References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailDéveloppement d’un test de compétences numériques précoces destiné à mesurer les effets d’une intervention mise en place auprès d’élèves de 4 à 6 ans
de Chambrier, Anne-Françoise; Vlassis, Joëlle UL; Fagnant, Annick et al

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 66 (7 UL)
Full Text
Peer Reviewed
See detailBesoins des apprenants en matière de pensée algébrique et connaissances pour enseigner cette pensée : évaluation diagnostique des acquis des enseignants à la transition école-collège
Demonty, Isabelle; Vlassis, Joëlle UL; Fagnant, Annick

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailMesurer les croyances des enseignants du préscolaire à propos des mathématiques
Vlassis, Joëlle UL; Dierendonck, Christophe UL; Tinnes, Mélanie UL et al

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 51 (6 UL)
Full Text
Peer Reviewed
See detailDetecting Malicious Authentication Events Trustfully
Kaiafas, Georgios UL; Varisteas, Georgios UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Varisteas, Georgios; Lagraa, Sofiane (Eds.) et al IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World (2018)

Detailed reference viewed: 240 (39 UL)
Full Text
Peer Reviewed
See detailFondi per la storia cistercense in Lombardia (dai tabularia monastici fino al loro approdo in Archivio di Stato di Milano e in altri depositi minori
Salemme, Timothy UL

in CATALDI, R. (Ed.) In monasterio reservetur. Le fonti per la storia dell’Ordine cistercense in Italia dal Medioevo all’età moderna nelle biblioteche e negli archivi italiani e della Città del Vaticano. Atti del convegno di studi promosso dalla Congregazione Cistercense di Casamari in occasione del nono centenario della fondazione di Clairvaux (1115-2015). Certosa di Pavia, 22-23 ottobre 2015 (2018)

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 66 (1 UL)
Full Text
Peer Reviewed
See detailA Decomposition-based Approach towards the Control of Boolean Networks
Paul, Soumya UL; Su, Cui; Pang, Jun UL et al

in Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (2018)

Detailed reference viewed: 89 (4 UL)
Full Text
See detailUne cour constitutionnelle différente des autres. Etendue, raisons & avenir de l'originalité de la Cour constitutionnelle luxembourgeoise
Heuschling, Luc UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: trop jeune pour mourir? (2018)

Detailed reference viewed: 382 (38 UL)
Full Text
Peer Reviewed
See detailLa réception des actes pontificaux dans le réseau monastique cistercien. Remarques sur la diffusion d'un ‘Liber privilegiorum’ du début du XIVe siècle
Salemme, Timothy UL

in FALMAGNE, Thomas; STUTZMANN, Dominique; TURCAN VERKERK, Anne-Marie (Eds.) Les Cisterciens et la transmission des textes (XIIe–XVIIIe siècles) (2018)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailVisualizing the Template of a Chaotic Attractor
Olszewski, Maya Alexandra UL; Meder, Jeff Alphonse Antoine UL; Kieffer, Emmanuel UL et al

in 26th International Symposium on Graph Drawing and Network Visualization (GD 2018) (2018)

Detailed reference viewed: 149 (24 UL)
Full Text
Peer Reviewed
See detailLes silences synesthésiques du roman naturaliste
Thiltges, Sébastian UL

in Estay Stange, Veronica; Colas, Marion (Eds.) Synesthésies sonores. Du son au(x) sens (2018)

Dans la double perspective d’une microlecture sémiologique et de la ‐ contextualisation des textes dans l’histoire des poétiques, cet article propose une étude ‐ comparée de la description du silence et ... [more ▼]

Dans la double perspective d’une microlecture sémiologique et de la ‐ contextualisation des textes dans l’histoire des poétiques, cet article propose une étude ‐ comparée de la description du silence et de la synesthésie dans le roman naturaliste. Il postule une double signification de ces séquences descriptives qui soit acquièrent une fonction symbolique, soit évoquent un environnement perçu grâce à des indices incertains, auquel cas le naturalisme met en place une réflexion heuristique, voire épistémologique. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailBinary Sequences set with small ISL for MIMO radar systems
Alaee-Kerahroodi, Mohammad; Modarres-Hashemi, Mahmoud; Naghsh, Mohammad Mahdi Naghsh et al

in 2018 26th European Signal Processing Conference (EUSIPCO) (2018)

In this paper, we aim at designing a set of binary sequences with good aperiodic auto- and crosscorrelation properties for Multiple-Input-Multiple-Output (MIMO) radar systems. We show such a set of ... [more ▼]

In this paper, we aim at designing a set of binary sequences with good aperiodic auto- and crosscorrelation properties for Multiple-Input-Multiple-Output (MIMO) radar systems. We show such a set of sequences can be obtained by minimizing the Integrated Side Lobe (ISL) with the binary requirement imposed as a design constraint. By using the block coordinate descent (BCD) framework, we propose an efficient monotonic algorithm based on Fast Fourier Transform (FFT), to minimize the objective function which is non-convex and NP-hard in general. Simulation results illustrate that the ISL of designed binary set of sequences is the neighborhood of the Welch bound, Indicating its superior performance. [less ▲]

Detailed reference viewed: 103 (4 UL)
Full Text
Peer Reviewed
See detailOptimal Deployment of Base Stations in Cognitive Satellite Terrestrial Networks
Vuppala, Satyanarayana UL; Sellathurai, Mathini; Chatzinotas, Symeon UL

in 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC) (2018)

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High ... [more ▼]

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High Throughput Satellites (HTS). However, although some previous works about precoding consider imperfect CSIT (Chanel State Information at the Transmitter) adding some CSI estimation errors, that is not the main cause of CSI degradation. In practice, receivers can only detect and estimate a few coefficients of the CSI vector being the other nullified, replaced by zeros. This introduces errors in the SINR calculation by the gateway that lead to the assignment of Modulation and Coding Schemes (MCS) over the decoding possibilities of the users, increasing the rate of erroneous frames. In this work, the errors in the SINR calculation caused by the nullification of the CSI are analyzing statistically and geographically using a radiation diagram of 245 beams over Europe. Furthermore, a solution based on a link adaptation algorithm with a per user adaptive margin is proposed, helping to achieve the QEF (Quasi-error Free) target of DVB-S2X systems. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailResource Allocation Approach for Differential Doppler Reduction in NB-IoT over LEO Satellite
Kodheli, Oltjon UL; Andrenacci, Stefano UL; Maturo, Nicola UL et al

in 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 10-12 September 2018 (2018)

Internet of things (IoT) over satellite is an attractive system architecture which has been proposed as a key-enabling technology, to extend the coverage in remote areas (e.g. desert, ocean, forest, etc ... [more ▼]

Internet of things (IoT) over satellite is an attractive system architecture which has been proposed as a key-enabling technology, to extend the coverage in remote areas (e.g. desert, ocean, forest, etc), particularly where a terrestrial network is impossible or impractical to reach. One of the most promising technologies that fit the IoT vision of low-power, wide area networks (LPWAN) is the narrowband IoT (NB-IoT). While low earth orbit (LEO) satellites are favourable because of their lower round trip time (RTT) and lower propagation loss in the communication link, they come up with a significantly increased Doppler shift. In our NB-IoT over LEO satellite architecture, we identify the problem of high differential Doppler among channels of different users on Earth, which leads to the performance degradation of our system. In this paper, we propose a resource allocation approach in order to reduce the high values of differential Doppler under the maximum value supported by the standard itself. [less ▲]

Detailed reference viewed: 169 (39 UL)
Full Text
Peer Reviewed
See detailReconstructing the Historic Landscape of Larochette, Luxembourg
de Kramer, Marleen UL; Mersch, Sam UL; Morse, Christopher UL

in Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection (2018)

Cultural Heritage education relies on a solid foundation of scientifically validated knowledge. This case study shows how different disciplines come together to source, combine, and interpret data for a ... [more ▼]

Cultural Heritage education relies on a solid foundation of scientifically validated knowledge. This case study shows how different disciplines come together to source, combine, and interpret data for a landscape reconstruction of Larochette, Luxembourg. It is the initial stage of a larger interdisciplinary project to create an educational game that highlights the tangible and intangible heritage that can be traced in the town's structures even today. [less ▲]

Detailed reference viewed: 133 (21 UL)
Full Text
See detailModeling of a prestressed concrete bridge with 3D finite elements for structural health monitoring using model updating techniques
Schommer, Sebastian UL; Kebig, Tanja UL; Nguyen, Viet Ha UL et al

in ISMA2018 International Conference on Noise and Vibration Engineering (2018)

This paper presents a linear finite element model for a prestressed concrete beam, which was part of a real bridge. Static and dynamic tests were carried out and compared to the numerical simulation ... [more ▼]

This paper presents a linear finite element model for a prestressed concrete beam, which was part of a real bridge. Static and dynamic tests were carried out and compared to the numerical simulation responses. A solid finite element model was created including the prestressed concrete beam, permanent dead load, two additional live loads and a shaker. A well planned finite element model is very important for later detection and localization of damage. Therefore, a mapped mesh was used to define so-called ‘slices’, which enables describing stiffness changes, e.g. damage. The model validation was performed by comparing simulated results to measured responses in the healthy state of the beam. After validation of the reference model, it is possible to modify the bending stiffness along the longitudinal axis of the beam by modifying Young’s moduli of different slices to adapt for the effect of damage. [less ▲]

Detailed reference viewed: 103 (10 UL)
Full Text
Peer Reviewed
See detailAn Elastic Multi-Core Allocation Mechanism for Database Systems
Dominico, Simone; Almeida, Eduardo Cunha; Meira, Jorge Augusto UL et al

in International Conference on Data Engineering (ICDE) (2018)

During the parallel execution of queries in Non-Uniform Memory Access (NUMA) systems, he Operating System (OS) maps the threads (or processes) from modern database systems to the available cores among the ... [more ▼]

During the parallel execution of queries in Non-Uniform Memory Access (NUMA) systems, he Operating System (OS) maps the threads (or processes) from modern database systems to the available cores among the NUMA nodes using the standard node-local policy. However, such non-smart mapping may result in inefficient memory activity, because shared data may be accessed by scattered threads requiring large data movements or non-shared data may be allocated to threads sharing the same cache memory, increasing its conflicts. In this paper we present a data-distribution aware and elastic multi-core allocation mechanism to improve the OS mapping of database threads in NUMA systems. Our hypothesis is that we mitigate the data movement if we only hand out to the OS the local optimum number of cores in specific nodes. We propose a mechanism based on a rule-condition-action pipeline that uses hardware counters to promptly find out the local optimum number of cores. Our mechanism uses a priority queue to track the history of the memory address space used by database threads in order to decide about the allocation/release of cores and its distribution among the NUMA nodes to decrease remote memory access. We implemented and tested a prototype of our mechanism when executing two popular Volcano-style databases improving their NUMA-affinity. For MonetDB, we show maximum speedup of 1.53 × , due to consistent reduction in the local/remote per-query data traffic ratio of up to 3.87 × running 256 concurrent clients in the 1 GB TPC-H database also showing system energy savings of 26.05%. For the NUMA-aware SQL Server, we observed speedup of up to 1.27 × and reduction on the data traffic ratio of 3.70 ×. [less ▲]

Detailed reference viewed: 135 (7 UL)
Full Text
See detailEvaluating Search-Based Techniques With Statistical Tests
Arcuri, Andrea UL

in The Search-Based Software Testing (SBST) Workshop (2018)

This tutorial covers the basics of how to use statistical tests to evaluate and compare search-algorithms, in particular when applied on software engineering problems. Search-algorithms like Hill Climbing ... [more ▼]

This tutorial covers the basics of how to use statistical tests to evaluate and compare search-algorithms, in particular when applied on software engineering problems. Search-algorithms like Hill Climbing and Genetic Algorithms are randomised. Running such randomised algorithms twice on the same problem can give different results. It is hence important to run such algorithms multiple times to collect average results, and avoid so publishing wrong conclusions that were based on just luck. However, there is the question of how often such runs should be repeated. Given a set of n repeated experiments, is such n large enough to draw sound conclusions? Or should had more experiments been run? Statistical tests like the Wilcoxon-Mann-Whitney U-test can be used to answer these important questions. [less ▲]

Detailed reference viewed: 112 (6 UL)
Full Text
Peer Reviewed
See detailA Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together ... [more ▼]

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together with indistinguishable decoy words so when an intruder steals the file, retrieves the words, and tries to log-in, he does not know which one is the password. By guessing one from the decoy words, he may not be lucky and reveal the leak. Juels and Rivest left a problem open: how to make the system secure even when the intruder corrupted the login server’s code. In this paper we study and solve the problem. However, since “code corruption” is a powerful attack, we first define rigorously the threat and set a few assumptions under which the problem is still solvable, before showing meaningful attacks against the original Honeywords System. Then we elicit a fundamental security requirement, implementing which, we are able to restore the honeywords System’s security despite a corrupted login service. We verify the new protocol’s security formally, using ProVerif for this task. We also implement the protocol and test its performance. Finally, at the light of our findings, we discuss whether it is still worth using a fixed honeywords-based system against such a powerful threat, or whether it is better, in order to be resilient against code corruption attacks, to design afresh a completely different password-based authentication solution. [less ▲]

Detailed reference viewed: 372 (49 UL)
Full Text
Peer Reviewed
See detailSequential spatio-temporal symbol-level precoding enabling faster-than-Nyquist signaling for multi-user MISO systems
Spano, Danilo UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 26th European Signal Processing Conference (EUSIPCO) (2018)

This paper addresses the problem of the interference between multiple co-channel transmissions in the downlink of a multi-antenna wireless system. In this context, symbol-level precoding achieves a ... [more ▼]

This paper addresses the problem of the interference between multiple co-channel transmissions in the downlink of a multi-antenna wireless system. In this context, symbol-level precoding achieves a constructive interference effect which results in SINR gains at the receivers side. Usually the constructive interference is exploited in the spatial dimension (multi-user interference), however in this work we consider a spatio-temporal precoding model which allows to exploit the interference also in the temporal dimension (inter-symbol interference). The proposed method, which optimizes the overs ampled transmit waveforms by minimizing the per-antenna transmit power, allows faster-than-Nyquist signaling over multi-user MISO systems without imposing additional complexity at the user terminals. The optimization is performed in a sequential fashion, by splitting the data streams in blocks and handling the inter-block interference. Numerical results are presented to assess the gains of the scheme in terms of effective rate and energy efficiency. [less ▲]

Detailed reference viewed: 29 (5 UL)
See detailZur Artikulation einer modernen europäischen Kultur im Theater als Text: vom engen zum erweiterten Text- bzw. Theaterbegriff
Nonoa, Koku Gnatuloma UL

in Zhu, Jianhua; Szurawitzki, Michael; Zhao, Jin (Eds.) Germanistik zwischen Tradition und Innovation: XIII. Kongress der Internationalen Vereinigung für Germanistik (IVG) (2018)

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailA rule-based approach for self-optimisation in autonomic eHealth systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Workshop Proceedings ot the 6th International Workshop on "Self-Optimisation in Autonomic & Organic Computing Systems" in ARCS 2018 - 31st International Conference on Architecture of Computing Systems, Braunschweig, Germany, 09 - 12 April, 2018 (2018)

Advances in machine learning techniques in recent years were of great benefit for the detection of diseases/medical conditions in eHealth systems, but only to a limited extend. In fact, while for the ... [more ▼]

Advances in machine learning techniques in recent years were of great benefit for the detection of diseases/medical conditions in eHealth systems, but only to a limited extend. In fact, while for the detection of some diseases the data mining techniques were performing very well, they still got outperformed by medical experts in about half of the tests done. In this paper, we propose a hybrid approach, which will use a rule-based system on top of the machine learning techniques in order to optimise the results of conflict handling. The goal is to insert the knowledge from medical experts in order to optimise the results given by the classification techniques. Possible positive and negative effects will be discussed. [less ▲]

Detailed reference viewed: 103 (15 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (2018)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 239 (27 UL)
Full Text
Peer Reviewed
See detailPredicting the Fault Revelation Utility of Mutants
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Bissyande, Tegawendé François D Assise UL et al

in 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018 (2018)

Detailed reference viewed: 218 (21 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 243 (24 UL)
Full Text
Peer Reviewed
See detailLink Adaptation and CSI Detection Errors in Multibeam Satellite Systems with Linear Precoding
Tato, Anxo; Andrenacci, Stefano UL; Chatzinotas, Symeon UL et al

in 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC) (2018)

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High ... [more ▼]

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High Throughput Satellites (HTS). However, although some previous works about precoding consider imperfect CSIT (Chanel State Information at the Transmitter) adding some CSI estimation errors, that is not the main cause of CSI degradation. In practice, receivers can only detect and estimate a few coefficients of the CSI vector being the other nullified, replaced by zeros. This introduces errors in the SINR calculation by the gateway that lead to the assignment of Modulation and Coding Schemes (MCS) over the decoding possibilities of the users, increasing the rate of erroneous frames. In this work, the errors in the SINR calculation caused by the nullification of the CSI are analyzing statistically and geographically using a radiation diagram of 245 beams over Europe. Furthermore, a solution based on a link adaptation algorithm with a per user adaptive margin is proposed, helping to achieve the QEF (Quasi-error Free) target of DVB-S2X systems. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailProvable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
Cogliati, Benoît-Michel UL; Dodis, Yevgeniy; Katz, Jonathan et al

in Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks (2018)

Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” ... [more ▼]

Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” substitution steps utilizing such S-boxes, with keyed and “global” permu- tation steps which are non-cryptographic. Many widely deployed block ciphers are constructed based on the SPNs, but there are essentially no provable-security results about SPNs. In this work, we initiate a comprehensive study of the provable security of SPNs as (possibly tweakable) wn-bit block ciphers, when the underlying n-bit permutation is modeled as a public random permutation. When the permutation step is linear (which is the case for most existing designs), we show that 3 SPN rounds are necessary and sufficient for security. On the other hand, even 1-round SPNs can be secure when non-linearity is allowed. Moreover, 2-round non-linear SPNs can achieve “beyond- birthday” (up to 2 2n/3 adversarial queries) security, and, as the number of non-linear rounds increases, our bounds are meaningful for the number of queries approaching 2 n . Finally, our non-linear SPNs can be made tweakable by incorporating the tweak into the permutation layer, and provide good multi-user security. As an application, our construction can turn two public n-bit permuta- tions (or fixed-key block ciphers) into a tweakable block cipher working on wn-bit inputs, 6n-bit key and an n-bit tweak (for any w ≥ 2); the tweakable block cipher provides security up to 2 2n/3 adversarial queries in the random permutation model, while only requiring w calls to each permutation, and 3w field multiplications for each wn-bit input. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailGenerating symbolic representation from sensor data: Inferring knowledge in robotics competitions
Rodriguez Lera, Francisco Javier UL; Martín-Rico, F.; Matelián-Olivera, V.

in 2018 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC) (2018)

Detailed reference viewed: 62 (0 UL)
Full Text
Peer Reviewed
See detailTalking Borders. From Local Expertise to Global Exchange
Venken, Machteld UL

in Heigl, Florian; Ernst, Marlene (Eds.) Austrian Citizen Science Conference 2018. Abstract book (2018)

On July 10-14, 2018, the Association for Borderlands Studies (ABS) held its Second World Conference in Vienna and Budapest. The meeting was attended by around 450 participants from 54 countries, including ... [more ▼]

On July 10-14, 2018, the Association for Borderlands Studies (ABS) held its Second World Conference in Vienna and Budapest. The meeting was attended by around 450 participants from 54 countries, including renowned experts and practitioners, spanning all fields of the humanities and the social sciences. The ABS is the world’s largest academic organization dedicated to the systematic study and exchange of ideas, information and analysis of international border, and the processes and communities engendered by such borders. The Second ABS World Conference had as its central topic Border-Making and its Consequences: Interpreting Evidence from the “post-Colonial” and “post-Imperial” 20th Century and was co-organized by the University of Vienna and the Central European University on the occasion of the 100th anniversary of the dissolution of the Austro-Hungarian Empire. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
See detailCombining Virtual and Robot Assistants - A Case Study about Integrating Amazon's Alexa as a Voice Interface in Robotics
Jungbluth, Jan UL; Krieger, Rolf; Gerke, Wolfgang et al

in Müller, Rainer; Plapper, Peter; Brüls, Oliver (Eds.) et al Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018)

Virtual assistants such as Alexa, Siri, Cortana and Google Assistant increasingly find ways to enter our homes and everyday lives, where they serve as powerful human-machine interfaces to control devices ... [more ▼]

Virtual assistants such as Alexa, Siri, Cortana and Google Assistant increasingly find ways to enter our homes and everyday lives, where they serve as powerful human-machine interfaces to control devices through natural language. In this work, we explore the use of virtual assistants to control single components within an intelligent industrial robot assistant system for disassembly applications. Following a short introduction and an overview of commercially available virtual assistants, we present our system architecture, which integrates Amazon's Alexa through an Echo Dot device. Utilizing the Alexa Skill Kit, we build a voice user interface that contains dialogs to control various device functions and assistive system behaviors. By connecting Alexa Voice Service with Amazon’s Lambda and IoT web services, we can parametrize machine commands depending on the user's voice input and, through a Raspberry Pi, which routes messages between the internet and decoupled machine network, send them to the devices within the intelligent robot assistance system. With the reversed communication flow, we can update and store the current state of the devices in the Amazon Web Services IoT Shadow. Utilizing the IoT Shadow, we are able to inform the user upon request about the current state of the devices by synthesize speech with the Alexa Voice Services and vocalize it through the Echo Dot. One implemented assistive system behavior and the related dialog to activate the behavior is further explained in this work. In the conclusion, we address our gathered positive and negative experience to date. [less ▲]

Detailed reference viewed: 307 (1 UL)
Full Text
Peer Reviewed
See detail"Kinder besitzen eine eigene Kraft für gute Lösungen". Zur Adressierung von Kindern im frühpädagogischen Partizipationsdiskurs
Hekel, Nicole UL

in Bloch, Bianca; Cloos, Peter; Schulz, Marc (Eds.) et al Kinder und Kindheit(en). Frühpädagogische Perspektiven (2018)

Detailed reference viewed: 70 (5 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (2018)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 126 (18 UL)
Full Text
Peer Reviewed
See detailEvoMaster: Evolutionary Multi-context Automated System Test Generation
Arcuri, Andrea UL

in IEEE Conference on Software Testing, Validation and Verification (2018)

This paper presents EVOMASTER, an open-source tool that is able to automatically generate system level test cases using evolutionary algorithms. Currently, EVOMASTER targets RESTful web services running ... [more ▼]

This paper presents EVOMASTER, an open-source tool that is able to automatically generate system level test cases using evolutionary algorithms. Currently, EVOMASTER targets RESTful web services running on JVM technology, and has been used to find several faults in existing open-source projects. We discuss some of the architectural decisions made for its implementation, and future work. [less ▲]

Detailed reference viewed: 154 (1 UL)
Full Text
Peer Reviewed
See detailSymbol-level precoding with low resolution DACs for large-scale array MU-MIMO systems
Tsinos, Christos UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

While (Multiple Input-Multiple Output) MIMO systems based on large-scale antenna arrays are seen as the solution to the continuously increasing demands in modern wireless systems, they require high ... [more ▼]

While (Multiple Input-Multiple Output) MIMO systems based on large-scale antenna arrays are seen as the solution to the continuously increasing demands in modern wireless systems, they require high hardware complexity and power consumption. To tackle this, solutions based on low resolution Analog-to-Digital Converters (ADCs) / Digital-to-Analog Converters (DACs) have been developed in the literature where they mainly propose quantized versions of typical channel dependent linear precoding solutions. Alternatively, nonlinear Symbol level Precoding techniques have been recently proposed for downlink Multi User (MU)-MIMO systems with low resolution DACs that achieve significantly improved performance in several cases. The existing SLP approaches support only DACs of 1-bit resolution which result in significant performance degradations, especially when constellations with order greater than 4 are employed. To that end, in this work a novel SLP approach is developed that supports systems with DACs of any resolution and it is applicable for any type of constellation. As it is verified by the presented numerical results, the proposed approach exhibits significantly improved performance when constellations with order greater than 4 are employed and require reduced computational complexity, compared to the existing solutions for the 1-bit DAC case. [less ▲]

Detailed reference viewed: 88 (5 UL)
Full Text
Peer Reviewed
See detailRecent Trends in Software Testing Education: A Systematic Literature Review
Lauvås, Per; Arcuri, Andrea UL

in UDIT (The Norwegian Conference on Didactics in IT education) (2018)

Testing is a critical aspect of software development. Far too often software is released with critical faults. However, testing is often considered tedious and boring. Unfortunately, many graduates might ... [more ▼]

Testing is a critical aspect of software development. Far too often software is released with critical faults. However, testing is often considered tedious and boring. Unfortunately, many graduates might join the work force without having had any education in software testing, which exacerbates the problem even further. Therefore, teaching software testing as part of a university degree in software engineering and is very important. But it is an open challenge how to teach software testing in an effective way that can successfully motivate students. In this paper, we have carried out a systematic literature review on the topic of teaching software testing. We analysed and reviewed 30 papers that were published between 2013 and 2017. The review points out to a few different trends, like the use of gamification to make the teaching of software testing less tedious. [less ▲]

Detailed reference viewed: 89 (2 UL)
Full Text
Peer Reviewed
See detailAttacks against GSMA's M2M Remote Provisioning
Meyer, Maxime; Quaglia, Elizabeth A.; Smyth, Benjamin UL

in FC'18: 22nd International Conference on Financial Cryptography and Data Security (2018)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailVerifiability of Helios Mixnet
Smyth, Benjamin UL

in Voting'18: 3rd Workshop on Advances in Secure Electronic Voting (2018)

Detailed reference viewed: 60 (0 UL)
Full Text
Peer Reviewed
See detailOn the Full Control of Boolean Networks
Paul, Soumya UL; Pang, Jun UL; Su, Cui

in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

Detailed reference viewed: 72 (4 UL)
Full Text
Peer Reviewed
See detailLe changement de rôle des patients atteints de maladie chronique dans l'organisation des soins
Odero, Angela UL; Bucki, Barbara; Baumann, Michèle UL

in Pratiques et interventions en santé (2018)

Introduction: Les patients sont de plus en plus impliqués dans les soins qui exigent leur engagement dans la surveillance, la prévention des risques, l'auto-éducation et l'auto-traitement. Les ... [more ▼]

Introduction: Les patients sont de plus en plus impliqués dans les soins qui exigent leur engagement dans la surveillance, la prévention des risques, l'auto-éducation et l'auto-traitement. Les professionnels, quant à eux, ils sont plus enclins à adopter avec leurs patients des modèles d'interaction équitable. Sur le plan théorique, une Approche Patient Partenaire de Soins (APPS) a été proposée par des chercheurs canadiens. Pour clarifier ce que représente l’APPS, une étude qualitative a tenté d’analyser les facteurs culturels et psychosociaux qui interviennent dans la mise en place d’une APPS. Méthode : Avec l’appui des associations luxembourgeoises, six focus groupes ont été organisés avec 30 patients. A partir des retranscriptions, une analyse de contenu thématique catégorielle a été réalisée avec l’aide de N’Vivo 12 Résultats: Parmi les obstacles qui freinent une APPS, des divergences culturelles entre patients et professionnels de santé sont évoqués. Des patients préfèrent en effet rester en harmonie avec leurs valeurs et refusent de partager les prises de décision, pour eux seuls les professionnels doivent les prendre. Les échanges avec les professionnels restent compliqués car des positions dominantes et autoritaires demeurent. Parmi les facteurs favorisants APPS, on peut retenir le fait que les patients estiment avoir une connaissance de leur corps, et qu’ils ressentent l’impact que peut avoir les effets secondaires des traitements ; ceci à condition qu’ils soient capables de les verbaliser. Enfin l'accent est mis sur une confiance réciproque. Conclusion: Une éducation des patients devrait être développée pour leur permettre d’acquérir un «Capital Culturel en Santé» ; une connaissance de base favorisant la compréhension des soins et facilitant les relations avec les professionnels de santé. De même, une formation médicale et une pratique infirmière plus soutenues par des «Compétences Culturelles» permettaient aux professionnels de mieux reconnaître l'impact socioculturel que peut avoir leur identité lors de leurs relations avec les patients. [less ▲]

Detailed reference viewed: 177 (5 UL)
Full Text
Peer Reviewed
See detailLegal Reasoning and Big Data: Opportunities and Challenges
Antoniou, Grigoris; Baryannis, George; Batsakis, Sotiris et al

in Legal Reasoning and Big Data: Opportunities and Challenges (2018)

Detailed reference viewed: 105 (5 UL)
Full Text
Peer Reviewed
See detailModelling of early-age complex crack propagation in cement-based materials using phase field method
Nguyen, Thanh Tung UL; Waldmann, Danièle UL

in 6th European Conference on Computational Mechanics (2018)

Detailed reference viewed: 36 (8 UL)
Full Text
See detailHigher level vocational education: The route to high skills and productivity as well as greater equity? An international comparative analysis
Bathmaker, Ann-Marie; Graf, Lukas; Orr, Kevin et al

in Nägele, Christof; Stalder, Barbara E. (Eds.) Trends in Vocational Education and Training Research. Proceedings of the European Conference on Educational Re- search (ECER), Vocational Education and Training Network (VETNET) (2018)

This international comparative analysis of higher level vocational education examines developments across five countries: England, Germany, Australia, Canada, and the USA. The authors consider how current ... [more ▼]

This international comparative analysis of higher level vocational education examines developments across five countries: England, Germany, Australia, Canada, and the USA. The authors consider how current developments address two key policy concerns: an emphasis on high skills as a means of achieving economic competitiveness and raising productivity; and the promise of increasing access for students hitherto excluded from higher education. We address these questions in relation to specific country contexts, in order to highlight similarities and differences in developments within the European arena and in a wider global context. We locate our analyses in an understanding of the different political and socio-economic conditions within different countries, which render particular reforms and innovations both possible and realizable in one context, but almost unthinkable in another. We argue for the need to recognize and embrace diversity in provision, while using comparison across countries as a means of challenging taken-for-granted assumptions of how things are and what is possible within individual country contexts. Such comparative analysis is a prerequisite for answering questions of policy transfer and learning from others. [less ▲]

Detailed reference viewed: 212 (9 UL)
See detailSprachlernbiographien und professionelles Handeln: Language Awareness bei Lehrkräften in Luxemburg.
Hu, Adelheid UL; Schank, Flore; Wagner, Jean-Marc UL

in Atlas der Mehrsprachigkeit (2018)

Detailed reference viewed: 54 (2 UL)
Full Text
Peer Reviewed
See detailMulticarrier phase modulated continuous waveform for automotive joint radar-communication system
Dokhanchi, Sayed Hossein; Shankar, Bhavani UL; Stifter, Thomas Stifter et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

Automotive radar implementation in the mm Wave band (79 G Hz) is being increasingly considered for the high bandwidths offered. While the radar systems and technology is maturing in mm Wave bands, the ... [more ▼]

Automotive radar implementation in the mm Wave band (79 G Hz) is being increasingly considered for the high bandwidths offered. While the radar systems and technology is maturing in mm Wave bands, the reuse of radar spectrum for low latency, limited throughput and safety critical communication has started to receive attention of late. Towards this, a joint radar-communication (JRC) system is proposed where the platform performs sensing and communication operations. The major challenge in JRC waveform design is the lack of degrees of freedom (DoF), due to need to estimate communication symbols in addition to the radar parameters. In this work, we propose a novel automotive JRC system based on multicarrier phase-modulated continuous waveform (MC-PMCW). MC-PMCW provides sufficient DoF to confine desired parameters, i.e., angles of arrival, Doppler shifts, ranges, and communication symbols in different dimensions. It can overcome the limitations of conventional PMCW and OFDM waveforms by leveraging the multicarrier feature of OFDM and the code sequence of PMCW to embed radar and communication. Further, the separation of parameters into different domains reduces complexity and enhances robustness; this is desirable in automotive scenarios characterized by dynamic scenes. Numerical results demonstrate the effectiveness of the proposed system. [less ▲]

Detailed reference viewed: 100 (2 UL)
Full Text
Peer Reviewed
See detailMessir: A Text-First DSL-Based Approach for UML Requirements Engineering (Tool Demo)
Ries, Benoît UL; Capozucca, Alfredo UL; Guelfi, Nicolas UL

in Proceedings of the 11th ACM SIGPLAN International Conference on Software Language Engineering SLE'18 (2018)

Detailed reference viewed: 95 (16 UL)
See detailSeeing People: Using Satellites for the Benefit of All
Blount, Percy UL

in Blount, Percy; Rafael, Moro-Aguilar; Tanja, Masson-Zwaan (Eds.) et al Procedings of the International Institute of Space Law 2017 (2018)

Detailed reference viewed: 32 (0 UL)
Full Text
See detailRecent Progress Toward Intelligent Robot Assistants for Non-Destructive Disassembly
Jungbluth, Jan UL; Gerke, Wolfgang; Plapper, Peter UL

in Müller, Rainer; Plapper, Peter; Brüls, Olivier (Eds.) et al Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018)

One key to successful and fluent human-robot collaboration in disassembly processes is equipping the robot systems with greater autonomy and intelligence. In this paper, we present our progress in ... [more ▼]

One key to successful and fluent human-robot collaboration in disassembly processes is equipping the robot systems with greater autonomy and intelligence. In this paper, we present our progress in developing such an intelligent robot assistant system. We present the multi-agent control architecture we developed and describe its technical implementation. Our control approach relies on two types of knowledge models: product and process models. The product model describes the structure of the product to be dismantled through a description of the parts involved and the connections between them. A connection type-related process model describes which agents and objects participate in the disassembly process and which methods of human-robot cooperation or collaboration are most useful. When supplied with a product model and a goal definition, our robotic assistant can automatically generate a partially ordered disassembly task sequence. For each disassembly task, the user can choose one of the divisions of labor defined in the process model. Using the process model, through perception and deliberation, the control system can both execute actions and coordinate and synchronize the actions of human and machine. This approach allows the system to be more autonomous when providing assistance to human coworkers in complex and one-piece disassembly processes. [less ▲]

Detailed reference viewed: 86 (1 UL)
Full Text
Peer Reviewed
See detailDialogue Games for Enforcement of Argument Acceptance and Rejection via Attack Removal
Dauphin, Jérémie UL; Satoh, Ken

in International Conference on Principles and Practice of Multi-Agent Systems (2018)

Argumentation is dynamic in nature and most commonly exists in dialogical form between different agents trying to convince each other. While abstract argumentation framework are mostly static, many ... [more ▼]

Argumentation is dynamic in nature and most commonly exists in dialogical form between different agents trying to convince each other. While abstract argumentation framework are mostly static, many studies have focused on dynamical aspects and changes to these static frameworks. An important problem is the one of argument enforcement, modifying an argumentation framework in order to ensure that a certain argument is accepted. In this paper, we use dialogue games to provide an exhaustive list of minimal sets of attacks such that when removed, a given argument is credulously accepted with respect to preferred semantics. We then extend the method to enforce other acceptability statuses and cope with sets of arguments. [less ▲]

Detailed reference viewed: 86 (13 UL)
Full Text
Peer Reviewed
See detailMultigroup Multicast Beamforming and Antenna Selection with Rate-Splitting in Multicell Systems
Tervo, Oskari; Trant, Le-Nam; Chatzinotas, Symeon UL et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

This paper studies energy-efficient joint coordinated beamforming and antenna selection in multi-cell multi-user multigroup multicast multiple-input single-output systems. We focus on interference-limited ... [more ▼]

This paper studies energy-efficient joint coordinated beamforming and antenna selection in multi-cell multi-user multigroup multicast multiple-input single-output systems. We focus on interference-limited scenarios, e.g., when the number of radio frequency (RF) chains is of the same order as the number of multicasting groups. To tackle the interference, we exploit rate-splitting to divide the group messages into common and group-specific sub-messages. We propose a per-cell rate-splitting approach, where the common message is locally designed to be decoded by the in-cell users, while treated as noise by the out-cell users. We consider the case where the number of RF chains is smaller than that of antennas, and consider a switching architecture, that is, the antenna selection is employed to choose the best antennas for transmission. Numerical results illustrate the potential of the proposed approach to significantly improve the energy efficiency in the interference-limited regime. [less ▲]

Detailed reference viewed: 72 (0 UL)
Full Text
Peer Reviewed
See detailA Blockchain-Based PKI Management Framework
Yakubov, Alexander UL; Shbair, Wazen UL; Wallbom, Anders et al

in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018, Tapei, Tawain 23-27 April 2018 (2018)

Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate ... [more ▼]

Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate Authorities (CAs) that may be used to issue unauthorized certificates for end-users. Many recent breaches show that if a CA is compromised, the security of the corresponding end-users will be in risk. As an emerging solution, Blockchain technology potentially resolves the problems of traditional PKI systems - in particular, elimination of single point-of-failure and rapid reaction to CAs shortcomings. Blockchain has the ability to store and manage digital certificates within a public and immutable ledger, resulting in a fully traceable history log. In this paper we designed and developed a blockchain-based PKI management framework for issuing, validating and revoking X.509 certificates. Evaluation and experimental results confirm that the proposed framework provides more reliable and robust PKI systems with modest maintenance costs. [less ▲]

Detailed reference viewed: 1081 (6 UL)
Full Text
Peer Reviewed
See detailPrecoder Design for Multibeam Mobile Satellite Systems
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Proceedings of IEEE Asilomar Conference on Signals, Systems and Computers (2018)

Detailed reference viewed: 73 (4 UL)
Full Text
Peer Reviewed
See detailIntroduction to PDCO 2018
Danoy, Grégoire UL; Baz, Didier El; Boyer, Vincent et al

in 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPS Workshops 2018, Vancouver, BC, Canada, May 21-25 2018 (2018)

Detailed reference viewed: 68 (2 UL)
Full Text
Peer Reviewed
See detailOn-Board Precoding in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Proceedings of IEEE VTC Fall 2018 (2018)

This paper present On-Board Precoding (OBP) for a multiple gateway multibeam satellite system where full frequency reuse pattern is employed at both user and feeder links. By reducing the Channel State ... [more ▼]

This paper present On-Board Precoding (OBP) for a multiple gateway multibeam satellite system where full frequency reuse pattern is employed at both user and feeder links. By reducing the Channel State Information (CSI) roundtrip delay to half, OBP offers significant benefits in the emerging multiple gateway scenario in terms of lower gateways coordination. However, two critical issues need to be addressed: (a) interference in both user and feeder links is the bottleneck of the whole system and employing interference mitigation techniques is essential, (b) clear push towards non-adaptive (fixed) payload implementation, leading to low computationally complex satellite architectures. In order to fulfill requirements (a) and (b), this paper studies the impact of employing a fixed OBP technique at the payload which is sufficiently robust to the variations in both user and feeder link channels. In addition to (a) and (b), the provided simulation results depict the performance gain obtained by our proposed OBP with respect to the conventional interference mitigation techniques in multiple gateway multibeam systems. [less ▲]

Detailed reference viewed: 126 (11 UL)
Full Text
Peer Reviewed
See detailFrom Georeferenced Data to Socio-Spatial Knowledge. Ontology Design Patterns to Discover Domain-Specific Knowledge from Crowdsourced Data
Calafiore, Alessia; Boella, Guido; van der Torre, Leon UL

in 21st International Conference on Knowledge Engineering and Knowledge Management (2018)

So far, ontologies developed to support Geographic Information science have been mostly designed from a space-centered rather than a human-centered and social perspective. In the last decades, a wealth of ... [more ▼]

So far, ontologies developed to support Geographic Information science have been mostly designed from a space-centered rather than a human-centered and social perspective. In the last decades, a wealth of georeferenced data is collected through sensors, mobile and web platforms from the crowd, providing rich information about people’s collective experiences and behaviors in cities. As a consequence, these new data sources require models able to make machine-understandable the social meanings and uses people commonly associate with certain places. This contribution proposes a set of reusable Ontology Design Patterns (ODP) to guide a data mining workflow and to semantically enrich the mined results. The ODPs explicitly aim at representing two facets of the geographic knowledge - the built environment and people social behavior in cities - as well as the way they interact. Modelling the interplay between the physical and the human aspects of the urban environment provides an ontology representation of the socio-spatial knowledge which can be used as baseline domain knowledge for analysing and interpreting georeferenced data collected through crowdsourcing. An experimentation using a TripAdvisor data sample to recognize food consumption practices in the city of Turin is presented. [less ▲]

Detailed reference viewed: 84 (1 UL)
Full Text
Peer Reviewed
See detailASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks
Mizera, Andrzej UL; Pang, Jun UL; Qu, Hongyang et al

in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

Detailed reference viewed: 82 (3 UL)
Full Text
Peer Reviewed
See detailEvoSuite at the SBST 2018 Tool Competition
Fraser, Gordon; Rojas, Jose; Arcuri, Andrea UL

in 2018 ACM/IEEE 11th International Workshop on Search-Based Software Testing (2018)

EvoSuite is a search-based tool that automatically generates executable unit tests for Java code (JUnit tests). This paper summarises the results and experiences of EvoSuite’s participation at the sixth ... [more ▼]

EvoSuite is a search-based tool that automatically generates executable unit tests for Java code (JUnit tests). This paper summarises the results and experiences of EvoSuite’s participation at the sixth unit testing competition at SBST 2018, where EvoSuite achieved the highest overall score (687 points) for the fifth time in six editions of the competition. [less ▲]

Detailed reference viewed: 86 (6 UL)
See detailDénationaliser le passé, désétatiser le politique : les apports d'un dialogue nouveau entre historiographies française et italienne des formations politiques de la fin du Moyen Âge
Abeles, Solal UL

in Genet, Jean-Philippe (Ed.) Les vecteurs de l'idéel, vi, Mutations des sociétés politiques et systèmes de communication (2018)

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailSecurity Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Advances in Cybersecurity 2018 (2018)

To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to ... [more ▼]

To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding the advantages and disadvantages of each method is essential to develop robust defense strategies. In this paper we explain the techniques used by ransomware to derive encryption keys and analyze the security of each approach. We argue that recovery of data might be possible if the ransomware cannot access high entropy randomness sources. As an evidence to support our theoretical results, we provide a decryptor program for a previously undefeated ransomware. [less ▲]

Detailed reference viewed: 180 (13 UL)
Full Text
Peer Reviewed
See detailA Reference Architecture for Deploying Component-based Robot Software and Comparison with Existing Tools
Hochgeschwender, Nico UL; Biggs, Geoffrey; Voos, Holger UL

in Proceedings of the IEEE International Conference on Robotic Computing (2018)

Detailed reference viewed: 131 (7 UL)
Full Text
Peer Reviewed
See detailA comparison between discrete analysis and a multiphase approach for predicting heat conduction in packed beds
Copertaro, Edoardo UL; Estupinan Donoso, Alvaro Antonio UL; Peters, Bernhard UL

in Proceedings of the 10th International Conference on Computer Modeling and Simulation (2018)

the Discrete Element Method (DEM) is a Lagrangian approach initially developed for predicting particles flow. The eXtended Discrete Element Method (XDEM) framework, developed at the LuXDEM Research Centre ... [more ▼]

the Discrete Element Method (DEM) is a Lagrangian approach initially developed for predicting particles flow. The eXtended Discrete Element Method (XDEM) framework, developed at the LuXDEM Research Centre of the University of Luxembourg, extends DEM by including the thermochemical state of particles, as well as their interaction with a Computational Fluid Dynamics (CFD) domain. The level of detail of its predictions makes the XDEM suite a powerful tool for predicting complex industrial processes like steel making, powder metallurgy and additive manufacturing. Like in any other DEM software, the critical aspect of the simulations is the computation requirement that grows rapidly as the number of particles increases. Indeed, such burden currently represents the main bottleneck to its full exploitation in large-scale scenarios. Digital Twin, a research project founded by the European Regional Development Fund (ERDF), aims at drastically accelerate XDEM through different approaches and make it an effective tool for numerical predictions in industry as well as virtual prototyping. The Multiphase Particle- In-Cell (MP-PIC) method has been introduced for reducing the computation burden of DEM. It has been initially developed for predicting particles flow and uses a two-way transfer of information between the Lagrangian entities and a computation grid. The method avoids explicit contact detection and can potentially achieve a drastic reduction of the time-to-solution respect to DEM. The present contribution introduces a multiphase approach for predicting the conductive heat transfer within a static packed bed of particles. Results from a test case are qualitatively and quantitatively compared against reference XDEM predictions. The method can be effectively exploited in combination with MP- PIC for predicting the thermochemical state of particles. [less ▲]

Detailed reference viewed: 75 (1 UL)
Full Text
Peer Reviewed
See detailTowards the Existential Control of Boolean Networks: A Preliminary Report
Paul, Soumya UL; Pang, Jun UL; Su, Cui

in Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (2018)

Detailed reference viewed: 58 (1 UL)
Full Text
Peer Reviewed
See detailHybrid analog-digital transceiver designs for mmwave amplify-and-forward relaying systems
Tsinos, Christos UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 41st International Conference on Telecommunications and Signal Processing (TSP) (2018)

Hybrid Analog/Digital (A/D) pre-/post-coding solutions aim at the reduction of the hardware complexity and power consumption of a system employed with a large-scale antenna array functioning in the ... [more ▼]

Hybrid Analog/Digital (A/D) pre-/post-coding solutions aim at the reduction of the hardware complexity and power consumption of a system employed with a large-scale antenna array functioning in the millimeter (mmWave) band. This is achieved by enabling the transceiver design with fewer Radio Frequency (RF) chains than antennas. In this work, hybrid A/D transceiver designs are developed for a relay assisted mmWave system that aims at data transmission from a source to a destination node via the well-known amplify-and-forward cooperative protocol. To that end, hybrid solutions are proposed for the joint design of the source and relay nodes precoders and for the destination ones, as well. Contrariwise to existing literature approaches that develop codebook-based solutions and exhibit limitations on the performance, the proposed approaches are codebook-free and present significantly improved spectral efficiency, as it is verified via the presented simulations. [less ▲]

Detailed reference viewed: 75 (2 UL)
Full Text
Peer Reviewed
See detailDeformation theory of Lie bialgebra properads
Merkulov, Sergei UL; Willwacher, Thomas

in Geometry and Physics: A Festschrift in honour of Nigel Hitchin (2018)

We compute the homotopy derivations of the properads governing even and odd Lie bialgebras as well as involutive Lie bialgebras. The answer may be expressed in terms of the Kontsevich graph complexes. In ... [more ▼]

We compute the homotopy derivations of the properads governing even and odd Lie bialgebras as well as involutive Lie bialgebras. The answer may be expressed in terms of the Kontsevich graph complexes. In particular, this shows that the Grothendieck-Teichm\"uller group acts faithfully (and essentially transitively) on the completions of the properads governing even Lie bialgebras and involutive Lie bialgebras, up to homotopy. This shows also that by contrast to the even case the properad governing odd Lie bialgebras admits precisely one non-trivial automorphism --- the standard rescaling automorphism, and that it has precisely one non-trivial deformation which we describe explicitly. [less ▲]

Detailed reference viewed: 166 (9 UL)
Full Text
Peer Reviewed
See detailA Semantic Perspective on Belief Change in a Preferential Non-Monotonic Framework
Casini, Giovanni UL; Ferme, Eduardo; Meyer, Thomas et al

in Proceedings of the Sixteenth International Conference on Principles of Knowledge Representation and Reasoning (KR 2018) (2018)

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we investigate the ... [more ▼]

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we investigate the integration of the two formalisms by studying belief change for a (preferential) non-monotonic framework. We show that the standard AGM approach to be- lief change can be transferred to a preferential non-monotonic framework in the sense that change operations can be defined on conditional knowledge bases. We take as a point of depar- ture the results presented by Casini and Meyer (2017), and we develop and extend such results with characterisations based on semantics and entrenchment relations, showing how some of the constructions defined for propositional logic can be lifted to our preferential non-monotonic framework. [less ▲]

Detailed reference viewed: 92 (24 UL)
Full Text
Peer Reviewed
See detailMore Attention and Less Repetitive and Stereotyped Behaviors using a Robot with Children with Autism
Pinto Costa, Andreia UL; Charpiot, Louise UL; Rodriguez Lera, Francisco Javier UL et al

in 27th IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2018, Nanjing, China, August 27-31, 2018 (2018)

The aim of the present study was to assess the usefulness of QTrobot, a socially assistive robot, in interventions with children with autism spectrum disorder (ASD) by assessing children's attention ... [more ▼]

The aim of the present study was to assess the usefulness of QTrobot, a socially assistive robot, in interventions with children with autism spectrum disorder (ASD) by assessing children's attention, imitation, and presence of repetitive and stereotyped behaviors. Fifteen children diagnosed with ASD, aged from 4 to 14 years participated in two short interactions, one with a person and one with the robot. Statistical analyses revealed that children directed more attention towards the robot than towards the person, imitated the robot as much as the person, and engaged in fewer repetitive or stereotyped behaviors with the robot than with the person. These results support previous research demonstrating the usefulness of robots in short interactions with children with ASD and provide new evidence to the usefulness of robots in reducing repetitive and stereotyped behaviors in children with ASD, which can affect children's learning. [less ▲]

Detailed reference viewed: 279 (27 UL)
Full Text
Peer Reviewed
See detailÉvaluation du potentiel cognitif sur tablette tactile : L’exemple du « TCP »
Muller, Claire UL; Reichel, Yanica UL; Martin, Romain UL

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L’évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du colloque. (2018)

Les tablettes tactiles offrent une toute nouvelle gamme de possibilités dans le domaine de l’éducation. L’intuitivité de cet outil inspire des approches innovatrices pour l’évaluation de compétences, qui ... [more ▼]

Les tablettes tactiles offrent une toute nouvelle gamme de possibilités dans le domaine de l’éducation. L’intuitivité de cet outil inspire des approches innovatrices pour l’évaluation de compétences, qui sont mieux adaptées aux besoins spécifiques des étudiants que les tests conventionnels. Dans la présente communication nous présenterons le « Test of cognitive potential » (TCP), un test de raisonnement développé au sein du Luxembourg Centre for Educational Testing (LUCET). Avec ses instructions non verbales, présentées par vidéo, ce test donne la possibilité de mesurer le raisonnement logique indépendamment de toute langue, ce qui pourra contribuer à une réduction d’inégalités dans le système scolaire. Le TCP répond donc à une demande très concrète du terrain. Dans un contexte langagier complexe, comme celui du Luxembourg, la distinction entre troubles de l’apprentissage et simples retards dans la compréhension de la langue d’instruction est cruciale pour trouver le soutien scolaire optimal pour chaque élève. Pour cela, le potentiel cognitif, sans biais de langue, doit être évalué en même temps que la performance scolaire. En utilisant des données recueillies auprès d’élèves luxembourgeois du cycle 3.2 (âge moyen de 10 ans, N = 280), nous montrerons que la performance d’élèves ayant eu des instructions non verbales (n = 136) est similaire à celle d’élèves ayant eu des instructions verbales (n = 144) sur une série de tâches de raisonnement logique. De plus, nous présenterons des observations sur la comparabilité de la version tablette tactile du test (n = 104) et de la version papier crayon (n = 176). Nous terminerons avec une réflexion critique des avantages et défis à relever dans l’utilisation de tablettes tactiles en situation de test. [less ▲]

Detailed reference viewed: 62 (2 UL)
Full Text
Peer Reviewed
See detailDetecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Rezazad, Mostafa; Brust, Matthias R. UL; Akbari, Mohammad et al

in Advances in Intelligent Systems and Computing (2018)

Detailed reference viewed: 116 (2 UL)
Full Text
Peer Reviewed
See detailBlockchain Orchestration and Experimentation Framework: A Case Study of KYC
Shbair, Wazen UL; Steichen, Mathis UL; François, Jérôme UL et al

in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018 (2018)

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public ... [more ▼]

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public testnets (e.g. Rinkeby Ethereum) can be used for testing, however, we cannot adjust their parameters (e.g. Gas limit, Mining difficulty) to further the understanding of the application in question and of the employed blockchain. This paper proposes an easy to use orchestration framework over the Grid'5000 platform. Grid'5000 is a highly reconfigurable and controllable large-scale testbed. We developed a tool that facilitates nodes reservation, deployment and blockchain configuration over the Grid'5000 platform. In addition, our tool can fine-tune blockchain and network parameters before and between experiments. The proposed framework offers insights for private and consortium blockchain developers to identify performance bottlenecks and to assess the behavior of their applications in different circumstances. [less ▲]

Detailed reference viewed: 509 (29 UL)
Full Text
Peer Reviewed
See detailA Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism
Chen, Jundong; Hossain, Md Shafaeat; Brust, Matthias R. UL et al

in International Conference on Decision and Game Theory for Security (2018)

Twitter users often crave more followers to increase their social popularity. While a variety of factors have been shown to attract the followers, very little work has been done to analyze the mechanism ... [more ▼]

Twitter users often crave more followers to increase their social popularity. While a variety of factors have been shown to attract the followers, very little work has been done to analyze the mechanism how Twitter users follow or unfollow each other. In this paper, we apply game theory to modeling the follow-unfollow mechanism on Twitter. We first present a two-player game which is based on the Prisoner’s Dilemma, and subsequently evaluate the payoffs when the two players adopt different strategies. To allow two players to play multiple rounds of the game, we propose a multi-stage game model. We design a Twitter bot analyzer which follows or unfollows other Twitter users by adopting the strategies from the multi-stage game. We develop an algorithm which enables the Twitter bot analyzer to automatically collect and analyze the data. The results from analyzing the data collected in our experiment show that the follow-back ratios for both of the Twitter bots are very low, which are 0.76% and 0.86%. This means that most of the Twitter users do not cooperate and only want to be followed instead of following others. Our results also exhibit the effect of different strategies on the follow-back followers and on the non-following followers as well. [less ▲]

Detailed reference viewed: 81 (0 UL)
Full Text
Peer Reviewed
See detailQuizbot: Exploring Formative Feedback with Conversational Interfaces
Vijayakumar, Bharathi UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in Vijayakumar, Bharathi; Höhn, Sviatlana; Schommer, Christoph (Eds.) Proceedings of the (2018)

Detailed reference viewed: 150 (8 UL)
Full Text
Peer Reviewed
See detailCellular Automata Model for Proteomics and Its Application in Cancer Immunotherapy
Ghosh, Soumyabrata UL; Chaudhuri, Parimal Pal

in Cellular Automata, Conference proceedings, ACRI 2018 (2018)

Detailed reference viewed: 79 (8 UL)
Full Text
Peer Reviewed
See detailFormal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker
Bana, Gergely UL; Chadha, Rohit; Eeralla, Ajay

in Computer Security (2018)

Detailed reference viewed: 102 (5 UL)
Full Text
Peer Reviewed
See detailLightweight Key Agreement for Wireless Sensor Networks
Mesit, Jaruwan; Brust, Matthias R. UL; Bouvry, Pascal UL

in 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (2018)

Detailed reference viewed: 112 (9 UL)
Full Text
Peer Reviewed
See detailAnnotation of Argument Components in Political Debates Data
Haddadan, Shohreh UL; Cabrio, Elena; Villata, Serena

in Proceedings of the Workshop on Annotation in Digital Humanities (2018)

n this paper, we present the annotation guidelines we defined for annotating arguments in political debates. In our guidelines, we consider each argument as being composed of a claim and one or more ... [more ▼]

n this paper, we present the annotation guidelines we defined for annotating arguments in political debates. In our guidelines, we consider each argument as being composed of a claim and one or more premises. The annotation process has started with defining the guidelines for three annotators containing examples from the data, and continued as cyclic process of evaluation and revision on the annotation to resolve the ambiguities in the guidelines. In this paper, we briefly discuss the resulting annotated dataset and give some examples of the annotation scheme. The quality of the annotated dataset is assessed by computing inter-annotator agreement using Krippendorf’s α coefficient on a portion of the dataset. [less ▲]

Detailed reference viewed: 147 (19 UL)
Full Text
Peer Reviewed
See detailNew cultural competences needed for healthcare teams as a priority in treatment of chronic diseases
Odero, Angela UL; Baumann, Michèle UL

in "Health Psychology across the Lifespan: Uniting Research, Practice and Policy” (2018)

Technological changes and higher prevalence of chronic diseases require changing patients’ and healthcare professionals’ position with more participation in healthcare organization, and more implication ... [more ▼]

Technological changes and higher prevalence of chronic diseases require changing patients’ and healthcare professionals’ position with more participation in healthcare organization, and more implication in their relationships. Based on the Canadian ‘patient-as-partner in healthcare’ approach, our aims were to identify and categorize cultural values underlying this term in Luxembourg, and to characterize a set of cultural competencies needed for its practical application. Method: A qualitative study using a semi-directive guide developed within an INTERREG project was conducted among 30 healthcare professionals. A categorical thematic content analysis was realized using N'Vivo software. Results: For some professionals, the word ‘partner’ is not appropriate in Luxembourgish, but they defined it as a companion who engages in a mutual cooperation, structured collaboration and sharing of information with a common goal: Quality of healthcare. For others, a ‘partner’ is an associate who takes part in decision making, discussions, negotiations and evaluations. This partner approach would allow processes of change, bringing autonomy (surveillance, self-education, and monitoring treatment) to the patients, provided that professionals partly cede their traditional power. Trust and respect would be the main start of this process. Difficulties in communication and relationships would arise when helping the patients understand their disease, adhering to instructions, and giving a balanced place to the information found on Internet. Conclusion: This ‘collaborative accompaniment’ appears to allow decisional balance, an interdisciplinary method which requires training for all partners (physicians GP or specialists, patients and psychologist) and not only case-managers to help patients acquire self-efficacy for behavioral changes. [less ▲]

Detailed reference viewed: 132 (2 UL)
Full Text
Peer Reviewed
See detailLate heartbeat-evoked potentials, indicators of cortical representation of interoceptive signal processing, are associated with survival after cardiac arrest
Schulz, André UL; Stammet, Pascal; Dierolf, Angelika UL et al

in Hennig, J.; Stark, R. (Eds.) Abstractband Psychologie und Gehirn 2018 (2018)

Rationale: Cardiac arrest (CA) is a serious condition characterized by high mortality rates, even after initial successful resuscitation, mainly due to neurological damage. Whether brain-heart ... [more ▼]

Rationale: Cardiac arrest (CA) is a serious condition characterized by high mortality rates, even after initial successful resuscitation, mainly due to neurological damage. Whether brain-heart communication is associated with outcome after CA is unknown. Heartbeat-evoked brain potentials (HEPs) represent neurophysiological indicators of brain-heart communication, as they reflect cortical representation of interoceptive signal processing. The aim of this study was to address the association between HEPs and survival after CA. Methods: HEPs were calculated from resting EEG/ECG in 55 CA patients 24 h after resuscitation. All patients were treated with targeted temperature management and a standardized sedation protocol during assessment. We investigated the association between HEP amplitude (180{320 ms, 455{595 ms, 860{1000 ms) and 6-month survival. Results: Twenty-five of 55 patients (45%) were still alive at 6-month follow-up. Survivors showed a higher HEP amplitude at frontopolar and frontal electrodes in the late HEP interval than non-survivors. This effect remained significant after controlling for between-group differences in terms of age, Fentanyl dose, and time lag between resuscitation and EEG assessment. There were no group differences in heart rate or heart rate variability. Conclusion: Brain-heart communication, as re ected by HEPs, is associated with survival after CA. Cardiovascular autonomic arousal may not be involved in mediating this effect. Adequate cortical representation of interoceptive signals may be essential to preserve cariovascular health and should be in the focus of prevention strategies. Future studies should address the brain-heart axis in CA. [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detail3DBodyTex: Textured 3D Body Dataset
Saint, Alexandre Fabian A UL; Ahmed, Eman UL; Shabayek, Abd El Rahman UL et al

in 2018 Sixth International Conference on 3D Vision (3DV 2018) (2018)

In this paper, a dataset, named 3DBodyTex, of static 3D body scans with high-quality texture information is presented along with a fully automatic method for body model fitting to a 3D scan. 3D shape ... [more ▼]

In this paper, a dataset, named 3DBodyTex, of static 3D body scans with high-quality texture information is presented along with a fully automatic method for body model fitting to a 3D scan. 3D shape modelling is a fundamental area of computer vision that has a wide range of applications in the industry. It is becoming even more important as 3D sensing technologies are entering consumer devices such as smartphones. As the main output of these sensors is the 3D shape, many methods rely on this information alone. The 3D shape information is, however, very high dimensional and leads to models that must handle many degrees of freedom from limited information. Coupling texture and 3D shape alleviates this burden, as the texture of 3D objects is complementary to their shape. Unfortunately, high-quality texture content is lacking from commonly available datasets, and in particular in datasets of 3D body scans. The proposed 3DBodyTex dataset aims to fill this gap with hundreds of high-quality 3D body scans with high-resolution texture. Moreover, a novel fully automatic pipeline to fit a body model to a 3D scan is proposed. It includes a robust 3D landmark estimator that takes advantage of the high-resolution texture of 3DBodyTex. The pipeline is applied to the scans, and the results are reported and discussed, showcasing the diversity of the features in the dataset. [less ▲]

Detailed reference viewed: 889 (63 UL)
Full Text
Peer Reviewed
See detailCapturing Regional Variation with Distributed Place Representations and Geographic Retrofitting
Hovy, Dirk; Purschke, Christoph UL

in Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing (2018)

Detailed reference viewed: 93 (1 UL)
Full Text
Peer Reviewed
See detailDistributed C++-Python embedding for fast predictions and fast prototyping
Varisteas, Georgios UL; Avanesov, Tigran UL; State, Radu UL

in Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning (2018)

Python has evolved to become the most popular language for data science. It sports state-of-the-art libraries for analytics and machine learning, like Sci-Kit Learn. However, Python lacks the ... [more ▼]

Python has evolved to become the most popular language for data science. It sports state-of-the-art libraries for analytics and machine learning, like Sci-Kit Learn. However, Python lacks the computational performance that a industrial system requires for high frequency real time predictions. Building upon a year long research project heavily based on SciKit Learn (sklearn), we faced performance issues in deploying to production. Replacing sklearn with a better performing framework would require re-evaluating and tuning hyperparameters from scratch. Instead we developed a python embedding in a C++ based server application that increased performance by up to 20x, achieving linear scalability up to a point of convergence. Our implementation was done for mainstream cost effective hardware, which means we observed similar performance gains on small as well as large systems, from a laptop to an Amazon EC2 instance to a high-end server. [less ▲]

Detailed reference viewed: 104 (6 UL)
Full Text
Peer Reviewed
See detailA Verified Theorem Prover Backend Supported by a Monotonic Library
Rahli, Vincent UL; Cohen, Liron; Bickford, Mark

in LPAR 2018 (2018)

Detailed reference viewed: 100 (6 UL)
Full Text
Peer Reviewed
See detailSpace-Based Services Supporting Refugees: Legal Aspects
Hofmann, Mahulena UL; Aloisio, Gerome; Rinaldis, Loredana

in Masson-Zwaan, Tanja; Blount, Percy; Moro-Aguilar, Rafael (Eds.) et al Proceedings of the International Institute of Space Law (2018)

In the last years, Europe has experienced the greatest mass movement of people since the Second World War. The EU agreed upon different measures to support the refugees. Almost all these activities use ... [more ▼]

In the last years, Europe has experienced the greatest mass movement of people since the Second World War. The EU agreed upon different measures to support the refugees. Almost all these activities use data gained with the help of space-based technologies. The article deals with the legal basis of these data. [less ▲]

Detailed reference viewed: 55 (1 UL)
Full Text
Peer Reviewed
See detailConstrained bayesian active learning of linear classifier
Tsakmalis, Anestis UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2018)

In this paper, an on-line interactive method is proposed for learning a linear classifier. This problem is studied within the Active Learning (AL) framework where the learning algorithm sequentially ... [more ▼]

In this paper, an on-line interactive method is proposed for learning a linear classifier. This problem is studied within the Active Learning (AL) framework where the learning algorithm sequentially chooses unlabelled training samples and requests their class labels from an oracle in order to learn the classifier with the least queries to the oracle possible. Additionally' a constraint is introduced into this interactive learning process which limits the percentage of the samples from one “unwanted” class under a certain threshold. An optimal AL solution is derived and implemented with a sophisticated, accurate and fast Bayesian Learning method, the Expectation Propagation (EP) and its performance is demonstrated through numerical simulations. [less ▲]

Detailed reference viewed: 160 (50 UL)
Full Text
Peer Reviewed
See detailContext-aware and Attribute-based Access Control Applying Proactive Computing to IoT System
Picard, Noé UL; Colin, Jean-Noël; Zampunieris, Denis UL

in Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018) (2018)

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its ... [more ▼]

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its sensors connected to the real world, allowing for context-awareness. However, the ABAC model alone does not include proposals for implementing security policies based on verified and/or meaningful values rather than on raw data flowing from the sensors. Nor does it allow to implement immediate action on the system when some security flaw is detected, while this possibility technically exists if the system is equipped with actuators next to its sensors. We show how to circumvent these limitations by adding a proactive engine to the ABAC components, that runs rule-based scenarios devoted to sensor data pre-processing, to higher-level information storage in the PIP, and to real-time, automatic reaction on the system through its actuators when required. [less ▲]

Detailed reference viewed: 166 (8 UL)
Full Text
Peer Reviewed
See detailCross-Layer Forward Packet Scheduling for Emerging Precoded Broadband Multibeam Satellite System
Lagunas, Eva UL; Andrenacci, Stefano UL; Chatzinotas, Symeon UL et al

in 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 10-12 September 2018 (2018)

Detailed reference viewed: 105 (14 UL)
Full Text
Peer Reviewed
See detailRobust Online Obstacle Detection and Tracking for Collision-free Navigation of Multirotor UAVs in Complex Environments
Wang, Min UL; Voos, Holger UL; Su, Daobilige

in 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore 18-21 November 2018 (2018)

Object detection and tracking is a challenging task, especially for unmanned aerial robots in complex environments where both static and dynamic objects are present. It is, however, essential for ensuring ... [more ▼]

Object detection and tracking is a challenging task, especially for unmanned aerial robots in complex environments where both static and dynamic objects are present. It is, however, essential for ensuring safety of the robot during navigation in such environments. In this work we present a practical online approach which is based on a 2D LIDAR. Unlike common approaches in the literature of modeling the environment as 2D or 3D occupancy grids, our approach offers a fast and robust method to represent the objects in the environment in a compact form, which is significantly more efficient in terms of both memory and computation in comparison with the former. Our approach is also capable of classifying objects into categories such as static and dynamic, and tracking dynamic objects as well as estimating their velocities with reasonable accuracy. [less ▲]

Detailed reference viewed: 109 (30 UL)
Full Text
Peer Reviewed
See detailNo Random, No Ransom: A Key to Stop Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo ... [more ▼]

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo random number generators that modern Operating Systems make available to applications. With this insight, we propose a strategy to mitigate ransomware attacks that considers pseudo random number generator functions as critical resources, controls accesses on their APIs and stops unauthorized applications that call them. Our strategy, tested against 524 active real-world ransomware samples, stops 94% of them, including WannaCry, Locky, CryptoLocker and CryptoWall. Remarkably, it also nullifies NotPetya, the latest offspring of the family which so far has eluded all defenses. [less ▲]

Detailed reference viewed: 503 (27 UL)
Full Text
Peer Reviewed
See detailTagvisor: A privacy advisor for sharing hashtags
Zhang, Yang; Humbert, Mathias; Rahman, Tahleen et al

in Proceedings of The Web Conference 2018 (WWW'18) (2018)

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailEthics by Design: Necessity or Curse?
Dignum, Virginia; Baldoni, Matteo; Baroglio, Cristina et al

in Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society AIES 2018, New Orleans, LA, USA, February 02-03, 2018 (2018)

Ethics by Design concerns the methods, algorithms and tools needed to endow autonomous agents with the capability to reason about the ethical aspects of their decisions, and the methods, tools and ... [more ▼]

Ethics by Design concerns the methods, algorithms and tools needed to endow autonomous agents with the capability to reason about the ethical aspects of their decisions, and the methods, tools and formalisms to guarantee that an agent's behavior remains within given moral bounds. In this context some questions arise: How and to what extent can agents understand the social reality in which they operate, and the other intelligences (AI, animals and humans) with which they co-exist? What are the ethical concerns in the emerging new forms of society, and how do we ensure the human dimension is upheld in interactions and decisions by autonomous agents?. But overall, the central question is: "Can we, and should we, build ethically-aware agents?" This paper presents initial conclusions from the thematic day of the same name held at PRIMA2017, on October 2017. [less ▲]

Detailed reference viewed: 92 (1 UL)
Full Text
Peer Reviewed
See detail2018 25th International Conference on Telecommunications (ICT)
Lagunas, Eva UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 25th International Conference on Telecommunications (ICT) (2018)

The anticipated exponential growth in network traffic is posing significant challenges for the implementation of 5G networks. In this context, a major problem is the backhaul network which acts as a ... [more ▼]

The anticipated exponential growth in network traffic is posing significant challenges for the implementation of 5G networks. In this context, a major problem is the backhaul network which acts as a bottleneck preventing the efficient flow of ultra-dense and heavy traffic between the end users and the core network. Spectrum scarcity has emerged as the primary problem encountered when trying to accommodate the traffic upsurge. In this paper, we investigate the carrier allocation problem in the context of Integrated Satellite-Terrestrial Backhaul (ISTB) networks. In particular, we consider the satellite component to be integrated with the conventional terrestrial wireless backhaul network thus providing evident benefits in terms of data-offloading. To enhance the overall spectral efficiency of the proposed network, we consider that both terrestrial and satellite segments operate in the Ka band, where the sharing between terrestrial microwave links and satellite communications is already allowed. A novel carrier allocation algorithm based on fairness is proposed, which ensures that all backhaul links are continuously active to satisfy the operator's coverage needs. The problem is NP-hard by definition. As a consequence, we present a two-step sequential carrier allocation strategy specifically tailored to tackle the interference issues emerging from the spectral co-existence. Supporting results based on numerical simulations show that the proposed carrier allocation can provide a 2x improvement in terms of spectral efficiency when compared to benchmark terrestrial-only backhaul networks. [less ▲]

Detailed reference viewed: 56 (6 UL)
Full Text
Peer Reviewed
See detailBuilding Jiminy Cricket: An Architecture for Moral Agreements Among Stakeholders
Liao, Beishui; Slavkovik, Marija; van der Torre, Leon UL

in AAAI/ACM Artificial Intelligence, Ethics and Society (2018)

An autonomous system is constructed by a manufacturer, operates in a society subject to norms and laws, and is interacting with end-users. We address the challenge of how the moral values and views of all ... [more ▼]

An autonomous system is constructed by a manufacturer, operates in a society subject to norms and laws, and is interacting with end-users. We address the challenge of how the moral values and views of all stakeholders can be integrated and reflected in the moral behaviour of the autonomous system. We propose an artificial moral agent architecture that uses techniques from normative systems and formal argumentation to reach moral agreements among stakeholders. We show how our architecture can be used not only for ethical practical reasoning and collaborative decision-making, but also for the explanation of such moral behavior. [less ▲]

Detailed reference viewed: 37 (7 UL)
Full Text
Peer Reviewed
See detailReversing social gradient: Impact of patients’ communication with their practitioners on adherence to preventive behaviours
Baumann, Michèle UL; Bucki, Barbara; Tchicaya, Anastase et al

in "Health Psychology across the Lifespan: Uniting Research, Practice and Policy” (2018)

Good communication with a physician has positive effects on the patients’ adopting preventive behaviours. Knowing social inequalities in health, we aimed at analysing in what extent financial situation ... [more ▼]

Good communication with a physician has positive effects on the patients’ adopting preventive behaviours. Knowing social inequalities in health, we aimed at analysing in what extent financial situation influences the associations between quality of communication and improved secondary preventive behaviours and limited risk factors - in cardiovascular diseases: hypertension, overweight, obesity, hypercholesterolemia, diabetes. Methods: 1,289 patients who underwent a coronary angiography in Luxembourg completed a self-administered questionnaire in 2008/09 and 2013/14. The association between improving each preventive eating behaviour (decrease of salt, sugar, fat consumption; increase of fruits/vegetables) and the quality of physician-patient communication (5-items scale) was evaluated using logistic regression models. Perceived financial situation (difficult, easy, and very easy) was introduced in interaction with the communication score. Findings: Patients declared in a difficult or easy financial situation had a higher probability of decreasing their salt intake when physician-patient communication quality was higher (OR [95% CI] respectively: 1.139 [1.045; 1.240], 1.105 [1.032; 1.182]). The pattern was similar for increased consumption of fruits/vegetables in patients with hypertension, diabetes, overweight and hypercholesterolemia. Reduced sugar consumption was associated with communication quality in hypercholesterolemia patients in financial difficulty (OR [95% CI]: 1.095 [1.009; 1.189]). Discussion: The quality of communication has a higher impact on adopting healthy behaviours in patients declaring themselves in financial difficulty. These findings raise awareness on the importance, in patients with perceived financial difficulties, of physician-patient quality to improve adherence to the secondary preventive recommendations. Across the lifespan, it highlights the role of physicians in reversing their patients’ social gradient. [less ▲]

Detailed reference viewed: 92 (6 UL)
Full Text
Peer Reviewed
See detailUser Selection for symbol-level multigroup multicasting precoding in the downlink of MISO channels
Alodeh, Maha UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 IEEE International Conference on Communications (ICC) (2018)

We consider the problem of user selection for symbol-level multigroup multicasting in the downlink of multiuser MISO systems. Symbol-level precoding is a new paradigm for multiuser multiple-antenna ... [more ▼]

We consider the problem of user selection for symbol-level multigroup multicasting in the downlink of multiuser MISO systems. Symbol-level precoding is a new paradigm for multiuser multiple-antenna downlink systems which aims at creating constructive interference among the simultaneous data streams. This can be enabled by designing the precoded signal of the multiantenna transmitter on a symbol level, taking into account both channel state information and data symbols. This work proposes a user selection algorithm to facilitate serving multiple groups of users, by transmitting a stream of common symbols to each group on symbol-by-symbol basis if we have large number of users. We provide numerical results to validate the proposed algorithm. [less ▲]

Detailed reference viewed: 88 (12 UL)
Full Text
Peer Reviewed
See detailL-CMP: an automatic learning-based parameterized verification tool
Cao, Jialun; Li, Yongjian; Pang, Jun UL

in Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (2018)

Detailed reference viewed: 77 (1 UL)
Full Text
Peer Reviewed
See detailEvolutionary Algorithms for Convolutional Neural Network Visualisation
Bernard, Nicolas UL; Leprévost, Franck UL

in Meneses, Esteban; Castro, Harold; Barrios Hernández, Carlos Jaime (Eds.) et al High Performance Computing -- 5th Latin American Conference, CARLA 2018, Piedecuesta, Colombia (2018)

Deep Learning is based on deep neural networks trained over huge sets of examples. It enabled computers to compete with ---~or even outperform~--- humans at many tasks, from playing Go to driving ... [more ▼]

Deep Learning is based on deep neural networks trained over huge sets of examples. It enabled computers to compete with ---~or even outperform~--- humans at many tasks, from playing Go to driving vehicules. Still, it remains hard to understand how these networks actually operate. While an observer sees any individual local behaviour, he gets little insight about their global decision-making process. However, there is a class of neural networks widely used for image processing, convolutional networks, where each layer contains features working in parallel. By their structure, these features keep some spatial information across a network's layers. Visualisation of this spatial information at different locations in a network, notably on input data that maximise the activation of a given feature, can give insights on the way the model works. This paper investigates the use of Evolutionary Algorithms to evolve such input images that maximise feature activation. Compared with some pre-existing approaches, ours seems currently computationally heavier but with a wider applicability. [less ▲]

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailA Deontic Logic Reasoning Infrastructure
Benzmüller, Christoph UL; Parent, Xavier UL; van der Torre, Leon UL

in Sailing Routes in the World of Computation, 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedings (2018)

A flexible infrastructure for the automation of deontic and normative reasoning is presented. Our motivation is the development, study and provision of legal and moral reasoning competencies in future ... [more ▼]

A flexible infrastructure for the automation of deontic and normative reasoning is presented. Our motivation is the development, study and provision of legal and moral reasoning competencies in future intelligent machines. Since there is no consensus on the “best” deontic logic formalisms and since the answer may be application specific, a flexible infrastructure is proposed in which candidate logic formalisms can be varied, assessed and compared in experimental ethics application studies. Our work thus links the historically rich research areas of classical higher-order logic, deontic logics, normative reasoning and formal ethics. [less ▲]

Detailed reference viewed: 135 (4 UL)
Full Text
Peer Reviewed
See detailOFDM-based automotive joint radar-communication system
Dokhanchi, Sayed Hossein UL; Shankar, Bhavani UL; Stifter, Thomas et al

in 2018 IEEE Radar Conference (RadarConf18) (2018)

We propose a novel automotive joint radar-communication (JRC) system, where the system first transmits OFDM sub-carriers for radar processing followed by sub-carriers enabling radar and communication ... [more ▼]

We propose a novel automotive joint radar-communication (JRC) system, where the system first transmits OFDM sub-carriers for radar processing followed by sub-carriers enabling radar and communication functionalities. The receiver processing includes iterative estimation of parameters to alleviate the shortage of samples to estimate range. The receiver first estimates the target parameters from the sub-carriers dedicated to radar; these parameters then determine the channel for the communication link. The communication data is then extracted, thereby enabling the use of all the carriers for improving the range estimation. It is shown that the range estimation improves significantly after efficient use of all the sub-carriers. Furthermore, for radar parameter estimation, we propose an effective iterative method based on alternating least square (ALS) to recover the angle of arrival (AoA), Doppler and Range. Numerical results demonstrate the feasibility of our proposed system. [less ▲]

Detailed reference viewed: 127 (10 UL)
Full Text
Peer Reviewed
See detailSelf-Improving System Integration – Status and Challenges After Five Years of SISSY
Bellman, Kirstie; Botev, Jean UL; Diaconescu, Ada et al

in Proceedings of the 12th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (2018)

Detailed reference viewed: 31 (3 UL)
Full Text
See detailPlaidoyer pour le maintien d’une Cour constitutionnelle (le cas échéant) réformée
Kinsch, Patrick UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour constitutionnelle : Trop jeune pour mourir ? (2018)

Detailed reference viewed: 56 (6 UL)
Full Text
Peer Reviewed
See detailNext Generation Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the Secure IT Systems (2018)

We are assisting at an evolution in the ecosystem of cryptoware - the malware that encrypts files and makes them unavailable unless the victim pays up. New variants are taking the place once dominated by ... [more ▼]

We are assisting at an evolution in the ecosystem of cryptoware - the malware that encrypts files and makes them unavailable unless the victim pays up. New variants are taking the place once dominated by older versions; incident reports suggest that forthcoming ransomware will be more sophisticated, disruptive, and targeted. Can we anticipate how such future generations of ransomware will work in order to start planning on how to stop them? We argue that among them there will be some which will try to defeat current anti-ransomware; thus, we can speculate over their working principle by studying the weak points in the strategies that seven of the most advanced anti-ransomware are currently implementing. We support our speculations with experiments, proving at the same time that those weak points are in fact vulnerabilities and that the future ransomware that we have imagined can be effective. [less ▲]

Detailed reference viewed: 161 (12 UL)
Full Text
Peer Reviewed
See detailZwentibold, roi (895-900) et Gislebert, duc (928-939) du royaume de Lothaire. Pouvoir et légitimation, histoire et mémoire
Margue, Michel UL

in Margue, Michel; Pettiau, Hérold (Eds.) La Lotharingie en question. Identités, oppositions, intégration. Lotharingische Identitäten im Spannungsfeld zwischen integrativen und partikularen Kräften. Actes des 14es Journées Lotharingiennes (2018)

Detailed reference viewed: 19 (0 UL)