References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailExtracting Statistical Graph Features for Accurate and Efficient Time Series Classification
Li, Daoyuan UL; Lin, Jessica; Bissyande, Tegawendé François D Assise UL et al

in 21st International Conference on Extending Database Technology (2018, March)

This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to ... [more ▼]

This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to find global similarities in time series databases (eg., Nearest Neighbor with Dynamic Time Warping distance) or methods specializing in locating local patterns/subsequences (eg., shapelets), we extract solely statistical features from graphs that are generated from time series. Specifically, we augment time series by means of their multiscale approximations, which are further transformed into a set of visibility graphs. After extracting probability distributions of small motifs, density, assortativity, etc., these features are used for building highly accurate classification models using generic classifiers (eg., Support Vector Machine and eXtreme Gradient Boosting). Thanks to the way how we transform time series into graphs and extract features from them, we are able to capture both global and local features from time series. Based on extensive experiments on a large number of open datasets and comparison with five state-of-the-art TSC algorithms, our approach is shown to be both accurate and efficient: it is more accurate than Learning Shapelets and at the same time faster than Fast Shapelets. [less ▲]

Detailed reference viewed: 499 (12 UL)
Full Text
See detailRetrouver le rapport à l’histoire et à l’Europe
Poirier, Philippe UL; Hartog, François

in Herzog, Philippe (Ed.) Europe 21 (2018, February 28)

L’Europe n’a de sens et de fondement que si les gens peuvent acquérir une conscience commune, former des projets communs, générer un affectio societatis. Ce n’est pas le cas aujourd’hui. Nous voulons donc ... [more ▼]

L’Europe n’a de sens et de fondement que si les gens peuvent acquérir une conscience commune, former des projets communs, générer un affectio societatis. Ce n’est pas le cas aujourd’hui. Nous voulons donc mettre la culture au cœur de l’espace public européen, au cœur de chaque action, et pour cela faire appel à toutes les sources d’inspiration en conjuguant foi et raison. La formation d’acteurs de la société civile capables de mettre les populations en relation et de porter des projets par-delà les frontières est essentielle. Ceci exige de dépasser les barrières nationales, psychiques et institutionnelles, et implique une culture de l’altérité afin que l’Europe puisse répondre positivement aux défis internes et externes de la mondialisation [less ▲]

Detailed reference viewed: 49 (0 UL)
Full Text
Peer Reviewed
See detailIMPROVING THE CAPACITY OF VERY DEEP NETWORKS WITH MAXOUT UNITS
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (2018, February 21)

Deep neural networks inherently have large representational power for approximating complex target functions. However, models based on rectified linear units can suffer reduction in representation ... [more ▼]

Deep neural networks inherently have large representational power for approximating complex target functions. However, models based on rectified linear units can suffer reduction in representation capacity due to dead units. Moreover, approximating very deep networks trained with dropout at test time can be more inexact due to the several layers of non-linearities. To address the aforementioned problems, we propose to learn the activation functions of hidden units for very deep networks via maxout. However, maxout units increase the model parameters, and therefore model may suffer from overfitting; we alleviate this problem by employing elastic net regularization. In this paper, we propose very deep networks with maxout units and elastic net regularization and show that the features learned are quite linearly separable. We perform extensive experiments and reach state-of-the-art results on the USPS and MNIST datasets. Particularly, we reach an error rate of 2.19% on the USPS dataset, surpassing the human performance error rate of 2.5% and all previously reported results, including those that employed training data augmentation. On the MNIST dataset, we reach an error rate of 0.36% which is competitive with the state-of-the-art results. [less ▲]

Detailed reference viewed: 230 (25 UL)
Full Text
Peer Reviewed
See detailDiluting the Scalability Boundaries: Exploring the Use of Disaggregated Architectures for High-Level Network Data Analysis
Vega Moreno, Carlos Gonzalo UL; Zazo, José Fernando; Meyer, Hugo et al

in Vega Moreno, Carlos Gonzalo (Ed.) 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (2018, February 15)

Traditional data centers are designed with a rigid architecture of fit-for-purpose servers that provision resources beyond the average workload in order to deal with occasional peaks of data ... [more ▼]

Traditional data centers are designed with a rigid architecture of fit-for-purpose servers that provision resources beyond the average workload in order to deal with occasional peaks of data. Heterogeneous data centers are pushing towards more cost-efficient architectures with better resource provisioning. In this paper we study the feasibility of using disaggregated architectures for intensive data applications, in contrast to the monolithic approach of server-oriented architectures. Particularly, we have tested a proactive network analysis system in which the workload demands are highly variable. In the context of the dReDBox disaggregated architecture, the results show that the overhead caused by using remote memory resources is significant, between 66% and 80%, but we have also observed that the memory usage is one order of magnitude higher for the stress case with respect to average workloads. Therefore, dimensioning memory for the worst case in conventional systems will result in a notable waste of resources. Finally, we found that, for the selected use case, parallelism is limited by memory. Therefore, using a disaggregated architecture will allow for increased parallelism, which, at the same time, will mitigate the overhead caused by remote memory. [less ▲]

Detailed reference viewed: 74 (2 UL)
Peer Reviewed
See detailCooperative sensing delay minimization in cloud-assisted DSA networks
Sharma, Shree Krishna UL; Wang, Xianbin

in Proc. IEEE PIMRC 2017 (2018, February 15)

Dynamic Spectrum Access (DSA) is considered as a promising solution to address the problem of spectrum scarcity in future wireless networks. However, the main challenges associated with this approach are ... [more ▼]

Dynamic Spectrum Access (DSA) is considered as a promising solution to address the problem of spectrum scarcity in future wireless networks. However, the main challenges associated with this approach are to acquire accurate spectrum usage information in a timely manner and to deal with the dynamicity of channel occupancy. Although Cooperative Sensing (CS) can provide significant advantages over individual device-level sensing in terms of sensing efficiency and the achievable throughput, the acquired channel occupancy information may become outdated in dynamic channel conditions due to the involved latency. In this regard, we propose to utilize a collaborative cloud-edge processing framework to minimize the CS delay in DSA networks. In this framework, the cloud-center can estimate channel occupancy parameters such as duty cycle based on the available historical sensing data by using a suitable spectrum prediction technique, and subsequently this prior knowledge can be utilized to adapt the sensing mechanism employed at the edge-side of a DSA network. Motivated by this, we formulate and solve the problem of minimizing CS delay in cloud-assisted DSA networks. A two-stage bisection search method is employed to solve this CS delay minimization problem. Our results show that the proposed cloud-assisted CS scheme can significantly reduce the CS delay in DSA networks. [less ▲]

Detailed reference viewed: 79 (4 UL)
Full Text
Peer Reviewed
See detailInsights on the Performance and Configuration of AVB and TSN in Automotive Ethernet Networks
Migge, Jörn; Villanueva, Josetxo; Navet, Nicolas UL et al

in Proc. Embedded Real-Time Software and Systems (ERTS 2018) (2018, February 02)

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of ... [more ▼]

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In this work, the basic questions that we investigate on a case-study with diverse and demanding communication requirements is what can we expect from the various protocols aimed at providing a better timing Quality of Service on top of Ethernet? And how to use them? Especially how to use them in a combined manner. We will focus on the Credit-Based Shaper of AVB, the Time-Aware Shaper of TSN and the use of priorities as defined in IEEE802.1Q. The performance metrics considered are the distributions of the communication latencies, obtained by simulation, as well as upper bounds on these quantities obtained by worst-case schedulability analysis. If there have been over the last 5 years numerous studies on the performance of AVB CBS, the literature on comparing AVB to TSN and other candidate protocols is still sparse. To the best of our knowledge, this empirical study is the first to consider most protocols currently considered in the automotive domain, with the aim to gain insights into the different technological, design and configurations alternatives. In particular, an objective of this study is to identify key problems that need to be solved in order to further automate network design and configuration. [less ▲]

Detailed reference viewed: 404 (16 UL)
Full Text
Peer Reviewed
See detailSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Fejoz, Loïc; Regnier, Bruno; Miramont, Philippe et al

in Proc. Embedded Real-Time Software and Systems (ERTS 2018) (2018, February 02)

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise ... [more ▼]

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise understanding of TTE’s functioning and its performances in nominal and error conditions. This holds especially true for the clock synchronization algorithm, the cornerstone of time-triggered communication in TTE, which involves complex distributed algorithms. In this study, we use both an experimental platform and fault-injection on a simulation model to gain quantified insights in these questions. We first describe a fine-grained simulation model of TTE model and discuss how it has been validated against communication traces recorded on the TTE platform. We then present experiments that evaluate the accuracy of the clock synchronization in TTE in the fault-free case as well as considering permanent link failure and transient transmission errors. Finally, we discuss what we have learned during the project in terms of development process and programming language support for complex simulation models used in the design of critical systems. [less ▲]

Detailed reference viewed: 121 (11 UL)
Full Text
Peer Reviewed
See detailOptimal First-Order Boolean Masking for Embedded IoT Devices
Biryukov, Alex UL; Dinu, Dumitru-Daniel UL; Le Corre, Yann UL et al

in CARDIS 2017: Smart Card Research and Advanced Applications (2018, January 26)

Boolean masking is an effective side-channel countermeasure that consists in splitting each sensitive variable into two or more shares which are carefully manipulated to avoid leakage of the sensitive ... [more ▼]

Boolean masking is an effective side-channel countermeasure that consists in splitting each sensitive variable into two or more shares which are carefully manipulated to avoid leakage of the sensitive variable. The best known expressions for Boolean masking of bitwise operations are relatively compact, but even a small improvement of these expressions can significantly reduce the performance penalty of more complex masked operations such as modular addition on Boolean shares or of masked ciphers. In this paper, we present and evaluate new secure expressions for performing bitwise operations on Boolean shares. To this end, we describe an algorithm for efficient search of expressions that have an optimal cost in number of elementary operations. We show that bitwise AND and OR on Boolean shares can be performed using less instructions than the best known expressions. More importantly, our expressions do no require additional random values as the best known expressions do. We apply our new expressions to the masked addition/subtraction on Boolean shares based on the Kogge-Stone adder and we report an improvement of the execution time between 14% and 19%. Then, we compare the efficiency of first-order masked implementations of three lightweight block ciphers on an ARM Cortex-M3 to determine which design strategies are most suitable for efficient masking. All our masked implementations passed the t-test evaluation and thus are deemed secure against first-order side-channel attacks. [less ▲]

Detailed reference viewed: 166 (7 UL)
Full Text
Peer Reviewed
See detailNon-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling
Charlier, Jérémy Henri J. UL; State, Radu UL; Hilger, Jean

in Charlier, Jeremy; State, Radu; Hilger, Jean (Eds.) 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (2018, January)

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and ... [more ▼]

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and transaction costs reduction. The Ethereum Virtual Machine performs smart contracts runs, where the execution of each contract is limited to the amount of gas required to execute the operations described in the code. Each gas unit must be paid using Ether, the crypto-currency of the platform. Due to smart contracts interactions evolving over time, analyzing the behavior of smart contracts is very challenging. We address this challenge in our paper. We develop for this purpose an innovative approach based on the nonnegative tensor decomposition PARATUCK2 combined with long short-term memory (LSTM) to assess if predictive analysis can forecast smart contracts interactions over time. To validate our methodology, we report results for two use cases. The main use case is related to analyzing smart contracts and allows shedding some light into the complex interactions among smart contracts. In order to show the generality of our method on other use cases, we also report its performance on video on demand recommendation. [less ▲]

Detailed reference viewed: 220 (23 UL)
Full Text
Peer Reviewed
See detailMesurer les croyances des enseignants du préscolaire à propos des mathématiques
Vlassis, Joëlle UL; Dierendonck, Christophe UL; Tinnes, Mélanie UL et al

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 54 (6 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (2018, January)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 222 (6 UL)
Full Text
Peer Reviewed
See detailDéveloppement d’un test de compétences numériques précoces destiné à mesurer les effets d’une intervention mise en place auprès d’élèves de 4 à 6 ans
de Chambrier, Anne-Françoise; Vlassis, Joëlle UL; Fagnant, Annick et al

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 67 (8 UL)
Full Text
Peer Reviewed
See detailLatency Minimization in Wireless IoT Using Prioritized Channel Access and Data Aggregation
Bhandari, Sabin; Sharma, Shree Krishna UL; Wang, Xianbin

in Proc. IEEE Global Communications (GLOBECOM) Conf. 2018 (2018, January)

Future Internet of Things (IoT) networks are expected to support a massive number of heterogeneous devices/sensors in diverse applications ranging from eHealthcare to industrial control systems. In highly ... [more ▼]

Future Internet of Things (IoT) networks are expected to support a massive number of heterogeneous devices/sensors in diverse applications ranging from eHealthcare to industrial control systems. In highly-dense deployment scenarios such as industrial IoT systems, providing reliable communication links with low-latency becomes challenging due to the involved system delay including data acquisition and processing latencies at the edge-side of IoT networks. In this regard, this paper proposes a priority-based channel access and data aggregation scheme at the Cluster Head (CH) to reduce channel access and queuing delays in a clustered industrial IoT network. First, a prioritized channel access mechanism is developed by assigning different Medium Access Control (MAC) layer attributes to the packets coming from two types of IoT nodes, namely, high-priority and low-priority nodes, based on the application-specific information provided from the cloud-center. Subsequently, a preemptive M/G/1 queuing model is employed by using separate low-priority and high- priority queues before sending aggregated data to the Cloud. Our results show that the proposed priority-based method significantly improves the system latency and reliability as compared to the non-prioritized scheme. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailBesoins des apprenants en matière de pensée algébrique et connaissances pour enseigner cette pensée : évaluation diagnostique des acquis des enseignants à la transition école-collège
Demonty, Isabelle; Vlassis, Joëlle UL; Fagnant, Annick

in Demeuse, Marc; Milmeister, Marianne; Weis, Christiane (Eds.) L'évaluation en éducation et en formation face aux transformations des sociétés contemporaines. Actes du 30e colloque de l'Admée-Europe (2018, January)

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailPERSEUS: A Personalization Framework for Sentiment Categorization with Recurrent Neural Network
Guo, Siwen UL; Höhn, Sviatlana; Xu, Feiyu et al

in International Conference on Agents and Artificial Intelligence , Funchal 16-18 January 2018 (2018, January)

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between ... [more ▼]

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between individuals and certain consistency in each individual is the cornerstone of the framework. We focus on relations between documents for user-sensitive predictions. Individual’s lexical choices act as indicators for individuality, thus we use a concept-based system which utilizes neural networks to embed concepts and associated topics in text. Furthermore, a recurrent neural network is used to memorize the history of user’s opinions, to discover user-topic dependence, and to detect implicit relations between users. PERSEUS also offers a solution for data sparsity. At the first stage, we show the benefit of inquiring a user-specified system. Improvements in performance experimented on a combined Twitter dataset are shown over generalized models. PERSEUS can be used in addition to such generalized systems to enhance the understanding of user’s opinions. [less ▲]

Detailed reference viewed: 382 (94 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 276 (25 UL)
Full Text
Peer Reviewed
See detailPRESENCE: Toward a Novel Approach for Performance Evaluation of Mobile Cloud SaaS Web Services
Ibrahim, Abdallah Ali Zainelabden Abdallah UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in Proc. of the 32nd IEEE Intl. Conf. on Information Networking (ICOIN 2018) (2018, January)

Detailed reference viewed: 101 (3 UL)
Full Text
Peer Reviewed
See detailRepresentation Equivalences among Argumentation Frameworks
Liao, Beishui; van der Torre, Leon UL

in Computational Models of Argument (2018)

In Dung’s abstract argumentation theory, an extension can be represented by subsets of it in the sense that from each of these subsets, the extension can be obtained again by iteratively applying the ... [more ▼]

In Dung’s abstract argumentation theory, an extension can be represented by subsets of it in the sense that from each of these subsets, the extension can be obtained again by iteratively applying the characteristic function. Such so-called regular representations can be used to differentiate argumentation frameworks having the same extensions. In this paper we provide a full characterization of relations between seven different types of representation equivalence. [less ▲]

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailDeformation theory of Lie bialgebra properads
Merkulov, Sergei UL; Willwacher, Thomas

in Geometry and Physics: A Festschrift in honour of Nigel Hitchin (2018)

We compute the homotopy derivations of the properads governing even and odd Lie bialgebras as well as involutive Lie bialgebras. The answer may be expressed in terms of the Kontsevich graph complexes. In ... [more ▼]

We compute the homotopy derivations of the properads governing even and odd Lie bialgebras as well as involutive Lie bialgebras. The answer may be expressed in terms of the Kontsevich graph complexes. In particular, this shows that the Grothendieck-Teichm\"uller group acts faithfully (and essentially transitively) on the completions of the properads governing even Lie bialgebras and involutive Lie bialgebras, up to homotopy. This shows also that by contrast to the even case the properad governing odd Lie bialgebras admits precisely one non-trivial automorphism --- the standard rescaling automorphism, and that it has precisely one non-trivial deformation which we describe explicitly. [less ▲]

Detailed reference viewed: 186 (10 UL)
Full Text
Peer Reviewed
See detailAbstract and Concrete Decision Graphs for Choosing Extensions of Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL; van der Torre, Leon UL

in Computational Models of Argument (2018)

Most argumentation semantics allow for multiple extensions, which raises the question of how to choose among extensions. We propose to study this question as a decision problem. Inspired by decision trees ... [more ▼]

Most argumentation semantics allow for multiple extensions, which raises the question of how to choose among extensions. We propose to study this question as a decision problem. Inspired by decision trees commonly used in economics, we introduce the notion of a decision graph for deciding between the multiple extensions of a given AF in a given semantics. We distinguish between abstract decision graphs and concrete instantiations thereof. Inspired by the principle-based approach to argumentation, we formulate two principles that mappings from argumentation frameworks to decision graphs should satisfy, the principles of decision-graph directionality and that of directional decision-making. We then propose a concrete instantiation of decision graphs, which satisfies one of these principles. Finally, we discuss the potential for further research based on this novel methodology. [less ▲]

Detailed reference viewed: 108 (16 UL)
Full Text
See detailUne cour constitutionnelle différente des autres. Etendue, raisons & avenir de l'originalité de la Cour constitutionnelle luxembourgeoise
Heuschling, Luc UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: trop jeune pour mourir? (2018)

Detailed reference viewed: 387 (38 UL)
See detailSeeing People: Using Satellites for the Benefit of All
Blount, Percy UL

in Blount, Percy; Rafael, Moro-Aguilar; Tanja, Masson-Zwaan (Eds.) et al Procedings of the International Institute of Space Law 2017 (2018)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailLink Adaptation and CSI Detection Errors in Multibeam Satellite Systems with Linear Precoding
Tato, Anxo; Andrenacci, Stefano UL; Chatzinotas, Symeon UL et al

in 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC) (2018)

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High ... [more ▼]

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High Throughput Satellites (HTS). However, although some previous works about precoding consider imperfect CSIT (Chanel State Information at the Transmitter) adding some CSI estimation errors, that is not the main cause of CSI degradation. In practice, receivers can only detect and estimate a few coefficients of the CSI vector being the other nullified, replaced by zeros. This introduces errors in the SINR calculation by the gateway that lead to the assignment of Modulation and Coding Schemes (MCS) over the decoding possibilities of the users, increasing the rate of erroneous frames. In this work, the errors in the SINR calculation caused by the nullification of the CSI are analyzing statistically and geographically using a radiation diagram of 245 beams over Europe. Furthermore, a solution based on a link adaptation algorithm with a per user adaptive margin is proposed, helping to achieve the QEF (Quasi-error Free) target of DVB-S2X systems. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailUne approche particulière du dialogue des juges au sein de l'espace économique européen
Neframi, Eleftheria UL; Lacchi, Clelia UL

in Monjal, Pierre Yves (Ed.) Une approche particulière du dialogue des juges au sein de l'espace économique européen (2018)

Detailed reference viewed: 157 (16 UL)
Full Text
Peer Reviewed
See detailSecurity Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Advances in Cybersecurity 2018 (2018)

To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to ... [more ▼]

To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding the advantages and disadvantages of each method is essential to develop robust defense strategies. In this paper we explain the techniques used by ransomware to derive encryption keys and analyze the security of each approach. We argue that recovery of data might be possible if the ransomware cannot access high entropy randomness sources. As an evidence to support our theoretical results, we provide a decryptor program for a previously undefeated ransomware. [less ▲]

Detailed reference viewed: 197 (13 UL)
Full Text
Peer Reviewed
See detailLate heartbeat-evoked potentials, indicators of cortical representation of interoceptive signal processing, are associated with survival after cardiac arrest
Schulz, André UL; Stammet, Pascal; Dierolf, Angelika UL et al

in Hennig, J.; Stark, R. (Eds.) Abstractband Psychologie und Gehirn 2018 (2018)

Rationale: Cardiac arrest (CA) is a serious condition characterized by high mortality rates, even after initial successful resuscitation, mainly due to neurological damage. Whether brain-heart ... [more ▼]

Rationale: Cardiac arrest (CA) is a serious condition characterized by high mortality rates, even after initial successful resuscitation, mainly due to neurological damage. Whether brain-heart communication is associated with outcome after CA is unknown. Heartbeat-evoked brain potentials (HEPs) represent neurophysiological indicators of brain-heart communication, as they reflect cortical representation of interoceptive signal processing. The aim of this study was to address the association between HEPs and survival after CA. Methods: HEPs were calculated from resting EEG/ECG in 55 CA patients 24 h after resuscitation. All patients were treated with targeted temperature management and a standardized sedation protocol during assessment. We investigated the association between HEP amplitude (180{320 ms, 455{595 ms, 860{1000 ms) and 6-month survival. Results: Twenty-five of 55 patients (45%) were still alive at 6-month follow-up. Survivors showed a higher HEP amplitude at frontopolar and frontal electrodes in the late HEP interval than non-survivors. This effect remained significant after controlling for between-group differences in terms of age, Fentanyl dose, and time lag between resuscitation and EEG assessment. There were no group differences in heart rate or heart rate variability. Conclusion: Brain-heart communication, as re ected by HEPs, is associated with survival after CA. Cardiovascular autonomic arousal may not be involved in mediating this effect. Adequate cortical representation of interoceptive signals may be essential to preserve cariovascular health and should be in the focus of prevention strategies. Future studies should address the brain-heart axis in CA. [less ▲]

Detailed reference viewed: 45 (1 UL)
Full Text
Peer Reviewed
See detailIs A Vertical Flow Constructed Wetland A Suitable Polishing Treatment For Micropollutant Removal In Medium-sized WWTPs? A Case Of Study
Venditti, Silvia UL; Hansen, Joachim UL

in 16th IWA Wetland System for Water Pollution Control, ICWS2018 (2018)

Detailed reference viewed: 38 (3 UL)
Full Text
Peer Reviewed
See detailMultigroup Multicast Beamforming and Antenna Selection with Rate-Splitting in Multicell Systems
Tervo, Oskari; Trant, Le-Nam; Chatzinotas, Symeon UL et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

This paper studies energy-efficient joint coordinated beamforming and antenna selection in multi-cell multi-user multigroup multicast multiple-input single-output systems. We focus on interference-limited ... [more ▼]

This paper studies energy-efficient joint coordinated beamforming and antenna selection in multi-cell multi-user multigroup multicast multiple-input single-output systems. We focus on interference-limited scenarios, e.g., when the number of radio frequency (RF) chains is of the same order as the number of multicasting groups. To tackle the interference, we exploit rate-splitting to divide the group messages into common and group-specific sub-messages. We propose a per-cell rate-splitting approach, where the common message is locally designed to be decoded by the in-cell users, while treated as noise by the out-cell users. We consider the case where the number of RF chains is smaller than that of antennas, and consider a switching architecture, that is, the antenna selection is employed to choose the best antennas for transmission. Numerical results illustrate the potential of the proposed approach to significantly improve the energy efficiency in the interference-limited regime. [less ▲]

Detailed reference viewed: 76 (0 UL)
Full Text
Peer Reviewed
See detailMulticarrier phase modulated continuous waveform for automotive joint radar-communication system
Dokhanchi, Sayed Hossein; Shankar, Bhavani UL; Stifter, Thomas Stifter et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

Automotive radar implementation in the mm Wave band (79 G Hz) is being increasingly considered for the high bandwidths offered. While the radar systems and technology is maturing in mm Wave bands, the ... [more ▼]

Automotive radar implementation in the mm Wave band (79 G Hz) is being increasingly considered for the high bandwidths offered. While the radar systems and technology is maturing in mm Wave bands, the reuse of radar spectrum for low latency, limited throughput and safety critical communication has started to receive attention of late. Towards this, a joint radar-communication (JRC) system is proposed where the platform performs sensing and communication operations. The major challenge in JRC waveform design is the lack of degrees of freedom (DoF), due to need to estimate communication symbols in addition to the radar parameters. In this work, we propose a novel automotive JRC system based on multicarrier phase-modulated continuous waveform (MC-PMCW). MC-PMCW provides sufficient DoF to confine desired parameters, i.e., angles of arrival, Doppler shifts, ranges, and communication symbols in different dimensions. It can overcome the limitations of conventional PMCW and OFDM waveforms by leveraging the multicarrier feature of OFDM and the code sequence of PMCW to embed radar and communication. Further, the separation of parameters into different domains reduces complexity and enhances robustness; this is desirable in automotive scenarios characterized by dynamic scenes. Numerical results demonstrate the effectiveness of the proposed system. [less ▲]

Detailed reference viewed: 102 (2 UL)
Full Text
Peer Reviewed
See detailLearning-based rainfall estimation via communication satellite links
Gharanjik, Ahmad UL; Mishra, Kumar Vijay; Shankar, Bhavani UL et al

in 2018 IEEE Statistical Signal Processing Workshop (SSP) (2018)

We present a method for estimating rainfall by opportunistic use of Ka-band satellite communication network. Our approach is based on the attenuation of the satellite link signal in the rain medium and ... [more ▼]

We present a method for estimating rainfall by opportunistic use of Ka-band satellite communication network. Our approach is based on the attenuation of the satellite link signal in the rain medium and exploits the nearly linear relation between the rain rate and the specific attenuation at Ka-band frequencies. Although our experimental setup is not intended to achieve high resolutions as millimeter wavelength weather radars, it is instructive because of easy availability of millions of satellite ground terminals throughout the world. The received signal is obtained over a passive link. Therefore, traditional weather radar signal processing to derive parameters for rainfall estimation algorithms is not feasible here. We overcome this disadvantage by employing neural network learning algorithms to extract relevant information. Initial results reveal that rainfall accumulations obtained through our method are 85% closer to the in situ rain gauge estimates than the nearest C-band German weather service Deutscher Wetterdienst (DWD) radar. [less ▲]

Detailed reference viewed: 97 (0 UL)
Full Text
Peer Reviewed
See detailOFDM-based automotive joint radar-communication system
Dokhanchi, Sayed Hossein UL; Shankar, Bhavani UL; Stifter, Thomas et al

in 2018 IEEE Radar Conference (RadarConf18) (2018)

We propose a novel automotive joint radar-communication (JRC) system, where the system first transmits OFDM sub-carriers for radar processing followed by sub-carriers enabling radar and communication ... [more ▼]

We propose a novel automotive joint radar-communication (JRC) system, where the system first transmits OFDM sub-carriers for radar processing followed by sub-carriers enabling radar and communication functionalities. The receiver processing includes iterative estimation of parameters to alleviate the shortage of samples to estimate range. The receiver first estimates the target parameters from the sub-carriers dedicated to radar; these parameters then determine the channel for the communication link. The communication data is then extracted, thereby enabling the use of all the carriers for improving the range estimation. It is shown that the range estimation improves significantly after efficient use of all the sub-carriers. Furthermore, for radar parameter estimation, we propose an effective iterative method based on alternating least square (ALS) to recover the angle of arrival (AoA), Doppler and Range. Numerical results demonstrate the feasibility of our proposed system. [less ▲]

Detailed reference viewed: 145 (12 UL)
Full Text
Peer Reviewed
See detailDeploying Joint Beamhopping and Precoding in Multibeam Satellite Networks
Joroughi, Vahid UL; Lagunas, Eva UL; Andrenacci, Stefano UL et al

in Global Conference on Signal and Information Processing (GlobalSIP) (2018)

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailSymbol-level precoding with low resolution DACs for large-scale array MU-MIMO systems
Tsinos, Christos UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2018)

While (Multiple Input-Multiple Output) MIMO systems based on large-scale antenna arrays are seen as the solution to the continuously increasing demands in modern wireless systems, they require high ... [more ▼]

While (Multiple Input-Multiple Output) MIMO systems based on large-scale antenna arrays are seen as the solution to the continuously increasing demands in modern wireless systems, they require high hardware complexity and power consumption. To tackle this, solutions based on low resolution Analog-to-Digital Converters (ADCs) / Digital-to-Analog Converters (DACs) have been developed in the literature where they mainly propose quantized versions of typical channel dependent linear precoding solutions. Alternatively, nonlinear Symbol level Precoding techniques have been recently proposed for downlink Multi User (MU)-MIMO systems with low resolution DACs that achieve significantly improved performance in several cases. The existing SLP approaches support only DACs of 1-bit resolution which result in significant performance degradations, especially when constellations with order greater than 4 are employed. To that end, in this work a novel SLP approach is developed that supports systems with DACs of any resolution and it is applicable for any type of constellation. As it is verified by the presented numerical results, the proposed approach exhibits significantly improved performance when constellations with order greater than 4 are employed and require reduced computational complexity, compared to the existing solutions for the 1-bit DAC case. [less ▲]

Detailed reference viewed: 101 (5 UL)
Full Text
Peer Reviewed
See detailSingle and Multiobjective Evolutionary Algorithms for Clustering Biomedical Information with Unknown Number of Clusters
Curi, María Eugenia; Carozzi, Lucía; Massobrio, Renzo et al

in Bioinspired Optimization Methods and Their Applications (2018)

This article presents single and multiobjective evolutionary approaches for solving the clustering problem with unknown number of clusters. Simple and ad-hoc operators are proposed, aiming to keep the ... [more ▼]

This article presents single and multiobjective evolutionary approaches for solving the clustering problem with unknown number of clusters. Simple and ad-hoc operators are proposed, aiming to keep the evolutionary search as simple as possible in order to scale up for solving large instances. The experimental evaluation is performed considering a set of real problem instances, including a real-life problem of analyzing biomedical information in the Parkinson's disease map project. The main results demonstrate that the proposed evolutionary approaches are able to compute accurate trade-off solutions and efficiently handle the problem instance involving biomedical information. [less ▲]

Detailed reference viewed: 232 (28 UL)
Full Text
Peer Reviewed
See detailArgumentation with Goals for Clinical Decision Support in Multimorbidity
Oliveira, Tiago; Dauphin, Jérémie UL; Satoh, Ken et al

in Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (2018)

The present work proposes a computational argumentation system equipped with goal seeking to combine independently generated recommendations for handling multimorbidity.

Detailed reference viewed: 45 (8 UL)
Full Text
Peer Reviewed
See detailOptimal Deployment of Base Stations in Cognitive Satellite Terrestrial Networks
Vuppala, Satyanarayana UL; Sellathurai, Mathini; Chatzinotas, Symeon UL

in 2018 9th Advanced Satellite Multimedia Systems Conference and the 15th Signal Processing for Space Communications Workshop (ASMS/SPSC) (2018)

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High ... [more ▼]

The application of linear precoding at the gateway side enables broadband multibeam satellite systems to use more aggressive frequency reuse patterns increasing the overall capacity of future High Throughput Satellites (HTS). However, although some previous works about precoding consider imperfect CSIT (Chanel State Information at the Transmitter) adding some CSI estimation errors, that is not the main cause of CSI degradation. In practice, receivers can only detect and estimate a few coefficients of the CSI vector being the other nullified, replaced by zeros. This introduces errors in the SINR calculation by the gateway that lead to the assignment of Modulation and Coding Schemes (MCS) over the decoding possibilities of the users, increasing the rate of erroneous frames. In this work, the errors in the SINR calculation caused by the nullification of the CSI are analyzing statistically and geographically using a radiation diagram of 245 beams over Europe. Furthermore, a solution based on a link adaptation algorithm with a per user adaptive margin is proposed, helping to achieve the QEF (Quasi-error Free) target of DVB-S2X systems. [less ▲]

Detailed reference viewed: 23 (0 UL)
See detailLa libertas, strumento ideologico dell’espansione territoriale del comune di Firenze nel XIV secolo
Abeles, Solal UL

in Zorzi, Andrea (Ed.) La libertà nelle città comunali e signorili italiane (2018)

Detailed reference viewed: 50 (4 UL)
Full Text
Peer Reviewed
See detail2018 25th International Conference on Telecommunications (ICT)
Lagunas, Eva UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 25th International Conference on Telecommunications (ICT) (2018)

The anticipated exponential growth in network traffic is posing significant challenges for the implementation of 5G networks. In this context, a major problem is the backhaul network which acts as a ... [more ▼]

The anticipated exponential growth in network traffic is posing significant challenges for the implementation of 5G networks. In this context, a major problem is the backhaul network which acts as a bottleneck preventing the efficient flow of ultra-dense and heavy traffic between the end users and the core network. Spectrum scarcity has emerged as the primary problem encountered when trying to accommodate the traffic upsurge. In this paper, we investigate the carrier allocation problem in the context of Integrated Satellite-Terrestrial Backhaul (ISTB) networks. In particular, we consider the satellite component to be integrated with the conventional terrestrial wireless backhaul network thus providing evident benefits in terms of data-offloading. To enhance the overall spectral efficiency of the proposed network, we consider that both terrestrial and satellite segments operate in the Ka band, where the sharing between terrestrial microwave links and satellite communications is already allowed. A novel carrier allocation algorithm based on fairness is proposed, which ensures that all backhaul links are continuously active to satisfy the operator's coverage needs. The problem is NP-hard by definition. As a consequence, we present a two-step sequential carrier allocation strategy specifically tailored to tackle the interference issues emerging from the spectral co-existence. Supporting results based on numerical simulations show that the proposed carrier allocation can provide a 2x improvement in terms of spectral efficiency when compared to benchmark terrestrial-only backhaul networks. [less ▲]

Detailed reference viewed: 68 (6 UL)
Full Text
Peer Reviewed
See detail2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
Domouchtsidis, Stavros; Tsinos, Christos UL; Chatzinotas, Symeon UL et al

in 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (2018)

Large-Scale Antenna Array Systems may be used to serve multiple users in the same time-frequency resource block which results to harmful multi-user interference (MUI). In the literature precoding ... [more ▼]

Large-Scale Antenna Array Systems may be used to serve multiple users in the same time-frequency resource block which results to harmful multi-user interference (MUI). In the literature precoding techniques have been proposed as a way to mitigate the induced MUI, by designing the transmitted signals using the knowledge of the Channel State Information (CSI), in block-level precoding (BLP) or both the CSI and the information-bearing symbols, in symbol-level precoding (SLP). However, the proposed SLP techniques require fully digital baseband processing which is infeasible in large-scale antenna array systems because of the high cost and power consumption of radio frequency (RF) components. In order to reduce the number of y-RF chains, we address an Antenna Selection Symbol-Level Precoding (AS-SLP) scheme, which minimizes the MUI by activating only a subset of the available antennas. For this scheme we develop an efficient algorithm, based on Coordinate Descent. Simulations provide an insight on the efficiency of the proposed approach and its improvement with respect to the fully digitally approaches. [less ▲]

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailNo Random, No Ransom: A Key to Stop Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo ... [more ▼]

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo random number generators that modern Operating Systems make available to applications. With this insight, we propose a strategy to mitigate ransomware attacks that considers pseudo random number generator functions as critical resources, controls accesses on their APIs and stops unauthorized applications that call them. Our strategy, tested against 524 active real-world ransomware samples, stops 94% of them, including WannaCry, Locky, CryptoLocker and CryptoWall. Remarkably, it also nullifies NotPetya, the latest offspring of the family which so far has eluded all defenses. [less ▲]

Detailed reference viewed: 568 (27 UL)
Full Text
Peer Reviewed
See detailHybrid analog-digital transceiver designs for mmwave amplify-and-forward relaying systems
Tsinos, Christos UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 41st International Conference on Telecommunications and Signal Processing (TSP) (2018)

Hybrid Analog/Digital (A/D) pre-/post-coding solutions aim at the reduction of the hardware complexity and power consumption of a system employed with a large-scale antenna array functioning in the ... [more ▼]

Hybrid Analog/Digital (A/D) pre-/post-coding solutions aim at the reduction of the hardware complexity and power consumption of a system employed with a large-scale antenna array functioning in the millimeter (mmWave) band. This is achieved by enabling the transceiver design with fewer Radio Frequency (RF) chains than antennas. In this work, hybrid A/D transceiver designs are developed for a relay assisted mmWave system that aims at data transmission from a source to a destination node via the well-known amplify-and-forward cooperative protocol. To that end, hybrid solutions are proposed for the joint design of the source and relay nodes precoders and for the destination ones, as well. Contrariwise to existing literature approaches that develop codebook-based solutions and exhibit limitations on the performance, the proposed approaches are codebook-free and present significantly improved spectral efficiency, as it is verified via the presented simulations. [less ▲]

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailL’écologie dans la littérature de jeunesse au Luxembourg : pour une écocritique comparée intralittéraire
Thiltges, Sébastian UL

in Glesener, Jeanne (Ed.) Lëtzebuerger Literaturen am Verglach (2018)

During the last decades, ecology has become a global socio-political stake, but also a recurrent literary theme. The recent research field of ecocriticism is rooted in the US, but is rapidly spreading ... [more ▼]

During the last decades, ecology has become a global socio-political stake, but also a recurrent literary theme. The recent research field of ecocriticism is rooted in the US, but is rapidly spreading across the scientific and cultural worlds, diversifying its interests and methods. Scholars all over the world particularly stress the importance of developing a comparative ecocriticism that internationally explores ecological discourses in different languages and cultures. According to the book’s aims, this paper compares three works of literature, which address environmental problems and/or try to develop an ecological sensibility, trespassing not national, but linguistic borders. The study of children’s literature has not been waiting for ecocritical theory to attest the importance of ecology as a main theme in texts addressing children. In many ways, education and consciousness-raising of the younger generations are supposed to be crucial, because these future adults will be even more concerned with climate change and will have to offer creative solutions to the environmental crisis. Yet, excessive pedagogy, enforcing awareness or even guilt, of both environmental writings and didactical children’s literature, has been a central aesthetical problem. This invites us not to limit our conclusions to an evaluation of the texts’ ecological substance and correctness, but rather to describe the multiple bonds between nature, aesthetics and narratives. We thus choose three works in three different languages which represent three different literary genres, namely crime fiction, fairy tale and poetry, to suggest that this poetical diversity of languages, motives, themes and narratives has to be seen as literature’s stand for nature’s protection in a multicultural landscape. [less ▲]

Detailed reference viewed: 63 (4 UL)
Full Text
Peer Reviewed
See detailBinary Sequences set with small ISL for MIMO radar systems
Alaee-Kerahroodi, Mohammad; Modarres-Hashemi, Mahmoud; Naghsh, Mohammad Mahdi Naghsh et al

in 2018 26th European Signal Processing Conference (EUSIPCO) (2018)

In this paper, we aim at designing a set of binary sequences with good aperiodic auto- and crosscorrelation properties for Multiple-Input-Multiple-Output (MIMO) radar systems. We show such a set of ... [more ▼]

In this paper, we aim at designing a set of binary sequences with good aperiodic auto- and crosscorrelation properties for Multiple-Input-Multiple-Output (MIMO) radar systems. We show such a set of sequences can be obtained by minimizing the Integrated Side Lobe (ISL) with the binary requirement imposed as a design constraint. By using the block coordinate descent (BCD) framework, we propose an efficient monotonic algorithm based on Fast Fourier Transform (FFT), to minimize the objective function which is non-convex and NP-hard in general. Simulation results illustrate that the ISL of designed binary set of sequences is the neighborhood of the Welch bound, Indicating its superior performance. [less ▲]

Detailed reference viewed: 109 (4 UL)
Full Text
Peer Reviewed
See detailSelf-Improving System Integration – Status and Challenges After Five Years of SISSY
Bellman, Kirstie; Botev, Jean UL; Diaconescu, Ada et al

in Proceedings of the 12th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (2018)

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailSequential spatio-temporal symbol-level precoding enabling faster-than-Nyquist signaling for multi-user MISO systems
Spano, Danilo UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 26th European Signal Processing Conference (EUSIPCO) (2018)

This paper addresses the problem of the interference between multiple co-channel transmissions in the downlink of a multi-antenna wireless system. In this context, symbol-level precoding achieves a ... [more ▼]

This paper addresses the problem of the interference between multiple co-channel transmissions in the downlink of a multi-antenna wireless system. In this context, symbol-level precoding achieves a constructive interference effect which results in SINR gains at the receivers side. Usually the constructive interference is exploited in the spatial dimension (multi-user interference), however in this work we consider a spatio-temporal precoding model which allows to exploit the interference also in the temporal dimension (inter-symbol interference). The proposed method, which optimizes the overs ampled transmit waveforms by minimizing the per-antenna transmit power, allows faster-than-Nyquist signaling over multi-user MISO systems without imposing additional complexity at the user terminals. The optimization is performed in a sequential fashion, by splitting the data streams in blocks and handling the inter-block interference. Numerical results are presented to assess the gains of the scheme in terms of effective rate and energy efficiency. [less ▲]

Detailed reference viewed: 30 (5 UL)
Full Text
Peer Reviewed
See detailDetecting Malicious Authentication Events Trustfully
Kaiafas, Georgios UL; Varisteas, Georgios UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Varisteas, Georgios; Lagraa, Sofiane (Eds.) et al IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World (2018)

Detailed reference viewed: 258 (41 UL)
Full Text
See detailThe vision and mission of CEREPS, a European council of research in physical education and physical activity
Scheuer, Claude UL; Naul, Roland

in Scheuer, Claude; Bund, Andreas; Holzweg, Martin (Eds.) Current Challenges for Physical Education. Keynotes, Invited Symposia and Selected Contributions of the 12th FIEP European Congress (2018)

Detailed reference viewed: 29 (5 UL)
See detailZur Artikulation einer modernen europäischen Kultur im Theater als Text: vom engen zum erweiterten Text- bzw. Theaterbegriff
Nonoa, Koku Gnatuloma UL

in Zhu, Jianhua; Szurawitzki, Michael; Zhao, Jin (Eds.) Germanistik zwischen Tradition und Innovation: XIII. Kongress der Internationalen Vereinigung für Germanistik (IVG) (2018)

Detailed reference viewed: 21 (1 UL)
See detailSprachlernbiographien und professionelles Handeln: Language Awareness bei Lehrkräften in Luxemburg.
Hu, Adelheid UL; Schank, Flore; Wagner, Jean-Marc UL

in Atlas der Mehrsprachigkeit (2018)

Detailed reference viewed: 59 (2 UL)
Full Text
Peer Reviewed
See detail3DBodyTex: Textured 3D Body Dataset
Saint, Alexandre Fabian A UL; Ahmed, Eman UL; Shabayek, Abd El Rahman UL et al

in 2018 Sixth International Conference on 3D Vision (3DV 2018) (2018)

In this paper, a dataset, named 3DBodyTex, of static 3D body scans with high-quality texture information is presented along with a fully automatic method for body model fitting to a 3D scan. 3D shape ... [more ▼]

In this paper, a dataset, named 3DBodyTex, of static 3D body scans with high-quality texture information is presented along with a fully automatic method for body model fitting to a 3D scan. 3D shape modelling is a fundamental area of computer vision that has a wide range of applications in the industry. It is becoming even more important as 3D sensing technologies are entering consumer devices such as smartphones. As the main output of these sensors is the 3D shape, many methods rely on this information alone. The 3D shape information is, however, very high dimensional and leads to models that must handle many degrees of freedom from limited information. Coupling texture and 3D shape alleviates this burden, as the texture of 3D objects is complementary to their shape. Unfortunately, high-quality texture content is lacking from commonly available datasets, and in particular in datasets of 3D body scans. The proposed 3DBodyTex dataset aims to fill this gap with hundreds of high-quality 3D body scans with high-resolution texture. Moreover, a novel fully automatic pipeline to fit a body model to a 3D scan is proposed. It includes a robust 3D landmark estimator that takes advantage of the high-resolution texture of 3DBodyTex. The pipeline is applied to the scans, and the results are reported and discussed, showcasing the diversity of the features in the dataset. [less ▲]

Detailed reference viewed: 959 (70 UL)
Full Text
Peer Reviewed
See detailVerifiability of Helios Mixnet
Smyth, Benjamin UL

in Voting'18: 3rd Workshop on Advances in Secure Electronic Voting (2018)

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailRobust Online Obstacle Detection and Tracking for Collision-free Navigation of Multirotor UAVs in Complex Environments
Wang, Min UL; Voos, Holger UL; Su, Daobilige

in 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore 18-21 November 2018 (2018)

Object detection and tracking is a challenging task, especially for unmanned aerial robots in complex environments where both static and dynamic objects are present. It is, however, essential for ensuring ... [more ▼]

Object detection and tracking is a challenging task, especially for unmanned aerial robots in complex environments where both static and dynamic objects are present. It is, however, essential for ensuring safety of the robot during navigation in such environments. In this work we present a practical online approach which is based on a 2D LIDAR. Unlike common approaches in the literature of modeling the environment as 2D or 3D occupancy grids, our approach offers a fast and robust method to represent the objects in the environment in a compact form, which is significantly more efficient in terms of both memory and computation in comparison with the former. Our approach is also capable of classifying objects into categories such as static and dynamic, and tracking dynamic objects as well as estimating their velocities with reasonable accuracy. [less ▲]

Detailed reference viewed: 121 (32 UL)
Full Text
Peer Reviewed
See detailUser Selection for symbol-level multigroup multicasting precoding in the downlink of MISO channels
Alodeh, Maha UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2018 IEEE International Conference on Communications (ICC) (2018)

We consider the problem of user selection for symbol-level multigroup multicasting in the downlink of multiuser MISO systems. Symbol-level precoding is a new paradigm for multiuser multiple-antenna ... [more ▼]

We consider the problem of user selection for symbol-level multigroup multicasting in the downlink of multiuser MISO systems. Symbol-level precoding is a new paradigm for multiuser multiple-antenna downlink systems which aims at creating constructive interference among the simultaneous data streams. This can be enabled by designing the precoded signal of the multiantenna transmitter on a symbol level, taking into account both channel state information and data symbols. This work proposes a user selection algorithm to facilitate serving multiple groups of users, by transmitting a stream of common symbols to each group on symbol-by-symbol basis if we have large number of users. We provide numerical results to validate the proposed algorithm. [less ▲]

Detailed reference viewed: 90 (12 UL)
Full Text
Peer Reviewed
See detailA Semantic Perspective on Belief Change in a Preferential Non-Monotonic Framework
Casini, Giovanni UL; Ferme, Eduardo; Meyer, Thomas et al

in Proceedings of the Sixteenth International Conference on Principles of Knowledge Representation and Reasoning (KR 2018) (2018)

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we investigate the ... [more ▼]

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we investigate the integration of the two formalisms by studying belief change for a (preferential) non-monotonic framework. We show that the standard AGM approach to be- lief change can be transferred to a preferential non-monotonic framework in the sense that change operations can be defined on conditional knowledge bases. We take as a point of depar- ture the results presented by Casini and Meyer (2017), and we develop and extend such results with characterisations based on semantics and entrenchment relations, showing how some of the constructions defined for propositional logic can be lifted to our preferential non-monotonic framework. [less ▲]

Detailed reference viewed: 102 (24 UL)
Full Text
Peer Reviewed
See detailA Verified Theorem Prover Backend Supported by a Monotonic Library
Rahli, Vincent UL; Cohen, Liron; Bickford, Mark

in LPAR 2018 (2018)

Detailed reference viewed: 101 (6 UL)
Full Text
Peer Reviewed
See detailA Revisit of Action Detection using Improved Trajectories
Papadopoulos, Konstantinos UL; Antunes, Michel; Aouada, Djamila UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, Alberta, Canada, 15–20 April 2018 (2018)

In this paper, we revisit trajectory-based action detection in a potent and non-uniform way. Improved trajectories have been proven to be an effective model for motion description in action recognition ... [more ▼]

In this paper, we revisit trajectory-based action detection in a potent and non-uniform way. Improved trajectories have been proven to be an effective model for motion description in action recognition. In temporal action localization, however, this approach is not efficiently exploited. Trajectory features extracted from uniform video segments result in significant performance degradation due to two reasons: (a) during uniform segmentation, a significant amount of noise is often added to the main action and (b) partial actions can have negative impact in classifier's performance. Since uniform video segmentation seems to be insufficient for this task, we propose a two-step supervised non-uniform segmentation, performed in an online manner. Action proposals are generated using either 2D or 3D data, therefore action classification can be directly performed on them using the standard improved trajectories approach. We experimentally compare our method with other approaches and we show improved performance on a challenging online action detection dataset. [less ▲]

Detailed reference viewed: 207 (27 UL)
Full Text
Peer Reviewed
See detailProvable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
Cogliati, Benoît-Michel UL; Dodis, Yevgeniy; Katz, Jonathan et al

in Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks (2018)

Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” ... [more ▼]

Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” substitution steps utilizing such S-boxes, with keyed and “global” permu- tation steps which are non-cryptographic. Many widely deployed block ciphers are constructed based on the SPNs, but there are essentially no provable-security results about SPNs. In this work, we initiate a comprehensive study of the provable security of SPNs as (possibly tweakable) wn-bit block ciphers, when the underlying n-bit permutation is modeled as a public random permutation. When the permutation step is linear (which is the case for most existing designs), we show that 3 SPN rounds are necessary and sufficient for security. On the other hand, even 1-round SPNs can be secure when non-linearity is allowed. Moreover, 2-round non-linear SPNs can achieve “beyond- birthday” (up to 2 2n/3 adversarial queries) security, and, as the number of non-linear rounds increases, our bounds are meaningful for the number of queries approaching 2 n . Finally, our non-linear SPNs can be made tweakable by incorporating the tweak into the permutation layer, and provide good multi-user security. As an application, our construction can turn two public n-bit permuta- tions (or fixed-key block ciphers) into a tweakable block cipher working on wn-bit inputs, 6n-bit key and an n-bit tweak (for any w ≥ 2); the tweakable block cipher provides security up to 2 2n/3 adversarial queries in the random permutation model, while only requiring w calls to each permutation, and 3w field multiplications for each wn-bit input. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailComputability Beyond Church-Turing via Choice Sequences
Bickford, Mark; Cohen, Liron; Constable, Robert et al

in LICS 2018 (2018)

Detailed reference viewed: 96 (9 UL)
Full Text
Peer Reviewed
See detailImpaired filter function in patients with somatoform disorders and major depression, as reflected by auditory evoked potentials in an oddball and an active distraction paradigm
Hutmacher, Djenna UL; Dierolf, Angelika UL; Lutz, Annika UL et al

in Abstractband Psychologie und Gehirn 2018 (2018)

Introduction: In the in influential perception-filter model of somatoform disorders (SD), three stages of symptom perception are postulated: (1) bodily signals, which may be amplified by stress, (2) a ... [more ▼]

Introduction: In the in influential perception-filter model of somatoform disorders (SD), three stages of symptom perception are postulated: (1) bodily signals, which may be amplified by stress, (2) a filter system, which distinguishes between relevant and irrelevant stimuli, and (3) cortical perception of physical symptoms. As there is dearth of evidence so far supporting the relationship between (1) bodily signals and (2) filter processes in SD, this study investigated if filter processes are altered in SD and if stress may affect filter mechanisms. Methods: Twenty-four patients with SD, 24 with depression and 24 healthy control individuals were assessed. Event-related potentials (ERPs) with two different auditory distraction procedures were recorded over four blocks, one before and three after either a socially evaluated cold pressor test (SECPT) or a control procedure. We manipulated both the frequency of and the attentional focus on stimuli to reflect filter processes. Results: We found smaller P3b amplitudes (reflecting memory storage) in patients with depression and SD, as compared to healthy controls. Furthermore, both patient groups showed a smaller P3a amplitude (reflecting attention), when counting the infrequent tone ("Oddball task") and a smaller N1 amplitude when counting the frequent tone ("active distraction"). In patients with SD, the SECPT had a decreasing effect on P3a amplitudes. Conclusions: Both late filter processes, reflecting attention (P3a) and memory storage (P3b), may be impaired in SD and depression. As acute stress affected attention in SD patients only, the impact of bodily signals (1) on filter processes (2) may be specific for SD. [less ▲]

Detailed reference viewed: 90 (20 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 246 (20 UL)
Full Text
See detailHigher level vocational education: The route to high skills and productivity as well as greater equity? An international comparative analysis
Bathmaker, Ann-Marie; Graf, Lukas; Orr, Kevin et al

in Nägele, Christof; Stalder, Barbara E. (Eds.) Trends in Vocational Education and Training Research. Proceedings of the European Conference on Educational Re- search (ECER), Vocational Education and Training Network (VETNET) (2018)

This international comparative analysis of higher level vocational education examines developments across five countries: England, Germany, Australia, Canada, and the USA. The authors consider how current ... [more ▼]

This international comparative analysis of higher level vocational education examines developments across five countries: England, Germany, Australia, Canada, and the USA. The authors consider how current developments address two key policy concerns: an emphasis on high skills as a means of achieving economic competitiveness and raising productivity; and the promise of increasing access for students hitherto excluded from higher education. We address these questions in relation to specific country contexts, in order to highlight similarities and differences in developments within the European arena and in a wider global context. We locate our analyses in an understanding of the different political and socio-economic conditions within different countries, which render particular reforms and innovations both possible and realizable in one context, but almost unthinkable in another. We argue for the need to recognize and embrace diversity in provision, while using comparison across countries as a means of challenging taken-for-granted assumptions of how things are and what is possible within individual country contexts. Such comparative analysis is a prerequisite for answering questions of policy transfer and learning from others. [less ▲]

Detailed reference viewed: 215 (9 UL)
Full Text
Peer Reviewed
See detailA Decomposition-based Approach towards the Control of Boolean Networks
Paul, Soumya UL; Su, Cui; Pang, Jun UL et al

in Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (2018)

Detailed reference viewed: 96 (4 UL)
Full Text
Peer Reviewed
See detailOn-Board Precoding in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Proceedings of IEEE VTC Fall 2018 (2018)

This paper present On-Board Precoding (OBP) for a multiple gateway multibeam satellite system where full frequency reuse pattern is employed at both user and feeder links. By reducing the Channel State ... [more ▼]

This paper present On-Board Precoding (OBP) for a multiple gateway multibeam satellite system where full frequency reuse pattern is employed at both user and feeder links. By reducing the Channel State Information (CSI) roundtrip delay to half, OBP offers significant benefits in the emerging multiple gateway scenario in terms of lower gateways coordination. However, two critical issues need to be addressed: (a) interference in both user and feeder links is the bottleneck of the whole system and employing interference mitigation techniques is essential, (b) clear push towards non-adaptive (fixed) payload implementation, leading to low computationally complex satellite architectures. In order to fulfill requirements (a) and (b), this paper studies the impact of employing a fixed OBP technique at the payload which is sufficiently robust to the variations in both user and feeder link channels. In addition to (a) and (b), the provided simulation results depict the performance gain obtained by our proposed OBP with respect to the conventional interference mitigation techniques in multiple gateway multibeam systems. [less ▲]

Detailed reference viewed: 141 (11 UL)
Full Text
Peer Reviewed
See detailRespiratory modulation of startle: effects on subjective intensity and psychomotor response times
Münch, Eva Elisabeth UL; Vögele, Claus UL; Van Diest, Ilse et al

in Hennig, J.; Stark, R. (Eds.) Abstractband Psychologie und Gehirn 2018 (2018)

Respiratory cycle time modulates reflexive startle eye blink responses to acoustic stimuli. Responsible for this effect seems to be the afferent input of slow adapting pulmonary stretch receptors. It ... [more ▼]

Respiratory cycle time modulates reflexive startle eye blink responses to acoustic stimuli. Responsible for this effect seems to be the afferent input of slow adapting pulmonary stretch receptors. It remains unclear, however, whether this respiratory modulation of startle (RMS) effect is also reflected in the modulation of higher cognitive, evaluative processing of the startle stimulus. Twenty-nine healthy volunteers received 80 acoustic startle stimuli (100 or 105 dB(A); 50 ms; binaural; instantaneous rise time), which were presented during peak and ongoing inspiration and expiration, while performing a paced breathing task at 0.25 Hz. Participants first responded to the startle probes by `as fast as possible' button pushes and then rated the perceived intensity of the acoustic stimuli. Psychomotor response time was divided into pre-motor (from stimulus onset to home button release; represents stimulus evaluation) and motor response time (from home button release to target button press). Intensity judgements were higher and evaluative response times accelerated during on-going expiration. No effect of respiratory cycle phase was found on eye blink responses and motor response time. We conclude, therefore, that respiratory cycle phase affects higher cognitive, attentional processing of acoustic startle stimuli. [less ▲]

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailAre Mutation Scores Correlated with Real Fault Detection? A Large Scale Empirical study on the Relationship Between Mutants and Real Faults
Papadakis, Mike UL; Shin, Donghwan; Yoo, Shin et al

in 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden (2018)

Detailed reference viewed: 199 (6 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (2018)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 246 (27 UL)
Full Text
Peer Reviewed
See detailContext-aware and Attribute-based Access Control Applying Proactive Computing to IoT System
Picard, Noé UL; Colin, Jean-Noël; Zampunieris, Denis UL

in Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018) (2018)

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its ... [more ▼]

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its sensors connected to the real world, allowing for context-awareness. However, the ABAC model alone does not include proposals for implementing security policies based on verified and/or meaningful values rather than on raw data flowing from the sensors. Nor does it allow to implement immediate action on the system when some security flaw is detected, while this possibility technically exists if the system is equipped with actuators next to its sensors. We show how to circumvent these limitations by adding a proactive engine to the ABAC components, that runs rule-based scenarios devoted to sensor data pre-processing, to higher-level information storage in the PIP, and to real-time, automatic reaction on the system through its actuators when required. [less ▲]

Detailed reference viewed: 175 (10 UL)
Full Text
Peer Reviewed
See detailPrecoder Design for Multibeam Mobile Satellite Systems
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Proceedings of IEEE Asilomar Conference on Signals, Systems and Computers (2018)

Detailed reference viewed: 76 (4 UL)
Full Text
Peer Reviewed
See detailDefeasible Entailment: from Rational Closure to Lexicographic Closure and Beyond
Casini, Giovanni UL; Meyer, Thomas; Varzinczak, Ivan

in Proceeding of the 17th International Workshop on Non-Monotonic Reasoning (NMR 2018) (2018)

In this paper we present what we believe to be the first systematic approach for extending the framework for de- feasible entailment first presented by Kraus, Lehmann, and Magidor—the so-called KLM ... [more ▼]

In this paper we present what we believe to be the first systematic approach for extending the framework for de- feasible entailment first presented by Kraus, Lehmann, and Magidor—the so-called KLM approach. Drawing on the properties for KLM, we first propose a class of basic defea- sible entailment relations. We characterise this basic frame- work in three ways: (i) semantically, (ii) in terms of a class of properties, and (iii) in terms of ranks on statements in a knowlege base. We also provide an algorithm for computing the basic framework. These results are proved through vari- ous representation results. We then refine this framework by defining the class of rational defeasible entailment relations. This refined framework is also characterised in thee ways: se- mantically, in terms of a class of properties, and in terms of ranks on statements. We also provide an algorithm for com- puting the refined framework. Again, these results are proved through various representation results. We argue that the class of rational defeasible entail- ment relations—a strengthening of basic defeasible entail- ment which is itself a strengthening of the original KLM proposal—is worthy of the term rational in the sense that all of them can be viewed as appropriate forms of defeasi- ble entailment. We show that the two well-known forms of defeasible entailment, rational closure and lexicographic clo- sure, fall within our rational defeasible framework. We show that rational closure is the most conservative of the defeasi- ble entailment relations within the framework (with respect to subset inclusion), but that there are forms of defeasible en- tailment within our framework that are more “adventurous” than lexicographic closure. [less ▲]

Detailed reference viewed: 80 (9 UL)
Full Text
Peer Reviewed
See detailLes silences synesthésiques du roman naturaliste
Thiltges, Sébastian UL

in Estay Stange, Veronica; Colas, Marion (Eds.) Synesthésies sonores. Du son au(x) sens (2018)

Dans la double perspective d’une microlecture sémiologique et de la ‐ contextualisation des textes dans l’histoire des poétiques, cet article propose une étude ‐ comparée de la description du silence et ... [more ▼]

Dans la double perspective d’une microlecture sémiologique et de la ‐ contextualisation des textes dans l’histoire des poétiques, cet article propose une étude ‐ comparée de la description du silence et de la synesthésie dans le roman naturaliste. Il postule une double signification de ces séquences descriptives qui soit acquièrent une fonction symbolique, soit évoquent un environnement perçu grâce à des indices incertains, auquel cas le naturalisme met en place une réflexion heuristique, voire épistémologique. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailPost-learning cold pressor stress, after a heartbeat perception training, enhances interoceptive accuracy in high blood pressure responders
Breden, Ion-Hideo UL; Fischbach, Jean; Schenk, Lara UL et al

in Hennig, J.; Stark, R. (Eds.) Abstractband Psychologie und Gehirn 2018 (2018)

Interoceptive accuracy (IAc) plays an important role for generation of medically unexplained symptoms (MUS) and trainings to enhance IAc reduces the perceived symptom severity of MUS. Post-learning stress ... [more ▼]

Interoceptive accuracy (IAc) plays an important role for generation of medically unexplained symptoms (MUS) and trainings to enhance IAc reduces the perceived symptom severity of MUS. Post-learning stress may facilitate recognition learning. It is yet unknown, however, if acute stress, when evoked during the memory consolidation phase, could enhance the visceral learning in a heartbeat perception training (HBPT). The present study is the first to investigate the effects of a socially evaluated cold pressor test (SECPT) induced after a HBPT aimed at increasing IAc. The sample consisted of 48 healthy students (28 women). IAc was assessed at three different time points: (1) once as a baseline measure, (2) 30 minutes after the SECPT, and (3) the day after. Assessment of IAc was performed using the heartbeat perception task developed by Schandry (1981). The HBPT followed the baseline IAc assessment and was a replication of the paradigm developed by Schaefer et al. (2014). The SECPT followed immediately after the HBPT. Results showed that post-encoding stress significantly increased IAc between T1 and T3 for participants showing a high blood pressure (BP) response in the SECPT compared to the control group, whereas low BP responders did not show such an effect. This indicates that post-encoding stress enhances visceral memory consolidation in high BP responders compared to low BP responder and non-stressed control participants. Post-learning stress facilitation of visceral learning and memory may represent a mechanism underlying symptom generation, which should be addressed in studies on somatic symptom disorders in the future. [less ▲]

Detailed reference viewed: 78 (11 UL)
Full Text
Peer Reviewed
See detailBlockchain Orchestration and Experimentation Framework: A Case Study of KYC
Shbair, Wazen UL; Steichen, Mathis UL; François, Jérôme UL et al

in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018 (2018)

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public ... [more ▼]

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public testnets (e.g. Rinkeby Ethereum) can be used for testing, however, we cannot adjust their parameters (e.g. Gas limit, Mining difficulty) to further the understanding of the application in question and of the employed blockchain. This paper proposes an easy to use orchestration framework over the Grid'5000 platform. Grid'5000 is a highly reconfigurable and controllable large-scale testbed. We developed a tool that facilitates nodes reservation, deployment and blockchain configuration over the Grid'5000 platform. In addition, our tool can fine-tune blockchain and network parameters before and between experiments. The proposed framework offers insights for private and consortium blockchain developers to identify performance bottlenecks and to assess the behavior of their applications in different circumstances. [less ▲]

Detailed reference viewed: 515 (29 UL)
Full Text
Peer Reviewed
See detailError detection and management in CAN XR
Cena, Gianluca; Cibrario Bertolotti, Ivan; Hu, Tingting UL et al

in 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS) (2018)

Nowadays, Controller Area Network is still the most popular solution for in-vehicle communications in automotive scenarios. Recently, the CAN with eXtensible in-frame Replyproposal has been introduced ... [more ▼]

Nowadays, Controller Area Network is still the most popular solution for in-vehicle communications in automotive scenarios. Recently, the CAN with eXtensible in-frame Replyproposal has been introduced, which permits several nodes to write at the same time on the bus in the data field of legacy CAN frames. This enables several new interesting communication services, including distributed key generation and highly-efficient data exchanges according to the combined message approach. Unfortunately, having several concurrent devices acting as transmitters for the same message impairs the ability of the protocol to detect global errors, hence worsening its robustness against electromagnetic disturbance. In this paper, this problem is analyzed in detail and some solutions are proposed, which make CAN XR as robust as the standard CAN protocol. [less ▲]

Detailed reference viewed: 81 (8 UL)
Full Text
Peer Reviewed
See detailInvestigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications
Ferreira Torres, Christof UL; Jonker, Hugo

in 23rd European Symposium on Research in Computer Security, Barcelona, Spain, September 3-7, 2018 (2018)

Detailed reference viewed: 102 (6 UL)
See detailModelling and Analysis of a Hierarchy of Distance Bounding Attacks
Chothia, Tom; Ruiter, Joeri de; Smyth, Benjamin UL

in Modelling and Analysis of a Hierarchy of Distance Bounding Attacks (2018)

Detailed reference viewed: 19 (3 UL)
See detailDénationaliser le passé, désétatiser le politique : les apports d'un dialogue nouveau entre historiographies française et italienne des formations politiques de la fin du Moyen Âge
Abeles, Solal UL

in Genet, Jean-Philippe (Ed.) Les vecteurs de l'idéel, vi, Mutations des sociétés politiques et systèmes de communication (2018)

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks
Mizera, Andrzej UL; Pang, Jun UL; Qu, Hongyang et al

in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

Detailed reference viewed: 97 (3 UL)
Full Text
Peer Reviewed
See detailEvoSuite at the SBST 2018 Tool Competition
Fraser, Gordon; Rojas, Jose; Arcuri, Andrea UL

in 2018 ACM/IEEE 11th International Workshop on Search-Based Software Testing (2018)

EvoSuite is a search-based tool that automatically generates executable unit tests for Java code (JUnit tests). This paper summarises the results and experiences of EvoSuite’s participation at the sixth ... [more ▼]

EvoSuite is a search-based tool that automatically generates executable unit tests for Java code (JUnit tests). This paper summarises the results and experiences of EvoSuite’s participation at the sixth unit testing competition at SBST 2018, where EvoSuite achieved the highest overall score (687 points) for the fifth time in six editions of the competition. [less ▲]

Detailed reference viewed: 92 (6 UL)
Full Text
Peer Reviewed
See detailSpace-Based Services Supporting Refugees: Legal Aspects
Hofmann, Mahulena UL; Aloisio, Gerome; Rinaldis, Loredana

in Masson-Zwaan, Tanja; Blount, Percy; Moro-Aguilar, Rafael (Eds.) et al Proceedings of the International Institute of Space Law (2018)

In the last years, Europe has experienced the greatest mass movement of people since the Second World War. The EU agreed upon different measures to support the refugees. Almost all these activities use ... [more ▼]

In the last years, Europe has experienced the greatest mass movement of people since the Second World War. The EU agreed upon different measures to support the refugees. Almost all these activities use data gained with the help of space-based technologies. The article deals with the legal basis of these data. [less ▲]

Detailed reference viewed: 61 (1 UL)
Full Text
See detailTalking Borders. From Local Expertise to Global Exchange
Venken, Machteld UL

in Heigl, Florian; Ernst, Marlene (Eds.) Austrian Citizen Science Conference 2018. Abstract book (2018)

On July 10-14, 2018, the Association for Borderlands Studies (ABS) held its Second World Conference in Vienna and Budapest. The meeting was attended by around 450 participants from 54 countries, including ... [more ▼]

On July 10-14, 2018, the Association for Borderlands Studies (ABS) held its Second World Conference in Vienna and Budapest. The meeting was attended by around 450 participants from 54 countries, including renowned experts and practitioners, spanning all fields of the humanities and the social sciences. The ABS is the world’s largest academic organization dedicated to the systematic study and exchange of ideas, information and analysis of international border, and the processes and communities engendered by such borders. The Second ABS World Conference had as its central topic Border-Making and its Consequences: Interpreting Evidence from the “post-Colonial” and “post-Imperial” 20th Century and was co-organized by the University of Vienna and the Central European University on the occasion of the 100th anniversary of the dissolution of the Austro-Hungarian Empire. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailTowards the Existential Control of Boolean Networks: A Preliminary Report
Paul, Soumya UL; Pang, Jun UL; Su, Cui

in Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (2018)

Detailed reference viewed: 61 (1 UL)
Full Text
Peer Reviewed
See detailEvolutionary Algorithms for Convolutional Neural Network Visualisation
Bernard, Nicolas UL; Leprévost, Franck UL

in Meneses, Esteban; Castro, Harold; Barrios Hernández, Carlos Jaime (Eds.) et al High Performance Computing -- 5th Latin American Conference, CARLA 2018, Piedecuesta, Colombia (2018)

Deep Learning is based on deep neural networks trained over huge sets of examples. It enabled computers to compete with ---~or even outperform~--- humans at many tasks, from playing Go to driving ... [more ▼]

Deep Learning is based on deep neural networks trained over huge sets of examples. It enabled computers to compete with ---~or even outperform~--- humans at many tasks, from playing Go to driving vehicules. Still, it remains hard to understand how these networks actually operate. While an observer sees any individual local behaviour, he gets little insight about their global decision-making process. However, there is a class of neural networks widely used for image processing, convolutional networks, where each layer contains features working in parallel. By their structure, these features keep some spatial information across a network's layers. Visualisation of this spatial information at different locations in a network, notably on input data that maximise the activation of a given feature, can give insights on the way the model works. This paper investigates the use of Evolutionary Algorithms to evolve such input images that maximise feature activation. Compared with some pre-existing approaches, ours seems currently computationally heavier but with a wider applicability. [less ▲]

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailPreference in Abstract Argumentation
Kaci, Souhila; van der Torre, Leon UL; Villata, Serena

in Computational Models of Argument (2018)

Consider an argument A that is attacked by an argument B, while A is preferred to B. Existing approaches will either ignore the attack or reverse it. In this paper we introduce a new reduction of ... [more ▼]

Consider an argument A that is attacked by an argument B, while A is preferred to B. Existing approaches will either ignore the attack or reverse it. In this paper we introduce a new reduction of preference and attack to defeat, based on the idea that in such a case, instead of ignoring the attack, the preference is ignored. We compare this new reduction with the two existing ones using a principle-based approach, for the four Dung semantics. The principle-based or axiomatic approach is a methodology to choose an argumentation semantics for a particular application, and to guide the search for new argumentation semantics. For this analysis, we also introduce a fourth reduction, and a semantics for preference-based argumentation based on extension selection. Our classification of twenty alternatives for preference-based abstract argumentation semantics using six principles suggests that our new reduction has some advantages over the existing ones, in the sense that if the set of preferences increases, the sets of accepted arguments increase as well. [less ▲]

Detailed reference viewed: 84 (10 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (2018)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 132 (19 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 247 (24 UL)
Full Text
Peer Reviewed
See detailAttacks against GSMA's M2M Remote Provisioning
Meyer, Maxime; Quaglia, Elizabeth A.; Smyth, Benjamin UL

in FC'18: 22nd International Conference on Financial Cryptography and Data Security (2018)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailGenerating symbolic representation from sensor data: Inferring knowledge in robotics competitions
Rodriguez Lera, Francisco Javier UL; Martín-Rico, F.; Matelián-Olivera, V.

in 2018 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC) (2018)

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailA rule-based approach for self-optimisation in autonomic eHealth systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Workshop Proceedings ot the 6th International Workshop on "Self-Optimisation in Autonomic & Organic Computing Systems" in ARCS 2018 - 31st International Conference on Architecture of Computing Systems, Braunschweig, Germany, 09 - 12 April, 2018 (2018)

Advances in machine learning techniques in recent years were of great benefit for the detection of diseases/medical conditions in eHealth systems, but only to a limited extend. In fact, while for the ... [more ▼]

Advances in machine learning techniques in recent years were of great benefit for the detection of diseases/medical conditions in eHealth systems, but only to a limited extend. In fact, while for the detection of some diseases the data mining techniques were performing very well, they still got outperformed by medical experts in about half of the tests done. In this paper, we propose a hybrid approach, which will use a rule-based system on top of the machine learning techniques in order to optimise the results of conflict handling. The goal is to insert the knowledge from medical experts in order to optimise the results given by the classification techniques. Possible positive and negative effects will be discussed. [less ▲]

Detailed reference viewed: 109 (17 UL)
Full Text
See detailPlaidoyer pour le maintien d’une Cour constitutionnelle (le cas échéant) réformée
Kinsch, Patrick UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour constitutionnelle : Trop jeune pour mourir ? (2018)

Detailed reference viewed: 59 (6 UL)
Full Text
Peer Reviewed
See detailFrom Georeferenced Data to Socio-Spatial Knowledge. Ontology Design Patterns to Discover Domain-Specific Knowledge from Crowdsourced Data
Calafiore, Alessia; Boella, Guido; van der Torre, Leon UL

in 21st International Conference on Knowledge Engineering and Knowledge Management (2018)

So far, ontologies developed to support Geographic Information science have been mostly designed from a space-centered rather than a human-centered and social perspective. In the last decades, a wealth of ... [more ▼]

So far, ontologies developed to support Geographic Information science have been mostly designed from a space-centered rather than a human-centered and social perspective. In the last decades, a wealth of georeferenced data is collected through sensors, mobile and web platforms from the crowd, providing rich information about people’s collective experiences and behaviors in cities. As a consequence, these new data sources require models able to make machine-understandable the social meanings and uses people commonly associate with certain places. This contribution proposes a set of reusable Ontology Design Patterns (ODP) to guide a data mining workflow and to semantically enrich the mined results. The ODPs explicitly aim at representing two facets of the geographic knowledge - the built environment and people social behavior in cities - as well as the way they interact. Modelling the interplay between the physical and the human aspects of the urban environment provides an ontology representation of the socio-spatial knowledge which can be used as baseline domain knowledge for analysing and interpreting georeferenced data collected through crowdsourcing. An experimentation using a TripAdvisor data sample to recognize food consumption practices in the city of Turin is presented. [less ▲]

Detailed reference viewed: 87 (1 UL)
Full Text
Peer Reviewed
See detailRecent Trends in Software Testing Education: A Systematic Literature Review
Lauvås, Per; Arcuri, Andrea UL

in UDIT (The Norwegian Conference on Didactics in IT education) (2018)

Testing is a critical aspect of software development. Far too often software is released with critical faults. However, testing is often considered tedious and boring. Unfortunately, many graduates might ... [more ▼]

Testing is a critical aspect of software development. Far too often software is released with critical faults. However, testing is often considered tedious and boring. Unfortunately, many graduates might join the work force without having had any education in software testing, which exacerbates the problem even further. Therefore, teaching software testing as part of a university degree in software engineering and is very important. But it is an open challenge how to teach software testing in an effective way that can successfully motivate students. In this paper, we have carried out a systematic literature review on the topic of teaching software testing. We analysed and reviewed 30 papers that were published between 2013 and 2017. The review points out to a few different trends, like the use of gamification to make the teaching of software testing less tedious. [less ▲]

Detailed reference viewed: 90 (2 UL)
Full Text
Peer Reviewed
See detailLegal Reasoning and Big Data: Opportunities and Challenges
Antoniou, Grigoris; Baryannis, George; Batsakis, Sotiris et al

in Legal Reasoning and Big Data: Opportunities and Challenges (2018)

Detailed reference viewed: 110 (5 UL)
Full Text
Peer Reviewed
See detailLate heartbeat-evoked potentials, indicators of cortical representation of interoceptive signal processing, are associated with survival after cardiac arrest
Schulz, André UL; Stammet, Pascal; Dierolf, Angelika UL et al

in Abstractband Psychologie und Gehirn 2018 (2018)

Rationale: Cardiac arrest (CA) is a serious condition characterized by high mortality rates, even after initial successful resuscitation, mainly due to neurological damage. Whether brain-heart ... [more ▼]

Rationale: Cardiac arrest (CA) is a serious condition characterized by high mortality rates, even after initial successful resuscitation, mainly due to neurological damage. Whether brain-heart communication is associated with outcome after CA is unknown. Heartbeat-evoked brain potentials (HEPs) represent neurophysiological indicators of brain-heart communication, as they reflect cortical representation of interoceptive signal processing. The aim of this study was to address the association between HEPs and survival after CA. Methods: HEPs were calculated from resting EEG/ECG in 55 CA patients 24 h after resuscitation. All patients were treated with targeted temperature management and a standardized sedation protocol during assessment. We investigated the association between HEP amplitude (180{320 ms, 455{595 ms, 860{1000 ms) and 6-month survival. Results: Twenty-five of 55 patients (45%) were still alive at 6-month follow-up. Survivors showed a higher HEP amplitude at frontopolar and frontal electrodes in the late HEP interval than non-survivors. This effect remained significant after controlling for between-group differences in terms of age, Fentanyl dose, and time lag between resuscitation and EEG assessment. There were no group differences in heart rate or heart rate variability. Conclusion: Brain-heart communication, as reflected by HEPs, is associated with survival after CA. Cardiovascular autonomic arousal may not be involved in mediating this e ect. Adequate cortical representation of interoceptive signals may be essential to preserve cariovascular health and should be in the focus of prevention strategies. Future studies should address the brain-heart axis in CA. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailAuthentication with weaker trust assumptions for voting systems
Quaglia, Elizabeth A.; Smyth, Benjamin UL

in AFRICACRYPT'18: 10th International Conference on Cryptology in Africa (2018)

Detailed reference viewed: 70 (1 UL)
Full Text
Peer Reviewed
See detailOn the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage
Glauner, Patrick UL; State, Radu UL; Valtchev, Petko et al

in Proceedings 13th International FLINS Conference on Data Science and Knowledge Engineering for Sensing Decision Support (FLINS 2018) (2018)

In machine learning, a bias occurs whenever training sets are not representative for the test data, which results in unreliable models. The most common biases in data are arguably class imbalance and ... [more ▼]

In machine learning, a bias occurs whenever training sets are not representative for the test data, which results in unreliable models. The most common biases in data are arguably class imbalance and covariate shift. In this work, we aim to shed light on this topic in order to increase the overall attention to this issue in the field of machine learning. We propose a scalable novel framework for reducing multiple biases in high-dimensional data sets in order to train more reliable predictors. We apply our methodology to the detection of irregular power usage from real, noisy industrial data. In emerging markets, irregular power usage, and electricity theft in particular, may range up to 40% of the total electricity distributed. Biased data sets are of particular issue in this domain. We show that reducing these biases increases the accuracy of the trained predictors. Our models have the potential to generate significant economic value in a real world application, as they are being deployed in a commercial software for the detection of irregular power usage. [less ▲]

Detailed reference viewed: 107 (5 UL)
Full Text
Peer Reviewed
See detailAnschauung überhaupt
Heidemann, Dietmar UL

in Akten des XII. Internationaler Kant-Kongress: Natur und Freiheit (2018)

Der Beitrag macht den Versuch einer Klärung des meines Erachtens diffusen Begriffs der „Anschauung überhaupt“ gemacht. Es soll gezeigt werden, dass Kant für den Beweis der Restriktionsthese im Rahmen ... [more ▼]

Der Beitrag macht den Versuch einer Klärung des meines Erachtens diffusen Begriffs der „Anschauung überhaupt“ gemacht. Es soll gezeigt werden, dass Kant für den Beweis der Restriktionsthese im Rahmen seiner kritischen Vermögenstheorie ohne die Annahme der „Anschauung überhaupt“ zwar nicht auskommt, dass sich diese Annahme aber gegen den naheliegenden Einwand verteidigen lässt, wonach die kritische Erkenntnisbegrenzung nur unter der für Kant illegitimen Voraussetzung einer Form metaphysischer Erkenntnis, das heißt einer „Anschauung überhaupt“ möglich ist. Die Schwierigkeit besteht hierbei vor allem darin, dass von allen Spezifikationen der „Anschauung überhaupt“ allein die menschliche sinnliche Anschauung in Raumund Zeit kognitiv zugänglich ist. Alle übrigen Arten der sinnlichen „Anschauung überhaupt“ sind menschlicher Erkenntnis nicht kognitiv zugänglich. [less ▲]

Detailed reference viewed: 105 (2 UL)
Full Text
Peer Reviewed
See detailMessir: A Text-First DSL-Based Approach for UML Requirements Engineering (Tool Demo)
Ries, Benoît UL; Capozucca, Alfredo UL; Guelfi, Nicolas UL

in Proceedings of the 11th ACM SIGPLAN International Conference on Software Language Engineering SLE'18 (2018)

Detailed reference viewed: 128 (17 UL)
Full Text
Peer Reviewed
See detailCapturing Regional Variation with Distributed Place Representations and Geographic Retrofitting
Hovy, Dirk; Purschke, Christoph UL

in Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing (2018)

Detailed reference viewed: 98 (1 UL)
Full Text
Peer Reviewed
See detailTowards Purposeful Enterprise Modeling for Enterprise Analysis
de Kinderen, Sybren; Ma, Qin UL

in 2018 International Conference on Information Management & Management Science (2018)

Detailed reference viewed: 172 (4 UL)
Full Text
Peer Reviewed
See detailMutant Quality Indicators
Papadakis, Mike UL; Titcheu Chekam, Thierry UL; Le Traon, Yves UL

in 13th International Workshop on Mutation Analysis (MUTATION'18) (2018)

Detailed reference viewed: 240 (15 UL)