging across Academic Cultures, Book of Abstracts (2019)

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailOn Deception-Based Protection Against Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (2019)

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While ... [more ▼]

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them. [less ▲]

Detailed reference viewed: 135 (13 UL)
Full Text
Peer Reviewed
See detailAn Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles
Kaiafas, Georgios UL; Hammerschmidt, Christian UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Hammerschmidt, Christian; State, Radu (Eds.) 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 59 (12 UL)
Full Text
Peer Reviewed
See detailImmersive Mixed Reality Object Interaction for Collaborative Context-Aware Mobile Training and Exploration
Botev, Jean UL; Mayer, Joe; Rothkugel, Steffen UL

in Proceedings of the 10th ACM Multimedia Systems Conference (MMSys) (2019)

Detailed reference viewed: 106 (24 UL)
Full Text
Peer Reviewed
See detailOptimising patients’ medical care after prison in Luxembourg
Batista, Jorge; Stein, Romain; Baumann, Michèle UL

in General Practice : The human side of medicine (2019)

Introduction : Passing through prison can be a health gain for the incarcerated population and release from prison can become a period of vulnerability where this potentially acquired gain is lost if the ... [more ▼]

Introduction : Passing through prison can be a health gain for the incarcerated population and release from prison can become a period of vulnerability where this potentially acquired gain is lost if the transition back to civil society in not anticipated. The main objective was the identification and analysis of the factors favor and oppose primary care practice for patients leaving prison in Luxembourg. The secondary objective was to develop recommendations based on the key findings through a literature’s review. Methods : A qualitative study using semi-structured interviews was conducted with general practitioners and patient-inmates. The questions from the two interview guides were similar so that the analysis allowed the results to be mirrored. Using the interviews’ transcripts, a categorical thematic content analysis of those was conducted based on the objectives. On the basis of verbatim, items were formulated and grouped into dimensions and then themes. Results : Our analysis has highlighted the lack of links between the prison and the outside world at each stage of medical and psychosocial care from the point of view of care and support proposed in prison until prison release. Recommendations for doable improvements have been proposed, such as the creation of a general practitioners’ network continuing the medical care as well as genuine cooperation with organisations dealing with drug addicts. Conclusion : Reforms concerning prison care should be considered between the system of prison release, the creation of socio-medical relays and alternatives to incarceration, in analogy to the transitions clinics found in the United States [less ▲]

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailInterozeption bei akutem Stress und Stress-assoziierten Erkrankungen
Schulz, André UL

in Schmidt, S. (Ed.) 14. Kongress der Fachgruppe Gesundheitspsychologie. Das richtige Maß ‒ Gesundheitspsychologie zwischen Individualisierung und Bevölkerungsbezug. (2019)

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum ... [more ▼]

Hintergrund: Das Gehirn und periphere Körperorgane tauschen permanent Informationen aus. Interozeption erfordert die Aufmerksamkeitslenkung auf afferente Signale vom Körper zum Gehirn. Stress wiederum beinhaltet efferente Signalübermittlung vom Gehirn an periphere Körperprozesse. Daher kann die Interaktion von Interozeption und Stress auch als bi-direktionale Signalübermittlung zwischen Gehirn und Körper angesehen werden. Die präsentierte Studienreihe besteht aus 10 Einzelstudien, die folgende Ziele verfolgt: (1.) Die bidirektionale Hirn-Körper-Kommunikation im Normalzustand bei Gesunden zu verstehen und (2.) die Bedeutung potenziell dysregulierter Hirn-Körper-Kommunikation bei Stress-assoziierten Krankheiten aufzudecken. Methode: Dabei werden verschiedene Ebenen interozeptiver Signalübermittlung, wie frühe Repräsentation im zentralen Nervensystem (ZNS), bewusste Wahrnehmung und Aufmerksamkeitslenkung auf Körperprozesse, sowie deren Interpretation untersucht. Die beiden physiologischen Stress-Achsen, die Hypothalamus- Hypophysen-Nebennierenrinden-Achse und die sympatho-adreno-medulläre (SAM-)Achse, stehen dabei im Mittelpunkt der Untersuchungen. Ergebnisse: Zunächst wird anhand von Studien mit Stresstests und pharmakologischen Designs aufgezeigt, dass eine Aktivierung der SAM-Achse sowohl das kardiovaskuläre System stimuliert, aber auch die Aufmerksamkeitslenkung beeinträchtigt. Cortisol wiederum verstärkt Hirn-Körper-Kommunikation vor allem auf Ebene der (kortikalen) ZNS-Repräsentation. Depersonalisierungsstörung, somatoforme Störungen, Depression, posttraumatische Belastungsstörung und Borderline-Persönlichkeitsstörung zeichnen sich alle durch ein hochspezifisches Pattern der Dysregulation hinsichtlich Interozeption und physiologischer Stressachsen aus, was die Heterogenität der Körpersymptome erklären könnte. Darüber hinaus zeigt sich, dass Hirn-Körper-Kommunikation auch den Verlauf kardiovaskulärer Erkrankungen vorhersagen kann. Diskussion: Die Ergebnisse sprechen für die Entwicklung von Präventionsansätzen, die Hirn-Körper-Kommunikation mit bestimmten Trainings zu stärken, um den psychischen und körperlichen Gesundheitsverlauf positiv beeinflussen zu können. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in Proceedings of the Third Central European Cybersecurity Conference (2019)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 123 (35 UL)
Full Text
Peer Reviewed
See detailProactive Legal Design: Embedding Values in the Design of Legal Artefacts
Rossi, Arianna UL; Haapio, Helena

in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) International Legal Infomatics Symposium IRIS 2019 (2019)

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an ... [more ▼]

Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an interdisciplinary and proactive approach to law, covering not only legal information and documents, but also legal services, processes, and systems. This paper introduces Legal Design in the context of forward-looking Legal Tech, especially through the lenses of data protection, and analyses the analogies among Value-Sensitive Design, Proactive Law, and Privacy by Design. [less ▲]

Detailed reference viewed: 66 (3 UL)
Full Text
Peer Reviewed
See detailHow Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program
Bernard, Nicolas UL; Leprévost, Franck UL

in Theeramunkong, Thanaruk; Bouvry, Pascal; Srichaikul, Piyawut (Eds.) Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (2019)

Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful ... [more ▼]

Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful deceptions may have disastrous consequences. Still, humans sometimes detect mistakes made by machines when they classify images. One can conceive a system able to solicit humans in case of doubts, namely when humans and machines may disagree. Using Information Hiding techniques, we describe a strategy to construct evolutionary algorithms able to fool both neural networks and humans for image recognition. Although this research is still exploratory, we already describe a concrete fitness function for a specific scenario. Additional scenarii and further research directions are provided. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailPrecoded Cluster Hopping in Multi-Beam High Throughput Satellite Systems
Kibria, Mirza UL; Lagunas, Eva UL; Maturo, Nicola UL et al

in Proceedings-IEEE Global Communications Conference (IEEE Globecom), Hawaii, 2019 (2019)

Beam-Hopping (BH) and precoding are two trending technologies for the satellite community. While BH enables flexibility to adapt the offered capacity to the heterogeneous demand, precoding aims at ... [more ▼]

Beam-Hopping (BH) and precoding are two trending technologies for the satellite community. While BH enables flexibility to adapt the offered capacity to the heterogeneous demand, precoding aims at boosting the spectral efficiency. In this paper, we consider a high throughput satellite (HTS) system that employs BH in conjunction with precoding. In particular, we propose the concept of Cluster-Hopping (CH) that seamlessly combines the BH and precoding paradigms and utilizes their individual competencies. The cluster is defined as a set of adjacent beams that are simultaneously illuminated. In addition, we propose an efficient time-space illumination pattern design, where we determine the set of clusters that can be illuminated simultaneously at each hopping event along with the illumination duration. We model the CH time-space illumination pattern design as an integer programming problem which can be efficiently solved. Supporting results based on numerical simulations are provided which validate the effectiveness of the proposed CH concept and time-space illumination pattern design. [less ▲]

Detailed reference viewed: 40 (8 UL)
Full Text
Peer Reviewed
See detailA proof of concept to deceive humans and machines at image classification with evolutionary algorithms
Chitic, Raluca Ioana UL; Bernard, Nicolas; Leprévost, Franck UL

in Chitic, Iona Raluca; Bernard, Nicolas; Leprévost, Franck (Eds.) Proceedings of ACIIDS 2020 (2019)

Detailed reference viewed: 41 (4 UL)
Full Text
Peer Reviewed
See detailFrom Classical to Non-monotonic Deontic Logic Using ASPIC+
Dong, Huimin; Liao, Beishui; Markovich, Réka UL et al

in Logic, Rationality, and Interaction - 7th International Workshop LORI 2019, Chongqing, China, October 18-21, 2019, Proceedings (2019)

In this paper we use formal argumentation to design non-monotonic deontic logics, based on two monotonic deontic logics. In particular, we use the structured argumentation theory ASPIC􀀀 to define non ... [more ▼]

In this paper we use formal argumentation to design non-monotonic deontic logics, based on two monotonic deontic logics. In particular, we use the structured argumentation theory ASPIC􀀀 to define non-monotonic variants of well-understood modal logics. We illustrate the approach using argumentation about free-choice permission. [less ▲]

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailNature et modernité : réflexions théoriques suivies d’une lecture écologique de Fenn Kaß
Thiltges, Sébastian UL

in Millim, Anne-Marie; Toffoli, Ian (Eds.) Modernismen in Luxemburg: Traditionen - Variationen - Brüche (2019)

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new ... [more ▼]

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new subjects, like industry and urbanism, as an alternative to homeland literature’s depiction of earth and soil. Batty Weber depicts in Fenn Kaß (1913) the life of a defrocked priest who leaves his native countryside to become an engineer abroad. Seemingly a novel about modernity, the book also contains several descriptions of the protagonist’s relation to the natural environment, using repeatedly the metaphor of a liquid and dissolving body. By defining both interrelated concepts of nature and modernity, this paper provides an anthropological reading of texts, questioning how salient poetical motives can challenge sociological and epistemological contextualisation. [less ▲]

Detailed reference viewed: 54 (3 UL)
Full Text
Peer Reviewed
See detailHerzschlag-evozierte Potenziale bei Bulimia nervosa
Lutz, Annika UL; Van Dyck, Zoé UL; Schulz, André UL et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben ... [more ▼]

Die ursprüngliche Annahme, dass Essstörungspatient/innen unter einem umfassenden Defizit der interozeptiven Wahrnehmung leiden, wird inzwischen differenzierter betrachtet. Unterschiedliche Befunde ergeben sich je nach betrachtetem Organsystem (Herz, Magen), Verarbeitungsebene (neuronal, Selbstbericht) und Diagnose. Die bisherige Befundlage ist jedoch unübersichtlich und widersprüchlich. Für Bulimia nervosa (BN) wurde sowohl reduzierte, als auch unveränderte Herzschlagwahrnehmung berichtet. Mit dem vorliegenden Beitrag steuern wir weitere Ergebnisse zur Herzschlagwahr nehmung bei und ergänzen diese um einen physiologischen Indikator der kortikalen Verarbeitung kardio-afferenter Signale (Herzschlag-evozierte Potenziale, HEPs). Es wurden 22 Frauen mit akuter oder teilremittierter BN (BMI 23,94±3,61; Alter 31,86±11,20) und 22 gesunde Frauen untersucht (BMI 24,24±3,37; Alter 31,00±10,15). Die Stichproben wurden nach Alter und BMI parallelisiert. Die Teilnehmerinnen führten eine Herzschlagwahrnehmungsaufgabe nach Schandry durch, während ein 64-Kanal-EEG aufgezeichnet wurde. HEPs wurden als mittlere EEG-Amplitude von 455ms bis 595ms nach der R-Zacke berechnet. Die Ergebnisse zeigen keine signifikanten Gruppenunterschiede in Herzschlagwahrnehmung, HEPs und Herzrate. Dies bestätigt vorherige Befunde einer intakten Herzschlagwahrnehmung bei BN. Zusätzlich können wir von einer intakten kortikalen Verarbeitung kardio-afferenter Reize ausgehen. Die Wahrnehmung des Herzschlags ist insbesondere für die Verarbeitung und Regulation von Emotionen relevant. Auf Basis der vorliegenden und früheren Befunde ist davon auszugehen, dass defizitäre Emotionsregulation bei BN nicht auf veränderte Herzschlagwahrnehmung zurückzuführen ist. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailGraph-based malicious login events investigation
Amrouche, Faouzi UL; Lagraa, Sofiane UL; Kaiafas, Georgios UL et al

in Amrouche, Faouzi; Lagraa, Sofiane; Kaiafas, Georgios (Eds.) et al 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 126 (21 UL)
Full Text
Peer Reviewed
See detailA Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in Emerging Technologies for Authorization and Authentication (2019)

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome ... [more ▼]

To send encrypted emails, users typically need to create and exchange keys which later should be manually authenticated, for instance, by comparing long strings of characters. These tasks are cumbersome for the average user. To make more accessible the use of encrypted email, a secure email application named pEp automates the key management operations; pEp still requires the users to carry out the verification, however, the authentication process is simple: users have to compare familiar words instead of strings of random characters, then the application shows the users what level of trust they have achieved via colored visual indicators. Yet, users may not execute the authentication ceremony as intended, pEp's trust rating may be wrongly assigned, or both. To learn whether pEp's trust ratings (and the corresponding visual indicators) are assigned consistently, we present a formal security analysis of pEp's authentication ceremony. From the software implementation in C, we derive the specifications of an abstract protocol for public key distribution, encryption and trust establishment; then, we model the protocol in a variant of the applied pi calculus and later formally verify and validate specific privacy and authentication properties. We also discuss alternative research directions that could enrich the analysis. [less ▲]

Detailed reference viewed: 121 (24 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 58 (26 UL)
Full Text
See detailSlim-floor beam bending moment resistance considering partial shear connection
Zhang, Qingjie UL; Schäfer, Markus UL

in Wald, Frantisek; Jandera, Michal (Eds.) Stability and Ductility of Steel Structures 2019 (2019)

Having the advantage of flat lower surface, high stiffness and integrated fire resistance, slim-floor composite beams are widely used and favoured in many design solutions. The current bending design ... [more ▼]

Having the advantage of flat lower surface, high stiffness and integrated fire resistance, slim-floor composite beams are widely used and favoured in many design solutions. The current bending design methods are mainly derived from plastic design methods for classical composite beam with consideration of the special features for slim-floor beams such as the transverse bending of bottom flange when used as support for slabs. Alternatively, more advanced strain-limited design method or FE-method can be used. In the case of full shear connection, with deep position of neutral axis and great compression zone height, there is a risk that plastic design method may overestimate the bending resistance of the cross section compared to the strain-limited design method. In the case of the partial shear connection, shear design diagram for slim-floor beams obtained by means of the strain-limited design can also differ significantly from the one obtained by plastic design method, thus further research on slim-floor beams is still necessary. [less ▲]

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailFog Seeding Strategies for Information-Centric Heterogeneous Vehicular Networks
Turcanu, Ion UL; Engel, Thomas UL; Sommer, Christoph

in 11th IEEE Vehicular Networking Conference (VNC 2019) (2019)

Content downloading of mobile broadband users today routinely causes network load to exceed what the Radio Access Network (RAN) can sustain without degrading user experience. Many works are therefore ... [more ▼]

Content downloading of mobile broadband users today routinely causes network load to exceed what the Radio Access Network (RAN) can sustain without degrading user experience. Many works are therefore considering edge or fog computing paradigms and Device to Device (D2D) communication using 4G/5G C-V2X or IEEE 802.11p/bd links to obtain content. When content originates (or is maintained) at a central location, however, this requires expensive seeding of the content into the mobile network. We thus advocate basing the decision of when and where to perform fog seeding on a network graph that respects connectivity metrics while performing community detection and exploiting node centrality. We present different seeding strategies and investigate their respective benefits compared to traditional information-centric networking. Using simulations, we demonstrate that choosing a suitable strategy can yield substantial benefits - and vice versa. [less ▲]

Detailed reference viewed: 423 (12 UL)
Full Text
Peer Reviewed
See detailSearch-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems
Cordy, Maxime UL; Muller, Steve; Papadakis, Mike UL et al

in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)

Detailed reference viewed: 127 (6 UL)
See detailCharles-Ferdinand Nothomb et les Belges germanophones: contribution à l'histoire des relations entre P.S.C. et C.S.P.
Brüll, Christoph UL

in Annaert, Phiilippe; Lanneau, Catherine; Dujardin, Vincent (Eds.) Charles-Ferdinand Nothomb. Une homme d'Etat, une époque. Actes du colloque tenu à Saint-Hubert le 10 juin 2016 (2019)

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailDesigning (In) finite-alphabet Sequences via Shaping the Radar Ambiguity Function
Alaee-Kerahroodi, Mohammad UL; Sedighi, Saeid UL; MR, Bhavani Shankar et al

in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019)

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed ... [more ▼]

In this paper, a new framework for designing the radar transmit waveform is established through shaping the radar Ambiguity Function (AF). Specifically, the AF of the phase coded waveforms are analyzed and it is shown that a continuous/discrete phase sequence with the desired AF can be obtained by solving an optimization problem promoting equality between the AF of the transmit sequence and the desired AF. An iterative algorithm based on Coordinate Descent (CD) method is introduced to deal with the resulting non-convex optimization problem. Numerical results illustrate the proposed algorithm make it possible to design sequences with remarkably high tolerance towards Doppler frequency shifts, which is of interest to the future generations of automotive radar sensors. [less ▲]

Detailed reference viewed: 58 (26 UL)
See detail"Le maillage de l'oeuvre. Avant Propos"
Raus, Tonia UL; Glesener, Jeanne UL

in Glesener, Jeanne; Raus, Tonia (Eds.) Jean Portante. Le travail de l'écriture ou la mémoire à l'oeuvre (2019)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailComposable, Unconditionally Secure Message Authentication without any Secret Key
Ostrev, Dimiter UL

in 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019 (2019)

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and ... [more ▼]

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and reject a message coming from Eve with high probability. The system does not require any secret key shared between Alice and Bob, provides information theoretic security, and can safely be composed with other protocols in an arbitrary context. [less ▲]

Detailed reference viewed: 69 (8 UL)
Full Text
See detailThe LuNa Open Toolbox for the Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in Perner, Petra (Ed.) Advances in Data Mining, Applications and Theoretical Aspects, Poster Proceedings 2019 (2019)

Despite some recent work, the ongoing research for the processing of Luxembourgish is still largely in its infancy. While a rich variety of linguistic processing tools exist, especially for English, these ... [more ▼]

Despite some recent work, the ongoing research for the processing of Luxembourgish is still largely in its infancy. While a rich variety of linguistic processing tools exist, especially for English, these software tools offer little scope for the Luxembourgish language. LuNa (a Tool for Luxembourgish National Corpus) is an Open Toolbox that allows researchers to annotate a text corpus written in Luxembourgish language and to build/query an annotated corpus. The aim of the paper is to demonstrate the components of the system and its usage for Machine Learning applications like Topic Modelling and Sentiment Detection. Overall, LuNa bases on a XML-database to store the data and to define the XML scheme, it offers a Graphical User Interface (GUI) for a linguistic data preparation such as tokenization, Part-Of-Speech tagging, and morphological analysis -- just to name a few. [less ▲]

Detailed reference viewed: 158 (17 UL)
Full Text
Peer Reviewed
See detailConversational Interfaces for Explainable AI: A Human-Centered Approach
Jenzsch, Sophie; Höhn, Sviatlana UL; Hochgeschwender, Nico UL

in Proceedings of EXTRAAMAS 2019 (2019)

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an ... [more ▼]

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an intelligent agent. We propose conversational interfaces (CI) to be the perfect setting, since they are intuitive for humans and computationally processible. While there are many approaches addressing technical issues of this human-agent communication problem, the user perspective appears to be widely neglected. With the purpose of better requirement understanding and identification of implicit expectations from a human-centered view, a Wizard of Oz experiment was conducted, where participants tried to elicit basic information from a pretended artificial agent (What are your capabilities?). The hypothesis that users pursue fundamentally different strategies could be verified with the help of Conversation Analysis. Results illustrate the vast variety in human communication and disclose both requirements of users and obstacles in the implementation of protocols for interacting agents. Finally, we infer essential indications for the implementation of such a CI. [less ▲]

Detailed reference viewed: 87 (3 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Design for Coded Caching Delivery Phase
Vu, Thang Xuan UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in 2019 IEEE International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom) (2019)

Detailed reference viewed: 38 (6 UL)
Full Text
Peer Reviewed
See detailEvaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models
Nejati, Shiva UL; Gaaloul, Khouloud UL; Menghi, Claudio UL et al

in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS ... [more ▼]

Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness of models against some given formal properties. In this paper, we present an industrial Simulink model benchmark, provide a categorization of different model types in the benchmark, describe the recurring logical patterns in the model requirements, and discuss the results of applying model checking and model testing approaches to identify requirements violations in the benchmarked models. Based on the results, we discuss the strengths and weaknesses of model testing and model checking. Our results further suggest that model checking and model testing are complementary and by combining them, we can significantly enhance the capabilities of each of these approaches individually. We conclude by providing guidelines as to how the two approaches can be best applied together. [less ▲]

Detailed reference viewed: 147 (45 UL)
Full Text
Peer Reviewed
See detailProactive Model for Handling Conflicts in Sensor Data Fusion Applied to Robotic Systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Proceedings of the 14th International Conference on Software Technologies (ICSOFT), 2019 Prague, Czech Republic, 26 - 28 July, 2019 (2019)

Robots have to be able to function in a multitude of different situations and environments. To help them achieve this, they are usually equipped with a large set of sensors whose data will be used in ... [more ▼]

Robots have to be able to function in a multitude of different situations and environments. To help them achieve this, they are usually equipped with a large set of sensors whose data will be used in order to make decisions. However, the sensors can malfunction, be influenced by noise or simply be imprecise. Existing sensor fusion techniques can be used in order to overcome some of these problems, but we believe that data can be improved further by computing context information and using a proactive rule-based system to detect potentially conflicting data coming from different sensors. In this paper we will present the architecture and scenarios for a generic model taking context into account. [less ▲]

Detailed reference viewed: 118 (10 UL)
Full Text
Peer Reviewed
See detailDo interoceptive deficits contribute to decision-making problems in academic procrastination
Breden, I.-H.; Dincher, K.; Pereira Pedrosa, R. et al

in Kirschbaum, C. (Ed.) 45. Jahrestagung Psychologie und Gehirn - Abstractband (2019)

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides ... [more ▼]

Interoception plays an important role for intuitive decision-making. One possible explanation is that the perception of somatic markers when simulating the outcome of different action alternatives guides the selection for the potentially best option. In the present study, we aimed at investigating if chronically procrastinating individuals show interoceptive deficits, which may explain poor decision-making performance. We tested 19 chronic procrastinators (14 females) and 22 nonprocrastinating control individuals (14 females), recruited from students and staff of the University of Luxembourg. This study consisted of a laboratory experiment including questionnaires assessing procrastinating behavior and two separate behavioral paradigms. Using the Schandry Heartbeat Perception Task as an indicator for interoceptive accuracy and the Iowa Gambling Task (IGT) for the assessment of decision-making performance. Questionnaire data confirmed significantly higher procrastination scores in that group. While male participants showed a significantly higher interoceptive accuracy score than their female counterparts, procrastinators and non-procrastinators did not differ significantly in interoception. Furthermore, no differences in the choice of deck selections were found between procrastinators and non-procrastinators. Interoceptive accuracy was unrelated to decision-making performance. No significant group differences were found for either analysis regarding the performance development as well as sex differences in the IGT. We observed a learning effect in the IGT, with choices for profitable decks increasing over time and poor choices declining. The current study did neither support reduced decision-making problems, nor interoceptive deficits in procrastination. Future studies should incorporate interoceptive indicators of other organ systems and self-report measures to elucidate possible alterations in procrastination. [less ▲]

Detailed reference viewed: 59 (2 UL)
Full Text
Peer Reviewed
See detailA graph-based approach to explore relationship between hashtags and images
Zhong, Zhiqiang UL; Zhang, Yang; Pang, Jun UL

in Proceedings of the 20th International Conference on Web Information System Engineering (2019)

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailMart: A Mutant Generation Tool for LLVM
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL

in Titcheu Chekam, Thierry; Papadakis, Mike; Le Traon, Yves (Eds.) Mart: A Mutant Generation Tool for LLVM (2019)

Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites ... [more ▼]

Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites. Mutants creation (generation) tools are often characterized by their mutation operators and the way they create and represent the mutants. This paper presents Mart, a mutants generation tool, for LLVM bitcode, that supports the fine-grained definition of mutation operators (as matching rule - replacing pattern pair; uses 816 defined pairs by default) and the restriction of the code parts to mutate. New operators are implemented in Mart by implementing their matching rules and replacing patterns. Mart also implements in-memory Trivial Compiler Equivalence to eliminate equivalent and duplicate mutants during mutants generation. Mart generates mutant code as separated mutant files, meta-mutants file, weak mutation, and mutant coverage instrumented files. The generated LLVM bitcode files can be interpreted using an LLVM interpreter or compiled into native code. Mart is publicly available (https://github.com/thierry-tct/mart) for use by researchers and practitioners. Mart has been applied to generate mutants for several research experiments and generated more than 4,000,000 mutants. [less ▲]

Detailed reference viewed: 245 (20 UL)
Full Text
Peer Reviewed
See detailResources and Competences required at the Institutional Level for a Patient – Healthcare Professional Partnership
Odero, Angela UL; Baumann, Michèle UL

in Conference Handbook EHPS : Individuals and Professionals Cooperation to health (2019)

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has ... [more ▼]

Societal changes have catalyzed the perception of health as a personal responsibility, with social studies showing a behavioral trend where patients are increasingly seeking health information. This has given rise to patients who are active players in their care, and participate in decision-making. Central to these changes, are patients and healthcare professionals’, whose backgrounds and experiences reflect both cultural factors that influence health decisions, and a power shift from professional dominance to a more equitable partnership style. Our study aims to determine resources and competences required at the institutional level to implementing a partnership Semi-structured focus groups with 20 chronic disease patients and interviews with 15 healthcare professionals were conducted. Thematic content analysis was performed with NVivo 12 to categorize verbatim. Items were grouped into dimensions, and themes common to both parties were grouped together. Three major areas emerged: 1) Training to develop a partnership culture - Training healthcare professionals in patient psychology, developing therapeutic education programs for patients and enriching available information with patients’ experiential knowledge. 2) Creation of information / support centers for: Interdisciplinary meetings, facilitating the provision of structured, verified and pertinent information and providing administrative aid to patients. 3) Development of e-health solutions to: Provide information 24/7; facilitate collaborative content creation by healthcare professionals, patients and researchers, and for sharing and updating patient files among professionals. Our findings will help design, implement, monitor and evaluate suitable actions, and help promote sustainable forms of expertise – inclusion of experiential knowledge and resource patients within the healthcare team [less ▲]

Detailed reference viewed: 70 (3 UL)
Full Text
Peer Reviewed
See detailAnimal autobiographique et poétique de l'évolution. Lecture zoopoétique de l'oeuvre de Jean Portante
Thiltges, Sébastian UL

in Glesener, Jeanne; Raus, Tonia (Eds.) Jean Portante. Le travail de l'écriture ou la mémoire à l'oeuvre (2019)

La clé de voûte du roman Mrs Haroy ou La Mémoire de la baleine (Echternach : Phi, 1993 ; rééd. Bordeaux : Le Castor Astral, 1999) est le souvenir du cadavre embaumé d’une baleine abattue au large de l’île ... [more ▼]

La clé de voûte du roman Mrs Haroy ou La Mémoire de la baleine (Echternach : Phi, 1993 ; rééd. Bordeaux : Le Castor Astral, 1999) est le souvenir du cadavre embaumé d’une baleine abattue au large de l’île de Haroy en Norvège, exposé sur un wagon ferroviaire à la gare de Luxembourg. Ce spectacle représente non seulement une expérience fondatrice pour le narrateur, mais tisse un réseau métaphorique reliant l’écrivain, l’étranger et l’animal dans leur passage de frontière et dans leur exil. L’image a été abondamment commentée et sa portée littéraire, linguistique et socioculturelle au Luxembourg fut prodigieuse . Cependant, la critique demeure étonnamment silencieuse sur la genèse de la métaphore : puisant aussi bien dans des textes scientifiques et des récits de voyages que dans des œuvres littéraires, le romancier passe outre les traditionnelles frontières génériques entre description naturaliste et imaginaire culturel. De même, si l’image poétique et poétologique du poumon a fait l’objet d’études approfondies de l’œuvre de Jean Portante, incluant les recueils de poésie L’Étrange langue (Châtelineau : Le Taillis Pré, 2002) et Le Travail du poumon (Bordeaux : Le Castor Astral, 2007), la lecture d’un chapitre de Mrs Haroy, où les millions d’années de l’évolution des cétacés sont au cœur de l’élaboration d’une poétique romanesque reliant les temporalités du récit intime, du contexte sociohistorique d’une migration et des transformations des formes de vie, permettra de porter un regard nouveau sur l’invention formelle qui sous-tend l’image. Dans le cadre des études éco- et zoocritiques (environmental et animal studies), nous souhaitons refonder le motif de la baleine, que nous ne lirons pas uniquement en tant que métaphore, nécessairement anthropocentrique et réduisant la nature au rôle de palimpseste sur lequel viennent s’écrire les histoires humaines. L’intérêt écologique du roman de Jean Portante ne réside pas simplement dans la présence de l’animal prototypique de la défense des animaux, dans les descriptions des atrocités réelles ou fictionnelles que subissent les cétacés ni dans l’identification du narrateur avec le non-humain. En effet, pour Jean-François Lyotard, l’art et la littérature sont des discours « écologiques » parce qu’ils font parler des voix mises à l’écart, et Jacques Derrida de poursuivre, dans L’Animal que donc je suis , la déconstruction des oppositions heuristiques de l’Occident à travers l’expression poétique d’une vision écocentrée de soi-même dans la communauté du vivant. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detail¿Hacia una Verdadera Acción Popular para la Protección del Medioambiente? Una Reflexión a la Luz de la Jurisprudencia Española y Europea
Muñoz, Susana UL

in Murillo, F. Javier; Mesa, Manuela (Eds.) Actas del I Congreso Internacional Derechos Humanos, Democracia, Cultura de Paz y No Violencia (2019)

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European ... [more ▼]

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European human rights law provide interpretative keys in favour of a true actio popularis open to citizens in defence of their individual rights and, ultimately, of environmental justice. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailCryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition
Derbez, Patrick UL; Lallemand, Virginie; Udovenko, Aleksei UL

in Patterson, Kenneth G.; Stebila, Douglas (Eds.) Selected Areas in Cryptography -- SAC 2019 (2019)

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous ... [more ▼]

In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous editions, the focus was made on practical attacks: contestants were asked to recover a 128-bit secret key from a given set of 2^20 plaintext blocks. The suggested SKINNY instances are 4- to 20-round reduced variants of SKINNY-64-128 and SKINNY-128-128. In this paper, we explain how to solve the challenges for 10-round SKINNY-128-128 and for 12-round SKINNY-64-128 in time equivalent to roughly 2^52 simple operations. Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode. [less ▲]

Detailed reference viewed: 118 (0 UL)
See detail"Portante postmoderne"
Raus, Tonia UL

in De Toffoli, Ian; Millim, Anne-Marie (Eds.) Modernismes au Luxembourg. Traditions - Variations - Ruptures (2019)

Detailed reference viewed: 8 (0 UL)
See detail"Georges Perec ou la méthode pratique de la critique"
Raus, Tonia

in Absalyamova, Elina; Van Nuijs, Laurence; Stiénon, Valérie (Eds.) "Figures du critique-écrivain. Formes et pratiques du discours métalittéraire (XIXe-XXIe siècles" (2019)

Detailed reference viewed: 3 (0 UL)
See detailThat Escalated Quickly: The Cyber-ASAT Conundrum
Blount, Percy UL

in Blount, Percy; Masson-Zwaan, Tanja; Moro-Aguilar, Rafael (Eds.) et al 2018 Proceedings of the IISL (2019)

Detailed reference viewed: 21 (0 UL)
Full Text
See detailDigital Resources and Tools in Historical Research
Zaagsma, Gerben UL; Wieneke, Lars UL

in Kollmann, Stefanie; Müller, Lars; Reh, Sabine (Eds.) et al Picture archives and the emergence of visual history of education. ISCHE 40 pre-conference workshop. 3rd workshop "Pictura Paedagogica Online: educational knowledge in images (2018, December 21)

One of the characteristic features of modern life is the omnipresence of images - in public life as well as in the private surroundings. At latest with coining the term "Visual history" at the beginning ... [more ▼]

One of the characteristic features of modern life is the omnipresence of images - in public life as well as in the private surroundings. At latest with coining the term "Visual history" at the beginning of the nineteen nineties historical disciplines are dealing with this ever growing pool of pictorial sources. This is also true for educational history - especially when keeping in mind that the use of images in an educational context is common practice since early modern ages. This concerns the presentation practices, the design of didactic visual media and their use in educational practice as well as the illustrated traces of historical educational practice and historical educational knowledge (e.g. photographs of school buildings or educational scenes). There are various digital picture archives to address the research questions of many historical disciplines. These databases, though, differ widely in purpose and design - and of course they cannot serve every scientific demand. According to Gerhard Paul there should be at least four layers of information evaluation when analysing historical images (reality of depiction, genesis, use and impact). Thus, building up a corpus of image sources with sufficient accompanying information can be quite challenging. As major topic the Pre-Conference Workshop will focus on the impact of the discipline on developing and maintaining of a picture archive. (DIPF/Orig.) [less ▲]

Detailed reference viewed: 144 (8 UL)
Full Text
Peer Reviewed
See detailLSRepair: Live Search of Fix Ingredients for Automated Program Repair
Liu, Kui UL; Koyuncu, Anil UL; Kim, Kisub UL et al

in 25th Asia-Pacific Software Engineering Conference (APSEC) (2018, December 07)

Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search ... [more ▼]

Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search space. State-of-the approaches often find fix ingredients by using mutation operators or leveraging manually-crafted templates. We argue that the fix ingredients can be searched in an online mode, leveraging code search techniques to find potentially-fixed versions of buggy code fragments from which repair actions can be extracted. In this study, we present an APR tool, LSRepair, that automatically explores code repositories to search for fix ingredients at the method-level granularity with three strategies of similar code search. Our preliminary evaluation shows that code search can drive a faster fix process (some bugs are fixed in a few seconds). LSRepair helps repair 19 bugs from the Defects4J benchmark successfully. We expect our approach to open new directions for fixing multiple-lines bugs. [less ▲]

Detailed reference viewed: 251 (25 UL)
Full Text
Peer Reviewed
See detailA Memory-Based Label Propagation Algorithm for Community Detection
Fiscarelli, Antonio Maria UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Aiello, Luca Maria; Cherifi, Chantal; Cherifi, Hocine (Eds.) et al Complex Networks and Their Applications VII (2018, December 02)

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dis- similarity between them. Several methods have been proposed but many of ... [more ▼]

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dis- similarity between them. Several methods have been proposed but many of them are not suitable for large-scale networks because they have high complexity and use global knowledge. The Label Propagation Algorithm (LPA) assigns a unique label to every node and propagates the labels locally, while applying the majority rule to reach a consensus. Nodes which share the same label are then grouped into communities. Although LPA excels with near linear execution time, it gets easily stuck in local optima and often returns a single giant community. To overcome these problems we propose MemLPA, a novel LPA where each node imple- ments memory and the decision rule takes past states of the network into account. We demonstrate through extensive experiments on the Lancichinetti-Fortunato-Radicchi benchmark and a set of real-world net- works that MemLPA outperforms most of state-of-the-art community detection algorithms. [less ▲]

Detailed reference viewed: 169 (41 UL)
Full Text
Peer Reviewed
See detailOsiris: Hunting for Integer Bugs in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Schütte, Julian; State, Radu UL

in 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018 (2018, December)

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed ... [more ▼]

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed once deployed to the blockchain. They typically implement the business logic of distributed apps and carry billions of dollars worth of coins. In that respect, it is imperative that smart contracts are correct and have no vulnerabilities or bugs. However, research has identified different classes of vulnerabilities in smart contracts, some of which led to prominent multi-million dollar fraud cases. In this paper we focus on vulnerabilities related to integer bugs, a class of bugs that is particularly difficult to avoid due to some characteristics of the Ethereum Virtual Machine and the Solidity programming language. In this paper we introduce Osiris – a framework that combines symbolic execution and taint analysis, in order to accurately find integer bugs in Ethereum smart contracts. Osiris detects a greater range of bugs than existing tools, while providing a better specificity of its detection. We have evaluated its performance on a large experimental dataset containing more than 1.2 million smart contracts. We found that 42,108 contracts contain integer bugs. Be- sides being able to identify several vulnerabilities that have been reported in the past few months, we were also able to identify a yet unknown critical vulnerability in a couple of smart contracts that are currently deployed on the Ethereum blockchain. [less ▲]

Detailed reference viewed: 357 (17 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Core Concept Identification in Learning Resources
Manrique, Rubén; Grevisse, Christian UL; Mariño, Olga et al

in 8th Joint International Conference, JIST 2018, Awaji, Japan, November 26–28, 2018, Proceedings (2018, December)

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support ... [more ▼]

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support systems. We present a set of strategies for core concept identification on the basis of a semantic representation built using the open and available knowledge in the so-called Knowledge Graphs (KGs). Different unsupervised weighting strategies, as well as a supervised method that operates on the semantic representation, were implemented for core concept identification. In order to test the effectiveness of the proposed strategies, a human-expert annotated dataset of 96 learning resources extracted from MOOCs was built. In our experiments, we show the capacity of the semantic representation for the core-concept identification task as well as the superiority of the supervised method. [less ▲]

Detailed reference viewed: 417 (17 UL)
Full Text
Peer Reviewed
See detailPower and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks
Lei, Lei UL; You, Lei; Yang, Yang UL et al

in IEEE Global Communications Conference (GLOBECOM) 2018 (2018, December)

Detailed reference viewed: 176 (24 UL)
Full Text
Peer Reviewed
See detailRobust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Robust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System (2018, December)

This paper aims to design joint precoding and onboard beamforming at a multiple gateway multibeam satellite system. Full frequency reuse pattern is considered among the beams and each gateway serves a ... [more ▼]

This paper aims to design joint precoding and onboard beamforming at a multiple gateway multibeam satellite system. Full frequency reuse pattern is considered among the beams and each gateway serves a cluster of adjacent beams such that multiple clusters are served through a set of gateways. However, two issues are required to be addressed. First, the interference in both user and feeder links is the bottleneck of the whole system and employing interference mitigation techniques is essential. Second, as the data demand increases, the ground and space segments should employ extensive bandwidth resources in the feeder link accordingly. This entails embedding an extra number of gateways aiming to support a fair balance between the increasing demand and the corresponding required feeder link resources. To tackle these problems, this paper studies the impact of employing a joint multiple gateway architecture and on-board beamforming scheme. It is shown that by properly designing the on-board beamforming scheme, the number of gateways can be kept affordable even if the data demand increases. The proposed beamforming scheme can partially mitigate the interference in the user link. While the user and feeder link channels vary over time, this paper focuses on designing fixed beamforming which is sufficiently robust to the variations in both channels, leading to keep payload complexity low. Moreover, Zero Forcing precoding technique is employed at the gateways to reject the interference in the feeder links as well as it helps the proposed fixed on-board beamforming by partially equalizing the interference in user link. [less ▲]

Detailed reference viewed: 160 (9 UL)
Full Text
Peer Reviewed
See detailCollaborative Data Delivery for Smart City-oriented Mobile Crowdsensing Systems
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 2018 (2018, December)

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing ... [more ▼]

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing infrastructures. In typical MCS systems, sensing tasks are allocated and reported on individual-basis. In this paper, we investigate on collaboration among users for data delivery as it brings a number of benefits for both users and sensing campaign organizers and leads to better coordination and use of resources. By taking advantage from proximity, users can employ device-to-device (D2D) communications like Wi-Fi Direct that are more energy efficient than 3G/4G technology. In such scenario, once a group is set, one of its member is elected to be the owner and perform data forwarding to the collector. The efficiency of forming groups and electing suitable owners defines the efficiency of the whole collaborative-based system. This paper proposes three policies optimized for MCS that are compliant with current Android implementation of Wi-Fi Direct. The evaluation results, obtained using CrowdSenSim simulator, demonstrate that collaborative-based approaches outperform significantly individual-based approaches. [less ▲]

Detailed reference viewed: 217 (20 UL)
Full Text
Peer Reviewed
See detailA Family of Lightweight Twisted Edwards Curves for the Internet of Things
Ghatpande, Sankalp UL; Groszschädl, Johann UL; Liu, Zhe UL

in Blazy, Olivier; Yeun, Chan Y. (Eds.) Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (2018, December)

We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are ... [more ▼]

We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined by an equation of the form -x^2 + y^2 = 1 + dx^2y^2 over a prime field Fp, where d is a small non-square modulo p. The underlying prime fields are based on "pseudo-Mersenne" primes given by p = 2^k - c and have in common that p is congruent to 5 modulo 8, k is a multiple of 32 minus 1, and c is at most eight bits long. Due to these common features, our primes facilitate a parameterized implementation of the low-level arithmetic so that one and the same arithmetic function is able to process operands of different length. Each of the twisted Edwards curves we introduce in this paper is birationally equivalent to a Montgomery curve of the form -(A+2)y^2 = x^3 + Ax^2 + x where 4/(A+2) is small. Even though this contrasts with the usual practice of choosing A such that (A+2)/4 is small, we show that the Montgomery form of our curves allows for an equally efficient implementation of point doubling as Curve25519. The four curves we put forward roughly match the common security levels of 80, 96, 112 and 128 bits. In addition, their Weierstraß representations are isomorphic to curves of the form y^2 = x^3 - 3x + b so as to facilitate inter-operability with TinyECC and other legacy software. [less ▲]

Detailed reference viewed: 323 (31 UL)
Full Text
Peer Reviewed
See detailBlockPGP: A Blockchain-based Framework for PGP Key Servers
Yakubov, Alexander UL; Shbair, Wazen UL; State, Radu UL

in The Sixth International Symposium on Computing and Networking (2018, November 28)

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the ... [more ▼]

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the correspondent in information exchange as well as the information integrity. It implements asymmetric encryption with certificates shared through a network of PGP key servers. Many recent breaches show that certificate infrastructure can be compromised as well as exposed to operational errors. In this paper, we propose a new PGP management framework with the key server infrastructure implemented using blockchain technology. Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk. We also provided user access right control where only the certificate holder can change information related to the certificate. We designed and developed a prototype for key server deployment on permissioned Ethereum blockchain. Permissioned blockchain should allow to control the costs of PGP key server infrastructure maintenance at the present level. [less ▲]

Detailed reference viewed: 219 (7 UL)
Full Text
Peer Reviewed
See detailHoneyPAKEs
Lopez Becerra, José Miguel UL; Roenne, Peter UL; Ryan, Peter UL et al

in Security Protocols XXVI: Lecture Notes in Computer Science (2018, November 27)

We combine two security mechanisms: using a Password-based Authenticated Key Establishment (PAKE) protocol to protect the password for access control and the Honeywords construction of Juels and Rivest to ... [more ▼]

We combine two security mechanisms: using a Password-based Authenticated Key Establishment (PAKE) protocol to protect the password for access control and the Honeywords construction of Juels and Rivest to detect loss of password files. The resulting construction combines the properties of both mechanisms: ensuring that the password is intrinsically protected by the PAKE protocol during transmission and the Honeywords mechanisms for detecting attempts to exploit a compromised password file. Our constructions lead very naturally to two factor type protocols. An enhanced version of our protocol further provides protection against a compromised login server by ensuring that it does not learn the index to the true password. [less ▲]

Detailed reference viewed: 94 (12 UL)
Full Text
Peer Reviewed
See detailA Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

in Bandi, Ashok; Shankar, Bhavani; maleki, Sina (Eds.) et al 6th IEEE Global Conference on Signal and Information Processing, November 26–29, 2018 Anaheim, California, USA (2018, November 26)

Detailed reference viewed: 178 (52 UL)
Full Text
Peer Reviewed
See detailDefining feasibility of Primary care strategies to disclose, counsel and provide access to advocacy on family violence.
Pas; Gomez Bravo, Raquel UL; Clavería, Ana et al

in Collins, Claire (Ed.) Abstract Book of the 87th EGPRN Meeting (2018, November 14)

Background: Family violence (FV) is a widespread public health problem and serious consequences. One third of European women suffer from partner violence in their adult lifetime while on fourth of ... [more ▼]

Background: Family violence (FV) is a widespread public health problem and serious consequences. One third of European women suffer from partner violence in their adult lifetime while on fourth of situations of partner violence children are present. Elderly abuse is present between 10 to 20 % of the population above 60 General practice is often a point of contact for victims but they tend to hesitate or feel ashamed to ask for assistance. GPs generally lack training in disclosing and supporting FV, feel uncomfortable about asking and may be hindered by lack of facilities where to refer. In 2018, WONCA encourages all national colleges and academies to develop policy and implementation strategies on family violence identification and response for intimate partner violence, child abuse and elder abuse. This recommendation states it is needed to develop research and define performance and outcome measures for general practitioners/family doctors and primary care teams in each of our member nations; implementation strategies for comprehensive family violence care should be enabled and evaluated. Research questions: To define needs and concerns of practice teams and analyze possibilities for practice management across European Countries. Method: A Delphi approach modified according to RAND is proposed to develop a consensus using online collection of data. A steering group will be composed of delegates recruited form EGPRN and EUROPREV members to constitute a nominal group validating questions and authorising feedback to respondents for each Delphi round. Country representatives in the project will select a representative sample in each country to allow for generalisability of conclusions per country and European wise. Collaboration with national colleges is encouraged. A meeting at EGPRN in October 2018 will further detail the methodology. A constant comparative methodology using computer software (eg. NVIVO or similar) will be followed analysing data on each question highlighting similarities and differences between answers thus constructing an underlying model about concerns and possible solutions proposed. Points for discussion: How to constitute a sample per country to allow for generalisability. What are main focuses for consensus development? [less ▲]

Detailed reference viewed: 42 (3 UL)
Full Text
Peer Reviewed
See detailAn international case-vignette study to assess general practitioners’ willingness to deprescribe (LESS)
Tabea Jungo, Katharina; Mantelli, Sophie; Rozsnyai, Zsofia et al

in Collins, Claire (Ed.) Abstract Book of the 87th EGPRN Meeting (2018, November 14)

Background: Globally, many oldest-old (>80 years of age) suffer from several chronic conditions and take multiple medications. Ideally, their general practitioners (GPs) regularly and systematically ... [more ▼]

Background: Globally, many oldest-old (>80 years of age) suffer from several chronic conditions and take multiple medications. Ideally, their general practitioners (GPs) regularly and systematically search for inappropriate medications and, if necessary, deprescribe those. However, deprescribing is challenging due to numerous barriers not only within patients, but also within GPs. Research questions: How does the willingness to deprescribe in oldest-old with polypharmacy differ in GPs from different countries? What factors do GPs in different contexts perceive as important for deprescribing? Method: We assess GPs' willingness to deprescribe and the factors GPs perceive to influence their deprescribing decisions in a cross-sectional survey using case-vignettes of oldest-old patients with polypharmacy. We approach GPs in 28 European countries as well as in Israel, Brazil and New Zealand through national coordinators, who administer the survey in their GP network. The case vignettes differ in how dependent patients are and whether or not they have a history of cardiovascular disease (CVD). For each case vignette, GPs are asked if and which medication they would deprescribe. GPs further rate to what extent pre-defined factors influence their deprescribe decisions. We will compare the willingness to deprescribe and the factors influencing deprescribing across countries. Multilevel models will be used to analyze the proportions of the deprescribed medications per case along the continuum of dependency and history of CVD and to analyze the factors perceived as influencing deprescribing decisions. Results: As of early-July 2018, the survey has been distributed in 14 countries and >650 responses have been returned. We will present first results at the conference. Conclusions: First, assessing GPs’ willingness to deprescribe and comparing the factors influencing GPs’ deprescribing decisions across countries will allow an understanding of the expected variation in the willingness to deprescribe across different contexts. Second, it will enable the tailoring of specific interventions that might facilitate deprescribing in oldest-old patients. Points for discussion: How can we explain differences across countries? How can the results be translated into practice in order to help GPs to optimize deprescribing practices? What factors could help GPs to implement deprescribing in oldest-old patients with polypharmacy? [less ▲]

Detailed reference viewed: 42 (2 UL)
Full Text
Peer Reviewed
See detailEmpowering reuse of digital cultural heritage in context-aware crosscuts of European history
Antoniou, A; Lopez-Nores, M; Yannick, N et al

in Wallace, M; Antoniou, A (Eds.) Proceedings of the Workshop on Cultural Informatics co-located with the EUROMED International Conference on Digital Heritage 2018 (EUROMED 2018) (2018, November 03)

The paper presents the H2020 CrossCult project, providing a short overview, a summary of the platform developed by the project, a description of the consortium, lessons learnt in three main dimensions ... [more ▼]

The paper presents the H2020 CrossCult project, providing a short overview, a summary of the platform developed by the project, a description of the consortium, lessons learnt in three main dimensions (humanities, technology and business), the open challenges and the main tools developed by the project. [less ▲]

Detailed reference viewed: 44 (2 UL)
Full Text
Peer Reviewed
See detailRevisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Atashpendar, Arash UL; Policharla, Guru Vamsi; Roenne, Peter UL et al

in Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (2018, November 02)

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily ... [more ▼]

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange. [less ▲]

Detailed reference viewed: 207 (56 UL)
Full Text
Peer Reviewed
See detailVisualizing the Learning Progress of Self-Driving Cars
Mund, Sandro; Frank, Raphaël UL; Varisteas, Georgios UL et al

in 21st International Conference on Intelligent Transportation Systems (2018, November 02)

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models ... [more ▼]

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models perform so well. In order for them to become a commercially viable solution, it first needs to be understood why a certain behavior is triggered and how and what those networks learn from human-generated driving data to ensure safety. One research direction is to visualize what the network sees by highlighting regions of an image that influence the outcome of the model. In this vein, we propose a generic visualization method using Attention Heatmaps (AHs) to highlight what a given Convolutional Neural Network (CNN) learns over time. To do so, we rely on a novel occlusion technique to mask different regions of an input image to observe the effect on a predicted steering signal. We then gradually increase the amount of training data and study the effect on the resulting Attention Heatmaps, both in terms of visual focus and temporal behavior. [less ▲]

Detailed reference viewed: 202 (16 UL)
Full Text
Peer Reviewed
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex UL; Udovenko, Aleksei UL

in Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018 (2018, November)

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation ... [more ▼]

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces. Structure hiding must provide protection against circuit analysis attacks. In this paper we focus on developing the value hiding component. It includes protection against the DCA attack by Bos et al. and protection against a new attack called algebraic attack. We present a provably secure first-order protection against the new al- gebraic attack. The protection is based on small gadgets implementing secure masked XOR and AND operations. Furthermore, we give a proof of compositional security allowing to freely combine secure gadgets. We derive concrete security bounds for circuits built using our construction. [less ▲]

Detailed reference viewed: 823 (20 UL)
Full Text
Peer Reviewed
See detailDeploying Joint Beamforming and Precoding in Multibeam Satellite Networks with Time Variant Traffic
Joroughi, Vahid; Lagunas, Eva UL; Andrenacci, Stefano UL et al

in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, California, USA (2018, November)

Detailed reference viewed: 52 (13 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 251 (9 UL)
Full Text
Peer Reviewed
See detailFraudDroid: Automated Ad Fraud Detection for Android Apps
Dong, Feng; Wang, Haoyu; Li, Li et al

in ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (2018, November)

Detailed reference viewed: 157 (5 UL)
Full Text
See detailIndustry 4.0 – Implementation of an automated assembly line in a wooden modular house production plant: The case Leko Labs
de Vincenzo, Vincenzo UL; Hichri, Bassem UL; Plapper, Peter UL

in De vincenzo, Vincenzo; Hichri, Bassem; Plapper, Peter (Eds.) Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018, November)

Detailed reference viewed: 216 (11 UL)
Full Text
See detailFLEXCAP – Cost competitive flexible process for highly aesthetic closures manufacturing
Kakogiannos, Ioannis UL; Hichri, Bassem UL; Plapper, Peter UL

in Kakogiannos, Ioannis; Hichri, Bassem; Plapper, Peter (Eds.) Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018, November)

Detailed reference viewed: 168 (2 UL)
Full Text
Peer Reviewed
See detailAn Approach to Incorporate Emotions in a Chatbot with Seq2Seq Model
Zheng, Yaqiong; Guo, Siwen UL; Schommer, Christoph UL

in Benelux Conference on Artificial Intelligence, ‘s-Hertogenbosch 8-9 November 2018 (2018, November)

Detailed reference viewed: 140 (35 UL)
Full Text
Peer Reviewed
See detailDeformation-Based Abnormal Motion Detection using 3D Skeletons
Baptista, Renato UL; Demisse, Girum UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA) (2018, November)

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a ... [more ▼]

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a sequence, based on few joints of a 3D skeleton, and a deformation-based distance function. We further introduce a time-variation model that is specifically designed for assessing the quality of a motion; we refer to a distance function that is based on such a model as~\emph{motion quality distance}. The overall advantages of the proposed approach are 1) lower dimensional yet representative sequence representation and 2) a distance function that emphasizes time variation, the motion quality distance, which is a particularly important property for quality assessment. We validate our approach using a publicly available dataset, SPHERE-StairCase2014 dataset. Qualitative and quantitative results show promising performance. [less ▲]

Detailed reference viewed: 123 (5 UL)
Full Text
Peer Reviewed
See detailAdvancing the Security of Trustworthy Self-IoT (Position Paper)
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Ladid, Latif UL et al

in International Conference on Smart Applications, Communications and Networking (SmartNets) (2018, November)

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a ... [more ▼]

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. [less ▲]

Detailed reference viewed: 279 (19 UL)
Full Text
Peer Reviewed
See detailA Protocol to Strengthen Password-Based Authentication
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL; Stojkovski, Borce UL

in Emerging Technologies for Authorization and Authentication (2018, November)

We discuss a password-based authentication protocol that we argue to be robust against password-guessing and o -line dictionary attacks. The core idea is to hash the passwords with a seed that comes from ... [more ▼]

We discuss a password-based authentication protocol that we argue to be robust against password-guessing and o -line dictionary attacks. The core idea is to hash the passwords with a seed that comes from an OTP device, making the resulting identity token unpredictable for an adversary. We believe that the usability of this new protocol is the same as that of password-based methods with OTP, but has the advan- tage of not burdening users with having to choose strong passwords. [less ▲]

Detailed reference viewed: 189 (64 UL)
Full Text
See detailCréer des liens entre les formations d'enseignant et de travailleur social pour favoriser les liens professionnels ultérieurs
Dujardin, Céline UL; Poncelet, Débora UL

in Sulova, Lenka; Pourtois, Jean-Pierre; Desmet, Huguette (Eds.) et al La qualité de vie de l'enfant aujourd'hui (2018, November)

La plupart des enfants d’aujourd’hui fréquentent plusieurs institutions éducatives en dehors de la famille. Au Luxembourg, il s’agit d’abord de la maison relais qui est destinée à prendre le relais entre ... [more ▼]

La plupart des enfants d’aujourd’hui fréquentent plusieurs institutions éducatives en dehors de la famille. Au Luxembourg, il s’agit d’abord de la maison relais qui est destinée à prendre le relais entre l’école et la famille dans le but de permettre aux parents à mieux concilier la vie professionnelle et la vie familiale. Ensuite, d’autres institutions éducatives s’ajoutent à la prise en charge de l’enfant, notamment en cas de difficultés d’apprentissage qui nécessitent une prise en charge professionnelle extrascolaire ou en cas de difficultés liées au parent qui sera accompagné par un service d’assistance en famille et de soutien à la parentalité. L’Université du Luxembourg offre avec son Bachelor en Sciences de l’Education la formation des enseignants ainsi qu’avec son Bachelor en Sciences Sociales et Educatives la formation des travailleurs sociaux. Dans le but d’approcher les deux formations sur leurs points communs et leurs similitudes, nous constatons de plus en plus l’importance de ces liens. Les liens entre les deux formations réfèrent aux liens professionnels ultérieurs, primordiaux pour la co-éducation école-famille-communauté. Dans le cours universitaire « relations école-famille », nous avons mené une première expérience en automne 2016 avec les futurs enseignants en intégrant les autres institutions éducatives dans les relations école-famille afin de sensibiliser les futurs enseignants aux enfants et familles en difficulté. Pour finir, cette expérience dans la formation universitaire est confrontée aux conceptions de réflexion et d’attitude professionnelle de ces professions relationnelles. [less ▲]

Detailed reference viewed: 76 (9 UL)
Full Text
Peer Reviewed
See detailEfficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers
Cheng, Hao UL; Dinu, Dumitru-Daniel; Groszschädl, Johann UL

in Lanet, Jean-Louis; Toma, Cristian (Eds.) Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (2018, November)

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides ... [more ▼]

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides strong resistance to collision and preimage attacks, and is assumed to remain secure in the dawning era of quantum computers. However, the compression function of SHA-512 is challenging to implement on small 8 and 16-bit microcontrollers because of their limited register space and the fact that 64-bit rotations are generally slow on such devices. In this paper, we present the first highly-optimized Assembler implementation of SHA-512 for the ATmega family of 8-bit AVR microcontrollers. We introduce a special optimization technique for the compression function based on a duplication of the eight working variables so that they can be more efficiently loaded from RAM via the indirect addressing mode with displacement (using the ldd and std instruction). In this way, we were able to achieve high performance without unrolling the main loop of the compression function, thereby keeping the code size small. When executed on an 8-bit AVR ATmega128 microcontroller, the compression function takes slightly less than 60k clock cycles, which corresponds to a compression rate of roughly 467 cycles per byte. The binary code size of the full SHA-512 implementation providing a standard Init-Update-Final (IUF) interface amounts to approximately 3.5 kB. [less ▲]

Detailed reference viewed: 268 (33 UL)
Full Text
Peer Reviewed
See detailForward Secrecy for SPAKE2
Lopez Becerra, José Miguel UL; Ostrev, Dimiter UL; Skrobot, Marjan

in Baek, Joonsang; Willy, Susilo (Eds.) Provable Security (2018, October 25)

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3 ... [more ▼]

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3. Although it has been proven secure in the Find-then-Guess model of Bellare, Pointcheval and Rogaway (EUROCRYPT 2000), whether it satisfies some notion of forward secrecy remains an open question. In this work, we prove that the SPAKE2 protocol satisfies the so-called weak forward secrecy introduced by Krawczyk (CRYPTO 2005). Furthermore, we demonstrate that the incorporation of key-confirmation codes in SPAKE2 results in a protocol that provably satisfies the stronger notion of perfect forward secrecy. As forward secrecy is an explicit requirement for cipher suites supported in the TLS handshake, we believe this work could fill the gap in the literature and facilitate the adoption of SPAKE2 in the recently approved TLS 1.3. [less ▲]

Detailed reference viewed: 77 (16 UL)
Full Text
Peer Reviewed
See detailPrésences de souverains dans l'espace du "regnum Lotharii": Itinéraires, lieux de pouvoir et fidélités "Lotharingiennes" (869-936)
Pettiau, Hérold UL

in Pettiau, Hérold; Margue, Michel (Eds.) La Lotharingie en question. Identités, oppositions, intégration. LOtharingische Identitäten im Spannungsfeld zwischen integrativen und partikularen Kräften. Actes des 14es Journées Lotharingiennes (2018, October 25)

Detailed reference viewed: 46 (2 UL)
Full Text
Peer Reviewed
See detailSoLeMiO: Semantic Integration of Learning Material in Office
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Proceedings of E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2018 (2018, October 15)

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information ... [more ▼]

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information might be required by the learner. However, leaving the study context to search for related material may lead to distraction or even abandonment of the learning task. Furthermore, traditional learning resources do not foster active learning. In this paper, we present SoLeMiO, a plugin for Office applications, which identifies key concepts in a document and thereby integrates related, heterogeneous resources from an open corpus. We employ concept recognition tools to determine concepts from different domains. Thereupon, resources from different repositories are suggested to the learner and can be consulted from within the current document. Aside from traditional learning resources, active learning is fostered through gamification activities. We showcase the applicability of our approach in multiple disciplines with concrete examples. [less ▲]

Detailed reference viewed: 70 (12 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 369 (50 UL)
Full Text
Peer Reviewed
See detailSemi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
Jhawar, Ravi UL; Lounis, Karim UL; Mauw, Sjouke UL et al

in Katsikas, Sokratis; Alcaraz, Cristina (Eds.) Security and Trust Management. STM 2018. (2018, October)

Detailed reference viewed: 87 (5 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 339 (88 UL)
Full Text
Peer Reviewed
See detailMoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies
Li, Li; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2018, October)

Detailed reference viewed: 123 (4 UL)
Full Text
Peer Reviewed
See detailIoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Engel, Thomas UL

in IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks (2018, October)

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the ... [more ▼]

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for IoT are well recognised, to allow a smooth integration of M2M and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for MQTT and CoAP, identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2M-Satellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links. [less ▲]

Detailed reference viewed: 204 (6 UL)
Full Text
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in Proceedings of the 69th International Astronautical Congress 2018 (2018, October)

This paper addresses the main legal challenges related to future human exploration of the Moon, with the goal to show possible solutions. In order to do so, it first presents an overview of current lunar ... [more ▼]

This paper addresses the main legal challenges related to future human exploration of the Moon, with the goal to show possible solutions. In order to do so, it first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 195 (27 UL)
Full Text
Peer Reviewed
See detailMesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content
Sobon-Muehlenbrock, Elena UL; Greger, Manfred UL; Schlienz, Markus UL

in Mesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content (2018, October)

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of ... [more ▼]

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of synthetic kitchen waste, further called model kitchen waste (MKW) with the same amounts of carbohydrates, fats and proteins. In this study the anaerobic degradation of this MKW (named MKW1; 23 % rapeseed oil) was investigated under mesophilic and thermophilic conditions at 2 different loadings. Additional experiments were performed with lower (MKW2; 14.7 %) and higher (MKW3; 27.2 %) rapeseed oil content at the expense of starch. An organic loading of 5 gVS/l leads to a fast and undisturbed degradation under mesophilic conditions. The volatile fatty acids (mainly acetic acid) appeared only during the first 3 days. Finally the amount of biogas been produced is weakly correlated with the oil content. Under thermophilic conditions the biogas production was retarded and the concentrations of the volatile fatty acids were generally higher whereas acetic acid was present for a period of 10 days. The final biogas amount was higher than compared to mesophilc conditions. At a higher loading of 25 gVS/l a strong retardation of biogas production was observed which correlates with very high concentrations of volatile fatty acids over the whole runtime period of 50 days. [less ▲]

Detailed reference viewed: 112 (13 UL)
Full Text
Peer Reviewed
See detailDas Palux-Projekt in Luxemburg: Forschungsdesign und erste Ergebnisse einer Pilotstudie
Eckelt, Melanie UL; Hutmacher, Djenna UL; Steffgen, Georges UL et al

in Bartsch, Fabienne; Mombeck, Mona; Müller, Merle (Eds.) et al Tägliche Herausforderungen meistern - Sportlehrkräfte im Fokus (2018, October)

Detailed reference viewed: 100 (17 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 140 (10 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Teacher Support for Learning Material Authoring
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Advances in Computing - CCC 2018 (2018, September 26)

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning ... [more ▼]

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning material in popular authoring software. As teachers create their learning material, SoLeMiO identifies the concepts they want to address. In order to identify relevant concepts in a reliable, automatic and unambiguous way, we employ state of the art concept recognition and entity linking tools. From the recognized concepts, we build a semantic representation by exploiting additional information from Open Knowledge Graphs through expansion and filtering strategies. These concepts and the semantic representation of the learning material support the authoring process in two ways. First, teachers will be recommended related, heterogeneous resources from an open corpus, including digital libraries, domain-specific knowledge bases, and MOOC platforms. Second, concepts are proposed for semi-automatic tagging of the newly authored learning resource, fostering its reuse in different e-learning contexts. Our approach currently supports resources in English, French, and Spanish. An evaluation of concept identification in lecture video transcripts and a user study based on the quality of tag and resource recommendations yielded promising results concerning the feasibility of our technique. [less ▲]

Detailed reference viewed: 145 (18 UL)
Full Text
Peer Reviewed
See detailSparsity-Aided Low-Implementation cost based On-Board beamforming Design for High Throughput Satellite Systems
Bandi, Ashok UL

in Bandi, Ashok; Joroughi, Vahid; Shankar, Bhavani (Eds.) et al 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC),Berlin, Sept. 10-12, 2018 (2018, September 10)

Detailed reference viewed: 110 (11 UL)
Full Text
Peer Reviewed
See detailComparison of Design Codes for Composite Beams of Steel and Concrete in Europe and China
Zhang, Qingjie UL; Schäfer, Markus UL; Santos-Ferreira, Katia

in 12th Japanese-German Bridge Symposium (2018, September 04)

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a ... [more ▼]

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a part of the Eurocodes, which are European harmonized design codes for buildings and bridges. In this paper, the equivalent Chinese codes are compared to the structure and contents of Eurocodes. EN1994-1-1, which is the first part of Eurocode 4 for general buildings, and JGJ138-2016 have similar design scopes, both cover topics of composite beams, columns, slabs, and connections. JGJ138-2016 also covers the design of composite shear walls and seismic design, while EN1994-1-1 considers more about durability and time effects. For the more technical comparison, the general design bases such as safety concept and design action effects are alike. The material property values by the two codes are mostly similar except for concrete. For structural members, the focus here is mainly on the comparison of composite beams in steel and concrete. The comparisons are explained with the help of parameter studies and theoretical comparisons. [less ▲]

Detailed reference viewed: 46 (1 UL)
Full Text
Peer Reviewed
See detailParticularities for plastic design of composite beams with deep plastic neutral axis
Schäfer, Markus UL; Zhang, Qingjie UL

in 12th Japanese-German Bridge Symposium (2018, September 04)

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the ... [more ▼]

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the moment resistance for composite beams follows the rules stated in EN 1994-1-1. Based on the slenderness c/t of the compressed parts of the steel-section, composite cross-sections are classified into four cross-section classes. This classification indirectly reflects the rotation capacity and susceptibility to local buckling. For class 1 and 2 cross-sections, the plastic moment resistance of the crosssection may be considered. Otherwise, an elastic design (for class 3) or an elastic design considering local buckling effects (for class 4) is necessary. If the plastic resistance of the cross-section is assumed, it is considered that each cross-section fibre may plastify without limitation of the strain values. For normal composite beams subjected to the sagging moments and with a high plastic neutral axis, the real moment resistance is quite greater than one obtained by the method of the plastic design. For sections with a large compression zone, xpl, a concrete failure in the compression zone can happen before the plastic moment resistance of the composite cross-section, Mpl,Rd, is reached. Strain limit design, therefore, becomes critical. EN 1994-1-1 provides a limitation of the plastic design resistance only for sections with steel grades S420 and S460. However, there is no guidance given for lower steel grades or the determination of the corresponding concrete compression force. This paper points out, that the rotation capacity of a composite section is dependent on the slenderness of steel crosssection parts and on the behaviour of the concrete part. A comparison of plastic and strain limited moment resistances as well as the analysis of partial shear diagram-based strain limited design results in new findings for the limits of plastic design methods. [less ▲]

Detailed reference viewed: 45 (1 UL)
Full Text
Peer Reviewed
See detailAutomated Identification of Desynchronisation Attacks on Shared Secrets
Mauw, Sjouke UL; Smith, Zachary Daniel UL; Toro Pozo, Jorge Luis UL et al

in Automated Identification of Desynchronisation Attacks on Shared Secrets (2018, September)

Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be ... [more ▼]

Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be vulnerable to desynchronisation attacks, a denial of service attack in which the agents are tricked into updating their keys improperly, so that they are no longer able to communicate. In this work we introduce a method that can be used to automatically verify (or falsify) resistance to desynchronisation attacks for a range of protocols. This approach is then used to identify previously unreported vulnerabilities in two published RFID grouping protocols. [less ▲]

Detailed reference viewed: 128 (8 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 189 (33 UL)
Full Text
Peer Reviewed
See detailA Temporal Model for Interactive Diagnosis of Adaptive Systems
Mouline, Ludovic UL; Benelallam, Amine; Fouquet, François UL et al

in Mouline, Ludovic; Benelallam, Amine; Fouquet, François (Eds.) et al 2018 IEEE International Conference on Autonomic Computing (ICAC) (2018, September)

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or ... [more ▼]

The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or suboptimal system states. Developers thus need diagnosis support that trace system states to the previous circumstances –targeted requirements, input context– that had resulted in these decisions. However, the lack of efficient temporal representation limits the tracing ability of current approaches. To tackle this problem, we first propose a knowledge formalism to define the concept of a decision. Second, we describe a novel temporal data model to represent, store and query decisions as well as their relationship with the knowledge (context, requirements, and actions). We validate our approach through a use case based on the smart grid at Luxembourg. We also demonstrate its scalability both in terms of execution time and consumed memory. [less ▲]

Detailed reference viewed: 112 (8 UL)
Full Text
Peer Reviewed
See detailRevisiting Gaussian Mixture Models for Driver Identification
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (2018, September)

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼]

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲]

Detailed reference viewed: 110 (13 UL)
Full Text
Peer Reviewed
See detailA Closer Look at Real-World Patches
Liu, Kui UL; Kim, Dongsun UL; Koyuncu, Anil UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution (ICSME) (2018, September)

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown ... [more ▼]

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown that the state-of-the-art techniques in automated repair tend to generate patches only for a small number of bugs even with quality issues (e.g., incorrect behavior and nonsensical changes). To improve automated program repair (APR) techniques, the community should deepen its knowledge on repair actions from real-world patches since most of the techniques rely on patches written by human developers. Previous investigations on real-world patches are limited to statement level that is not sufficiently fine-grained to build this knowledge. In this work, we contribute to building this knowledge via a systematic and fine-grained study of 16,450 bug fix commits from seven Java open-source projects. We find that there are opportunities for APR techniques to improve their effectiveness by looking at code elements that have not yet been investigated. We also discuss nine insights into tuning automated repair tools. For example, a small number of statement and expression types are recurrently impacted by real-world patches, and expression-level granularity could reduce search space of finding fix ingredients, where previous studies never explored. [less ▲]

Detailed reference viewed: 169 (24 UL)