References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailShear Stresses Analysis at the Steel-Concrete Interface with the Usage of Bond Eliminating Products
Chrzanowski, Maciej UL; Odenbreit, Christoph UL; Obiala, Renata et al

in Proceedings of the XI CMM 2017 Conference, Coimbra 23-24 November 2017 (2017, November)

Detailed reference viewed: 46 (9 UL)
Full Text
Peer Reviewed
See detailImproving Real-Time Bidding Using a Constrained Markov Decision Process
Du, Manxing UL; Sassioui, Redouane UL; Varisteas, Georgios UL et al

in Proceedings of the 13th International Conference on Advanced Data Mining and Applications (2017, November)

Detailed reference viewed: 245 (18 UL)
Full Text
Peer Reviewed
See detailEfficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares
Dinu, Dumitru-Daniel UL; Groszschädl, Johann UL; Le Corre, Yann UL

in Nguyen, Phong Q.; Zhou, Jianying (Eds.) Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (2017, November)

Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems against Differential Power Analysis (DPA) attacks. Applying masking to a cipher that involves both arithmetic ... [more ▼]

Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems against Differential Power Analysis (DPA) attacks. Applying masking to a cipher that involves both arithmetic and Boolean operations requires a conversion between arithmetic and Boolean masks. An alternative approach is to perform the required arithmetic operations (e.g. modular addition or subtraction) directly on Boolean shares. At FSE 2015, Coron et al. proposed a logarithmic-time algorithm for modular addition on Boolean shares based on the Kogge-Stone carry-lookahead adder. We revisit their addition algorithm in this paper and present a fast implementation for ARM processors. Then, we introduce a new technique for direct modular addition/subtraction on Boolean shares using a simple Carry-Save Adder (CSA) in an iterative fashion. We show that the average complexity of CSA-based addition on Boolean shares grows logarithmically with the operand size, similar to the Kogge-Stone carry-lookahead addition, but consists of only a single AND, an XOR, and a left-shift per iteration. A 32-bit CSA addition~on Boolean shares has an average execution time of 162 clock cycles on an ARM Cortex-M3 processor, which is approximately 43% faster than the Kogge-Stone adder. The performance gain increases to over 55% when comparing the average subtraction times. We integrated both addition techniques into a masked implementation of the block cipher Speck and found that the CSA-based variant clearly outperforms its Kogge-Stone counterpart by a factor of 1.70 for encryption and 2.30 for decryption. [less ▲]

Detailed reference viewed: 114 (0 UL)
Full Text
Peer Reviewed
See detailObserver-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017 (2017, November)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bilinear Matrix Inequality (BMI) approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose in using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. An illustrative example of the proposed approach applied to a three-tank system is presented. [less ▲]

Detailed reference viewed: 166 (5 UL)
Full Text
Peer Reviewed
See detailOptimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation
Hommes, Stefan UL; Valtchev, Petko; Blaiech, Khalil et al

in Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation (2017, November)

Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into ... [more ▼]

Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into network device tables. With heterogeneous devices, deployment is strongly bounded by the respective table constraints (size, lookup time, etc.) and forwarding pipelines. Hence, minimising the overall number of entries is paramount in reducing resource consumption and speeding up the search. Moreover, since multiple control plane applications can deploy own rules, conflicts may occur. To avoid those and ensure overall correctness, a rule validation mechanism is required. Here, we present a compilation mechanism for rules of diverging origins that minimises the number of entries. Since it exploits the semantics of rules and entries, our compiler fits a heterogeneous landscape of network devices. We evaluated compiler implementations on both software and hardware switches using a realistic testbed. Experimental results show a reduction in both produced table entries and forwarding delay. [less ▲]

Detailed reference viewed: 101 (4 UL)
Full Text
Peer Reviewed
See detailYour Moves, Your Device: Establishing Behavior Profiles Using Tensors
Falk, Eric UL; Charlier, Jérémy Henri J. UL; State, Radu UL

in Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (2017, November)

Smartphones became a person's constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor ... [more ▼]

Smartphones became a person's constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor authentication or personal assistants. In addition, Internet of Things (IoT) gadgets extend the capabilities of the latter even further. Devices such as body worn fitness trackers allow users to keep track of daily activities by periodically synchronizing data with the smartphone and ultimately with the vendor's computational centers in the cloud. These fitness trackers are equipped with an array of sensors to measure the movements of the device, to derive information as step counts or make assessments about sleep quality. We capture the raw sensor data from wrist-worn activity trackers to model a biometric behavior profile of the carrier. We establish and present techniques to determine rather the original person, who trained the model, is currently wearing the bracelet or another individual. Our contribution is based on CANDECOMP/PARAFAC (CP) tensor decomposition so that computational complexity facilitates: the execution on light computational devices on low precision settings, or the migration to stronger CPUs or to the cloud, for high to very high granularity. This precision parameter allows the security layer to be adaptable, in order to be compliant with the requirements set by the use cases. We show that our approach identifies users with high confidence. [less ▲]

Detailed reference viewed: 145 (18 UL)
Full Text
See detail2017 AIChE Annual Meeting
Qi, Fenglei UL; Wright, Mark

in Qi, Fenglei; Wright, Mark (Eds.) A DEM modeling of biomass fast pyrolysis in a double screw reactor (2017, October 31)

Detailed reference viewed: 75 (3 UL)
Full Text
Peer Reviewed
See detailAnalysis of Fingerprinting Techniques for Tor Hidden Services
Panchenko, Andriy UL; Mitseva, Asya UL; Henze, Martin et al

in Proceedings of the 24th ACM Computer and Communications Security (ACM CCS) 16th Workshop on Privacy in the Electronic Society (ACM WPES 2017) (2017, October 31)

Detailed reference viewed: 276 (17 UL)
Full Text
Peer Reviewed
See detailVariant-DB: A Tool for Efficiently Exploring Millions of Human Genetic Variants and Their Annotations
Kutzera, Joachim UL; May, Patrick UL

in Da Silveira, Marcos; Pruski, Cédric; Schneider, Reinhard (Eds.) DILS 2017: Data Integration in the Life Sciences (2017, October 24)

Next Generation Sequencing (NGS) allows sequencing of a human genome within hours, enabling large scale applications such as sequencing the genome of each patient in a clinical study. Each individual ... [more ▼]

Next Generation Sequencing (NGS) allows sequencing of a human genome within hours, enabling large scale applications such as sequencing the genome of each patient in a clinical study. Each individual human genome has about 3.5 Million genetic differences to the so called reference genome, the consensus genome of a healthy human. These differences, called variants, determine individual phenotypes, and certain variants are known to indicate disease predispositions. Finding associations from variant patterns and affected genes to these diseases requires combined analysis of variants from multiple individuals and hence, efficient solutions for accessing and filtering the variant data. We present Variant-DB, our in-house database solution that allows such efficient access to millions of variants from hundreds to thousands of individuals. Variant-DB stores individual variant genotypes and annotations. It features a REST-API and a web-based front-end for filtering variants based on annotations, individuals, families and studies. We explain Variant-DB and its front-end and demonstrate how the Variant-DB API can be included in data integration workflows. [less ▲]

Detailed reference viewed: 154 (27 UL)
Full Text
Peer Reviewed
See detailAutomatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Appelt, Dennis UL; Panichella, Annibale UL; Briand, Lionel UL

in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2017, October 23)

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases ... [more ▼]

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests. However, existing research suggests that rule sets are very difficult to understand and too complex to be manually fixed. In this paper, we formalise the problem of fixing vulnerable WAFs as a combinatorial optimisation problem. To solve it, we propose an automated approach that combines machine learning with multi-objective genetic algorithms. Given a set of legitimate requests and bypassing SQL injection attacks, our approach automatically infers regular expressions that, when added to the WAF's rule set, prevent many attacks while letting legitimate requests go through. Our empirical evaluation based on both open-source and proprietary WAFs shows that the generated filter rules are effective at blocking previously identified and successful SQL injection attacks (recall between 54.6% and 98.3%), while triggering in most cases no or few false positives (false positive rate between 0% and 2%). [less ▲]

Detailed reference viewed: 327 (27 UL)
Full Text
See detailUnified Satellite and Terrestrial ACM Design
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL

in International Communications Satellite Systems Conference (ICSSC), Trieste 16-19 October 2017 (2017, October 17)

First step towards integrating satellite and terrestrial standards at the physical layer is to design a unified packet frame structure, and in particular, a unified adaptive coding and modulation (ACM ... [more ▼]

First step towards integrating satellite and terrestrial standards at the physical layer is to design a unified packet frame structure, and in particular, a unified adaptive coding and modulation (ACM) scheme without substantial loss in either of the systems. In this paper we introduce a methodology to design such a set of modulation and coding (MODCOD) combinations. In the first step, we design a set of base MODCODs for the AWGN channel. Then, for any other given channel model, we build a new set of MODCODs through a suitable transformation of the base MODCODs. We mainly focus on two types of channels: (a) non-linear satellite channels, and (b) AWGN channels with fading. We compare our results with latest digital video broadcasting standards, namely, DVB-T2 and DVB-S2X. [less ▲]

Detailed reference viewed: 211 (36 UL)
Full Text
Peer Reviewed
See detailCoverage Extension via Side-Lobe Transmission in Multibeam Satellite System
Gharanjik, Ahmad UL; Kmieciak, Jarek; Shankar, Bhavani UL et al

in 23rd Ka and Broadband Communications Conference (2017, October 16)

In this paper, we study feasibility of coverage extension of a multibeam satellite network by providing low-rate communications to terminals located outside the coverage of main beams. Focusing on the MEO ... [more ▼]

In this paper, we study feasibility of coverage extension of a multibeam satellite network by providing low-rate communications to terminals located outside the coverage of main beams. Focusing on the MEO satellite network, and using realistic link budgets from O3b networks, we investigate the performance of both forward and return-links for terminals stationed in the side lobes of the main beams. Particularly, multi-carrier transmission for forward-link and single carrier transmission for return-link are examined and the resulting coverage and data rate for different setups are evaluated. Simulation results verifies that side-lobe transmission can extend the coverage area and provide considerable data rate, thereby providing a solution for enhancing capacity of existing networks. [less ▲]

Detailed reference viewed: 84 (7 UL)
Full Text
Peer Reviewed
See detailHistorical overview of CPT-based design methods
Rica, Shilton UL; Van Baars, Stefan UL

in Proceedings of the International Conference of Civil Engineering, ICCE 2017, Tirana 12-14 October 2017 (2017, October 12)

The Cone Penetration Test (CPT) is used for many decades in order to evaluate the pile bearing capacity. Pieter Barentsen developed the CPT around 1930 in order to investigate the soil resistance. However ... [more ▼]

The Cone Penetration Test (CPT) is used for many decades in order to evaluate the pile bearing capacity. Pieter Barentsen developed the CPT around 1930 in order to investigate the soil resistance. However, Boonstra was the first, in 1940, to used the cone resistance of the CPT as the unit pile bearing capacity. From this moment, the CPT became very important in the evaluation of the pile bearing capacity. An overview is given about the most common pile design methods, which are based on the in-situ Cone Penetration Test (CPT). This overview will start with the evolution of the CPT, followed by a brief presentation of the methods in use. An important part, in pile design methods, is the averaging procedure of the cone resistance over an influence zone around the pile tip. Since the pile tip is much wider than the tip of the CPT cone, the influence zone of the pile is also much larger, therefore the cone resistance has to be averaged over the influence zone around the pile tip. Unfortunately, the definition of this zone is different for each method in use. Finally, several methods for the pile tip bearing capacity near the interface of a soil layer will be discussed, including related methods from De Beer [1] and White & Bolton [2]. [less ▲]

Detailed reference viewed: 93 (10 UL)
Full Text
Peer Reviewed
See detailSecurity in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals
Lenzini, Gabriele UL; Samir, Ouchani; Roenne, Peter UL et al

in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a ... [more ▼]

We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a nail’s head. Because of their structural properties, a bundle of them reflects light, creating colorful patterns that we argue to be unique and computationally hard to predict. We argue also that the bundle itself is unclonable. These are typical properties of Physically Unclonable Functions, a family to which shells of ChLCs belong too. Herein we discuss their physical and security properties and their potential use in object authentication. [less ▲]

Detailed reference viewed: 312 (42 UL)
Full Text
See detailUsage public normalisé ou anormal: Kant et les Lumières face à Jeffrey Stout
Burks, Deven UL

in Ruffing, Margit; Grapotte, Sophie; Lequan, Mai (Eds.) Kant: L’année 1784: Droit et philosophie de l’histoire (2017, October)

Dans “Réponse à la question: Qu’est-ce que les Lumières?”, Kant se donne pour tâche de garantir “la plus inoffensive de toutes les libertés, celle de faire publiquement usage de sa raison en toutes ... [more ▼]

Dans “Réponse à la question: Qu’est-ce que les Lumières?”, Kant se donne pour tâche de garantir “la plus inoffensive de toutes les libertés, celle de faire publiquement usage de sa raison en toutes choses” et, par là même, de fonder le progrès des lumières dans un discours public de type normalisé. La démarche de Kant se révèle normalisante dans la mesure où elle “rend commensurable toute contribution au discours dans un domaine” (Jeffrey Stout, Ethics After Babel, p. 294, ma traduction): dans l’usage public, tout interlocuteur part d’un vocabulaire épuré, “à titre de savant”, pour s’adresser à un public de “lecteurs” de sorte que tout autre interlocuteur peut accepter les raisons du premier, peu importe sa fonction dans la société. Une telle normalisation des conditions de pratiques discursives peut-elle réellement faire progresser la société humaine comme le prétend Kant? Certes, un discours normalisé rend compte de la fragmentation de l’autorité dans la société moderne. Mais il résiste à l’effort de certains interlocuteurs, peu satisfaits de ses prétentions libérales fondationnalistes, d’y apporter des éléments justificatifs issus non pas des usages publics de la raison mais de ceux dits “privés”. Car, pour Jeffrey Stout, la discussion qui fait réellement progresser la société cosmopolite passe par l’écoute, “l’interaction conversationnelle” et la critique improvisée dans un “discours anormal” (idem.). À force de vouloir fixer les critères du débat en avance, on le rendrait en même temps stérile. Si cela constitue une critique forte d’un discours normalisé kantien dont les principes sont fondationnalistes, il n’exclut nullement un discours normalisé kantien de type non-fondationnaliste. A cet effet, il suffirait de supposer une raison pratique et un discours modaux, sensibles aux particularités des interlocuteurs, selon lesquels l’usage public exige des interlocuteurs des raisons qui pourraient être adoptées de façon cohérente par tout interlocuteur dans le domaine en question (cf. Towards justice and virtue, Onora O’Neill). Dans cet optique modal, l’usage public résiste-il mieux ou finit-il par se rapprocher de ses critiques plus qu’on ne le soupçonne? [less ▲]

Detailed reference viewed: 53 (0 UL)
Full Text
See detailHuman-Robot-Collaboration for dismantling processes
Groß, Sebastian UL; Gerke, Wolfgang; Plapper, Peter UL

in Müller, Rainer; Plapper, Peter; Brüls, Olivier (Eds.) et al Robotix-Academy Conference for Industrial Robotics (RACIR) 2017 (2017, October)

Remanufacturing of used technical products allows saving of raw material and energy. The complex and mostly manual disassembly of the products prevents the application of remanufacturing in industry. The ... [more ▼]

Remanufacturing of used technical products allows saving of raw material and energy. The complex and mostly manual disassembly of the products prevents the application of remanufacturing in industry. The fully automated dismantling can not be achieved and the manual work causes high labour costs. Companies can profit by remanufacturing. Using human-robot collaboration for disassembly allows a certain degree of automation and provides the flexibility and knowledge of the human. This is a promising approach to economically realise a disassembly and remanufacturing of products which are difficult to disassemble or have a high variance. [less ▲]

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailPlease Stand By: TV-based indoor localization
Popleteev, Andrei UL

in 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017) (2017, October)

Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access ... [more ▼]

Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access points or Bluetooth beacons --- provides only a limited coverage. This paper investigates feasibility of accurate indoor positioning using broadcast digital TV signals, readily available in populated areas worldwide. We experiment with the classic received signal strength (RSS) fingerprinting, and introduce a novel approach based on channel state information (CSI), which leverages frequency-selective multipath fading of wideband TV signals. The proposed methods are experimentally evaluated on an extensive dataset of DVB-T signals, systematically collected in two large buildings over the course of 8 months. The results show that the proposed approach consistently outperforms RSS fingerprinting and achieves 92--98% localization accuracy. While this study is based on the European DVB-T signals, the proposed method is directly generalizable to other TV standards (such as ATSC, ISDB, DTMB and DMB) and wide-area TV white space (TVWS) networks. [less ▲]

Detailed reference viewed: 118 (6 UL)
Full Text
Peer Reviewed
See detailWi-Fi butterfly effect in indoor localization: The impact of imprecise ground truth and small-scale fading
Popleteev, Andrei UL

in 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017) (2017, October)

The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems ... [more ▼]

The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems: hardware diversity, device orientation, environment dynamics. This paper presents a new butterfly-like effect in localization experiments. The effect is caused by minor ground truth (GT) errors --- that is, small deviations between calibration and test positions. While such deviations are widely considered as purely additive and thus negligible, we demonstrate that even centimeter-scale GT errors are amplified by small-scale radio fading and lead to severe multi-meter Wi-Fi positioning errors. The results show that fingerprint-based localization accuracy quickly deteriorates as GT errors increase towards 0.4 wavelength (5 cm for 2.4 GHz). Beyond that threshold, system's accuracy saturates to about one-third of its original level achievable with precise GT. This effect challenges the impact of the already known accuracy-limiting factors (such as cross-user tests, receiver diversity, device orientation and temporal variations), as they can be partially explained by minor GT errors. Moreover, for smartphone-in-a-hand experiments, this effect directly associates the evaluation outcomes with experimenters' diligence. [less ▲]

Detailed reference viewed: 109 (0 UL)
Full Text
Peer Reviewed
See detailHeterogeneous models and analyses in the design of real-time embedded systems - an avionic case-study
Brau, Guillaume UL; Navet, Nicolas UL; Hugues, Jérôme

in 25th International Conference on Real-Time Networks and Systems, Grenoble 4-6 October 2017 (2017, October)

The development of embedded systems according to Model-Driven Development relies on two complementary activities: system modeling on the one hand and analysis of the non-functional properties, such as ... [more ▼]

The development of embedded systems according to Model-Driven Development relies on two complementary activities: system modeling on the one hand and analysis of the non-functional properties, such as timing properties, on the other hand. Yet, the coupling between models and analyses remains largely disregarded so far: e.g., how to apply an analysis on a model? How to manage the analysis process? This paper presents an application of our research on this topic. In particular, we show that our approach makes it possible to combine heterogeneous models and analyses in the design of an avionic system. We use two languages to model the system at different levels of abstraction: the industry standard AADL (Architecture Analysis and Design Language) and the more recent implementation-oriented CPAL language (Cyber-Physical Action Language). We then combine different real-time scheduling analyses so as to gradually define the task and network parameters and finally validate the schedulability of all activities of the system. [less ▲]

Detailed reference viewed: 78 (2 UL)
Full Text
See detailLa dimension extérieure des politiques de l'Union européenne
Neframi, Eleftheria UL

in FIDE (Ed.) External dimension of EU Policies (2017, October)

Detailed reference viewed: 94 (3 UL)
Full Text
Peer Reviewed
See detailDesign of an Electromechanical Prosthetic Finger using Shape Memory Alloy Wires
van der Elst, Louis UL; Quintanar Guzman, Serket UL; Hadji-Minaglou, Jean-Régis UL

in IEEE 5th International Symposium on Robotics and Intelligent Sensors, Ottawa, Canada, 5-7 October 2017 (2017, October)

This research concerns the design and prototyping of an artificial middle finger, using Shape Memory Alloys (SMAs), PolyLactic Acid (PLA), and other technologies. The design is a biomimicry of the human ... [more ▼]

This research concerns the design and prototyping of an artificial middle finger, using Shape Memory Alloys (SMAs), PolyLactic Acid (PLA), and other technologies. The design is a biomimicry of the human biological anatomical and muscular systems. After briefly describing the operational features and functioning of natural striated muscles, the document reviews the features, advantages and disadvantages of SMAs in the perspective of their use as an actuator of a prosthetic finger.Using different design parameters, such as the lightness of the device, actuation complexity, and resilience, a working prototype is proposed meeting the established criteria. [less ▲]

Detailed reference viewed: 145 (4 UL)
Full Text
Peer Reviewed
See detailRelay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems
Gautam, Sumit UL; Lagunas, Eva UL; Sharma, Shree Krishna UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017 (2017, October)

Detailed reference viewed: 410 (53 UL)
Full Text
Peer Reviewed
See detailOptical Feeder Links Study towards Future Generation MEO VHTS Systems
Mengali, Alberto UL; Lyras, Nikos K.; Shankar, Bhavani UL et al

in Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC) (2017, October)

Detailed reference viewed: 161 (4 UL)
Full Text
Peer Reviewed
See detailTowards Automatic Human Body Model Fitting to a 3D Scan
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in D'APUZZO, Nicola (Ed.) Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (2017, October)

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing ... [more ▼]

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing clothing. The underlying body shape is thus partially or completely occluded. Yet, it is very desirable to recover the shape of a covered body as it provides non-invasive means of measuring and analysing it. This is particularly convenient for patients in medical applications, customers in a retail shop, as well as in security applications where suspicious objects under clothing are to be detected. To recover the body shape from the 3D scan of a person in any pose, a human body model is usually fitted to the scan. Current methods rely on the manual placement of markers on the body to identify anatomical locations and guide the pose fitting. The markers are either physically placed on the body before scanning or placed in software as a postprocessing step. Some other methods detect key points on the scan using 3D feature descriptors to automate the placement of markers. They usually require a large database of 3D scans. We propose to automatically estimate the body pose of a person from a 3D mesh acquired by standard 3D body scanners, with or without texture. To fit a human model to the scan, we use joint locations as anchors. These are detected from multiple 2D views using a conventional body joint detector working on images. In contrast to existing approaches, the proposed method is fully automatic, and takes advantage of the robustness of state-of-art 2D joint detectors. The proposed approach is validated on scans of people in different poses wearing garments of various thicknesses and on scans of one person in multiple poses with known ground truth wearing close-fitting clothing. [less ▲]

Detailed reference viewed: 262 (34 UL)
Full Text
Peer Reviewed
See detailRecurrent Neural Network based control of an Oil Well
Jordanou, Jean Panaioti; Antonelo, Eric Aislan UL; Camponogara, Eduardo et al

in Brazilian Symposium on Intelligent Automation, Porto Alegre 1-4 October 2017 (2017, October)

Echo State Networks (ESN) are dynamical learning models composed of two parts: a recurrent network (reservoir) with fixed weights and a linear adaptive readout output layer. The output layer’s weights are ... [more ▼]

Echo State Networks (ESN) are dynamical learning models composed of two parts: a recurrent network (reservoir) with fixed weights and a linear adaptive readout output layer. The output layer’s weights are learned for the ESN to reproduce temporal patterns usually by solving a least-squares problem. Such recurrent networks have shown promising results in previous applications to dynamic system identification and closed-loop control. This work applies an echo state network to control the bottom hole pressure of an oil well, whereby the opening of the production choke is manipulated. The controller utilizes a network to learn the plant inverse model, whose model input is the plant output and the vice-versa, and another network to compute the control action that induces a desired plant behavior. Despite the nonlinearities of the well model, the ESN effectively learned the inverse model and achieved near global setpoint tracking and disturbance rejection, with little setpoint deviation in the latter case. These results show that echo state networks are a viable tool for the control of complex dynamic systems by means of online inverse-model learning. [less ▲]

Detailed reference viewed: 55 (4 UL)
Full Text
Peer Reviewed
See detailSur les uninormes discrètes idempotentes
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

in Couceiro, Miguel; Devillet, Jimmy; Marichal, Jean-Luc (Eds.) LFA 2017 - Rencontres francophones sur la logique floue et ses applications (2017, October)

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values ... [more ▼]

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values. More precisely we first show that the idempotent discrete uninorms are exactly those operations that are conservative, symmetric, and nondecreasing. Then we show that, in this characterization, symmetry can be replaced with both bisymmetry and existence of a neutral element. [less ▲]

Detailed reference viewed: 71 (8 UL)
Full Text
Peer Reviewed
See detailHuman-Robot Cooperation in Surface Inspection Aerial Missions
Molina, Martin; Frau, Pedro; Maraval, Dario et al

in 2017 International Micro Air Vehicle Conference and Flight Competition (IMAV), Toulouse, France, 18-21 Septembre 2017 (2017, September 21)

The goal of the work presented in this paper is to facilitate the cooperation between human opera- tors and aerial robots to perform surface inspec- tion missions. Our approach is based on a model of ... [more ▼]

The goal of the work presented in this paper is to facilitate the cooperation between human opera- tors and aerial robots to perform surface inspec- tion missions. Our approach is based on a model of human collaborative control with a mixed ini- tiative interaction. In the paper, we present our human-robot cooperation model based on the combination of a supervisory mode and an as- sistance mode with a set of interaction patterns. We developed a software system implementing this interaction model and carried out several real flight experiments that proved that this ap- proach can be used in aerial robotics for sur- face inspection missions (e.g., in vision based indoor missions). Compared to a conventional tele-operated inspection system, the solution pre- sented in this paper gives more autonomy to the aerial systems, reducing the cognitive load of the operator during the mission development. [less ▲]

Detailed reference viewed: 48 (5 UL)
Full Text
Peer Reviewed
See detailExperimental investigations on semi-continuous encased composite joints
Duarte Da Costa, Job UL; Obiala, Renata UL; Odenbreit, Christoph UL

in Eurosteel 2017 (2017, September 13)

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has ... [more ▼]

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has been analytically proven that at serviceability limit state (SLS) the performance of composite beams benefits from the use of semi-continuous composite joints [1]. At ultimate limit state (ULS) it is of common knowledge that the use of semi-continuous composite joints is only judicious in combination with the plastic hinge theory, which requires the verification of the rotation capacity of the joint. Despite all the effort done in this area, a concise and well-defined method to determine the rotation capacity of composite joints is lacking. Hence, a research programme with a large experimental part has been designed to investigate the behaviour of the connection between a column and a composite slim-floor beam subjected to a negative bending moment. It is the first time that the rotation capacity of an encased composite joint is analysed. The experimental campaign, presented in here, aims at determining the influence of each joint component on the rotation capacity of composite joints. Three test series have been performed; on boltless beam-to-column connections using variable longitudinal reinforcement ratio and bar diameter of the slab, on a bare bolted end-plate steel connection without reinforced concrete slab and finally on the encased composite joint with the complete bolted end-plate connection. This paper presents a detailed description of the tested specimen, shows the main results of the experimental investigations and gives an outlook on future work regarding this research project. The final goal of the research project is to develop a comprehensive methodology to predict the rotation capacity for traditional and slim-floor type of composite beams. [less ▲]

Detailed reference viewed: 135 (10 UL)
Full Text
Peer Reviewed
See detailMechanical Model to Predict the Resistance of the Shear Connection in Composite Beams with Deep Steel Decking
Odenbreit, Christoph UL; Nellinger, Sebastian UL

in Eurosteel 2017 (2017, September 13)

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking ... [more ▼]

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking onto the ultimate load bearing capacity is considered with empirically derived reduction factors and equations, which have been developed in the last century between the late 70th and the early 80th. The RFCS research project “DISCCO” investigated the shear stud resistance with novel types of steel decking. In many cases, the shear resistance, which was predicted by EN 1994-1-1 was not reached in tests. In the respective experiments with composite beams and deep decking, a concrete cone failure mode was identified and not a pure shear failure of the stud. This failure mode acted in combination with the load bearing capacity of the shear stud, which formed one or two plastic hinges in the shaft - depending on the available geometry. Based on these observations, new equations have been developed to predict the shear connection’s resistance with more accurcy. The yield hinge mechanism of the shear stud, which was developed by Lungershausen, was extended by the above mentioned load bearing component ‘concrete cone’. The formulae consider the geometry of the stud and the steel decking, the material strength of the stud and of the concrete material. The statistical evaluation of the developed equations shows a good accordance with test results. [less ▲]

Detailed reference viewed: 117 (9 UL)
Full Text
Peer Reviewed
See detailLimits of plastic design for composite beams
Schäfer, Markus UL

in Eurosteel 2017 (2017, September 13)

Due to the demand for sustainable constructions, composite structures become more important and lead to slim and economic solutions. The determination of moment resistance for composite beams follows the ... [more ▼]

Due to the demand for sustainable constructions, composite structures become more important and lead to slim and economic solutions. The determination of moment resistance for composite beams follows the rules for composite structures according to EN 1994-1-1. For the plastic design it is still assumed, that each cross-sectional fibre can plastify without any limitation of strains. For normal composite beams in case of sagging moments and a high-lying plastic neutral axis, the real moment resistance is slightly higher than the plastic resistance. This is based on the large strains at the bottom side of the section, so that the lower steel flange reaches the solidification range. In case of sections with a large compression zone height xpl, a concrete failure in the compression zone can happen before reaching the plastic moment resistance. In these cases a strain limit design, based on the strain-stress relationships of concrete and steel, becomes decisive. EN 1994-1-1 provides only for cross-sections of classes 1 and 2 in steel grades S420 and S460 a limitation of plastic design. It is to point out, that the rotation capacity of a composite section is not only conditioned by the b/t ratio of the steel section, but also the concrete part has a significant impact. This applies not only for high steel grades. Though, in Eurocode 4 there are no further regulations given for sections with lower steel grades. Especially, the more and more upcoming integrated and compact composite sections underline the importance of such requirements. Therefore, the objective of the recent research is concentrated on the development of additional regulations, to consider the influence of concrete compression zone height onto the moment resistance of composite beams. [less ▲]

Detailed reference viewed: 77 (7 UL)
Full Text
Peer Reviewed
See detailSpecification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract)
Shin, Seung Yeob UL

in Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017) (2017, September 10)

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial ... [more ▼]

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial in assuring that these processes achieve their goals. But complex utilization policies may govern the use of such resources, increasing the difficulty of accurately incorporating resource considerations into complex processes. This dissertation presents an approach to the specification, allocation, and analysis of the management of such resources. [less ▲]

Detailed reference viewed: 100 (37 UL)
Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Empirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 133 (8 UL)
Full Text
Peer Reviewed
See detailEmbedding of the Personalized Sentiment Engine PERSEUS in an Artificial Companion
Guo, Siwen UL; Schommer, Christoph UL

in International Conference on Companion Technology, Ulm 11-13 September 2017 (2017, September)

The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts ... [more ▼]

The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts them, assists them with simple tasks. . . ”. To serve the users’ interests by considering a personal knowledge is, furthermore, demanded. The following position paper takes this request as motivation for the embedding of the PERSEUS system, which is a personalized sentiment framework based on a Deep Learning approach. We discuss how such an embedding with a group of users should be realized and why the utilization of PERSEUS is beneficial. [less ▲]

Detailed reference viewed: 237 (67 UL)
Full Text
Peer Reviewed
See detailLaboratory experiment for damage assessment using the DAD-method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

in Conference proceedings SMAR 2017 (2017, September)

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam ... [more ▼]

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam. An essential prerequisite for the application of this method is a high precise measurement of the deflection line. In this paper, the results from a laboratory experiment using modern measurement techniques such as photogrammetry and displacement sensors are discussed. A reinforced concrete beam is stepwise loaded until reaching the ultimate limit state. The DAD-method is applied to the resulting data from the measurements and the outcome is discussed for further optimisation of the method. In principle, the measured deflection line of the beam contains already essential information on discontinuities which occur due to cracking. These entries are processed and visualised using the DAD-method. This study shows that a high accuracy of the measurement techniques in combination with the DAD-method can become an effective tool for damage detection. [less ▲]

Detailed reference viewed: 124 (28 UL)
Full Text
Peer Reviewed
See detailOn the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics software
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in AIP Conference Proceedings ICNAAM 2017 (2017, September)

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]

Detailed reference viewed: 217 (61 UL)
Full Text
Peer Reviewed
See detailFORMACIÓN SANITARIA EN VIOLENCIA DE GÉNERO. HERRAMIENTAS ONLINE PARA LA CAPACITACIÓN Y TRANSFERENCIA PRÁCTICA
Fernández Alonso, Carmen; Gomez Bravo, Raquel UL; Herrero Velázquez, Sonia et al

in González López-Valcárcel, Beatriz (Ed.) XVII CONGRESO SESPAS XXXV REUNIÓN CIENTÍFICA DE LA SOCIEDAD ESPAÑOLA DE EPIDEMIOLOGÍA Y XII CONGRESSO DA ASSOCIAÇÃO PORTUGUESA DE EPIDEMIOLOGIA XXXVII JORNADAS DE ECONOMÍA DE LA SALUD Ciencia para la Acción (2017, September)

Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y ... [more ▼]

Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y para la atención a las victimas si no disponemos de profesionales formados para llevarlo a cabo. La violencia contra la mujer no está presente en los contenidos curriculares de la mayor parte de las profesiones sanitarias. Por ello la formación en VG supone en muchos casos partir de cero. Supone sensibilizar y convencer que se trata de un problema de salud y nos compete, y luego de capacitar al profesional para una práctica adecuada. Objetivo del estudio: Identificar necesidades de formación de los y las profesionales en VG, los contenidos básicos y los métodos mejor valorados Elaborar un kit de herramientas de ayuda para la formación dirigido a formadores/as en VG. Métodos: Compartir experiencias formativas de 4 organizaciones europeas que trabajan en VG. Análisis de la práctica formativa, diseñar, consensuar y evaluar las herramientas de ayuda a la formación en VG. Resultados: 1. Kit de 28 herramientas para las distintas fases de la formación (preparación, desarrollo, aplicación, seguimiento y evaluación) con ejemplos que facilitan su aplicación práctica. 2. Documento que recoge las herramientas y materiales disponibles para los docentes y discentes. 3. Página web con todo el material (Toolkik) en inglés y en español accesible: www.toolner.com. En 18 meses ha tenido 40.000 visitas 1ª evaluación de una actividad formativa siguiendo esta metodología ha mejorado los conocimientos y actitudes del alumnado. Conclusiones/Recomendaciones: Esta herramienta on-line puede facilitar el trabajo a los formadores/as y contribuir a la mejora de la capacitación de profesionales y la transferencia a la práctica Se trata de una herramienta dinámica que permite realizar cambios y adaptarse a distintos perfiles y necesidades. Accesible en abierto para cualquier usuario. Financiación: Lifelong Learning Programme, acción Leonardo da Vinci (2013-1-DE2-LEO04-16120 4). [less ▲]

Detailed reference viewed: 141 (4 UL)
Full Text
Peer Reviewed
See detailAutomating Emendations of the Ontological Argument in Intensional Higher-Order Modal Logic
Fuenmayor, David; Benzmüller, Christoph UL

in KI 2017: Advances in Artificial Intelligence 40th Annual German Conference on AI (2017, September)

A shallow semantic embedding of an intensional higher-order modal logic (IHOML) in Isabelle/HOL is presented. IHOML draws on Montague/Gallin intensional logics and has been introduced by Melvin Fitting in ... [more ▼]

A shallow semantic embedding of an intensional higher-order modal logic (IHOML) in Isabelle/HOL is presented. IHOML draws on Montague/Gallin intensional logics and has been introduced by Melvin Fitting in his textbook Types, Tableaus and Gödel’s God in order to discuss his emendation of Gödel’s ontological argument for the existence of God. Utilizing IHOML, the most interesting parts of Fitting’s textbook are formalized, automated and verified in the Isabelle/HOL proof assistant. A particular focus thereby is on three variants of the ontological argument which avoid the modal collapse, which is a strongly criticized side-effect in Gödel’s resp. Scott’s original work. [less ▲]

Detailed reference viewed: 110 (6 UL)
Full Text
Peer Reviewed
See detailFrom RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project
Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL; Briand, Lionel UL

in the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4-8 September 2017 (2017, September)

Detailed reference viewed: 103 (11 UL)
Full Text
Peer Reviewed
See detailLegal Markup Generation in the Large: An Experience Report
Sannier, Nicolas UL; Adedjouma, Morayo UL; Sabetzadeh, Mehrdad UL et al

in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)

Detailed reference viewed: 222 (31 UL)
Full Text
Peer Reviewed
See detailMining AndroZoo: A Retrospect
Li, Li UL

in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]

Detailed reference viewed: 185 (11 UL)
Full Text
See detailWWII: СОВЕТСКИЕ ВОЕННОПЛЕННЫЕ И ВОСТОЧНЫЕ РАБОЧИЕ В ЛЮКСЕМБУРГЕ В 1942-1944 гг.
Ganschow, Inna UL

in Ganschow, Inna (Ed.) СОЦИАЛЬНАЯ ИСТОРИЯ ВТОРОЙ МИРОВОЙ ВОЙНЫ МАТЕРИАЛЫ МЕЖДУНАРОДНОЙ КОНФЕРЕНЦИИ 26-28 августа 2016 г. (2017, September)

This publication is the first scientific treatise in the Russian language and covers the use of the labor force of Soviet prisoners of war and Eastern workers in the Luxembourg economy. The essay deals ... [more ▼]

This publication is the first scientific treatise in the Russian language and covers the use of the labor force of Soviet prisoners of war and Eastern workers in the Luxembourg economy. The essay deals with questions of demographic composi- tion, as well as living and working conditions, which until now have only been dis- cussed on the margins of two other publications on the economy of Luxembourg. Moreover, the essay deals with an unexplored theme of the repatriation of the Soviet citizens from Luxembourg after the liberation of the country in September 1944. [less ▲]

Detailed reference viewed: 84 (9 UL)
Full Text
Peer Reviewed
See detailAmbiLoc: A year-long dataset of FM, TV and GSM fingerprints for ambient indoor localization
Popleteev, Andrei UL

in 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017) (2017, September)

Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM ... [more ▼]

Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM, TV and cellular stations. However, the need for specialized equipment and laborious data collection constitute a high entry barrier for follow-up studies. This paper presents AmbiLoc - a dataset of radio signals for ambient indoor localization research. The dataset has been systematically collected in multiple testbeds, including large-scale and multi-floor buildings, over the course of one year. Due to the use of a software-defined radio receiver, raw signal samples in AmbiLoc allow extraction of arbitrary fingerprinting features. The first edition of AmbiLoc, introduced in this paper, includes received signals strength (RSS) fingerprints of FM, TV and GSM signals, along with the relevant metadata (such as weather conditions). The dataset is available online at AmbiLoc.org. As the first public dataset of ambient localization signals, AmbiLoc provides an easy entry and a common reference for researchers exploring novel indoor localization methods. [less ▲]

Detailed reference viewed: 213 (0 UL)
Full Text
Peer Reviewed
See detailJoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]

Detailed reference viewed: 468 (44 UL)
See detailDie steuerrechtlichen Herausforderungen der digitalen Wirtschaft - Was passiert in Europa?
Sinnig, Julia UL

in Taeger, Juergen (Ed.) Tagungsband Herbstakademie 2017: Recht 4.0 - Innovationen aus den rechtswissenschaftlichen Laboren (2017, September)

Detailed reference viewed: 201 (11 UL)
Full Text
Peer Reviewed
See detailRaising Time Awareness in Model-Driven Engineering
Benelallam, Amine; Hartmann, Thomas UL; Mouline, Ludovic UL et al

in 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (2017, September)

The conviction that big data analytics is a key for the success of modern businesses is growing deeper, and the mobilisation of companies into adopting it becomes increasingly important. Big data ... [more ▼]

The conviction that big data analytics is a key for the success of modern businesses is growing deeper, and the mobilisation of companies into adopting it becomes increasingly important. Big data integration projects enable companies to capture their relevant data, to efficiently store it, turn it into domain knowledge, and finally monetize it. In this context, historical data, also called temporal data, is becoming increasingly available and delivers means to analyse the history of applications, discover temporal patterns, and predict future trends. Despite the fact that most data that today’s applications are dealing with is inherently temporal current approaches, methodologies, and environments for developing these applications don’t provide sufficient support for handling time. We envision that Model-Driven Engineering (MDE) would be an appropriate ecosystem for a seamless and orthogonal integration of time into domain modelling and processing. In this paper, we investigate the state-of-the-art in MDE techniques and tools in order to identify the missing bricks for raising time-awareness in MDE and outline research directions in this emerging domain. [less ▲]

Detailed reference viewed: 161 (9 UL)
Full Text
Peer Reviewed
See detailMultistage Downstream Attack Detection in a Cyber Physical System
Qadeer, Rizwan UL; Murguia, Carlos; Ahmed, Chuadhry Mujeeb et al

in 3rd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems In Conjunction With ESORICS 2017 (2017, September)

We present a detection scheme for attacks on a Cyber-Physical System (CPS) in which we leverage the connectivity of a multistage process to detect attacks downstream from the point of attack. Our methods ... [more ▼]

We present a detection scheme for attacks on a Cyber-Physical System (CPS) in which we leverage the connectivity of a multistage process to detect attacks downstream from the point of attack. Our methods form a control theoretic approach to CPS security by characterizing a real water treatment facility with a mathematical model; obtaining a residual (error) signal from sensor measurements and sensor measurement estimates; and finally using Cumulative Sum (CUSUM) and Bad-Data detection methods to detect the presence of a sensor attack. In particular, the attacks are designed so that they do not raise alarms on the detectors in the same stage where the attack takes place, requiring detection to take place on a separate part of the system. Proposed scheme is implemented on a real world water treatment facility. Extensive experiments are carried out and results show the significance of the proposed scheme. [less ▲]

Detailed reference viewed: 150 (37 UL)
Full Text
Peer Reviewed
See detailA Model for the Optimization of Beacon Message Age-of-Information in a VANET
Baiocchi, Andrea; Turcanu, Ion UL

in 29th International Teletraffic Congress (ITC 29) (2017, September)

Beaconing is a basic communication process taking place in Vehicular Ad Hoc Networks (VANETs) to achieve cooperative awareness among vehicles on the road. It is actually a paradigm of information ... [more ▼]

Beaconing is a basic communication process taking place in Vehicular Ad Hoc Networks (VANETs) to achieve cooperative awareness among vehicles on the road. It is actually a paradigm of information spreading among peer-agents, where each node of a networks sends periodically broadcast messages containing information collected by the node itself. A trade-off arises between the update frequency of the broadcast information and the congestion induced in the wireless shared channel used to send the messages, which is based on the IEEE 802.11p standard in case of a VANET. For periodic updates, the primary metric is the Age-of-Information (AoI), i.e., the age of the latest update received by neighboring nodes. We define an analytical model to evaluate the AoI of a VANET, given the connectivity graph of the vehicles. Analytical results are compared to simulation to assess the accuracy of the model. The model provides a handy tool to optimize the AoI trade-off. [less ▲]

Detailed reference viewed: 137 (11 UL)
Full Text
Peer Reviewed
See detailPrivate Verification of Access on Medical Data: An Initial Study
Bardini Idalino, Thaís; Pierina Brustolin Spagnuelo, Dayana UL; Everson Martina, Jean

in Private Verification of Access on Medical Data: An Initial Study (2017, September)

Patient-centered medical systems promote empowerment of patients, who can decide on the accesses and usage of their personal data. To inspire a sense of trust and encourage the adoption of such systems ... [more ▼]

Patient-centered medical systems promote empowerment of patients, who can decide on the accesses and usage of their personal data. To inspire a sense of trust and encourage the adoption of such systems, it is desired to allow one to verify whether the system has acted in accordance with the patients’ preferences. However, it is argued that even audit logs and usage policies, normally used when verifying such property, may already be enough for one to learn sensitive information, e.g., the medical specialists a given patient has visited in the past. This is not only damaging for the patients, but is also against the interests of the medical system, which may lose back the trust earned and gain a bad reputation. Verifiability should not come at the expense of patients’ privacy. It is, therefore, imperative that these systems take necessary precautions towards patient’s information when providing means for verifiability. In this work we study how to realize that. In particular, we explore how searchable encryption techniques could be applied to allow the verification of systems in a private fashion, providing no information on patient’s sensitive data. [less ▲]

Detailed reference viewed: 123 (3 UL)
Full Text
Peer Reviewed
See detailProfiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Charlier, Jérémy Henri J. UL; Lagraa, Sofiane UL; State, Radu UL et al

in Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18, 2017. (2017, September)

Smart contracts, computer protocols designed for autonomous execution on predefined conditions, arise from the evolution of the Bitcoin’s crypto-currency. They provide higher transaction security and ... [more ▼]

Smart contracts, computer protocols designed for autonomous execution on predefined conditions, arise from the evolution of the Bitcoin’s crypto-currency. They provide higher transaction security and allow economy of scale through the automated process. Smart contracts provides inherent benefits for financial institutions such as investment banking, retail banking, and insurance. This technology is widely used within Ethereum, an open source block-chain platform, from which the data has been extracted to conduct the experiments. In this work, we propose an multi-dimensional approach to find and predict smart contracts interactions only based on their crypto-currency exchanges. This approach relies on tensor modeling combined with stochastic processes. It underlines actual exchanges between smart contracts and targets the predictions of future interactions among the community. The tensor analysis is also challenged with the latest graph algorithms to assess its strengths and weaknesses in comparison to a more standard approach. [less ▲]

Detailed reference viewed: 112 (19 UL)
Full Text
Peer Reviewed
See detailflexfringe: A Passive Automaton Learning Package
Verwer, Sicco E.; Hammerschmidt, Christian UL

in Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on (2017, September)

Detailed reference viewed: 94 (1 UL)
Full Text
Peer Reviewed
See detailA Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)

Detailed reference viewed: 161 (19 UL)
Full Text
Peer Reviewed
See detailPile load test at the west coast of Mexico
Rica, Shilton UL; Van Baars, Stefan UL; Jung, Stefan

in Proceedings of Pile 2017 (2017, September)

Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to ... [more ▼]

Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to execute the pile tests. The soil stratigraphy has been surveyed with standard penetration tests, cone penetration tests and borings, and consists of a ten to twelve meter soft clayey soil on top of a hard clay layer. Three identical pile tests have been performed on bored piles with a pile diameter of 0.6 m and a pile length of 30 m. In addition, two identical pile tests have been performed on driven piles with a squared cross section of 0.5 m × 0.5 m and a pile length of about 21 m. The aims of these tests were, first to evaluate the pile bearing capacity for both the bored and the driven pile types, in order to decide which pile type will be used finally, for the foundation of a factory; and second, to study the influence of the pile installation process on the pile bearing capacity of both pile types. During the testing of the bored piles, load measurements in different sections of the pile suggested that almost all bearing capacity came from the pile section in the upper soft clay layer. Since it is impossible to have such a relative large friction along the pile shaft in the soft soil, and because far more concrete was used for making the pile than expected, it had to be concluded that the liquid concrete has widened the pile diameter just above the hard soil layer, leading to a bulking effect in the pile. Therefore, the pile was leaning on this hard soil layer. For the driven test piles, the measurements showed a normal behaviour of both the pile shaft friction and the pile tip bearing capacity. [less ▲]

Detailed reference viewed: 106 (11 UL)
Full Text
Peer Reviewed
See detailHigh-Order Conversion from Boolean to Arithmetic Masking
Coron, Jean-Sébastien UL

in Proceedings of CHES 2017 (2017, September)

Detailed reference viewed: 145 (17 UL)
Full Text
Peer Reviewed
See detailComparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM Applications
Rousset, Alban UL; Mainassara Chekaraou, Abdoul Wahid UL; Liao, Yu-Chung UL et al

in AIP Conference Proceedings ICNAAM 2017 (2017, September)

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric ... [more ▼]

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric contact when it is about to occur or has actually occurred. Unfortunately, detailed and exact collision detection for large amounts of objects represent an immense amount of computations, naively n 2 operation with n being the number of objects [9]. To avoid and reduce these expensive computations, the collision detection is decomposed in two phases as it shown on Figure 1: the Broad-Phase and the Narrow-Phase. In this paper, we focus on Broad-Phase algorithm in a large dynamic three-dimensional environment. We studied two kinds of Broad-Phase algorithms: spatial partitioning and spatial sorting. Spatial partitioning techniques operate by dividing space into a number of regions that can be quickly tested against each object. Two types of spatial partitioning will be considered: grids and trees. The grid-based algorithms consist of a spatial partitioning processing by dividing space into regions and testing if objects overlap the same region of space. And this reduces the number of pairwise to test. The tree-based algorithms use a tree structure where each node spans a particular space area. This reduces the pairwise checking cost because only tree leaves are checked. The spatial sorting based algorithm consists of a sorted spatial ordering of objects. Axis-Aligned Bounding Boxes (AABBs) are projected onto x, y and z axes and put into sorted lists. By sorting projection onto axes, two objects collide if and only if they collide on the three axes. This axis sorting reduces the number of pairwise to tested by reducing the number of tests to perform to only pairs which collide on at least one axis. For this study, ten different Broad-Phase collision detection algorithms or framework have been considered. The Bullet [6], CGAL [10, 11] frameworks have been used. Concerning the implemented algorithms most of them come from papers or given implementation. [less ▲]

Detailed reference viewed: 263 (54 UL)
Full Text
Peer Reviewed
See detailRefinement-Aware Generation of Attack Trees
Gadyatskaya, Olga UL; Ravi, Jhawar; Mauw, Sjouke UL et al

in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)

Detailed reference viewed: 154 (4 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 143 (12 UL)
Full Text
Peer Reviewed
See detailA Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet
Lei, Lei UL; You, Lei; Dai, Gaoyang et al

in IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017 (2017, August 31)

Detailed reference viewed: 291 (17 UL)
Full Text
Peer Reviewed
See detailImplementation and validation of an event-based real-time nonlinear model predictive control framework with ROS interface for single and multi-robot systems
Dentler, Jan Eric UL; Kannan, Somasundar UL; Olivares Mendez, Miguel Angel UL et al

in 2017 IEEE Conference on Control Technology and Applications (CCTA) (2017, August 30)

This paper presents the implementation and experimental validation of a central control framework. The presented framework addresses the need for a controller, which provides high performance combined ... [more ▼]

This paper presents the implementation and experimental validation of a central control framework. The presented framework addresses the need for a controller, which provides high performance combined with a low-computational load while being on-line adaptable to changes in the control scenario. Examples for such scenarios are cooperative control, task-based control and fault-tolerant control, where the system's topology, dynamics, objectives and constraints are changing. The framework combines a fast Nonlinear Model Predictive Control (NMPC), a communication interface with the Robot Operating System (ROS) [1] as well as a modularization that allows an event-based change of the NMPC scenario. To experimentally validate performance and event-based adaptability of the framework, this paper is using a cooperative control scenario of Unmanned Aerial Vehicles (UAVs). The source code of the proposed framework is available under [2]. [less ▲]

Detailed reference viewed: 201 (20 UL)
Full Text
Peer Reviewed
See detailFourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
Liu, Zhe UL; Longa, Patrick; Pereira, Geovandro et al

in Homma, Naofumi; Fischer, Wieland (Eds.) International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (2017, August 25)

Detailed reference viewed: 95 (16 UL)
Full Text
Peer Reviewed
See detailFacial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations
Oyedotun, Oyebade UL; Demisse, Girum UL; Shabayek, Abd El Rahman UL et al

in 2017 IEEE International Conference on Computer Vision Workshop (ICCVW) (2017, August 21)

Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we ... [more ▼]

Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we propose deep convolutional neural network (DCNN) for joint learning of robust facial expression features from fused RGB and depth map latent representations. We posit that learning jointly from both modalities result in a more robust classifier for facial expression recognition (FER) as opposed to learning from either of the modalities independently. Particularly, we construct a learning pipeline that allows us to learn several hierarchical levels of feature representations and then perform the fusion of RGB and depth map latent representations for joint learning of facial expressions. Our experimental results on the BU-3DFE dataset validate the proposed fusion approach, as a model learned from the joint modalities outperforms models learned from either of the modalities. [less ▲]

Detailed reference viewed: 346 (55 UL)
Full Text
Peer Reviewed
See detailCoverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics
Rosalie, Martin UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (2017, August 11)

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation ... [more ▼]

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation to swarm members in favor of achieving an efficient global behavior. In this paper, we address the problem of optimizing two adversary criteria for such a UAV swarm: (a) maximizing the area coverage, while (b) preserving network connectivity. Our approach, called CACOC², solves the problem with a novel chaotic ant colony optimization approach, which combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC² employs swarming behavior to obtain UAV clustering that result in maximized area coverage and preserved network connectivity. We show by extensive simulations how the size of the UAV swarm influences the coverage and connectivity. A metrics comparison chart shows the correlation of coverage and connectivity metrics. [less ▲]

Detailed reference viewed: 181 (29 UL)
Full Text
Peer Reviewed
See detailMultiprecision Multiplication on ARMv8
Liu, Zhe UL; Järvinen, Kimmo; Liu, Weiqiang et al

in IEEE 24th Symposium on Computer Arithmetic - ARITH24 (2017, August 01)

Detailed reference viewed: 109 (2 UL)
Full Text
Peer Reviewed
See detailAn Extensible and Lightweight Modular Ontology for Programming Education
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in Advances in Computing - 12th Colombian Conference, CCC 2017, Cali, Colombia, September 19-22, 2017, Proceedings (2017, August)

Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an ... [more ▼]

Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an open, heterogeneous corpus is a nontrivial problem. In this paper, we propose an extensible and lightweight modular ontology for programming education. Its main purpose is to integrate annotated learning material related to programming into an IDE such as Eclipse. Our ontology is based on a modular architecture, which is extensible with respect to different programming languages. Aligning language-specific concepts with user-specific tags allows us to suggest learning resources for code elements in a fine-grained and cross-curricular way. Our concrete implementation establishes relations between learning aspects in Java or C code and annotated resources such as articles on online question-and-answer sites. [less ▲]

Detailed reference viewed: 183 (33 UL)
Full Text
Peer Reviewed
See detailRandom Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO Radars
Hammes, Christian UL; Shankar, Bhavani UL; Nijsure, Yogesh UL et al

in European Signal Processing Conference (EUSIPCO) 2017 (2017, August)

A random Phase Center Motion (PCM) technique is presented in this paper, based on Frequency Modulated Continuous Wave (FMCW) radar, in order to suppress the angle- Doppler coupling in Time Division ... [more ▼]

A random Phase Center Motion (PCM) technique is presented in this paper, based on Frequency Modulated Continuous Wave (FMCW) radar, in order to suppress the angle- Doppler coupling in Time Division Multiplex (TDM) Multiple- Input-Multiple-Output (MIMO) radar when employing sparse array structures. The presented approach exploits an apparently moving transmit platform or PCM due to spatio-temporal transmit array modulation. In particular, the work considers a framework utilizing a random PCM trajectory. The statistical characterization of the random PCM trajectory is devised, such that the PCM and the target motion coupling is minimal, while the angular resolution is increased by enabling the virtual MIMO concept. In more details, this paper discusses sidelobe suppression approaches within the angle-Doppler Ambiguity Function (AF) by introducing a phase center probability density function within the array. This allows for enhanced discrimination of multiple targets. Simulation results demonstrate the suppression angle- Doppler coupling by more than 30 dB, even though spatiotemporal transmit array modulation is done across chirps which leads usually to strong angle-Doppler coupling. [less ▲]

Detailed reference viewed: 206 (17 UL)
Full Text
Peer Reviewed
See detailIndoor localization using ambient FM radio RSS fingerprinting: A 9-month study
Popleteev, Andrei UL

in 17th IEEE International Conference on Computer and Information Technology (CIT-2017) (2017, August)

While indoor positioning systems aspire for higher accuracy, their coverage is typically limited to buildings with dedicated hardware. A possible alternative is offered by infrastructure-free positioning ... [more ▼]

While indoor positioning systems aspire for higher accuracy, their coverage is typically limited to buildings with dedicated hardware. A possible alternative is offered by infrastructure-free positioning methods. In particular, several studies have demonstrated feasibility of indoor positioning using broadcast FM radio signals, which are available in most populated areas worldwide. However, previous work provides little information about long-term performance of FM-based indoor localization. This paper presents a longitudinal study of FM indoor positioning based on received signal strength (RSS) fingerprinting. We evaluate system's performance on a large dataset of real-world FM signals, systematically collected in several large-scale multi-floor testbeds over the course of 9 months. We also investigate the impact of different classifiers, training schedules and fingerprint sizes on localization accuracy. The results demonstrate that well-trained FM-based system can provide reliable indoor positioning even several months after deployment. [less ▲]

Detailed reference viewed: 91 (0 UL)
Full Text
Peer Reviewed
See detailBelief Change in a Preferential Non-Monotonic Framework
Casini, Giovanni UL; Meyer, Thomas

in Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (2017, August)

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can ... [more ▼]

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can also integrate the two formalisms by studying belief change within a (preferential) non-monotonic framework. This integration relies heavily on the identification of the monotonic core of a non-monotonic framework. We consider belief change operators in a non-monotonic propositional setting with a view towards preserving consistency. These results can also be applied to the preservation of coherence—an important notion within the field of logic-based ontologies. We show that the standard AGM approach to belief change can be adapted to a preferential non-monotonic framework, with the definition of expansion, contraction, and revision operators, and corresponding representation results. Surprisingly, preferential AGM belief change, as defined here, can be obtained in terms of classical AGM belief change. [less ▲]

Detailed reference viewed: 204 (5 UL)
Full Text
Peer Reviewed
See detailAn engineering approach to mapping meanings in products and services
Waltersdorfer, Gregor UL; Gericke, Kilian UL; Desmet, Pieter M. A. et al

in Maier, Anja; Skec, Stanko; Kim, Harrison (Eds.) et al Proceedings of the 21st International Conference on Engineering Design (ICED 17) Vol 3: Product, Services and Systems Design (2017, August)

Detailed reference viewed: 69 (6 UL)
Full Text
Peer Reviewed
See detailHidden-Token Searchable Public-Key Encryption
Zuo, Cong; Shao, Jun; Liu, Zhe UL et al

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17 (2017, August)

Detailed reference viewed: 92 (0 UL)
Full Text
Peer Reviewed
See detailWhat do we need to say about a design method?
Gericke, Kilian UL; Eckert, Claudia; Stacey, Martin

in Proceedings of the 21st International Conference on Engineering Design (2017, August)

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with ... [more ▼]

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with methods is the lack of clarity about what is actually proposed to industry and the academic community when a new method is put forward, in terms of how detailed, strict, precise and rigorous the method is and what it can deliver. This paper puts the concept of method in the context of related concepts and proposes a multi-level model of the elements of a method to argue that a contribution on each of these levels can be of value and that the introduction of methods can fail on each of these levels. Implications thereof for industry and academia are discussed, concluding that a clear description of methods and their intended use is important for enabling proper validation of each of the method’s elements and for communicating methods to academia and industry. [less ▲]

Detailed reference viewed: 101 (6 UL)
Full Text
Peer Reviewed
See detailTraining Very Deep Networks via Residual Learning with Stochastic Input Shortcut Connections
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017 (2017, July 31)

Many works have posited the benefit of depth in deep networks. However, one of the problems encountered in the training of very deep networks is feature reuse; that is, features are ’diluted’ as they are ... [more ▼]

Many works have posited the benefit of depth in deep networks. However, one of the problems encountered in the training of very deep networks is feature reuse; that is, features are ’diluted’ as they are forward propagated through the model. Hence, later network layers receive less informative signals about the input data, consequently making training less effective. In this work, we address the problem of feature reuse by taking inspiration from an earlier work which employed residual learning for alleviating the problem of feature reuse. We propose a modification of residual learning for training very deep networks to realize improved generalization performance; for this, we allow stochastic shortcut connections of identity mappings from the input to hidden layers.We perform extensive experiments using the USPS and MNIST datasets. On the USPS dataset, we achieve an error rate of 2.69% without employing any form of data augmentation (or manipulation). On the MNIST dataset, we reach a comparable state-of-the-art error rate of 0.52%. Particularly, these results are achieved without employing any explicit regularization technique. [less ▲]

Detailed reference viewed: 235 (46 UL)
Full Text
Peer Reviewed
See detailReview of plastic moment resistance for compsite beams - Development of second generation of Eurocode 4
Schäfer, Markus UL

in Leon, Roberto (Ed.) 8th International Conference on Composie Structures in Steel and Concrete (2017, July 30)

Due to the demand for sustainable buildings and slim constructions, composite slim-floor systems become more important. The present European Codes do not include complete de-sign rules for shallow-floor ... [more ▼]

Due to the demand for sustainable buildings and slim constructions, composite slim-floor systems become more important. The present European Codes do not include complete de-sign rules for shallow-floor beams. Therefore, the objective of the recent research work was concentrated on the development of additional regulations, considering ultimate limit state, serviceability limit state and fire design. Apart from traditional sections consisting of rolled profiles also floor-slabs with integrated steel-box-sections have been considered [less ▲]

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailDevelopment of a new push test for Eurocode 4
Hicks, Stephen; Ciutina, Adrian; Odenbreit, Christoph UL

in 8th International Conference on Composite Construction in Steel and Concrete (2017, July 30)

The standard push test specimen in the current version of Eurocode 4 does not provide any information on what modifications should be made when profiled steel sheeting is introduced. Whilst the lack of ... [more ▼]

The standard push test specimen in the current version of Eurocode 4 does not provide any information on what modifications should be made when profiled steel sheeting is introduced. Whilst the lack of information was intended to encourage innovation, this has sometimes lead to test results implying that stud connectors possess a lower resistance and ductility than assumed in current Standards. From full-scale beam and companion push tests in Europe, it has been shown that modifying the push test through the introduction of a normal force to the face of the test slabs provides comparable load-slip performance to that encountered within a beam. Within the work programme for developing the second generation of Eurocodes, this paper presents part of the background to Sub-task 1 of SC4.T3, whose aim is to develop an improved push test for Eurocode 4 when stud connectors are welded within profiled steel sheeting. [less ▲]

Detailed reference viewed: 116 (2 UL)
Full Text
Peer Reviewed
See detailArea exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPC
Rosalie, Martin UL; Dentler, Jan Eric UL; Danoy, Grégoire UL et al

in 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (2017, July 27)

The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already ... [more ▼]

The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already proposed a new mobility model using Ant Colony Algorithms combined with chaotic dynamics (CACOC) to enhance the coverage of an area by a swarm of UAVs. In this paper we propose to consider this mobility model as waypoints for real UAVs. A control model of the UAVs is deployed to test the efficiency of the coverage of an area by the swarm. We have tested our approach in a realistic robotics simulator (V-Rep) which is connected with ROS. We compare the performance in terms of coverage using several metrics to ensure that this mobility model is efficient for real UAVs. [less ▲]

Detailed reference viewed: 227 (40 UL)
Full Text
Peer Reviewed
See detailA centralized approach for setting floating content parameters in VANETs
Di Maio, Antonio UL; Soua, Ridha UL; Palattella, Maria Rita et al

in A centralized approach for setting floating content parameters in VANETs (2017, July 20)

Floating Content (FC) has recently been proposed as an attractive application for mobile networks, such as VANETs, to operate opportunistic and distributed content sharing over a given geographic area ... [more ▼]

Floating Content (FC) has recently been proposed as an attractive application for mobile networks, such as VANETs, to operate opportunistic and distributed content sharing over a given geographic area, namely Anchor Zone (AZ). FC performances are tightly dependent on the AZ size, which in literature is classically chosen by the node that generates the floating message. In the present work, we propose a method to improve FC performances by optimizing the AZ size with the support of a Software Defined Network (SDN) controller, which collects mobility information, such as speed and position, of the vehicles in its coverage range. [less ▲]

Detailed reference viewed: 166 (17 UL)
Full Text
Peer Reviewed
See detailChanging (multi-)cultural contexts through the lense of the receiving society
Murdock, Elke UL; Albert, Isabelle UL; Ferring, Dieter UL

in 9th European IACCP Conference - Program and the book of abstracts (2017, July 17)

Using the natural laboratory of Luxembourg with a foreign population of 47% as case study example, we outline the diversification of diversity. The immigrant population is increasingly heterogeneous in ... [more ▼]

Using the natural laboratory of Luxembourg with a foreign population of 47% as case study example, we outline the diversification of diversity. The immigrant population is increasingly heterogeneous in terms of countries of origin, length of stay/ generation status, economic participation and acculturation choices. Who is a Luxembourger is increasingly difficult to define and minority or majority becomes ever more fluid. Empirical findings concerning the attitude of the receiving society towards multiculturalism will be presented including implications for national identification. We aim to shed light on inter-individual differences in terms of views on immigration among the receiving society, also taking into consideration regional demographic differences. We draw on two different samples, one from the center of Luxembourg (N = 507), where the native population is in the minority and a more regionally diversified sample (N = 238). Similarities and differences will be highlighted and implications discussed. [less ▲]

Detailed reference viewed: 61 (10 UL)
Full Text
Peer Reviewed
See detailRisk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical Systems
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017 (2017, July 11)

Stochastic nonlinear model predictive control has been developed to systematically find an optimal decision with the aim of performance improvement in dynamical systems that involve uncertainties. However ... [more ▼]

Stochastic nonlinear model predictive control has been developed to systematically find an optimal decision with the aim of performance improvement in dynamical systems that involve uncertainties. However, most of the current methods are risk-neutral for safety-critical systems and depend on computationally expensive algorithms. This paper investigates on the risk-averse optimal stochastic nonlinear control subject to real-time safety-critical systems. In order to achieve a computationally tractable design and integrate knowledge about the uncertainties, bounded trajectories generated to quantify the uncertainties. The proposed controller considers these scenarios in a risk-sensitive manner. A certainty equivalent nonlinear model predictive control based on minimum principle is reformulated to optimise nominal cost and expected value of future recourse actions. The capability of proposed method in terms of states regulations, constraints fulfilment, and real-time implementation is demonstrated for a semi-autonomous ecological advanced driver assistance system specified for battery electric vehicles. This system plans for a safe and energy-efficient cruising velocity profile autonomously. [less ▲]

Detailed reference viewed: 141 (8 UL)
Full Text
Peer Reviewed
See detailKnowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices
Kubler, Sylvain UL; Derigent, William; Voisin, Alexandre et al

in Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices (2017, July 10)

Abstract—Fuzzy AHP is today one of the most used Multiple Criteria Decision-Making (MCDM) techniques. The main argument to introduce fuzzy set theory within AHP lies in its ability to handle uncertainty ... [more ▼]

Abstract—Fuzzy AHP is today one of the most used Multiple Criteria Decision-Making (MCDM) techniques. The main argument to introduce fuzzy set theory within AHP lies in its ability to handle uncertainty and vagueness arising from decision makers (when performing pairwise comparisons between a set of criteria/alternatives). As humans usually reason with granular information rather than precise one, such pairwise comparisons may contain some degree of inconsistency that needs to be properly tackled to guarantee the relevance of the result/ranking. Over the last decades, several consistency indexes designed for fuzzy pairwise comparison matrices (FPCMs) were proposed, as will be discussed in this article. However, for some decision theory specialists, it appears that most of these indexes fail to be properly “axiomatically” founded, thus leading to misleading results. To overcome this, a new index, referred to as KCI (Knowledge-based Consistency Index) is introduced in this paper, and later compared with an existing index that is axiomatically well founded. The comparison results show that (i) both indexes perform similarly from a consistency measurement perspective, but (ii) KCI contributes to significantly reduce the computation time, which can save expert’s time in some MCDM problems. [less ▲]

Detailed reference viewed: 124 (4 UL)
Full Text
Peer Reviewed
See detailExploring Effect of Location Number on Map-Based Graphical Password Authentication
Meng, Weizhi; Lee, Wanghao; Au, Man ho et al

in 22nd Australasian Conference on Information Security and Privacy - ACISP2017 (2017, July 03)

Detailed reference viewed: 109 (0 UL)
Full Text
Peer Reviewed
See detailTesting the discrimination hypothesis for female self employment migrants in the UK
Constantinidis, Christina UL; Fletcher, Denise Elaine UL; Joxhe, Majlinda UL

in IAFFE (Ed.) Books of Abstracts (2017, July 01)

We propose a comparative analysis of migrants in both sectors (employment and self-employment) exploring the gender earning discrimination hypothesis. Using individual micro data from the British ... [more ▼]

We propose a comparative analysis of migrants in both sectors (employment and self-employment) exploring the gender earning discrimination hypothesis. Using individual micro data from the British Household Panel Survey (1991-2008), we estimate wage equations for employed and self-employed migrants and find that, contrary to our expectations, the average earnings gap in self-employment is almost double compared to the employment sector. This finding reveals that self-employment leads migrant women to an even more precarious and vulnerable position in terms of financial means and economic power. In addition, we explore the determinants of these gaps using the econometric procedure of the decomposition (the Blinder-Oaxaca) model. We find that the variables that explain the gender gap in the employment sector are mostly observable individual characteristics like education or migration duration, confirming the human capital theory, whereas in the self-employment sector, this gap is more due to unobservable individual characteristics. Through our work, we show that including the gender perspective into migration analysis has implications for policy makers enabling them to evaluate these processes from a more social (rather than individualistic) dimension. [less ▲]

Detailed reference viewed: 150 (10 UL)
Full Text
Peer Reviewed
See detailAnalyzing Complex Data in Motion at Scale with Temporal Graphs
Hartmann, Thomas UL; Fouquet, François UL; Jimenez, Matthieu UL et al

in Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (2017, July)

Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics ... [more ▼]

Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics algorithms to deal with more and more complex data, which can be structured as graphs and evolve over time. However, the underlying data storage systems that support large-scale data analytics, such as time-series or graph databases, fail to accommodate both dimensions, which limits the integration of more advanced analysis taking into account the history of complex graphs, for example. This paper therefore introduces a formal and practical definition of temporal graphs. Temporal graphs pro- vide a compact representation of time-evolving graphs that can be used to analyze complex data in motion. In particular, we demonstrate with our open-source implementation, named GREYCAT, that the performance of temporal graphs allows analytics solutions to deal with rapidly evolving large-scale graphs. [less ▲]

Detailed reference viewed: 228 (15 UL)
Full Text
Peer Reviewed
See detailLinear Dynamic Network Reconstruction from Heterogeneous Datasets
Yue, Zuogong UL; Thunberg, Johan UL; Pan, Wei et al

in Linear Dynamic Network Reconstruction from Heterogeneous Datasets (2017, July)

Detailed reference viewed: 83 (1 UL)
Full Text
Peer Reviewed
See detailHybrid software and system development in practice: Waterfall, scrum, and beyond
Kuhrmann, Marco; Diebold, Philipp; Münch, Jürgen et al

in Proceedings of International Conference on Software and Systems Process (ICSSP) (2017, July)

Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well ... [more ▼]

Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well-structured comprehensive methods and flexible agile practices. Yet, the number of methods and practices is large, and available studies argue that the actual process composition is carried out in a fairly ad-hoc manner. The present paper reports on a survey on hybrid software development approaches. We study which approaches are used in practice, how different approaches are combined, and what contextual factors influence the use and combination of hybrid software development approaches. Our results from 69 study participants show a variety of development approaches used and combined in practice. We show that most combinations follow a pattern in which a traditional process model serves as framework in which several fine-grained (agile) practices are plugged in. We further show that hybrid software development approaches are independent from the company size and external triggers. We conclude that such approaches are the results of a natural process evolution, which is mainly driven by experience, learning, and pragmatism. [less ▲]

Detailed reference viewed: 220 (18 UL)
Full Text
Peer Reviewed
See detailLMI-Based H_infty Nonlinear State Observer Design for Anaerobic Digestion Model
Chaib Draa, Khadidja UL; Voos, Holger UL; Alma, Marouane et al

in IEEE Mediterranean Conference on Control and Automation, Valletta 3-6 July 2017 (2017, July)

This note deals with the design of an $H_{\infty}$ nonlinear state observer for the anaerobic digestion model. Positively, the designed observer is an unified one that can be used for different class of ... [more ▼]

This note deals with the design of an $H_{\infty}$ nonlinear state observer for the anaerobic digestion model. Positively, the designed observer is an unified one that can be used for different class of systems, mainly linear systems, Linear Parameter Varying (LPV) systems with known and bounded parameters, and nonlinear Lipschitz systems. Applying the Lyapunov theory and theH¥ criterion, Linear Matrix Inequality (LMI) condition is synthesised and solved to obtain the designed observer gains. The novelty of our work consists in the relaxation of the synthesized LMI condition through the inclusion of additional decision variables. This was possible due to the use of a suitable reformulation of the Young’s inequality. Stability, effectiveness and potency of the theoretical results are confirmed by the simulation results. [less ▲]

Detailed reference viewed: 61 (4 UL)
Full Text
Peer Reviewed
See detailSpatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink
Spano, Danilo UL; Alodeh, Maha UL; Chatzinotas, Symeon UL et al

in IEEE SPAWC 2017 (2017, July)

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the ... [more ▼]

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the constructive interference effect, the proposed scheme aims at improving the robustness of the transmitted signals to the non-linear distortions of practical satellite systems. This is done by reducing the imbalances between the instantaneous power transmitted by the multiple antennas, which are detrimental in non-linear systems. More specifically, this work proposes a symbol-level precoding scheme performing the minimization of the spatial peak-to-average power ratio, under Quality-of-Service constraints. An iterative algorithm is proposed to solve the related optimization problem. Numerical results are presented to assess the performance of the proposed scheme, which outperforms the state of the art symbol-level precoding techniques in terms of spatial peak-to-average power ratio across the transmitting antennas. [less ▲]

Detailed reference viewed: 236 (27 UL)
Full Text
Peer Reviewed
See detailThe role of humour in intimate intercultural relationships
Aleksic, Gabrijela UL

in The 9th European IACPP Conference (2017, July)

Humour is vital for social life. We explored the role of humour in intimate intercultural relationships by: (1) interviewing intercultural couples and (2) analysing the videos of international street ... [more ▼]

Humour is vital for social life. We explored the role of humour in intimate intercultural relationships by: (1) interviewing intercultural couples and (2) analysing the videos of international street performances of a conflictual intercultural clown couple. The interviews involved 15 intercultural couples. The video analysis was based on one clown couple selected from an initial sample. Preliminary results supported the interdisciplinary theories explaining the relationships between: (1) humour and embarrassment and (2) humour and hatred. Humour and ridicule are main elements of embarrassment which is important for maintaining social order. The presence of an audience in embarrassing situations is necessary. ‘Laughing with’ or ‘laughing at’ was explored through three main types of embarrassing situations: faux pas, sticky situations and being the centre of attention. The third type was found to be the most common among intercultural couples, especially in situations of linguistic misunderstandings. Humour was the most used remedial strategy, along with apologies, excuses and justifications. Embarrassment was related to shame, the master-emotion appearing when interpersonal or group relations are broken. Shame could transform into rage and humour can provide tools for expressing it while also supporting the feelings of pleasure. Hatred was present in the forms of stereotypes against the partner’s culture through jokes. We discuss humour, embarrassment and hatred from micro to macro level to understand how they can protect the social order, find the pleasure in damaging the same and what we can do about it. [less ▲]

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailMeasuring data locality ratio in virtual MapReduce cluster using WorkflowSim
Wangsom, Peerasak; Lavangnananda, Kittichai; Bouvry, Pascal UL

in Proceedings of the 14th International Joint Conference on Computer Science and Software Engineering (JCSSE), 2017 14th (2017, July)

The data locality is significant factor which has a direct impact on the performance of MapReduce framework. Several previous works have proposed alternative scheduling algorithms for improving the ... [more ▼]

The data locality is significant factor which has a direct impact on the performance of MapReduce framework. Several previous works have proposed alternative scheduling algorithms for improving the performance by increasing data locality. Nevertheless, their studies had focused the data locality on physical MapReduce cluster. As more and more deployment of MapReduce cluster have been on virtual environment, a more suitable evaluation of MapReduce cluster may be necessary. This study adopts a simulation based approach. Five scheduling algorithms were used for the simulation. WorkflowSim is extended by inclusion of three implemented modules to assess the new performance measure called `data locality ratio'. Comparison of their results reveals interesting findings. The proposed implementation can be used to assess `data locality ratio' and allows users prior to efficiently select and tune scheduler and system configurations suitable for an environment prior to its actual physical MapReduce deployment. [less ▲]

Detailed reference viewed: 112 (7 UL)
Full Text
Peer Reviewed
See detailPower Allocation for In-Band Full-Duplex Self-Backhauling
Lagunas, Eva UL; Lei, Lei UL; Maleki, Sina UL et al

in International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017 (2017, July)

Detailed reference viewed: 185 (25 UL)
Full Text
Peer Reviewed
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana UL; Bartolini, Cesare UL; Lenzini, Gabriele UL

in Proceedings of TrustBus 2017 (2017, July)

Detailed reference viewed: 185 (20 UL)
Full Text
Peer Reviewed
See detailNumerical Check of the Meyerhof Bearing Capacity Equation for Shallow Foundations
Van Baars, Stefan UL

in Shehata, Hany; Rashed, Youssef (Eds.) Congress and Exhibition on Sustainable Civil Infrastructures (2017, July)

In 1920 Prandtl published an analytical solution for the bearing capacity of a strip load on a weightless infinite half-space. This solution was extended with a surrounding surcharge by Reissner and with ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a strip load on a weightless infinite half-space. This solution was extended with a surrounding surcharge by Reissner and with the soil weight by Keverling Buisman. It was Terzaghi who wrote this with three separate bearing capacity factors for the cohesion, surcharge and soil-weight. Meyerhof extended this to the equation which is nowadays used; with shape and inclination factors. He also proposed equations for the inclination factors, based on his own laboratory experiments. Since then, several people proposed updated equations for the soil-weight bearing capacity factor, and also for the shape and inclination factors. The common idea is that failure of a footing occurs in all cases with a Prandtl-wedge failure mechanism. In order to check the failure mechanisms and the currently used equations for the bearing capacity factors and shape factors, a large number of finite element calculations of strip and circular footings have been made. These calculations proof that for some cases there are also a few other failure mechanisms possible. Also the currently used bearing capacity factors and shape factors are not correct. In fact, for footings on a soil with a higher friction angle, all three bearing capacity factors and all three shape factors can be much lower than the currently used values. This means that the currently used equations for the soil-weight bearing capacity factors and the shape factors are inaccurate and unsafe. Therefore, based on the finite element calculations, new equations have been presented in this paper. [less ▲]

Detailed reference viewed: 125 (2 UL)
Full Text
Peer Reviewed
See detailImpact of residual transceiver impairments on MMSE filtering performance of Rayleigh-product MIMO channels
Sharma, Shree Krishna UL; Papazafeiropoulos, Anastasios; Chatzinotas, Symeon UL et al

in Proc. IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2017) (2017, July)

ecent studies have demonstrated the presence of residual transceiver hardware impairments even after employing calibration and compensation techniques in different wireless systems. The effect of these ... [more ▼]

ecent studies have demonstrated the presence of residual transceiver hardware impairments even after employing calibration and compensation techniques in different wireless systems. The effect of these impairments becomes more severe in the systems involving a large number of inexpensive Radio Frequency (RF) chains such as massive Multiple Input Multiple Output (MIMO) systems due to the requirement of cost-efficient implementation. However, most of the existing studies consider ideal transceivers without incorporating the effect of residual hardware impairments. In this regard, this paper studies the impact of additive residual transceiver hardware impairments on the Minimum Mean Square Error (MMSE) filtering performance of Rayleigh-Product (RP) MIMO channels. Using principles from Random Matrix Theory (RMT), the MMSE filtering performance of the RP channels is analyzed and a tight lower bound is derived by taking the effects of residual additive transceiver impairments into account. Moreover, some useful insights on the performance of the considered system with respect to various parameters such as the transmit Signal to Noise Ratio (SNR), the number of scatterers and the severity of impairments on both the transmit and receive sides are provided. [less ▲]

Detailed reference viewed: 57 (0 UL)
Full Text
Peer Reviewed
See detailTowards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services
Kolbe, Niklas UL; Kubler, Sylvain UL; Robert, Jérémy UL et al

in 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings (2017, July)

A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits ... [more ▼]

A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits the capabilities of a smart city to improve social, environmental and economic aspects. Interoperability in the IoT is concerned with both, messaging interfaces and semantic understanding of heterogeneous data. In this paper, the first building blocks of an emerging open IoT ecosystem developed at the EU level are presented. Se- mantic web technologies are applied to the existing messaging components to support and improve semantic interoperability. The approach is demonstrated with a proof-of-concept for connected vehicle services in a smart city setting. [less ▲]

Detailed reference viewed: 241 (11 UL)
Full Text
Peer Reviewed
See detailEnriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components
Kolbe, Niklas UL; Zaslavsky, Arkady; Kubler, Sylvain UL et al

in Modeling and Using Context (2017, July)

Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a ... [more ▼]

Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a semantically rich situation model together with reliable situation infer- ence based on Context Spaces Theory (CST) and Situation Theory (ST). The paper discusses benefits of integrating the proposed situation aware- ness framework with knowledge base and efficient reasoning techniques taking into account uncertainty and incomplete knowledge about situa- tions. The paper discusses advantages and impact of proposed context adaptation in dynamic IoT environments. Practical issues of two-way mapping between IoT messaging standards and CST are also discussed. [less ▲]

Detailed reference viewed: 141 (4 UL)
Full Text
Peer Reviewed
See detailAn LMI-Based H_infty Discrete-Time Nonlinear State Observer Design for an Anaerobic Digestion Model
Chaib Draa, Khadidja UL; Voos, Holger UL

in World Congress of the International Federation of Automatic Control, Toulouse 9-14 July 2017 (2017, July)

This paper is devoted to the design of an H1 discrete-time nonlinear state observer for an anaerobic digestion model. Indeed, the designed observer can be used for di erent class of systems, mainly linear ... [more ▼]

This paper is devoted to the design of an H1 discrete-time nonlinear state observer for an anaerobic digestion model. Indeed, the designed observer can be used for di erent class of systems, mainly linear systems, LPV systems with known and bounded parameters, and nonlinear Lipschitz systems. We use an LMI approach to guarantee the H1 asymptotic stability of the estimation error despite the disturbances a ecting the system dynamics and measurements. The synthesised LMI is relaxed due to the inclusion of additional decision variables which enhance its feasibility. This was possible due to the use of a suitable reformulation of the Young's inequality. Simulation results are given to show the robustness of the designed observer. [less ▲]

Detailed reference viewed: 67 (3 UL)
Full Text
Peer Reviewed
See detailFast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance Systems
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (2017, June 27)

Semi-autonomous driving assistance systems have a high potential to improve the safety and efficiency of the battery electric vehicles that are enduring limited cruising range. This paper presents an ... [more ▼]

Semi-autonomous driving assistance systems have a high potential to improve the safety and efficiency of the battery electric vehicles that are enduring limited cruising range. This paper presents an ecologically advanced driver assistance system to extend the functionality of the adaptive cruise control system. A real-time stochastic non-linear model predictive controller with probabilistic constraints is presented to compute on-line the safe and energy-efficient cruising velocity profile. The individual chance-constraint is reformulated into a convex second-order cone constraint which is robust for a general class of probability distributions. Finally, the performance of proposed approach in terms of states regulation, constraints fulfilment, and energy efficiency is evaluated on a battery electric vehicle. [less ▲]

Detailed reference viewed: 172 (9 UL)
Full Text
Peer Reviewed
See detailHow Mobile Phone Handovers reflect Urban Mobility: A Simulation Study
Derrmann, Thierry UL; Frank, Raphaël UL; Engel, Thomas UL et al

in Proceedings of the 5th IEEE Conference on Models and Technologies for Intelligent Transportation Systems. (2017, June 26)

Detailed reference viewed: 207 (21 UL)
Full Text
Peer Reviewed
See detailASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques
Bouvry, Pascal UL; Chaumette, Serge; Danoy, Grégoire UL et al

in DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (2017, June 23)

This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium ... [more ▼]

This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium composed of Thales, Fraunhofer IOSB, Fly-n-Sense, University of Bordeaux and University of Luxembourg. Funded by the European Defence Agency (EDA), the objectives of the ASIMUT project are to design, implement and validate algorithms that will allow the efficient usage of autonomous swarms of Unmanned Aerial Vehicles (UAVs) for surveillance missions. [less ▲]

Detailed reference viewed: 149 (34 UL)
Full Text
Peer Reviewed
See detailKeynote: Cultural heritage, musical diversity and functionality of music education
Sagrillo, Damien UL

in Andrea Kárpáti (Ed.) New landscapes in science and art - in focus: teaching Visual Culture. Book of Proceedings (2017, June 23)

cf. attachment

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailMobile network energy efficiency optimization in MIMO multi-cell systems
Yang, Yang UL; Sabella, Dario

in Proc. 5th International Workshop on Cloud Technologies and Energy Efficiency in Mobile Communication Networks (2017, June 22)

Detailed reference viewed: 93 (0 UL)
Full Text
Peer Reviewed
See detailCloud-Assisted Device Clustering for Lifetime Prolongation in Wireless IoT Networks
Bhandari, Sabin; Sharma, Shree Krishna UL; Wang, Xianbin

in Proc. IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE) 2017 (2017, June 15)

One of the crucial challenges in the recently emerging Internet of Things (IoT) applications is how to handle the massive heterogeneous data generated from a large number of resource-constrained sensors ... [more ▼]

One of the crucial challenges in the recently emerging Internet of Things (IoT) applications is how to handle the massive heterogeneous data generated from a large number of resource-constrained sensors. In this context, cloud computing has emerged as a promising paradigm due to its enormous storage and computing capabilities, thus leading to the IoT-Cloud convergence. In such a framework, IoT devices can be grouped into several clusters and each cluster head can send the aggregated information to the cloud via a gateway for further processing. Although a number of clustering methods have been proposed for the conventional Wireless Sensor Networks (WSNs), it is important to consider specific IoT characteristics while adapting these techniques for wireless IoT networks. One of the important features of IoT networks that can be exploited while developing clustering techniques is the collaborations among heterogeneous IoT devices. In this regard, the network-wide knowledge at the cloud center can be useful to provide information about the device relations to the IoT gateway. Motivated by this, we propose and evaluate a cloud-assisted device interaction-aware clustering scheme for heterogeneous IoT networks. The proposed method considers the joint impact of residual energy and device closeness factor for the effective selection of cluster heads. Our results show that the proposed clustering scheme can significantly prolong the network lifetime, and enhance the overall throughput of a wireless IoT network. [less ▲]

Detailed reference viewed: 68 (2 UL)
Full Text
Peer Reviewed
See detailChoosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources
Raulamo-Jurvanen, Päivi; Mäntylä, Mika; Garousi, Vahid UL

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE 2017) (2017, June 15)

Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we ... [more ▼]

Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we study how practitioners tackle the problem of choosing the right test automation tool. Method: We synthesize the “voice” of the practitioners with a grey literature review originating from 53 different companies. The industry experts behind the sources had roles such as “Software Test Automation Architect”, and “Principal Software Engineer”. Results: Common consensus about the important criteria exists but those are not applied systematically. We summarize the scattered steps from individual sources by presenting a comprehensive process for tool evaluation with 12 steps and a total of 14 different criteria for choosing the right tool. Conclusions: The practitioners tend to have general interest in and be influenced by related grey literature as about 78% of our sources had at least 20 backlinks (a reference comparable to a citation) while the variation was between 3 and 759 backlinks. There is a plethora of different software testing tools available, yet the practitioners seem to prefer and adopt the widely known and used tools. The study helps to identify the potential pitfalls of existing processes and opportunities for comprehensive tool evaluation. [less ▲]

Detailed reference viewed: 130 (11 UL)