![]() Streit, David D ![]() in Proceedings of the First International Workshop on Logics for the New Generation Artificial Intelligence (2021) Detailed reference viewed: 52 (5 UL)![]() ; ; et al in DIS 2021 - Proceedings of the 2021 ACM Designing Interactive Systems Conference: Nowhere and Everywhere (2021) Modern office environments foster sitting, a major public health risk, with physical inactivity being the fourth cause of death worldwide. This provocative pictorial presents the design explorations and ... [more ▼] Modern office environments foster sitting, a major public health risk, with physical inactivity being the fourth cause of death worldwide. This provocative pictorial presents the design explorations and bodily experimentations culminating in The Office Jungle, a critical and speculative redesign of the office environment that encourages physical activity by embracing wildness. The Office Jungle is a design exemplar of a "wild"office space presented as a suspended geodesic structure. It is built to experienc e how our office environment and our behaviour at work affect each other. We advocate that bringing wildness into office spaces will create more durable office environments that foster movement. With this pictorial, we aim to spark discussion amongst designers to think in new ways and to consider new opportunities to design for workplaces that integrate physical activity with work. © 2021 Owner/Author. [less ▲] Detailed reference viewed: 28 (0 UL)![]() Scheuer, Claude ![]() ![]() ![]() in Popups Université de Liège (2021) An objective of physical education (PE) is supporting students’ positive motor development. Therefore, it is indispensable for them to be in command of the necessary basic motor competencies (in German ... [more ▼] An objective of physical education (PE) is supporting students’ positive motor development. Therefore, it is indispensable for them to be in command of the necessary basic motor competencies (in German: Motorische Basiskompetenzen; MOBAK) as the prerequisites to be able to participate in the culture of human movement. For the implementation of the MOBAK approach in Luxembourg (MOBAK-LUX), we developed the test instruments MOBAK-LUX-PS for preschoolers, MOBAK-LUX-1 for first graders, MOBAK-LUX-3 for third graders and MOBAK-LUX-5 for fifth graders. These motor tests are conducted on a voluntary basis by interested schools and teachers at the beginning of each school year. In general, about one third of students in the different class levels have support needs in at least one area of basic motor competence. The support needs are prevalent mostly in the area object control and girls generally have lower results than boys, especially in object control. [less ▲] Detailed reference viewed: 250 (16 UL)![]() ; ; Lallemand, Carine ![]() in Lecture Notes in Computer Science (2021), 12935 LNCS As an active form of meeting, walking meetings can be beneficial for office workers who often have a sedentary work routine. Despite their substantial benefits in terms of health, social interactions, and ... [more ▼] As an active form of meeting, walking meetings can be beneficial for office workers who often have a sedentary work routine. Despite their substantial benefits in terms of health, social interactions, and creativity, walking meetings are not yet widely adopted. Some key barriers limiting their social acceptance and wider adoption, for instance, the difficulty to present files or take notes, might be addressed by technology. Using the Hubs - a network of stand-up meeting stations - as a design exemplar, we conducted a scenario-based survey (N = 186) to provide insights into how technological solutions can support the practice of walking meetings. Focusing on the size of the group and type of meetings, we identify scenarios of use and discuss design implications for the development of future technologies and service design components to support walking meetings. © 2021, IFIP International Federation for Information Processing. [less ▲] Detailed reference viewed: 42 (1 UL)![]() ; ; et al in Proceedings of SPIE: The International Society for Optical Engineering (2021), 11769 We report on ultrafast opto-acoustic modulation of light reflectance in artificial epsilon-near-zero metamaterials made of two layers of Ag separated by an Al2O3 layer. By means of non-degenerate two ... [more ▼] We report on ultrafast opto-acoustic modulation of light reflectance in artificial epsilon-near-zero metamaterials made of two layers of Ag separated by an Al2O3 layer. By means of non-degenerate two color pump-probe experiments we demonstrate an optically induced acoustic modulation of the reflectance up to 20% via generation of acoustic waves inside the cavity upon mechanical expansion of the metal due to hot electron-phonon coupling nonlinearity in the Ag layers. The presented architecture opens the pathway towards novel routes to exploit light-matter interactions for opto-acoustic modulation at GHz frequencies. Moreover, our system can be designed to work in transmission geometry and is very versatile in terms of shifting the presented properties along a broad range of wavelengths, from UV to mid-IR. Our approach, beyond light-driven information processing, might impact also opto-mechanics, light-driven phonon induced up conversion mechanisms, non-linear optical and acoustic properties of materials, energy harvesting, and heat-assisted ultrafast magneto-optical recording. [less ▲] Detailed reference viewed: 39 (3 UL)![]() ; ; et al in Proceedings of SPIE: The International Society for Optical Engineering (2021), 11770 We report efficient second-harmonic emission by single multilayer metal–dielectric nanocavities. Engineering the intrinsic interface-induced symmetry breaking by resonant optical absorption design, allows ... [more ▼] We report efficient second-harmonic emission by single multilayer metal–dielectric nanocavities. Engineering the intrinsic interface-induced symmetry breaking by resonant optical absorption design, allows to achieve almost two orders of magnitude higher second-harmonic generation efficiency compared to gold nanostructures with the same geometry. We estimate a second-order nonlinear susceptibility of the order of 1 pm/V, which is comparable to widely used nonlinear crystals. We envision that our system, which combines the advantages of both plasmonic and dielectric materials, might enable the realization of composite nano-systems for an efficient multi-purpose manipulation of nonlinear optical processes at the nanoscale. [less ▲] Detailed reference viewed: 58 (0 UL)![]() ; ; et al in DIS 2021 - Proceedings of the 2021 ACM Designing Interactive Systems Conference: Nowhere and Everywhere (2021) Despite an intention to exercise, it remains a challenge for many people to establish a workout routine over a period of time. Amongst identified barriers and enablers to exercise, getting dressed for a ... [more ▼] Despite an intention to exercise, it remains a challenge for many people to establish a workout routine over a period of time. Amongst identified barriers and enablers to exercise, getting dressed for a workout is considered as one of the tipping points of actually going. Implementing the Aesthetic of Friction in this specific context, could imply the right course of action for the user, while it also allows freedom and encourages meaning-making. In this Research-through-Design project, we designed an interactive shrinking hanger, that implements these key principles, to encourage exercise motivation. We followed an iterative process focusing on the aesthetics of the interaction to find out how a careful consideration of the look and feel of an interactive artefact influences the acceptance of the implemented friction. We document the design process of this aesthetics of friction exemplar, and reflect on how to implement friction in design. © 2021 Owner/Author. [less ▲] Detailed reference viewed: 27 (1 UL)![]() Lima Baima, Renan ![]() in IEEE International Conference on Systems, Man, and Cybernetics (2021) Detailed reference viewed: 43 (3 UL)![]() Heuschling, Luc ![]() in Actes de la section des sciences morales et politiques de l'Institut grand-ducal (2021), Vol XXIV Detailed reference viewed: 111 (7 UL)![]() Mohamed Ali, Mohamed Adel ![]() ![]() ![]() in 2021 IEEE International Conference on Image Processing (ICIP) (2021) Detailed reference viewed: 90 (16 UL)![]() Mathivanan, Karthik ![]() ![]() in Procedia CIRP (2021) Laser welding of copper to aluminum is challenging due to the formation of complex intermetallic phases. More Al (~18.5 at. %) can be dissolved in Cu, in contrast to Cu (~2.5 at. %) in Al. Therefore ... [more ▼] Laser welding of copper to aluminum is challenging due to the formation of complex intermetallic phases. More Al (~18.5 at. %) can be dissolved in Cu, in contrast to Cu (~2.5 at. %) in Al. Therefore, welding from copper side, large melting of Al can be achieved. However optimum Cu and Al must be melted for a strong joint. Finding the right amount is difficult and time consuming by tradition analysis technique like inspection by weld cross-sections. Considering the speed of the welding process and complexity of analysis involving with metallography cross-sections, alternative rapid method to qualify the welds are necessary. The acoustic emission during laser welding can give proportional information of the Al, Cu melted. With such an approach the weld status can be obtained in real time. In this paper the acoustic welding signal using an airborne sensor in the audible range of 20 Hz to 20 kHz, is correlated to the weld strength and material mixing (Al, Cu melt). Finally, the weld status is predicted by an artificial neural network based on the acquired signal. [less ▲] Detailed reference viewed: 53 (3 UL)![]() van Ryckeghem, Dimitri ![]() in Canadian Journal of Pain (2021) Detailed reference viewed: 52 (0 UL)![]() ; ; et al in The Proceedings of the Data Science and Advanced Analytics (DSAA 2021) IEEE conference (2021) The dark face of digital commerce generalization is the increase of fraud attempts. To prevent any type of attacks, state-of-the-art fraud detection systems are now embedding Machine Learning (ML) modules ... [more ▼] The dark face of digital commerce generalization is the increase of fraud attempts. To prevent any type of attacks, state-of-the-art fraud detection systems are now embedding Machine Learning (ML) modules. The conception of such modules is only communicated at the level of research and papers mostly focus on results for isolated benchmark datasets and metrics. But research is only a part of the journey, preceded by the right formulation of the business problem and collection of data, and followed by a practical integration. In this paper, we give a wider vision of the process, on a case study of transfer learning for fraud detection, from business to research, and back to business. [less ▲] Detailed reference viewed: 21 (1 UL)![]() ; ; et al in DIS 2021 - Proceedings of the 2021 ACM Designing Interactive Systems Conference: Nowhere and Everywhere (2021) Promoting healthy lifestyles is an essential endeavor for public health. The design of active urban environments can be an effective medium to nudge people into moving. With technology increasingly ... [more ▼] Promoting healthy lifestyles is an essential endeavor for public health. The design of active urban environments can be an effective medium to nudge people into moving. With technology increasingly integrated into our daily lives, designers have access to more data than ever. In this pictorial, we explore the design space of interActive environments (contraction of ginteractive' and gactive'); places designed to increase the physical activity of users or passers-by through the use of interactive technology. Through sketches, a benchmark of existing concepts and an analysis of designed artefacts, we map the different intervention levels, interaction modalities, behavior change strategies and technological opportunities to design such interActive environments. With this work, we invite the community to consider how digital technology can help understand and shape human behavior in urban environments, and provide inspiration to designers and practitioners. © 2021 Owner/Author. [less ▲] Detailed reference viewed: 40 (0 UL)![]() Erpelding, Michel ![]() in Histoire de la Justice (2021), 31(1), 203-213 This article summarizes the evolution of international legal norms regarding slavery between the 17th and 20th centuries. Detailed reference viewed: 75 (6 UL)![]() Kornadt, Anna Elena ![]() in Innovation in Aging (2021), 5(Supplement_1), 287-287 We examined short-term fluctuations of subjective age with data obtained from 123 young-old (Mage = 67.19 years) and 47 old-old adults (Mage = 86.59 years) who reported their momentary subjective age six ... [more ▼] We examined short-term fluctuations of subjective age with data obtained from 123 young-old (Mage = 67.19 years) and 47 old-old adults (Mage = 86.59 years) who reported their momentary subjective age six times a day over seven consecutive days as they were going about their everyday lives. Participants felt younger on a large majority of occasions, and 25% of the total variability in subjective age could be attributed to within-person variation. Those with younger trait subjective ages exhibited larger moment-to-moment variation, while chronological age did not impact variability. Furthermore, we investigated relationships between within-day fluctuations of subjective age and daily cortisol fluctuations. Our findings extend the literature on subjective age by showing that how old people feel can vary on a momentary basis, that state and trait components of subjective age are related, and that fluctuations in subjective age are related to biomarkers of stress. [less ▲] Detailed reference viewed: 45 (2 UL)![]() Ecker, Jill Marie-Anne ![]() ![]() in Banach Center Publications (2021), 123 The main aim of this contribution is to compute the low-dimensional algebraic cohomology of the Witt and the Virasoro algebra with values in the adjoint and the trivial module. The last section includes ... [more ▼] The main aim of this contribution is to compute the low-dimensional algebraic cohomology of the Witt and the Virasoro algebra with values in the adjoint and the trivial module. The last section includes results for the general tensor densities modules, presented without proof. One of our main results is that the third algebraic cohomology of the Witt algebra with values in the adjoint module vanishes, while it is one-dimensional for the Virasoro algebra. The first and the second algebraic cohomology of the Witt and the Virasoro algebra with values in tensor densities modules vanish for almost all modules. In the case they do not vanish, we give explicit expressions for the generating cocycles. In our work, we consider algebraic cohomology and not only the sub-complex of continuous cohomology, meaning we do not put any continuity constraints on the cochains. Consequently, our results are independent of any choice of an underlying topology, and valid for any concrete realizations of the considered Lie algebras. [less ▲] Detailed reference viewed: 175 (9 UL)![]() Heinz, Andreas ![]() in Cogent Medicine (2020, December 04) Background: In many studies, participants who do not state their gender are excluded from the analysis. This may be appropriate if they do not answer the questionnaire seriously. However, some ... [more ▼] Background: In many studies, participants who do not state their gender are excluded from the analysis. This may be appropriate if they do not answer the questionnaire seriously. However, some participants may have understandable reasons for not reporting their gender, e.g. questioning their gender identity. Research question: How many students and which students do not answer the question on gender? Methods: We analyzed data of the Health Behaviour in School-aged Children study from Ireland, France, Hungary, Scotland, Belgium (Flemish) and Luxembourg (n = 40,053). To explore the reasons for non-response, we divided the participants into 3 groups: 1. Responders answered both socio- demographic questions (age and gender) 2. age non-responders did not answer the question on age. 3. Gender non-responders answered the question on age, but not the one on gender. Results: 311 out of 40,053 (0.8%) pupils aged 11–18 did not report their gender. About 40% of them did not answer the age question either. However, the other 60% belong to the group of gender non-responders and this group is disadvantaged compared to responders: they report lower self-rated health, more health complaints, less family support and more substance use (alcohol, tobacco, cannabis). 1.9% of pupils did not answer the question about age. These age non-responders answered the questionnaire more selectively overall and skipped more questions. Conclusion: The data suggest that the reasons for age non-response and gender non-response are different. For age non-responders, the fear of de-anonymization seems to be the reason for not indicating their age. Not answering the question on gender is rare. If the participants answered the question on age, but not the question on gender, then the variable gender is missing not at random. The health problems of gender non-responders correspond to the health problems of gender non-conforming adolescents. Thus, the question arises if the group of gender non-responders should be included in the analysis and if the question on gender should be asked differently in the future [less ▲] Detailed reference viewed: 222 (19 UL)![]() ; Heinz, Andreas ![]() in Cogent Medicine (2020, December 04) Introduction: The Health Behaviour in School-aged Children (HBSC) is a World Health Organization collaborative cross-cultural study of adolescents aged 11–15 years, from 50 countries and regions in Europe ... [more ▼] Introduction: The Health Behaviour in School-aged Children (HBSC) is a World Health Organization collaborative cross-cultural study of adolescents aged 11–15 years, from 50 countries and regions in Europe, North America and the former Soviet republics. Since 1983 (the first survey round), the sex/gender of the respondents have been categorised with the question “Are you a boy or a girl?”, the response options being “a boy” and “a girl”. In the light of lived experiences of young people and contemporary theoretical and empirical approaches to the measurement of sex assigned birth and gender identity, this item is contested.Research Questions: What are HBSC National Research Teams’ experiences with using this item? What is their position on any potential change or amendment of the item? Have they already made any changes? Do they see potential drawbacks and benefits in changing the item? Method: In Summer 2019, an online survey was conducted with HBSC National Teams, to under-stand member countries’ position on the measurement of sex and gender in the HBSC survey. Results: Of the 50 research teams, 44 responded to the online questionnaire. Opinions on potential changes or amendments of the item were polarised, with 19 teams (43%) not supporting any changes, 15 teams (34%) agreeing with a change, and 10 teams (23%) indicating they don’t know or not sure if changes are necessary. Various arguments were raised for and against any changes or amendments. Six national teams already implemented a change, by adding a third response option, replacing the item, or using additional items. Conclusions: The results demonstrate that the issue of sex and gender in HBSC needs to be addressed, but methodological, political and cultural implications need to be considered. The complexity of this problem makes it impossible to suggest a “one-size-fits-all” solution. [less ▲] Detailed reference viewed: 273 (14 UL)![]() ; ; Viti, Francesco ![]() in 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC) (2020, December) Detailed reference viewed: 112 (9 UL)![]() Terzidou, Kalliopi ![]() in Journal of the Association for Computing Machinery (2020, December) Detailed reference viewed: 63 (11 UL)![]() Rinaldi, Marco ![]() ![]() in 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC) (2020, December) Detailed reference viewed: 137 (6 UL)![]() Decker, Thierry ![]() ![]() ![]() in 850th International Conference on Science, Technology, Engineering and Management (2020, November 25) Functionally graded lattice structures (FGLS) were studied thoroughly for the past years, mostly focusing on specific synthetic tests in the context of additive manufacturing while rarely being actually ... [more ▼] Functionally graded lattice structures (FGLS) were studied thoroughly for the past years, mostly focusing on specific synthetic tests in the context of additive manufacturing while rarely being actually applied outside of this specific domain. This paper examines a way to practically implement them in a commonly used appliance and study their potential for its improvement. A bicycle crank arm was chosen for this purpose, and a solid aluminium reference model (Shimano FC-R450-453) is used as a performance baseline. The novel design is composed of a hollow body containing a beam-based, non-stochastic, functionally graded lattice structure and is planned to be manufactured on a Markforged Metal X system using 17-4 PH stainless steel. It aims to increase the total stiffness under EN ISO 4210-8 norm loading conditions compared to the reference model while limiting mass and stress values to acceptable degrees. Two crank arm variants, containing a face-centred cubic (FCC) and re-entrant auxetic lattice respectively, are optimised by locally altering their beam radii in eight separate regions. The displacement at the load application point is minimised using Altair OptiStruct and HyperStudy. The reference crank, weighing 213g, exhibits a deflection magnitude of 7.1mm in the most demanding load case while the newly designed and optimised versions only showed displacements of 2.52mm (FCC lattice, 340g) and 2.58mm (re-entrant lattice, 339g) respectively. In addition, the stress distribution was significantly enhanced compared to the reference model, as the latter would not pass the fatigue tests required by the norm. This demonstrates that FGLS, in combination with high-strength materials and additive manufacturing, can increase the performance of many parts, although in this case, with a trade-off in terms of its mass. In future projects, it might be considerably reduced by utilising alternative lattice types lattices or other materials while preserving the benefits of FGLS. [less ▲] Detailed reference viewed: 189 (31 UL)![]() ; Kebig, Tanja ![]() in Eccomas Proceedia (2020, November 23) Structural health monitoring of concrete bridges can be achieved by tracking static load-testing results or dynamic properties as for example eigenfrequencies. Deviations from a healthy reference state ... [more ▼] Structural health monitoring of concrete bridges can be achieved by tracking static load-testing results or dynamic properties as for example eigenfrequencies. Deviations from a healthy reference state can be used as damage indicators and even more, help to localize zones of stiffness reduction, i.e. cracking. However, outdoor temperature effects also lead to changes of monitored physical characteristics in the same order of magnitude as damage. Hence, temperature effects need to be removed prior to any condition analysis. The present paper presents a new two-step approach by applying physical compensation first, before using a statistical method based of Principal Component Analysis (PCA) or more exactly on principal vectors and singular values. This technique is here applied to eigenfrequencies, first of a new bridge without damage, but with extreme temperature variation due to thick asphalt layer and special bearing constraints, thus showing strong sensitivity along seasonal temperatures in the intact state. The second object is the Z24 Bridge in Switzerland, which is well documented in literature and where artificial damage was applied prior to demolition. The proposed techniques allow removing noise and temperature effects in a coherent and efficient way. The corrected measurement data can then be used in subsequent steps for its definite purpose, i.e. detection and localization of damage for instance by updating a numerical finite element model which allows assessing a stiffness loss. [less ▲] Detailed reference viewed: 114 (18 UL)![]() Rakotonjanahary, Tahiana Roland Michaël ![]() ![]() ![]() in IOP Conference Series: Earth and Environmental Science (2020, November 20), 588(5), 052026 To face the challenges of climate change, new buildings need to be further greener while being able to ensure a minimum comfort to the tenants. Nonetheless, extensibility and flexibility could be added to ... [more ▼] To face the challenges of climate change, new buildings need to be further greener while being able to ensure a minimum comfort to the tenants. Nonetheless, extensibility and flexibility could be added to buildings. In this context, the architect jointly with the team of this research project have designed a hybrid modular construction called “slab building” which is composed of a permanent concrete structure and several removable wooden modules. A module offers 27m² of living space but larger housings can be realized by combining two up to four modules. The aim of this paper is to design the walls of the modules to meet the criteria of nZEB. The thicknesses of the studied thermal insulations, namely rock wool, wood wool, polyurethane and aerogel, have been determined in accordance with the passive house requirements in Luxembourg. The embodied energy of the building materials has also been considered in the designing of the modules. Steady state calculations revealed that a wall thickness of 40 cm, comprising 31cm of insulation is sufficient but according to the LCA outcomes, there is no environmental benefit in having the modules comply with the AAA energy class requirements at reasonable wall thicknesses. [less ▲] Detailed reference viewed: 152 (21 UL)![]() ; Reuter, Robert ![]() in Proceedings of ICERI 2020 (2020, November 09) Besides the pure application of serious games as tools for knowledge transfer, a further trend has been observed in the last few years: The creation of games as an opportunity to gain practical experience ... [more ▼] Besides the pure application of serious games as tools for knowledge transfer, a further trend has been observed in the last few years: The creation of games as an opportunity to gain practical experience and thereby also build up valuable knowledge. In this context several approaches are possible, such as using paper prototyping, applying Game-Maker tools like Scratch, RPG-Maker, Construct 3 or Game Maker Studio 2, next to the option to use actual game engines like Unity. This contribution aims to discuss the possibility of creating games in a very specific, predefined genre using Game Maker tools that have been especially developed for use in an educational context and therefore offer didactic guidance. The Game Creator tool which was developed as part of the Erasmus+ project Create Digital Games for Education (CDG4E) is presented in more depth. With this tool you can create decision card games inspired by the mobile game bestseller "Reigns". Within the project, the consortium created educational games in different areas such as fake news prevention and STEM education. In addition to these ready-made games, another focus was placed on using the tool itself as a teaching technique, for example to create games on a specific topic with school classes or within youth work, but also as an instrument for setting up dedicated "game jams". This contribution reports on the advantages and drawbacks of creating the tool itself by analyzing qualitative and quantitative data gathered during the iterative design process of the Game Creator. [less ▲] Detailed reference viewed: 121 (8 UL)![]() Gao, Jun ![]() ![]() in ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2020, November) {The Android ecosystem offers different facilities to enable communication among app components and across apps to ensure that rich services can be composed through functionality reuse. At the heart of ... [more ▼] {The Android ecosystem offers different facilities to enable communication among app components and across apps to ensure that rich services can be composed through functionality reuse. At the heart of this system is the Inter-component communication (ICC) scheme, which has been largely studied in the literature. Less known in the community is another powerful mechanism that allows for direct inter-app code invocation which opens up for different reuse scenarios, both legitimate or malicious. This paper exposes the general workflow for this mechanism, which beyond ICCs, enables app developers to access and invoke functionalities (either entire Java classes, methods or object fields) implemented in other apps using official Android APIs. We experimentally showcase how this reuse mechanism can be leveraged to â plagiarize" supposedly-protected functionalities. Typically, we were able to leverage this mechanism to bypass security guards that a popular video broadcaster has placed for preventing access to its video database from outside its provided app. We further contribute with a static analysis toolkit, named DICIDer, for detecting direct inter-app code invocations in apps. An empirical analysis of the usage prevalence of this reuse mechanism is then conducted. Finally, we discuss the usage contexts as well as the implications of this studied reuse mechanism [less ▲] Detailed reference viewed: 76 (7 UL)![]() ; Kaiser, Daniel ![]() in Proceedings of ICPS ICCNS 2020 (2020, November) Distributed Hash Table (DHT) protocols, such as Kademlia, provide a decentralized key-value lookup which is nowadays integrated into a wide variety of applications, such as Ethereum, InterPlanetary File ... [more ▼] Distributed Hash Table (DHT) protocols, such as Kademlia, provide a decentralized key-value lookup which is nowadays integrated into a wide variety of applications, such as Ethereum, InterPlanetary File System (IPFS), and BitTorrent. However, many security issues in DHT protocols have not been solved yet. DHT networks are typically evaluated using mathematical models or simulations, often abstracting away from artefacts that can be relevant for security and/or performance. Experiments capturing these artefacts are typically run with too few nodes. In this paper, we provide Locust, a novel highly concurrent DHT experimentation framework written in Elixir, which is designed for security evaluations. This framework allows running experiments with a full DHT implementation and around 4,000 nodes on a single machine including an adjustable churn rate; thus yielding a favourable trade-off between the number of analysed nodes and being realistic. We evaluate our framework in terms of memory consumption, processing power, and network traffic. [less ▲] Detailed reference viewed: 124 (6 UL)![]() Distler, Verena ![]() ![]() ![]() in New Security Paradigms Workshop (2020, October 26) A growing body of research in the usable privacy and security community addresses the question of how to best influence user behavior to reduce risk-taking.We propose to address this challenge by ... [more ▼] A growing body of research in the usable privacy and security community addresses the question of how to best influence user behavior to reduce risk-taking.We propose to address this challenge by integrating the concept of user experience (UX) into empirical usable privacy and security studies that attempt to change risktaking behavior. UX enables us to study the complex interplay between user-related, system-related and contextual factors and provides insights into the experiential aspects underlying behavior change, including negative experiences. We first compare and contrast existing security-enhancing interventions (e.g., nudges, warnings, fear appeals) through the lens of friction. We then build on these insights to argue that it can be desirable to design for moments of negative UX in security-critical situations. For this purpose, we introduce the novel concept of security-enhancing friction, friction that effectively reduces the occurrence of risk-taking behavior and ensures that the overall UX (after use) is not compromised. We illustrate how security-enhancing friction provides an actionable way to systematically integrate the concept of UX into empirical usable privacy and security studies for meeting both the objectives of secure behavior and of overall acceptable experience. [less ▲] Detailed reference viewed: 220 (42 UL)![]() Erpelding, Michel ![]() in Journal of the History of International Law (2020, October 21), 22(2-3), 446-472 Using the example of the European Court of Justice (ECJ), this article addresses the lack of historical contextualization which is prevalent in most general accounts of EU law and EU institutions. It ... [more ▼] Using the example of the European Court of Justice (ECJ), this article addresses the lack of historical contextualization which is prevalent in most general accounts of EU law and EU institutions. It argues that this narrative is the result of a tradition established by the founders of the discipline. For these early ‘Euro-lawyers’, distinguishing the practice of European institutions from earlier international institutions had important political implications. This was especially true with regard to the ECJ. By providing a selective and partly decontextualized narrative of this court and describing it as largely unprecedented in international law, early Euro-lawyers were not only able to bolster the ‘supranational’ and ‘sui generis’ character of their nascent discipline. They were also able to avoid comparisons between the ECJ and prior international courts and tribunals whose similarly wide-ranging powers and integrated nature had been considered as politically problematic. [less ▲] Detailed reference viewed: 59 (1 UL)![]() ; Lochy, Aliette ![]() in Journal of Vision (2020, October), 20(11), The extent to which faces and written words share neural circuitry in the human brain is actively debated. We provide an original contribution to this debate by comparing face-selective and word-selective ... [more ▼] The extent to which faces and written words share neural circuitry in the human brain is actively debated. We provide an original contribution to this debate by comparing face-selective and word-selective responses in a large group of patients (N=37) implanted with intracerebral electrodes in the ventral occipito-temporal cortex (VOTC). Both face-selective (i.e., significantly different responses to faces vs. nonface objects) and word-selective (i.e., significantly different responses to words vs. pseudofonts) neural activity is isolated through frequency-tagging (Jonas et al., 2016; Lochy et al., 2018, respectively). Critically, this approach allows disentangling category-selective neural responses from general visual responses. Overall, we find that 69.26% of significant contacts show either face- or word-selectivity, with the expected right and left hemispheric dominance, respectively (Fig.1A,B). Moreover, the center of mass for word-contacts is more lateral than for face-contacts, with no differences in postero-anterior axis (Fig.2A). Spatial dissociations are also found within core regions of face and word processing, with a medio-lateral dissociation in the fusiform gyrus (FG) and surrounding sulci (FG+sulci;Fig.2B), while a postero-anterior dissociation is found in the inferior occipital gyrus (IOG;Fig.2C). Despite their spatial dissociations in the FG+sulci and IOG, most overlap in category-selective responses is found in these regions (Fig.1C). Critically, in the overlap-contacts, across the whole brain or specifically in the FG+sulci, between-category (word-face) selective-amplitudes showed no-to-weak correlations, despite strong correlations for within-category (face-face, word-word) selective-amplitudes (Fig.3A), and a strong correlation in non-selective general-amplitudes to words-faces. Moreover, substantial overlap and no-to-weak correlations were observed between faces and a control category (houses) known to be functionally dissociated from faces. Overall, we conclude that category-selectivity for faces and words is largely dissociated in the human VOTC, with a limited spatial overlap likely due to the distant recording of dissociated populations of neurons rather than to shared category-selective representations. [less ▲] Detailed reference viewed: 51 (3 UL)![]() Lallemand, Carine ![]() ![]() in Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (2020, October) The context of use has been highlighted for a long time as being a key factor impacting User Experience (UX). Yet current UX evaluation tools, especially questionnaires, rarely encompass an explicit ... [more ▼] The context of use has been highlighted for a long time as being a key factor impacting User Experience (UX). Yet current UX evaluation tools, especially questionnaires, rarely encompass an explicit investigation of the context. With the ever-growing trend for mobile products and ubiquitous computing, the absence of a dedicated measurement tool becomes critical. Based on a review of relevant literature and a fine-grained categorization of contextual factors, we developed the UX Context Scale (UXCS), a 30-items instrument allowing for a measure of context properties, as perceived by the user. We report on the development of the scale and present a first validation study (N = 137). A principal component analysis on the subjective items reveals a 6-components structure: Physical Context, Social Context, Internal Context, Perceived Resources, Task Context, and Temporal Context. Reliability of each subscale is high and further analyses confirm the relevance of this tool for UX evaluation. [less ▲] Detailed reference viewed: 123 (5 UL)![]() Norvill, Robert ![]() in Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure (2020, October) Detailed reference viewed: 176 (3 UL)![]() Merlano Duncan, Juan Carlos ![]() ![]() ![]() in Proceedings of IEEE International Geoscience and Remote Sensing Symposium 2020 (2020, September 26) Remote Sensing from distributed platforms has become attractive for the community in the last years. Phase, frequency, and time synchronization are a crucial requirement for many such applications as ... [more ▼] Remote Sensing from distributed platforms has become attractive for the community in the last years. Phase, frequency, and time synchronization are a crucial requirement for many such applications as multi-static remote sensing and also for distributed beamforming for communications. The literature on the field is extensive, and in some cases, the requirements an complexity of the proposed synchronization solution may surpass the ones set by the application itself. Moreover, the synchronization solution becomes even more challenging when the nodes are flying or hovering on aerial or space platforms. In this work, we discuss the synchronization considerations for the implementation of distributed remote sensing applications. The general framework considered is based on a distributed collection of autonomous nodes that synchronize their clocks with a common reference using inter-satellite links. For this purpose, we implement a synchronization link between two nodes operating in a full-duplex fashion. The experimental testbed uses commercially available SDR platforms to emulate two satellites, two targets, and the communication channel. The proposal is evaluated considering phase and frequency errors for different system parameters. [less ▲] Detailed reference viewed: 95 (16 UL)![]() Yuan, Yaxiong ![]() ![]() ![]() in 2020 European Conference on Networks and Communications (EuCNC) (2020, September 21) In this paper, we investigate a user-timeslot scheduling problem for downlink unmanned aerial vehicle (UAV)-aided networks, where the UAV serves as an aerial base station. We formulate an optimization ... [more ▼] In this paper, we investigate a user-timeslot scheduling problem for downlink unmanned aerial vehicle (UAV)-aided networks, where the UAV serves as an aerial base station. We formulate an optimization problem by jointly determining user scheduling and hovering time to minimize UAV’s transmission and hovering energy. An offline algorithm is proposed to solve the problem based on the branch and bound method and the golden section search. However, executing the offline algorithm suffers from the exponential growth of computational time. Therefore, we apply a deep reinforcement learning (DRL) method to design an online algorithm with less computational time. To this end, we first reformulate the original user scheduling problem to a Markov decision process (MDP). Then, an actor-critic-based RL algorithm is developed to determine the scheduling policy under the guidance of two deep neural networks. Numerical results show the proposed online algorithm obtains a good tradeoff between performance gain and computational time. [less ▲] Detailed reference viewed: 102 (11 UL)![]() Garcia Santa Cruz, Beatriz ![]() ![]() ![]() in Movement Disorders (2020, September 12) Objective: Automatize the detection of ‘swallow-tail’ appearance in substantia nigra dopaminergic neurons using MRI for more robust tests on Parkinson’s disease (PD) diagnosis. Background: Differential ... [more ▼] Objective: Automatize the detection of ‘swallow-tail’ appearance in substantia nigra dopaminergic neurons using MRI for more robust tests on Parkinson’s disease (PD) diagnosis. Background: Differential diagnosis of PD is challenging even in specialized centers. The use of imaging techniques can be bene cial for the diagnosis. Although DaTSCAN has been proven to be clinically useful, it is not widely available and has radiation risk and high-cost associated. Therefore, MRI scans for PD diagnosis offer several advantages over DaTSCAN [1]. Recent literature shows strong evidence of high diagnostic accuracy using the ‘swallow-tail’ shape of the dorsolateral substantia nigra in 3T – SWI [2]. Nevertheless, the majority of such studies rely on the subjective opinion of experts and manual methods for the analysis to assess the accuracy of these features. Alternatively, we propose a fully automated solution to evaluate the absence or presence of this feature for computer-aided diagnosis (CAD) of PD. Method: Restrospective study of 27 PD and 18 non-PD was conducted, including standard high-resolution 3D MRI – T1 & SWI sequences (additionally, T2 scans were used to increase the registration references). Firstly, spatial registration and normalization of the images were performed. Then, the ROI was extracted using atlas references. Finally, a supervised machine learning model was built using 5-fold-within-5-fold nested cross-validation. Results: Preliminary results show signi cant sensitivity (0.92) and ROC AUC (0.82), allowing for automated classi cation of patients based on swallow-tail biomarker from MRI. Conclusion: Detection of nigrosome degeneration (swallow-tail biomarker) in accessible brain imaging techniques can be automatized with signi cant accuracy, allowing for computer-aided PD diagnosis. References: [1] Schwarz, S. T., Xing, Y., Naidu, S., Birchall, J., Skelly, R., Perkins, A., ... & Gowland, P. (2017). Protocol of a single group prospective observational study on the diagnostic value of 3T susceptibility weighted MRI of nigrosome-1 in patients with parkinsonian symptoms: the N3iPD study (nigrosomal iron imaging in Parkinson’s disease). BMJ open, 7(12), e016904. [2] – Schwarz, S. T., Afzal, M., Morgan, P. S., Bajaj, N., Gowland, P. A., & Auer, D. P. (2014). The ‘swallow tail’ appearance of the healthy nigrosome –a new accurate test of Parkinson’s disease: a case-control and retrospective cross-sectional MRI study at 3T. PloS one, 9(4). [less ▲] Detailed reference viewed: 204 (22 UL)![]() Tikhomirov, Sergei ![]() in Proceedings of 2020 IEEE European Symposium on Security and Privacy (EuroS&P) (2020, September) Payment channel networks have been introduced to mitigate the scalability issues inherent to permissionless decentralized cryptocurrencies such as Bitcoin. Launched in 2018, the Lightning Network (LN) has ... [more ▼] Payment channel networks have been introduced to mitigate the scalability issues inherent to permissionless decentralized cryptocurrencies such as Bitcoin. Launched in 2018, the Lightning Network (LN) has been gaining popularity and consists today of more than 5000 nodes and 30000 payment channels that jointly hold 895 bitcoins (7.6M USD as of February 2020). This adoption has motivated research from both academia and industry. Payment channels suffer from security vulnerabilities, such as the wormhole attack, anonymity issues, and scalability limitations related to the upper bound on the number of concurrent payments per channel, which have been pointed out by the scientific community but never quantitatively analyzed. In this work, we first analyze the proneness of the LN to the wormhole attack and attacks against anonymity. We observe that an adversary needs to control only 2% of LN nodes to learn sensitive payment information (e.g., sender, receiver and payment amount) or to carry out the wormhole attack. Second, we study the management of concurrent payments in the LN and quantify its negative effect on scalability. We observe that for micropayments, the forwarding capability of up to 50% of channels is restricted to a value smaller than the overall channel capacity. This phenomenon not only hinders scalability but also opens the door for DoS attacks: We estimate that a network-wide DoS attack costs within 1.5M USD, while isolating the biggest community from the rest of the network costs only 225k USD. Our findings should prompt the LN community to consider the security, privacy and scalability issues of the network studied in this work when educating users about path selection algorithms, as well as to adopt multi-hop payment protocols that provide stronger security, privacy and scalability guarantees. [less ▲] Detailed reference viewed: 90 (10 UL)![]() ; Gao, Jun ![]() ![]() in The 3rd International Workshop on Advances in Mobile App Analysis (2020, September) In this work, we describe the design and implementation of a reusable tool named KnowledgeZooClient targeting the construction, as a crowd-sourced effort, of a knowledge graph for Android apps ... [more ▼] In this work, we describe the design and implementation of a reusable tool named KnowledgeZooClient targeting the construction, as a crowd-sourced effort, of a knowledge graph for Android apps. KnowledgeZooClient is made up of two modules: (1) the Metadata Extraction Module (MEM), which aims at extracting metadata from Android apps and (2) the Metadata Integration Module (MIM) for importing and integrating extracted metadata into a graph database. The usefulness of KnowledgeZooClient is demonstrated via an exclusive knowledge graph called KnowledgeZoo, which contains information on over 500,000 apps already and still keeps growing. Interested users can already benefit from KnowledgeZoo by writing advanced search queries so as to collect targeted app samples. [less ▲] Detailed reference viewed: 44 (7 UL)![]() Sobon, Elena ![]() ![]() ![]() in Chemie Ingenieur Technik (2020, August 28), 92(9), 1267-1268 Detailed reference viewed: 58 (4 UL)![]() Backes, Dietmar ![]() in The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences (2020, August 12), XLIII-B2-2020 Article Metrics Related articles(1017), 1024 An efficient alternative to labour-intensive terrestrial and costly airborne surveys is the use of small, inexpensive Unmanned Aerial Vehicles (UAVs) or Remotely Piloted Aerial Systems (RPAS). These low ... [more ▼] An efficient alternative to labour-intensive terrestrial and costly airborne surveys is the use of small, inexpensive Unmanned Aerial Vehicles (UAVs) or Remotely Piloted Aerial Systems (RPAS). These low-altitude remote sensing platforms, commonly known as drones, can carry lightweight optical and LiDAR sensors. Even though UAV systems still have limited endurance, they can provide a flexible and relatively inexpensive monitoring solution for a limited area of interest. This study investigated the applicability of monitoring the morphology of a frequently changing glacial stream using high-resolution topographic surface models derived from low-altitude UAV-based photogrammetry and LiDAR. An understanding of river-channel morphology and its response to anthropogenic and natural disturbances is imperative for effective watershed management and conservation. We focus on the data acquisition, processing workflow and highlight identified challenges and shortcomings. Additionally, we demonstrate how LiDAR data acquisition simulations can help decide which laser scanning approach to use and help optimise data collection to ensure full coverage with desired level of detail. Lastly, we showcase a case study of 3D surface change analysis in an alpine stream environment with UAV-based photogrammetry. The datasets used in this study were collected as part of the ISPRS Summer School of Alpine Research, which will continue to add new data layers on a biyearly basis. This growing data repository is freely available for research. [less ▲] Detailed reference viewed: 175 (19 UL)![]() Rivera, Sean ![]() ![]() in Proceedings of the 15th International Conference on Availability, Reliability and Security (2020, August) The Domain Name System (DNS), a fundamental protocol that controls how users interact with the Internet, inadequately provides protection for user privacy. Recently, there have been advancements in the ... [more ▼] The Domain Name System (DNS), a fundamental protocol that controls how users interact with the Internet, inadequately provides protection for user privacy. Recently, there have been advancements in the field of DNS privacy and security in the form of the DNS over TLS (DoT) and DNS over HTTPS (DoH) protocols. The advent of these protocols and recent advancements in large-scale data processing have drastically altered the threat model for DNS privacy. Users can no longer rely on traditional methods, and must instead take active steps to ensure their privacy. In this paper, we demonstrate how the extended Berkeley Packet Filter (eBPF) can assist users in maintaining their privacy by leveraging eBPF to provide privacy across standard DNS, DoH, and DoT communications. Further, we develop a method that allows users to enforce application-specific DNS servers. Our method provides users with control over their DNS network traffic and privacy without requiring changes to their applications while adding low overhead. [less ▲] Detailed reference viewed: 112 (5 UL)![]() ; Banda, Peter ![]() in ALIFE 2020: The 2020 Conference on Artificial Life (2020, July 14) Top-down engineering of biomolecular circuits to perform specific computational tasks is notoriously hard and time-consuming. Current circuits have limited complexity and are brittle and application ... [more ▼] Top-down engineering of biomolecular circuits to perform specific computational tasks is notoriously hard and time-consuming. Current circuits have limited complexity and are brittle and application-specific. Here we propose an alternative: we design and test a bottom-up constructed Reservoir Computer (RC) that uses random chemical circuits inspired by DNA strand displacement reactions. This RC has the potential to be implemented easily and trained for various tasks. We describe and simulate it by means of a Chemical Reaction Network (CRN) and evaluate its performance on three computational tasks: the Hamming distance and a short- as well as a long-term memory. Compared with the deoxyribozyme oscillator RC model simulated by Yahiro et al., our random chemical RC performs 75.5% better for the short-term and 67.2% better for the long-term memory task. Our model requires an 88.5% larger variety of chemical species, but it relies on random chemical circuits, which can be more easily realized and scaled up. Thus, our novel random chemical RC has the potential to simplify the way we build adaptive biomolecular circuits. [less ▲] Detailed reference viewed: 91 (1 UL)![]() Arend, Béatrice ![]() ![]() ![]() in L.Gomez Chova, A. Lopez Martinez, I. Candel Torres: Proceedings, International Conference on Education and New Learning Technologies 2020 (2020, July) Detailed reference viewed: 155 (10 UL)![]() Chiara, Pier Giorgio ![]() in Ambient Intelligence and Smart Environments (2020, July), 28 The exponential spreading and deployment of emerging digital technologies such as the Internet of Things (IoT) has been remarkable: the IoT market is expected to triple, at least, from USD 170.57 billion ... [more ▼] The exponential spreading and deployment of emerging digital technologies such as the Internet of Things (IoT) has been remarkable: the IoT market is expected to triple, at least, from USD 170.57 billion in 2017 to USD 561.04 billion by 2022. IoT technologies collect, generate and communicate a huge amount of different data and metadata, through an increasing number of interconnected devices and sensors. Current EU legislation on data protection classifies data into personal and non-personal. The paper aims at charting the resulting entanglements from an interdisciplinary perspective. The legal analysis, integrated with a technical perspective, will address firstly the content of IoT communications, i.e. “data”, and the underlying distinction between personal and non-personal. Secondly, the focus will shift on the metadata related to communications. Through a technical analysis of the highly sensitive nature of metadata, even when the content is encrypted, I will argue that metadata are likely to undermine even more the ontological and sharp division between personal and non-personal data upon which the European legal frameworks for privacy and data protection have been built. The incoming ePrivacy Regulation shall provide metadata, which should be considered always personal data, the same level of protection of “content” data. This interpretation might broaden the scope of application of GDPR and the connected obligations and responsibilities of data controllers and data processors too much. [less ▲] Detailed reference viewed: 51 (4 UL)![]() Muralidharan, Vivek ![]() in IFAC-PapersOnLine (2020, July) We consider the orbital maintenance problem on a quasi-satellite orbit about the Martian moon, Phobos. The orbit is computed using a high-fidelity ephemeris model so that the major sources of disturbances ... [more ▼] We consider the orbital maintenance problem on a quasi-satellite orbit about the Martian moon, Phobos. The orbit is computed using a high-fidelity ephemeris model so that the major sources of disturbances are due to measurement error. Two types of orbit maintenance schemes are considered. The first is based on asymptotically tracking the desired trajectory and the second is based on stabilizing to the manifold of trajectories that share the same Jacobi constant as the reference trajectory. The latter can be done because trajectories with the same Jacobi constant are in the neighborhood of one another. The results show that the trajectory-tracking scheme has lower fuel consumption when tracking must be precise and that the approach of stabilizing to a manifold has better fuel consumption at the expense of tracking. [less ▲] Detailed reference viewed: 41 (0 UL)![]() ; Kreis, Yves ![]() in Proceedings of the British Society for Research into Learning Mathematics (2020, July), 40(2), 1-6 In the Luxemburgish national curriculum for elementary schools (MENFP, 2011) experimentations and discoveries of mathematics concepts in courses are strongly recommended. Elementary school teachers should ... [more ▼] In the Luxemburgish national curriculum for elementary schools (MENFP, 2011) experimentations and discoveries of mathematics concepts in courses are strongly recommended. Elementary school teachers should engage students in active mathematical modelling approaches, where they can develop processes and content skills through discoveries. Moreover, learned skills should be connected to real-world problems and situations to foster a better understanding of students’ living environments. Nevertheless, this teaching culture in mathematics is unusual in elementary schools and teachers tend to teach based on textbooks. Students mostly learn mathematics by imitation and repetition rather than through modelling mathematics with real-world problems and situations. Thus, to develop new methodologies in teaching mathematics and to meet the requirements of the national curriculum, we designed different technology-enhanced teaching and learning methods to engage students in experimental approaches within and outside classrooms. Moreover, we conducted three studies with digital and physical modelling, augmented reality, and a tutoring system in elementary school mathematics courses. Based on our collected data, we identified settings and tasks likely to support active mathematical modelling approaches. [less ▲] Detailed reference viewed: 305 (19 UL)![]() ; Reuter, Robert ![]() in Proceedings of EdMedia + Innovate Learning (2020, June 23), 2020(1), 315-322 In this article, we present the objectives and first achievements of the PIAF project supported by the European Union and aiming at developing computational and algorithmic thinking in basic education ... [more ▼] In this article, we present the objectives and first achievements of the PIAF project supported by the European Union and aiming at developing computational and algorithmic thinking in basic education. This project brings together researchers in educational sciences and computer science from four countries (Belgium, France, Germany and Luxembourg) around the theme of teacher training. More concretely, the aim is to define a framework (competency framework, pedagogical scenarios) enabling teachers to (i) appropriate the concept of computational and algorithmic thinking and (ii) implement learning activities that promote the development of this kind of thinking in children. [less ▲] Detailed reference viewed: 174 (33 UL)![]() ; Kong, Long ![]() in 2020 IEEE Wireless Communications and Networking Conference (WCNC) (2020, June 19) We propose a decision triggered data transmission and collection (DTDTC) protocol for condition monitoring and anomaly detection in the industrial Internet of things (IIoT). In the IIoT, the collection ... [more ▼] We propose a decision triggered data transmission and collection (DTDTC) protocol for condition monitoring and anomaly detection in the industrial Internet of things (IIoT). In the IIoT, the collection, processing, encoding, and transmission of the sensor readings are usually not for the reconstruction of the original data but for decision making at the fusion center. By moving the decision making process to the local end devices, the amount of data transmission can be significantly reduced, especially when normal signals with positive decisions dominate in the whole life cycle and the fusion center is only interested in collecting the abnormal data. The proposed concept combines compressive sensing, machine learning, data transmission, and joint decision making. The sensor readings are encoded and transmitted to the fusion center only when abnormal signals with negative decisions are detected. All the abnormal signals from the end devices are gathered at the fusion center for a joint decision with feedback messages forwarded to the local actuators. The advantage of such an approach lies in that it can significantly reduce the volume of data to be transmitted through wireless links. Moreover, the introduction of compressive sensing can further reduce the dimension of data tremendously. An exemplary case, i.e., diesel engine condition monitoring, is provided to validate the effectiveness and efficiency of the proposed scheme compared to the conventional ones. [less ▲] Detailed reference viewed: 52 (2 UL)![]() Cassagnes, Cyril ![]() ![]() ![]() in IEEE Xplore (2020, June 08) In this paper, we explain that container engines are strengthening their isolation mechanisms. Therefore, nonintrusive monitoring becomes a must-have for the performance analysis of containerized user ... [more ▼] In this paper, we explain that container engines are strengthening their isolation mechanisms. Therefore, nonintrusive monitoring becomes a must-have for the performance analysis of containerized user-space application in production environments. After a literature review and background of Linux subsystems and container isolation concepts, we present our lessons learned of using the extended Berkeley packet filter to monitor and profile performance. We carry out the profiling and tracing of several Interledger connectors using two full-fledged implementations of the Interledger protocol specifications. [less ▲] Detailed reference viewed: 166 (16 UL)![]() ; Kasprzak, Mikolaj ![]() in Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics (AISTATS) (2020, June) Detailed reference viewed: 57 (19 UL)![]() Gallet, Thibaut ![]() ![]() ![]() in 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) (2020, February 06) Careful surface analysis is essential to understand the electronic and ionic behaviors in perovskite absorbers. In this contribution we discuss Kelvin probe force microscopy performed in ultra-high vacuum ... [more ▼] Careful surface analysis is essential to understand the electronic and ionic behaviors in perovskite absorbers. In this contribution we discuss Kelvin probe force microscopy performed in ultra-high vacuum on as-grown and annealed co-evaporated methylammonium lead iodide perovskite thin films. By comparing the contact potential difference upon annealing and illumination, we find that annealing increases the average workfunction, indicating a change either in doping or in surface composition. Illumination also increases the average workfunction, indicating a p-type absorber, by reducing band bending as the photo-generated carriers screen the surface states. The effect of light shows a two-step process, with a first fast trend, linked to the surface photovoltage and a second slower trend indicating a possible redistribution of mobile charges. [less ▲] Detailed reference viewed: 101 (6 UL)![]() Pinel, Frédéric ![]() ![]() in Communications in Computer and Information Science (2020, February) We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be ... [more ▼] We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be embedded in the scheduler of a shared GPU infrastructure, capable of providing estimated training times for a wide range of network architectures, when the user submits a training job. To this end, a very short and simple representation for a given DNN is chosen. In order to compensate for the limited degree of description of the basic network representation, a novel co-evolutionary approach is taken to fit the estimator. The training set for the estimator, i.e. DNNs, is evolved by an evolutionary algorithm that optimizes the accuracy of the estimator. In the process, the genetic algorithm evolves DNNs, generates Python-Keras programs and projects them onto the simple representation. The genetic operators are dynamic, they change with the estimator’s accuracy in order to balance accuracy with generalization. Results show that despite the low degree of information in the representation and the simple initial design for the predictor, co-evolving the training set performs better than near random generated population of DNNs. [less ▲] Detailed reference viewed: 167 (15 UL)![]() ; Vitello, Piergiorgio ![]() in Transportation Research Procedia (2020, January), 47 Detailed reference viewed: 92 (11 UL)![]() ; Vitello, Piergiorgio ![]() in Transportation Research Procedia (2020, January), 47 Detailed reference viewed: 92 (11 UL)![]() ; Rinaldi, Marco ![]() in Transportation Research Procedia (2020, January), 47 Detailed reference viewed: 68 (5 UL)![]() van Duin, Claire ![]() ![]() ![]() in Cogent Medicine (2020), 7(1), Background: Adolescents spend an increasing amount of time communicating online. Previous research has indicated that electronic media communication has been associated with positive outcomes on ... [more ▼] Background: Adolescents spend an increasing amount of time communicating online. Previous research has indicated that electronic media communication has been associated with positive outcomes on adolescent well-being and development, however, problematic social media use is on the rise. This study investigates factors that influence problematic social media use (PSMU), based on previous empirical research and the Differential Susceptibility to Media Effects Model by Valkenburg and Peter (2013). Methods: The data used in this study stems from the 2018 Health Behaviour for School-aged Children (HBSC) study in Luxembourg. Data from elementary and secondary school students aged 11 to 18 was used (N = 6164), which was collected through a written survey. A four-stage hierarchical multiple regression analysis was conducted using SPSS, with problematic social media use as the dependent variable. 14 independent variables were included in the model, added in four blocks: sociodemographic factors, social support factors, well-being factors and media use factors.Results: The results indicate that in stage one of the hierarchical regression, the sociodemographic predictors accounted for 3% of the variation in problematic social media use. The addition of the social support factors to the model in stage two explained an additional 7% of the variation in problematic social media use, and the addition of the well-being factors in stage three an additional 5.3%. In stage four of the hierarchical regression media use factors were added to the model, and the four blocks of predictors accounted for 22.2% of the variation in problematic social media use (Adjusted R2 = 0.222). The most important predictors for problematic social media use were preference for online social interaction (β = 0.205, p < .001), the intensity of electronic media communication (β = 0.155, p < .001), psychosomatic complaints (β = 0.136, p < .001), perceived stress (β = 0.122, p < .001) and cyberbullying perpetration (β = 0.117, p < .001). Conclusions: The block of sociodemographic factors contributed minimally to the explanation of the variance in problematic social media use in the model. The most important predictors for problematic social media use were preference for online social interaction, the intensity of electronic media communication, psychosomatic complaints, perceived stress and cyberbullying perpetration. This suggests that there are several starting points for the prevention of problematic social media use among adolescents. [less ▲] Detailed reference viewed: 280 (40 UL)![]() Khan, Nida ![]() in IEEE BCA @AICCSA 2019 - Workshop on Blockchain and it's Applications (2020) Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems ... [more ▼] Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems remains to address data privacy. While in Bitcoin and similar e-cash systems, privacy was limited to anonymity and addressed by using cryptographic pseudonyms for identification and authentication of parties, the question of privacy has more breadth in systems maintaining actual data such as medical records or energy meters. In this paper, we look into recently proposed privacy-preserving blockchains, analyze their strengths and weaknesses, and highlight research questions requiring future investigation. We conclude that privacy-preserving blockchains are still in their infancy and more research is definitely needed in this area. [less ▲] Detailed reference viewed: 177 (19 UL)![]() Chiara, Pier Giorgio ![]() in CEUR Workshop Proceedings (2020), 2598 Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing power. Given also their ubiquitous presence, lower costs and limitations in keeping security measures up ... [more ▼] Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing power. Given also their ubiquitous presence, lower costs and limitations in keeping security measures up-todate, resource-constrained devices represent a growing risk for the security of IT infrastructure. The scope of the research is to investigate the weaknesses of resource-constrained IoT devices. The methodology for the investigation is the legal analysis of existing legal frameworks regulating IoT cybersecurity and data security; afterwards it will be carried out a critical evaluation of the existing best practices. This critical analysis should face the twofold challenge of increasing transparency and trust in resource-constrained systems. Users and companies are two faces of the same coin: accountability of data collectors and user awareness are crucial in the security and data protection debate. Thus, a comprehensive overview of the relevant legal frameworks and guidelines would increase the understanding of risks of the users, whilst data controllers (especially of small and medium enterprises) may have an instrument to implement properly security measures. [less ▲] Detailed reference viewed: 158 (5 UL)![]() ; Lallemand, Carine ![]() in Communications in Computer and Information Science (2020), 1294 The popularity of recreational sports such as running, has increased substantially due to its low threshold to start and it is attractive for a wide range of people. However, despite the growing ... [more ▼] The popularity of recreational sports such as running, has increased substantially due to its low threshold to start and it is attractive for a wide range of people. However, despite the growing popularity, running has a high drop-out rate due to injuries and motivational loss, especially among novice runners. To investigate factors influencing motivation among novice runners and design opportunities, we deployed an empathy probe at a women-only running event. Faye is a running shirt that reveals motivational feedback on the shirt, during the warm-up phase of the run. In this paper, we both inform on the impact of motivational feedback while warming up on running motivation and reflect on the use of an empathy probe to investigate motivational strategies among novice runners. © 2020, Springer Nature Switzerland AG. [less ▲] Detailed reference viewed: 38 (2 UL)![]() Pauly, Claire ![]() ![]() in Innovation in Aging (2020), 4(S1), 952 Detailed reference viewed: 128 (19 UL)![]() ; Markovich, Réka ![]() ![]() in Legal Knowledge and Information Systems – Frontiers in Artificial Intelligence and Application Series (2020) Detailed reference viewed: 67 (4 UL)![]() Singh, Ajay ![]() in IEEE NANO (2020) Detailed reference viewed: 48 (2 UL)![]() ; ; et al in Proceedings of Conference on Human Factors in Computing Systems (2020) In office environments, workers spend the majority of their workday sitting in a static position behind a desk or around a meeting table. Prolonged sitting time and sedentary behavior have severe negative ... [more ▼] In office environments, workers spend the majority of their workday sitting in a static position behind a desk or around a meeting table. Prolonged sitting time and sedentary behavior have severe negative health effects. Through this explorative study, we studied how different postures can be stimulated during meetings. We designed PositionPeak: three pieces of furniture aimed at composing a 'dynamic meeting room', subtly encouraging participants to avoid static postures. We video-recorded 5 meetings (N=16) and coded the number of position changes per participant. Participants also filled out a pre- and post-questionnaire about their experience. Our findings show that PositionPeak triggers people to adopt a variety of postures. Participants on average experienced a more efficient meeting but reported physical discomfort with some objects. We discuss the influence of PositionPeak on the meetings' social dynamics, the acceptance of new conventions and design recommendations for new meeting facilities. © 2020 Owner/Author. [less ▲] Detailed reference viewed: 74 (3 UL)![]() Perucca, Antonella ![]() ![]() ![]() in Proceedings of the Roman Number Theory Association (2020) Detailed reference viewed: 94 (10 UL)![]() Leist, Anja ![]() in Alzheimer's and Dementia: the Journal of the Alzheimer's Association (2020), 16 Background: Intervention studies have shown beneficial short-term effects of physical activity on cognitive decline and reduced risk of dementia. However, randomized controlled trial data of lifestyle ... [more ▼] Background: Intervention studies have shown beneficial short-term effects of physical activity on cognitive decline and reduced risk of dementia. However, randomized controlled trial data of lifestyle interventions over long time spans are not available due to lack of resources, feasibility or ethical reasons. Drawing from the principles of emulating a ‘target trial’, which apply design principles of randomized trials to the analysis of observational data, cohort data of a large European survey were analyzed to understand the long-term effects of physical activity changes. Method: Biennial assessments of the economic, social, and health situation of respondents aged 50 and older came from the Survey of Health, Ageing and Retirement in Europe (2004-2017). Cognitive functioning (immediate recall, delayed recall, and verbal fluency) and self-reported diagnosis of dementia were assessed at each follow-up. The target trial included sedentary respondents at t1 who, at follow-up (t2), stayed sedentary (“control group”) or newly reported vigorous physical activity more often than once a week (initiators, “treatment group”). Inclusion and exclusion criteria were implemented as close as possible to those of the FINGER trial. Inverse-probability weighting accounted for the probability of initiating physical activity with a large set of predictor variables. Selecting respondents aged 50-85 years old who met the target trial inclusion and exclusion criteria, assessments of cognitive functioning and self-reported diagnosis of dementia were available for 8,781 respondents at t3 (on average 3.02 years later), 3,858 respondents at t4 (5.84 years), and 2,304 respondents at t5 (7.72 years). A total of 304 respondents reported a diagnosis of dementia. Result: Initiators of vigorous physical activity had higher cognitive functioning at two follow-ups compared to non-initiators (t3: “average treatment effect on the treated”, ATET=0.059, CI: 0.028, 0.090), which remained significant after implementing inclusion and exclusion criteria. Initiators had lower risk of dementia compared to non-initiators at all three follow-ups (t3: ATET=-0.009, CI: -0.015, -0.005, relative risk decrease -46.7%), remaining significant after implementing inclusion and exclusion criteria. Conclusion: Emulating a target trial showed long-term benefits of initiating physical activity for cognitive functioning and dementia risk. Multidomain interventions related to nutrition, social, cognitive activities etc. can be similarly emulated. [less ▲] Detailed reference viewed: 182 (2 UL)![]() ; ; Lagraa, Sofiane ![]() in IEEE International Conference on Distributed Computing Systems (ICDCS) (2020) Managed security service providers increasingly rely on machine-learning methods to exceed traditional, signature- based threat detection and classification methods. As machine- learning often improves ... [more ▼] Managed security service providers increasingly rely on machine-learning methods to exceed traditional, signature- based threat detection and classification methods. As machine- learning often improves with more data available, smaller orga- nizations and clients find themselves at a disadvantage: Without the ability to share their data and others willing to collaborate, their machine-learned threat detection will perform worse than the same model in a larger organization. We show that Feder- ated Learning, i.e. collaborative learning without data sharing, successfully helps to overcome this problem. Our experiments focus on a common task in cyber security, the detection of unwanted URLs in network traffic seen by security-as-a-service providers. Our experiments show that i) Smaller participants benefit from larger participants ii) Participants seeing different types of malicious traffic can generalize better to unseen types of attacks, increasing performance by 8% to 15% on average, and up to 27% in the extreme case. iii) Participating in Federated training never harms the performance of the locally trained model. In our experiment modeling a security-as-a service setting, Federated Learning increased detection up to 30% for some participants in the scheme. This clearly shows that Federated Learning is a viable approach to address issues of data sharing in common cyber security settings. [less ▲] Detailed reference viewed: 121 (10 UL)![]() Distler, Verena ![]() ![]() ![]() in The 5th European Workshop on Usable Security (EuroUSEC 2020) (2020) When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and ... [more ▼] When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and the actual system state can lead to potentially risky behaviors. It is thus crucial to understand how security perceptions are shaped by interface elements such as text-based descriptions of encryption. This article addresses the question of how encryption should be described to non-experts in a way that enhances perceived security. We tested the following within-subject variables in an online experiment (N=309): a) how to best word encryption, b) whether encryption should be described with a focus on the process or outcome, or both c) whether the objective of encryption should be mentioned d) when mentioning the objective of encryption, how to best describe it e) whether a hash should be displayed to the user. We also investigated the role of context (between subjects). The verbs “encrypt” and “secure” performed comparatively well at enhancing perceived security. Overall, participants stated that they felt more secure not knowing about the objective of encryption. When it is necessary to state the objective, positive wording of the objective of encryption worked best. We discuss implications and why using these results to design for perceived lack of security might be of interest as well. This leads us to discuss ethical concerns, and we give guidelines for the design of user interfaces where encryption should be communicated to end users. [less ▲] Detailed reference viewed: 101 (7 UL)![]() ; Kornadt, Anna Elena ![]() in Innovation in Aging (2020), 4(Supplement_1), 588-588 It remains unknown how distinct types of views on aging (VoA) are related to one another, and to aging outcomes. We used a latent-variable structural equation model to test the hypothesis that generalized ... [more ▼] It remains unknown how distinct types of views on aging (VoA) are related to one another, and to aging outcomes. We used a latent-variable structural equation model to test the hypothesis that generalized views on aging (assessed as Age Stereotypes (AS)) would influence personal views on aging (assessed as Self-Perceptions of Aging (SPA)), which in-turn would influence later physical and mental health. Data came from a longitudinal survey on VoA (N= 537, MageT1 = 64.13, age rangeT1 = 40-98). As expected, SPA mediated the effect of AS on physical (loss-SPA: β = .23, p< .001; gain-SPA: β = .06, p< .001; R2 = .62) and mental health (loss-SPA: β = .13, p< .001; gain-SPA: β = .03, p< .01, ; R2 = .31). Congruent with theoretical assumptions, our findings provide empirical support for a directional pathway by which generalized views on aging affect health outcomes via personal views of aging. [less ▲] Detailed reference viewed: 96 (1 UL)![]() Conac, Pierre-Henri ![]() in Fordham Journal of Corporate and Financial Law (2020), 25 Detailed reference viewed: 66 (0 UL)![]() Kornadt, Anna Elena ![]() in Innovation in Aging (2020), 4(Supplement_1), 556-556 Subjective age (SA) is strongly linked to positive developmental outcomes and successful aging. The social roles people assume are supposed to impact SA, since they incorporate age-graded social ... [more ▼] Subjective age (SA) is strongly linked to positive developmental outcomes and successful aging. The social roles people assume are supposed to impact SA, since they incorporate age-graded social experiences and age-stereotypic role expectations. Social roles are also strongly gendered, providing the opportunity to understand gender-specific processes of SA. This study investigates a broad range of social roles and their relation to older men and women’s SA in later life. N = 285 participants aged 50 to 86 years (Mage = 65.04, SD = 8.88) reported on 19 social roles and their SA. Higher commitment to social roles of continued development and engagement was related to a younger subjective age, above and beyond sociodemographic variables, physical and mental health, but only for younger men. Commitment to family roles was related to a younger subjective age only for older men. Implications for the gender-specific understanding of antecedents of SA are discussed. [less ▲] Detailed reference viewed: 102 (2 UL)![]() Albert, Isabelle ![]() ![]() in Innovation in Aging (2020), 4(Supplement_1), 957-958 During the COVID-19 crisis, older adults, in particular those with underlying health conditions, were at a special risk for severe illness and mortality, and efforts were made to shield them from exposure ... [more ▼] During the COVID-19 crisis, older adults, in particular those with underlying health conditions, were at a special risk for severe illness and mortality, and efforts were made to shield them from exposure to the virus. While measures of physical distancing and reduction of in-person contacts were necessary to prevent contraction, they hit residents of care settings particularly hard since visits from family and friends were banned and the risk for loneliness and social isolation increased. In the present study, we therefore gave the voice to nursing home residents and focused on their perceived loneliness and subjective well-being during the crisis. We were both interested in difficulties but also in personal resources and resilience factors that might protect older adults from negative mental health outcomes and help to maintain subjective well-being. A sample of N = 76 residents in care homes in the Grand Duchy of Luxembourg were interviewed by use of a standardized questionnaire during July and August 2020. Participants reported on their loneliness and life satisfaction during the crisis, on their self-regulatory strategies as well as on personal and social resources (e.g. self-efficacy, generativity, social support). Data will be analyzed by use of regression analysis to predict loneliness and well-being by risk and protective factors. Results will be discussed applying a life-span developmental and systemic perspective to understand the mutual interplay of individual, social and institutional resources to mitigate negative side effects of protective measures on care home residents. [less ▲] Detailed reference viewed: 195 (3 UL)![]() ; ; et al in Conference on Lasers and Electro-Optics (2020) (2020) Detailed reference viewed: 61 (0 UL)![]() ; ; et al in DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference (2020) The Office Jungle is an experimental office environment designed to make offices more "wild". Through this demonstration and associated design vision, we make a first attempt to reflect on and to define ... [more ▼] The Office Jungle is an experimental office environment designed to make offices more "wild". Through this demonstration and associated design vision, we make a first attempt to reflect on and to define what characterizes wildness and how it could empower people in more playful and active lifestyles, particularly in the workplace. In our understanding, wildness is not an exclusive property of nature, but rather a condition that can be designed for. How wildness can be designed is described here in a set of design principles called "Design for Wildness", inspired by the work of Gibson. The Office Jungle, a large geodesic sphere of 2 meters in diameter, is part and parcel of these design principles and can be used as a tool to design other wild environments. Such environments could benefit people working in the office, many of whom have been suffering the consequences of a sedentary lifestyle. © 2020 Owner/Author. [less ▲] Detailed reference viewed: 29 (0 UL)![]() Kornadt, Anna Elena ![]() ![]() in Innovation in Aging (2020), 4(Supplement_1), 961-961 During the Covid-Crisis, stereotypes of older adults as helpless and vulnerable were spread, and intergenerational conflict was stirred more or less openly. We thus focused on perceived ageism during the ... [more ▼] During the Covid-Crisis, stereotypes of older adults as helpless and vulnerable were spread, and intergenerational conflict was stirred more or less openly. We thus focused on perceived ageism during the crisis and its effects on well-being and health of older adults. Since views on aging are multifaceted and can be both, risk and resource for individual development, we assessed people’s self-perceptions of aging (SPA) as social loss, continued growth and physical decline and subjective age (SA). We hypothesized that people with SPA of social loss and physical decline would be more susceptible to negative effects of perceived ageism, whereas those with SPA of continued growth and younger SA would be less affected. NT1 = 611 community-dwelling adults aged 60 – 98 (Mage = 69.92 years) were recruited in June 2020 online and via phone in Luxembourg. In September 2020, participants will be contacted again for a follow-up. Analyses with cross-sectional data show that participants who felt more discriminated reported lower life satisfaction after the onset of the crisis (r = -.35) and worse subjective health (r = -.14). SPA of social loss and higher SA increased the negative effect of ageism on well-being (beta = -.57) and subjective health (beta = -.53), respectively. Our results point to mid- and long-term consequences of age discriminatory and stereotype-based crisis communication for the well-being of older adults and the importance of individual SPA in critical situations. [less ▲] Detailed reference viewed: 132 (6 UL)![]() ; ; Kong, Long ![]() in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020) Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) system for the fifth generation (5G) cellular communications can also enable single-anchor positioning and object tracking due to its large ... [more ▼] Millimeter-wave (mmWave) multiple-input multiple-output (MIMO) system for the fifth generation (5G) cellular communications can also enable single-anchor positioning and object tracking due to its large bandwidth and inherently high angular resolution. In this paper, we introduce the newly invented concept, large intelligent surface (LIS), to mmWave positioning systems, study the theoretical performance bounds (i.e., Cramér-Rao lower bounds) for positioning, and evaluate the impact of the number of LIS elements and the value of phase shifters on the position estimation accuracy compared to the conventional scheme with one direct link and one non-line-of-sight path. It is verified that better performance can be achieved with a LIS from the theoretical analyses and numerical study. [less ▲] Detailed reference viewed: 70 (6 UL)![]() ; ; et al in Innovation in Aging (2020), 4(Supplement_1), 598-598 While increasing longitudinal evidence suggests that negative age views accelerate cognitive decline and increase dementia risk, we know little about such co-variance dynamics on a daily basis. We make ... [more ▼] While increasing longitudinal evidence suggests that negative age views accelerate cognitive decline and increase dementia risk, we know little about such co-variance dynamics on a daily basis. We make use of subjective age and working memory performance data obtained six times a day over seven consecutive days as people went about their daily routines from 123 young-old (aged 66-69 years, 47.2% women) and 42 old-old (aged 86-90 years, 55.8% women) adults. Notably, multilevel models revealed considerably-sized short-term intra-individual variation of subjective age and working memory within days and these short-term within-day fluctuations in subjective age and working memory were coupled as expected. Hence, increased subjective age went along with lowered working memory confirming previous research. However, the respective between-day associations appeared reversed. Given this evidence of correlated short-term variability, we also discuss implications of different change dynamics that might explain moment-to-moment versus day-to-day associations between subjective age and working memory. [less ▲] Detailed reference viewed: 75 (0 UL)![]() ; Topal, Ali Osman ![]() ![]() in Proceedings - 2020 International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020 (2020) Over the last few years, there has been an increasing number of studies about facial emotion recognition because of the importance and the impact that it has in the interaction of humans with computers ... [more ▼] Over the last few years, there has been an increasing number of studies about facial emotion recognition because of the importance and the impact that it has in the interaction of humans with computers. With the growing number of challenging datasets, the application of deep learning techniques have all become necessary. In this paper, we study the challenges of Emotion Recognition Datasets and we also try different parameters and architectures of the Conventional Neural Networks (CNNs) in order to detect the seven emotions in human faces, such as: anger, fear, disgust, contempt, happiness, sadness and surprise. We have chosen iCV MEFED (Multi-Emotion Facial Expression Dataset) as the main dataset for our study, which is relatively new, interesting and very challenging. © 2020 IEEE. [less ▲] Detailed reference viewed: 46 (5 UL)![]() Settels, Jason ![]() ![]() in Innovation in Aging (2020), 4(S1), 483 Detailed reference viewed: 104 (0 UL)![]() Ribeiro, Fabiana ![]() in Alzheimer's and Dementia: the Journal of the Alzheimer's Association (2020), 16 Background: Decreases in prevalence of memory impairment and dementia over the last two decades have been observed in different countries for cohorts entering older age. We sought to explore the changes ... [more ▼] Background: Decreases in prevalence of memory impairment and dementia over the last two decades have been observed in different countries for cohorts entering older age. We sought to explore the changes in prevalence of cognitive impairment across four waves of the Health, Welfare and Aging survey (SABE) with data collected in Sao Paolo, Brazil, in 2000, 2006, 2010, and 2015. Method: Mini Mental State Exam (MMSE) scores and covariate values were available for 5,191 respondents (62.4% female) aged 60 to 99 across four waves. Cognitive impairment was defined as having <=12 points on a 19-point abbreviated version of the MMSE. Age group, educational attainment (no formal schooling, primary, secondary, post-secondary), self-reported heart disease, stroke, diabetes, hypertension, and BMI (<18.5, 18.5-24.9, 25-29.9, 30+) were adjusted for. Result: In more recent waves, prevalence of cognitive impairment was higher for respondents aged 60-64 years (9.0% in 2015 vs. 4.6% in 2000), 65-69 years (9.7% in 2015 vs. 5.8% in 2006) and 70-74 years (13.9% in 2015 vs. 5.8% in 2006). Between 2015 and 2000, respondents were increasingly more likely to report some formal education (90.8% vs. 75.3%), secondary (17.6% vs. 7.3%) or postsecondary education (11.4% vs. 4.3%). Respondents were increasingly more likely to report hypertension (66.5% vs. 54.2%), diabetes (28.7% vs. 17.8%), and be overweight/obese (74.1% vs. 58.9%). In age-adjusted logistic regressions, respondents in 2015 were more likely to show cognitive impairment compared to 2000 (OR 1.84, CI 1.20-2.82). Conclusion: SABE respondents showed higher prevalence of cognitive impairment in 2015 compared to respondents of the same age in earlier waves, but differences disappeared after adjusting for chronic disease burden and educational attainment. [less ▲] Detailed reference viewed: 125 (6 UL)![]() Ribeiro, Fabiana ![]() ![]() in Innovation in Aging (2020), 4(S1), 897898 Detailed reference viewed: 66 (2 UL)![]() ; Lallemand, Carine ![]() in ACM International Conference Proceeding Series (2020) Running is a popular recreational sport, yet for many amateur runners it remains challenging to turn intentions into sustainable running behavior. Although the market offers a myriad of running-related ... [more ▼] Running is a popular recreational sport, yet for many amateur runners it remains challenging to turn intentions into sustainable running behavior. Although the market offers a myriad of running-related devices that aim to motivate runners, these often focus on the training itself and not on overcoming the barriers experienced prior to the run. A better understanding of these barriers to running is essential to identify design opportunities for technologies supporting amateur runners. We conducted two complementary studies among participants of a women-only running event. Combining an online survey (N = 114) and a journey mapping activity (N = 13), we investigated the influence of motivational barriers and enablers in runners' rituals. Based on our findings, we created the Runner's Journey, a visual narrative highlighting actionable design opportunities for running motivation technology. We propose five design recommendations to overcome barriers among amateur runners. © 2020 ACM. [less ▲] Detailed reference viewed: 45 (4 UL)![]() ; ; Mahfouz, Ahmed ![]() in Advances in the Astronautical Sciences (2020), 173 This study is a part of the Skoltech University project to deploy a swarm of four identical 3U CubeSats in LEO. The CubeSats are to be equipped with gamma-ray sensors and their collective behavior will be ... [more ▼] This study is a part of the Skoltech University project to deploy a swarm of four identical 3U CubeSats in LEO. The CubeSats are to be equipped with gamma-ray sensors and their collective behavior will be exhibited in detecting gamma-ray bursts and coordinated attitude control. We consider a fully magnetic attitude control system, comprising a magnetometer as a part of attitude determination routine and three orthogonal magnetorquers as actuators. Having implemented and tested the conventional three-axis magnetic attitude determination and control algorithms, we proceed to study how the performance of such ADCS may be enhanced by using measurements and state vectors exchange. We interpolate the exchanged data, using the Kriging algorithm in conjunction with Extended Kalman filter and Lyapunov-based controller, since it provides the auto correlation and variance information about the environment of the magnetic field, which is of utmost importance for heterogeneous and noisy fields. In our simulations we compare the performance of the controller for a single satellite to that of the satellite in the swarm of CubeSats, which maintains the form of a regular tetrahedron and carries out distributed measurements with interpolation. Improved attitude stabilization for the latter scenario is demonstrated by mean squared errors. [less ▲] Detailed reference viewed: 22 (3 UL)![]() ; ; Lallemand, Carine ![]() in DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference (2020) This paper describes Ivy, an office chair that represents sitting time of an office worker through growing ivy strands. The longer one sits, the more strands will grow onto the chair. By means of a ... [more ▼] This paper describes Ivy, an office chair that represents sitting time of an office worker through growing ivy strands. The longer one sits, the more strands will grow onto the chair. By means of a qualitative interface called Ivy, we illustrate a design approach that is currently underrepresented in sedentary behavior interventions. With this approach, we counter the current trend of digitalization and quantification of health interventions. Instead of graphs and numbers, Ivy uses data physicalization as a qualitative interface that represents sitting. We describe the design, the process, and future research steps of Ivy as a critical perspective on sedentary behavior interventions. We aim to spark discussion amongst designers and researchers in the field of Human-Computer Interaction to use qualitative interfaces as a promising approach to deepen the user's relationship with the targeted behavior and enrich the ability to construct meaning from the feedback. © 2020 Owner/Author. [less ▲] Detailed reference viewed: 36 (0 UL)![]() ; ; et al in DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference (2020) Walking meetings are a promising means to improve healthy behavior at work. By providing a physically active way of working, walking meetings can reduce our sitting time. Several obstacles that limit the ... [more ▼] Walking meetings are a promising means to improve healthy behavior at work. By providing a physically active way of working, walking meetings can reduce our sitting time. Several obstacles that limit the social acceptance and wider adoption of walking meeting practice have been highlighted in previous research. Amongst these, the difficulty to take notes or present files is a recurring concern for office workers. To address these barriers, we designed the Hub, a network of stand-up meeting stations that accommodate different work-related tasks during walking meetings. We report on two pilot user tests investigating users' experiences and ideas for improvement, and present future research steps. We discuss the usefulness and relevance of the Hub concept to overcome the obstacles associated with walking meetings. © 2020 Owner/Author. [less ▲] Detailed reference viewed: 32 (0 UL)![]() ; ; Lallemand, Carine ![]() in DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference (2020) In this paper, we present and discuss Ivy, a critical artifact offering a novel design perspective on interventions that aim to reduce sedentary behavior in office workers. Ivy is an interactive office ... [more ▼] In this paper, we present and discuss Ivy, a critical artifact offering a novel design perspective on interventions that aim to reduce sedentary behavior in office workers. Ivy is an interactive office chair that represents the amount of sitting time through growing ivy strands. Using the matrix of common argument types by Bardzell et al., we propose a structured "reading" of Ivy, as an example supporting reasoned and accessible conversations about criticality in design. Our reading of Ivy emphasized that its criticality emerges mainly from data physicalization as a new form of interactivity intended to trigger reflectiveness. The insights of this design study contribute towards a critical perspective on designing interventions to reduce sedentary time and spark discussion amongst designers and researchers in the field of Human-Computer Interaction. © 2020 Owner/Author. [less ▲] Detailed reference viewed: 34 (2 UL)![]() Aalto, Atte ![]() ![]() in Proceedings of the IEEE Conference on Decision and Control (2019, December) Developments in transcriptomics techniques have caused a large demand in tailored computational methods for modelling gene expression dynamics from experimental data. Recently, so-called single-cell ... [more ▼] Developments in transcriptomics techniques have caused a large demand in tailored computational methods for modelling gene expression dynamics from experimental data. Recently, so-called single-cell experiments have revolutionised genetic studies. These experiments yield gene expression data in single cell resolution for a large number of cells at a time. However, the cells are destroyed in the measurement process, and so the data consist of snapshots of an ensemble evolving over time, instead of time series. The problem studied in this article is how such data can be used in modelling gene regulatory dynamics. Two different paradigms are studied for linear system identification. The first is based on tracking the evolution of the distribution of cells over time. The second is based on the so-called pseudotime concept, identifying a common trajectory through the state space, along which cells propagate with different rates. Therefore, at any given time, the population contains cells in different stages of the trajectory. Resulting methods are compared in numerical experiments. [less ▲] Detailed reference viewed: 336 (51 UL)![]() Merlano Duncan, Juan Carlos ![]() ![]() ![]() in Proceedings of the 37th International Communications Satellite Systems Conference (2019, November 01) In this paper, we present a new hardware test-bed to demonstrate closed-loop precoded communications for interference mitigation in multi-beam ultra high throughput satellite systems under realistic ... [more ▼] In this paper, we present a new hardware test-bed to demonstrate closed-loop precoded communications for interference mitigation in multi-beam ultra high throughput satellite systems under realistic payload and channel impairments. We build the test-bed to demonstrate a real-time channel aided precoded transmission under realistic conditions such as the power constraints and satellite-payload non-linearities. We develop a scalable architecture of an SDR platform with the DVB-S2X piloting. The SDR platform consists of two parts: analog-to-digital (ADC) and digital-to-analog (DAC) converters preceded by radio frequency (RF) front-end and Field-Programmable Gate Array (FPGA) backend. The former introduces realistic impairments in the transmission chain such as carrier frequency and phase misalignments, quantization noise of multichannel ADC and DAC and non-linearities of RF components. It allows evaluating the performance of the precoded transmission in a more realistic environment rather than using only numerical simulations. We benchmark the performance of the communication standard in realistic channel scenarios, evaluate received signal SNR, and measure the actual channel throughput using LDPC codes. [less ▲] Detailed reference viewed: 205 (55 UL)![]() Monzon Baeza, Victor ![]() in 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC) (2019, November) Detailed reference viewed: 17 (4 UL)![]() Rivera, Sean ![]() ![]() ![]() in International Symposium on Software Reliability Engineering (2019, October) In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-physical systems as they rely on several sensors to perform critical operations. The most sensitive ... [more ▼] In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-physical systems as they rely on several sensors to perform critical operations. The most sensitive targets are their location systems, where spoofing attacks can force robots to behave incorrectly. In this paper, we propose a novel anomaly detection approach for sensor spoofing attacks, based on an auto-encoder architecture. After initial training, the detection algorithm works directly on the compressed data by computing the reconstruction errors. We focus on spoofing attacks on Light Detection and Ranging (LiDAR) systems. We tested our anomaly detection approach against several types of spoofing attacks comparing four different compression rates for the auto-encoder. Our approach has a 99% True Positive rate and a 10% False Negative rate for the 83% compression rate. However, a compression rate of 41% could handle almost all of the same attacks while using half the data. [less ▲] Detailed reference viewed: 110 (23 UL)![]() Charlier, Jérémy Henri J. ![]() ![]() in Proceedings of the Fourth Workshop on MIning DAta for financial applicationS (MIDAS 2019) co-located with the 2019 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2019) (2019, September) Reinforcement learning has become one of the best approach to train a computer game emulator capable of human level performance. In a reinforcement learning approach, an optimal value function is learned ... [more ▼] Reinforcement learning has become one of the best approach to train a computer game emulator capable of human level performance. In a reinforcement learning approach, an optimal value function is learned across a set of actions, or decisions, that leads to a set of states giving different rewards, with the objective to maximize the overall reward. A policy assigns to each state-action pairs an expected return. We call an optimal policy a policy for which the value function is optimal. QLBS, Q-Learner in the Black-Scholes(-Merton) Worlds, applies the reinforcement learning concepts, and noticeably, the popular Q-learning algorithm, to the financial stochastic model of Black, Scholes and Merton. It is, however, specifically optimized for the geometric Brownian motion and the vanilla options. Its range of application is, therefore, limited to vanilla option pricing within the financial markets. We propose MQLV, Modified Q-Learner for the Vasicek model, a new reinforcement learning approach that determines the optimal policy of money management based on the aggregated financial transactions of the clients. It unlocks new frontiers to establish personalized credit card limits or bank loan applications, targeting the retail banking industry. MQLV extends the simulation to mean reverting stochastic diffusion processes and it uses a digital function, a Heaviside step function expressed in its discrete form, to estimate the probability of a future event such as a payment default. In our experiments, we first show the similarities between a set of historical financial transactions and Vasicek generated transactions and, then, we underline the potential of MQLV on generated Monte Carlo simulations. Finally, MQLV is the first Q-learning Vasicek-based methodology addressing transparent decision making processes in retail banking. [less ▲] Detailed reference viewed: 144 (3 UL)![]() Vigneri, Valentino ![]() ![]() in ce/papers (2019, September), 3(3-4), 231-236 The current regulations of EN1994-1-1 for headed stud shear connections in composite beams with profiled sheeting lead, for some configurations, to an over-estimation of the load-bearing capacity. Since ... [more ▼] The current regulations of EN1994-1-1 for headed stud shear connections in composite beams with profiled sheeting lead, for some configurations, to an over-estimation of the load-bearing capacity. Since these design equations are based on empirical considerations, they are not able to capture the real mechanical behaviour of the connector and they do not consider appropriately the influence of the geometry of sheeting on the shear capacity. For this reason, the load-bearing mechanisms of the shear connection are identified in this work with the support of experimental and numerical results. According to the static system presented, the concrete rib is modelled as a system of diagonal struts acting simultaneously in combination with the stud in bending. It is observed that at 2÷4 mm slip, a ?Strut and beam? mechanism prevails where the resistance of the connector depends mostly on the plastic hinges activated in the stud and on the capacity of the diagonal strut in front of it. By increasing the slip (ca. 4÷10 mm), the surrounding concrete progressively crushes while the tensile stresses at the edge of the rib reach the tensile strength of the material. As a consequence of this loss of rotational stiffness, the bending capacity developed in the stud reduces and the upper hinges gradually moves towards the slab. At higher displacements (ca. 20÷40 mm), due to nonlinear geometric effects, high tensile forces develop in the stud and the load is carried through a ?Strut and Tie? resistance mechanism, if the embedment of the stud is sufficient. By further increasing the slip, the whole rib rotates or the failure occurs either for concrete pull-out or stud rupture. This contribution describes the sequence of the activated load-bearing mechanisms in headed stud shear connections with profiled steel sheeting at different displacements. [less ▲] Detailed reference viewed: 134 (29 UL)![]() Charlier, Jérémy Henri J. ![]() ![]() in Proceedings of the International Workshop on Applications of Topological Data Analysis In conjunction with ECML PKDD 2019 (2019, September) Auto-encoders are among the most popular neural network architecture for dimension reduction. They are composed of two parts: the encoder which maps the model distribution to a latent manifold and the ... [more ▼] Auto-encoders are among the most popular neural network architecture for dimension reduction. They are composed of two parts: the encoder which maps the model distribution to a latent manifold and the decoder which maps the latent manifold to a reconstructed distribution. However, auto-encoders are known to provoke chaotically scattered data distribution in the latent manifold resulting in an incomplete reconstructed distribution. Current distance measures fail to detect this problem because they are not able to acknowledge the shape of the data manifolds, i.e. their topological features, and the scale at which the manifolds should be analyzed. We propose Persistent Homology for Wasserstein Auto-Encoders, called PHom-WAE, a new methodology to assess and measure the data distribution of a generative model. PHom-WAE minimizes the Wasserstein distance between the true distribution and the reconstructed distribution and uses persistent homology, the study of the topological features of a space at different spatial resolutions, to compare the nature of the latent manifold and the reconstructed distribution. Our experiments underline the potential of persistent homology for Wasserstein Auto-Encoders in comparison to Variational Auto-Encoders, another type of generative model. The experiments are conducted on a real-world data set particularly challenging for traditional distance measures and auto-encoders. PHom-WAE is the first methodology to propose a topological distance measure, the bottleneck distance, for Wasserstein Auto-Encoders used to compare decoded samples of high quality in the context of credit card transactions. [less ▲] Detailed reference viewed: 77 (4 UL)![]() Odenbreit, Christoph ![]() ![]() in ce/papers (2019, September), 3(3-4), 283-288 The basic principle of the circular economy is to reduce or totally eliminate waste and carbon dioxide production with the help of a multiple, efficient usage of resources. The application of reusable ... [more ▼] The basic principle of the circular economy is to reduce or totally eliminate waste and carbon dioxide production with the help of a multiple, efficient usage of resources. The application of reusable structural elements plays an important role and can contribute essentially to a low-carbon future. Within the European research project REDUCE (Grant Agreement number: 710040), composite beams and steel-based flooring systems, which are demountable and reusable, have been developed and investigated. The experimental investigations showed that the structural behaviour of the newly developed shear connectors differs from the behaviour of the traditionally applied welded studs. Some behave in a non-ductile way. In order to assess, how far the regulations of EN1994-1-1 for shear connections can still be applied, parametric studies have been conducted. The respective numerical models were developed with the use of the commercially available finite element software ABAQUS® and were validated against the experimental observations. The effects of the lack of ductility of the shear connectors on the structural behaviour of the entire composite beam was examined with different types of shear connectors, shear connector layouts and material grades. This contribution presents the underlying laboratory tests as well as the results of the supplementing numerical parameter studies. The outcome provides valuable information for future design guidance concerning the use of demountable shear connectors in composite beams. [less ▲] Detailed reference viewed: 112 (27 UL)![]() Merlano Duncan, Juan Carlos ![]() ![]() in 2019 IEEE International Geoscience and Remote Sensing Symposium (IGARSS) (2019, August 31) Phase, frequency and time synchronization is a crucial requirement for many applications as such as multi-static remote sensing and distributed beamforming for communications. The literature on the field ... [more ▼] Phase, frequency and time synchronization is a crucial requirement for many applications as such as multi-static remote sensing and distributed beamforming for communications. The literature on the field is very wide, and in some cases, the requirements of the proposed synchronization solution may surpass the ones set by the application itself. Moreover, the synchronization solution becomes even more challenging when the nodes are flying or hovering on aerial or space platforms. In this work, we compare and classify the synchronization technologies available in the literature according to a common proposed framework, and we discuss the considerations of an implementation for distributed remote sensing applications. The general framework considered is based on a distributed collection of autonomous nodes that try to synchronize their clocks with a common reference. Moreover, they can be classified in non-overlapping, adjacent and overlapping frequency band scenarios [less ▲] Detailed reference viewed: 157 (16 UL)![]() Leyer, Stephan ![]() in NURETH-18 (2019, August 18) Detailed reference viewed: 81 (6 UL)![]() Haddadan, Shohreh ![]() in Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI-19} (2019, August 14) Political debates are the means used by political candidates to put forward and justify their positions in front of the electors with respect to the issues at stake. Argument mining is a novel research ... [more ▼] Political debates are the means used by political candidates to put forward and justify their positions in front of the electors with respect to the issues at stake. Argument mining is a novel research area in Artificial Intelligence, aiming at analyzing dis-course on the pragmatics level and applying a certain argumentation theory to model and automatically analyze textual data. In this paper, we present DISPUTool, a tool designed to ease the work of historians and social science scholars in analyzing the argumentative content of political speeches. More precisely, DISPUTool allows to explore and automatically identify argumentative components over the 39 political debates from the last 50 years of US presidential campaigns (1960-2016). [less ▲] Detailed reference viewed: 64 (5 UL)![]() ; Schiffner, Stefan ![]() in Data for Better Living: AI and Privacy (2019, August) Detailed reference viewed: 91 (4 UL)![]() Martin Lanzoni, Evandro ![]() ![]() ![]() in IEEE Photovoltaic Specialists Conference. Conference Record (2019, July) We investigated the electrical properties of epitaxial Cu-rich CuInSe 2 by Kelvin probe force microscopy (KPFM) under ambient and ultra-high vacuum conditions. We first measured the sample under ambient ... [more ▼] We investigated the electrical properties of epitaxial Cu-rich CuInSe 2 by Kelvin probe force microscopy (KPFM) under ambient and ultra-high vacuum conditions. We first measured the sample under ambient conditions before and after potassium cyanide (KCN) etching. In both cases, we do not see any substantial contrast in the surface potential data; furthermore, after the KCN etching we observed outgrowths with a height around 2nm over the sample surface. On the other hand, the KPFM measurements under ultra-high vacuum conditions show a work function dependence according to the surface orientation of the Cu-rich CuInSe 2 crystal. Our results show the possibility to increase the efficiency of epitaxial Cu-rich CuInSe 2 by growing the materials in the appropriated surface orientation where the variations in work function are reduced. [less ▲] Detailed reference viewed: 142 (25 UL)![]() Boufaied, Chaima ![]() ![]() ![]() in Journal of Object Technology (2019, July), 18(2), 151-21 The verification of complex software systems often requires to check quantitative properties that rely on aggregation operators (e.g., the average response time of a service). One way to ease the ... [more ▼] The verification of complex software systems often requires to check quantitative properties that rely on aggregation operators (e.g., the average response time of a service). One way to ease the specification of these properties is to use property specification patterns, such as the ones for “service provisioning”, previously proposed in the literature. In this paper we focus on the problem of performing offline trace checking of temporal properties containing aggregation operators. We first present TemPsy-AG, an extension of TemPsy—an existing pattern-based language for the specification of temporal properties—to support service provisioning patterns that use aggregation operators. We then extend an existing model-driven procedure for trace checking, to verify properties expressed in TemPsy-AG. The trace checking procedure relies on the efficient mapping of temporal properties written in TemPsy-AG into OCL constraints on a meta-model of execution traces. We have implemented this procedure in the TemPsy-Check-AG tool and evaluated its performance: our approach scales linearly with respect to the length of the input trace and can deal with much larger traces than a state-of-the-art tool. [less ▲] Detailed reference viewed: 305 (41 UL)![]() Pejo, Balazs ![]() in Proceedings on Privacy Enhancing Technologies (2019, July) Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼] Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have the necessary data to train a reasonably accurate model. For such organizations, a realistic solution is to train their machine learning models based on their joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, by focusing on a two-player setting, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. Using recommendation systems as our main use case, we demonstrate how two players can make practical use of the proposed theoretical framework, including setting up the parameters and approximating the non-trivial Nash Equilibrium. [less ▲] Detailed reference viewed: 110 (4 UL) |
||